Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp3264540rwd; Sat, 3 Jun 2023 01:49:48 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4g5KHtTW6bGdPjKATXQ/PNcw/gohFxOPznA5cS9B98foZ7KO3onNws3KwKGoOB7tyTwhLX X-Received: by 2002:a5e:a802:0:b0:76c:4ce7:e37c with SMTP id c2-20020a5ea802000000b0076c4ce7e37cmr5608714ioa.16.1685782188340; Sat, 03 Jun 2023 01:49:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685782188; cv=none; d=google.com; s=arc-20160816; b=hwevkTMXVRyg2pLYUMLxgloGh9DTvwqjwotHb1S7p9xTeSDI0WRpSKQ9wunTiQCrdU yJ7EhILED2b2OS8J2K1WMqOs/QfjBrsBgrrBdLz71eNH/wE9hlpV903HT5rpCpW2h1XR JWnCns9OD7x7QDdh5bCAKvsitEj+CRxQizZfvX/WDDiUFxnK6r/BJ7VloZNx3L2Pe8wP dvhO+RRr5Fz4o6rYQ7jiMzKry3DpxVAiyfL/JxJAKtCSSk5TaXSBhyyhkNkxKbNxp73G nJHXwnlGH7OD9j5c29cMYdm9EvPhokFAROeJGlADNyZAdNEEbgc6wTwG9VwPm3SxQLoO TDiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:feedback-id:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from; bh=rvILh4rr8ZfEfvwjKGol5NwIPh5Vnvb6NtFVVt0n6Y8=; b=0ky5HhjN/x6ZpS9guOjGB/f7RQQieAWKlyXzGKqy89KCsgJ947ocN8Dtb7Fux30YBn pdPLIcXMfRjWMi0WcUvp1yqRYPCMiqvA9CCQ0ZHsYFwyKTUZCj6tVSAjewEOIGMx0flo C/7/kfxzJGSRVw/ytD7OFEbL0yyM5Gi/Qrvxa2ZkWGbWe19tXHHRB1F9cv1O7CRRJGdG S9rPIPmuAT7VPn5JLezGy0yiZFL8aza2E0dR1kdkDjDWB6ioLA6GKP0JuSmlHPxu+/6K NglEku5+alXWhfw9iFOUok8Qqwokadb0Hny8bHIeGiDyeSEwR6E+zDNvVbmbZb30mDiI jymw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c68-20020a633547000000b0053f265b0ef2si2437692pga.471.2023.06.03.01.49.34; Sat, 03 Jun 2023 01:49:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234081AbjFCIBL (ORCPT + 99 others); Sat, 3 Jun 2023 04:01:11 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55124 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229572AbjFCIBJ (ORCPT ); Sat, 3 Jun 2023 04:01:09 -0400 Received: from bg4.exmail.qq.com (bg4.exmail.qq.com [43.154.54.12]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 812D81B6; Sat, 3 Jun 2023 01:01:06 -0700 (PDT) X-QQ-mid: bizesmtp66t1685779256tfrhwl1v Received: from linux-lab-host.localdomain ( [119.123.130.226]) by bizesmtp.qq.com (ESMTP) with id ; Sat, 03 Jun 2023 16:00:55 +0800 (CST) X-QQ-SSF: 00200000000000D0V000000A0000000 X-QQ-FEAT: k0mQ4ihyJQNgkVwygW0yshuGkeM5gEbPP6qD3JPq1MQNFpbusU7tTU0lbB22l A/5UcKnooUQIfO7IdU6An49Ew/yF6sQud/gbxCL4QnanhGzK5jwDlyfGoBThAEWl768oPaN eBs1jfQtfGszTLv2Ika597BM+IvXXcun0tPnrU6tHzcRc2UZUueBk6bih+duFmLswS5oeaG vFxXt7CE38Pel27vLsN2UsJz//tO/rgvA+hJSXSRHAQTde1zwQCX9o42qUvx0BGe+Zs2U5Z 2CNFuUUZWezBEgy6ORi06eutXif6JZYh+Pnlp3AnWar+2IW0xvGRO9ed1T643iOLM4zGfFm dF/cgTkjCgfOoncc6p43EE+tkxQsdBQsYmRC9NXrF1fNybD8O6YFpEQI/CODCNYAvg059yP X-QQ-GoodBg: 0 X-BIZMAIL-ID: 13312987647065387357 From: Zhangjin Wu To: w@1wt.eu Cc: falcon@tinylab.org, arnd@arndb.de, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-riscv@lists.infradead.org, thomas@t-8ch.de Subject: [PATCH v3 01/12] selftests/nolibc: syscall_args: use generic __NR_statx Date: Sat, 3 Jun 2023 16:00:46 +0800 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-QQ-SENDSIZE: 520 Feedback-ID: bizesmtp:tinylab.org:qybglogicsvrsz:qybglogicsvrsz3a-3 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_MSPIKE_H3, RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Compiling nolibc-test.c for rv32 got such error: tools/testing/selftests/nolibc/nolibc-test.c:599:57: error: ‘__NR_fstat’ undeclared (first use in this function) 599 | CASE_TEST(syscall_args); EXPECT_SYSER(1, syscall(__NR_fstat, 0, NULL), -1, EFAULT); break; The generic include/uapi/asm-generic/unistd.h used by rv32 doesn't support __NR_fstat, use the more generic __NR_statx instead: Running test 'syscall' 69 syscall_noargs = 1 [OK] 70 syscall_args = -1 EFAULT [OK] __NR_statx has been added from v4.10: commit a528d35e8bfc ("statx: Add a system call to make enhanced file info available") It has been supported by all of the platforms since at least from v4.20. Fixes: 8e3ab529bef9 ("tools/nolibc/unistd: add syscall()") Suggested-by: Arnd Bergmann Link: https://lore.kernel.org/linux-riscv/ee8b1f02-ded1-488b-a3a5-68774f0349b5@app.fastmail.com/ Signed-off-by: Zhangjin Wu --- tools/testing/selftests/nolibc/nolibc-test.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c index 7de46305f419..d417ca5d976f 100644 --- a/tools/testing/selftests/nolibc/nolibc-test.c +++ b/tools/testing/selftests/nolibc/nolibc-test.c @@ -621,7 +621,7 @@ int run_syscall(int min, int max) CASE_TEST(write_badf); EXPECT_SYSER(1, write(-1, &tmp, 1), -1, EBADF); break; CASE_TEST(write_zero); EXPECT_SYSZR(1, write(1, &tmp, 0)); break; CASE_TEST(syscall_noargs); EXPECT_SYSEQ(1, syscall(__NR_getpid), getpid()); break; - CASE_TEST(syscall_args); EXPECT_SYSER(1, syscall(__NR_fstat, 0, NULL), -1, EFAULT); break; + CASE_TEST(syscall_args); EXPECT_SYSER(1, syscall(__NR_statx, 0, NULL, 0, 0, NULL), -1, EFAULT); break; case __LINE__: return ret; /* must be last */ /* note: do not set any defaults so as to permit holes above */ -- 2.25.1