Received: by 2002:a5d:925a:0:0:0:0:0 with SMTP id e26csp795656iol; Thu, 9 Jun 2022 14:17:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzRrTFVsEIkVy3AjjO6WZgsmatYplUiW7aYVJg1TSdB7U3G0QN6qyfb40w2ZC5M7MHTjM/t X-Received: by 2002:a17:90b:3908:b0:1e3:1a48:16b7 with SMTP id ob8-20020a17090b390800b001e31a4816b7mr5233804pjb.174.1654809423275; Thu, 09 Jun 2022 14:17:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654809423; cv=none; d=google.com; s=arc-20160816; b=UH3S0FAmPa/n2DFWEIkfJGO7R+8lUbV4r7K2GqdEbOVKbjUNJVIrBs1XSEoYcwT/Yt q2WTopSlOonb6b9s+tjug2+zDJKXZDRyN8oP9r1y3DgDQsFgbIWSibPuwftzZrfEx4jz eDdsodi5uIAiLfdjGCfpJuB8gCy02k+QSvwjgL/SLihqR9QDZgKHWrttjeb6xlIWU3Kg Udt2yEx9PRKd50pGttPazFSlmaNUqeAe7aNM8YSmbkgd7F5PQN/XtUZvb7zQyB8kPKzk +EH1BhTtc7IWNYOcdNK//vzkjQjBdh9BRVWBfCkvDzuyJxhxDfxvu2KY82GtdL6NFt3D c7TA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=PRwCAczOEs3oWB79ndk+TRrGu6B70/rR3Wnhg/0mT/M=; b=ywt+O/K07o6yoWWZEpWwpSWFCUtWuMdnI8Y1uZteIsHHFWs17RtsmzuM1MUepVgXJP mIRt0u7cZxXPKxbtTo3tKcw7cWg+RMOlCLkSr/LpZWv05NUjjrE5TB9OhtiPD1bFN2KK 1x1ZQvAEUzkTouOsg4ridTVjpLREOfxBiz8qeVe+32O8qogHEDYzh1cYr8unqmj+pxim gWkRGQEcYyVgYbYpxMEyIkevvcHIeNDGIXBwl9tEjcG4ELfUbNPJWRz86TFHk70+frlB DS7AbpMlA+ROxdzYh98X8FW0NAMf3CepLu9MqMZ1vcw0qWThycybsKZ0BoZTtQbQmjj+ fccw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UPUrJ8rm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b20-20020a17090a8c9400b001e8942420fasi457696pjo.84.2022.06.09.14.16.50; Thu, 09 Jun 2022 14:17:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=UPUrJ8rm; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344994AbiFIUht (ORCPT + 99 others); Thu, 9 Jun 2022 16:37:49 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59628 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236064AbiFIUhr (ORCPT ); Thu, 9 Jun 2022 16:37:47 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 16ADBDE81 for ; Thu, 9 Jun 2022 13:37:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1654807066; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=PRwCAczOEs3oWB79ndk+TRrGu6B70/rR3Wnhg/0mT/M=; b=UPUrJ8rm+mYswySS1EhesqQGaLqGjpDs8I4VH9qutLrA2crnLBh0QCGhdwizgWSOKocHlp Aksy0IHBUscSzhHX3ZKfUf2mwrEmpge1ZqXnSgPSBs47f2DoI6QR5vzVTd2vCZvApfw6UN HIT5N9S5NkTdw+Lu46pU19NcdZoTYvQ= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-79-kvgtpqTPPj62Ir5KLx3dGQ-1; Thu, 09 Jun 2022 16:37:43 -0400 X-MC-Unique: kvgtpqTPPj62Ir5KLx3dGQ-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 90A4B80159B; Thu, 9 Jun 2022 20:37:42 +0000 (UTC) Received: from jsavitz-csb.redhat.com (unknown [10.22.11.108]) by smtp.corp.redhat.com (Postfix) with ESMTP id 434E71730C; Thu, 9 Jun 2022 20:37:42 +0000 (UTC) From: Joel Savitz To: linux-kernel@vger.kernel.org Cc: Joel Savitz , Andrew Morton , Shuah Khan , linux-mm@kvack.org, linux-kselftest@vger.kernel.org, Nico Pache Subject: [PATCH] selftests: make use of GUP_TEST_FILE macro Date: Thu, 9 Jun 2022 16:32:17 -0400 Message-Id: <20220609203217.3206247-1-jsavitz@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Spam-Status: No, score=-3.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit 17de1e559cf1 ("selftests: clarify common error when running gup_test") had most of its hunks dropped due to a conflict with another patch accepted into Linux around the same time that implemented the same behavior as a subset of other changes. However, the remaining hunk defines the GUP_TEST_FILE macro without making use of it. This patch makes use of the macro in the two relevant places. Furthermore, the above mentioned commit's log message erroneously describes the changes that were dropped from the patch. This patch corrects the record. Fixes: 17de1e559cf1 ("selftests: clarify common error when running gup_test") Signed-off-by: Joel Savitz --- tools/testing/selftests/vm/gup_test.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/vm/gup_test.c b/tools/testing/selftests/vm/gup_test.c index 6bb36ca71cb5..a309876d832f 100644 --- a/tools/testing/selftests/vm/gup_test.c +++ b/tools/testing/selftests/vm/gup_test.c @@ -209,7 +209,7 @@ int main(int argc, char **argv) if (write) gup.gup_flags |= FOLL_WRITE; - gup_fd = open("/sys/kernel/debug/gup_test", O_RDWR); + gup_fd = open(GUP_TEST_FILE, O_RDWR); if (gup_fd == -1) { switch (errno) { case EACCES: @@ -224,7 +224,7 @@ int main(int argc, char **argv) printf("check if CONFIG_GUP_TEST is enabled in kernel config\n"); break; default: - perror("failed to open /sys/kernel/debug/gup_test"); + perror("failed to open " GUP_TEST_FILE); break; } exit(KSFT_SKIP); -- 2.31.1