Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp221157rdd; Tue, 9 Jan 2024 01:52:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IHy4A6ols4Ld+Yaxpg5imc2sbZiOfMu0oVOIA+el4n4eJmM2grdWfvfy/Tf2tW4XR9DDECt X-Received: by 2002:a05:6830:1d4a:b0:6dd:d155:2268 with SMTP id p10-20020a0568301d4a00b006ddd1552268mr2797063oth.74.1704793960755; Tue, 09 Jan 2024 01:52:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704793960; cv=none; d=google.com; s=arc-20160816; b=V5oUXgn353eqVQ2JEI7NrPLTakN+HFgBRBPZ7vrql6Op365KOyuSwbxa+r98y9M9Pw 3xHI/iConKmWLchpnbDXGq6P7a8e+mtTYhqcoJs12GQWjatCrLDtoNzdmrj8Acg29WZg LCKUI5hUkonNJTQZCMhmGFjlv5u26uO72C/cw3s6hI/DGAzeF4b/AnDk2pHUQ+qwt4XE lTo47DjoDkJa/eVYRpk5oEdTiSAp7WmiFv2WSPOCW2ztbhTFmzLWeaYb4PdEGzUBLW7o 6NREGImsncf321t0o1yMl+xM7Xw/3qMNlRkIHW7XdNhW5sxJrweHGkyjW66D0tIKYLcu lUgQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=user-agent:in-reply-to:content-disposition:mime-version :list-unsubscribe:list-subscribe:list-id:precedence:references :message-id:subject:cc:to:from:date:dkim-signature; bh=iLm6S5mj54nQUZFU9gHMkijFFnSahO6jpIEBSnhIfY4=; fh=f3/2OOY3AjyK4yLKSZZSGBQZu2lhTxgvkUF7rVfPodw=; b=Kb1DhIlAFNJrgIa0CWd+xlr/M+ieCv6erlRLRAZ4LhQRVwU0P7DEwEDGWmO5MjK8f8 AUBm9d4NkHKnpgpZLfQ9Yd9ueiyvZe6JuNi0KRrttAvripBvG6YadgGy+RRqoRlZ66wR lGTJqCd629yt31RNOsU4FGMoHjpm3t4Tdiu3/oaX33/gvaS0JNq1Ts63zQR5FdGf5wZj 8Wgf2PnEvowuvhnc4Oy1IUSMIwy+WHbSym8vEYKUxBHHqE8yW87H+fhvQyCqKv63/I/O hLUTNcde8IM6tpBSlOUmRfbyQ39qET58ifgEOAUp7pcP3J5yzUkEm4Yoy3eCLAX4G8V/ lJAg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=oZ5jiUNl; spf=pass (google.com: domain of linux-kernel+bounces-20688-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-20688-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id l189-20020a6325c6000000b005cee87fbf7esi1184028pgl.453.2024.01.09.01.52.40 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Jan 2024 01:52:40 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-20688-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=oZ5jiUNl; spf=pass (google.com: domain of linux-kernel+bounces-20688-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-20688-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id CC606B229DD for ; Tue, 9 Jan 2024 09:52:37 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6F5E63609F; Tue, 9 Jan 2024 09:52:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="oZ5jiUNl" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A1AB73588B; Tue, 9 Jan 2024 09:52:19 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0674BC433F1; Tue, 9 Jan 2024 09:52:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1704793939; bh=E0zakJMzNcSQvgcgc8AtRvLO3GWb7iOulE6UYhMFa9s=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=oZ5jiUNlx+uIcVw0jOrCRHD/HIgkYHSdkfMeXRC7H6k9CdsTHIT6ytv0You6CYPJP JL2e8ac+pU9wQgh7KeYlMahawI2dCz5kICh0rd9VCJ/Aw4dl4tBwJaNzkSgT66QeZF t5BL4TZD1oRNAL9gqpqSKF6K3ix7ZFHWv8GEdt+qY/tyL1/DtsiuS/VbK5m3amG05b ojdmgauWZcv0NL+IwvdbxBoASiVBsgG41pr6N7/s9C1Qp4Z9VBQd49g6gdfkGlmdAo Nb5Sct9ydw0Iz8l8UbVVGTzz02Xv4ZS5+GV2FAn+uR3NdSCPy+pKd4/cvg7AZxlIfW tBn2k1JrUKWmQ== Date: Tue, 9 Jan 2024 09:52:14 +0000 From: Will Deacon To: Linus Torvalds Cc: Christian Brauner , Catalin Marinas , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [GIT PULL] vfs mount api updates Message-ID: <20240109095214.GB12915@willie-the-truck> References: <20240105-vfs-mount-5e94596bd1d1@brauner> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Hi Linus, On Mon, Jan 08, 2024 at 05:02:48PM -0800, Linus Torvalds wrote: > On Fri, 5 Jan 2024 at 04:47, Christian Brauner wrote: > > > > This contains the work to retrieve detailed information about mounts via two > > new system calls. > > Gaah. While I have an arm64 laptop now, I don't do arm64 builds in > between each pull like I do x86 ones. > > I *did* just start one, because I got the arm64 pull request. > > And this fails the arm64 build, because __NR_statmount and > __NR_listmount (457 and 458 respectively) exceed the compat system > call array size, which is > > arch/arm64/include/asm/unistd.h: > #define __NR_compat_syscalls 457 > > I don't think this is a merge error, I think the error is there in the > original, but I'm about to go off and have dinner, so I'm just sending > this out for now. > > How was this not noted in linux-next? Am I missing something? Urgh, that is surprising, and I just confirmed that linux-next builds fine! The reason seems to be because there are also some new lsm syscalls being added there (lsm_get_self_attr and friends) which bump __NR_compat_syscalls to 460 and then Stephen Rothwell's mighty merging magic adjusted this up to 462 in the merge of the lsm tree. > Now, admittedly this looks like an easy mistake to make due to that > whole odd situation where the compat system calls are listed in > unistd32.h, but then the max number is in unistd.h, but I would still > have expected this to have raised flags before it hit my tree.. I suppose the two options for now are either to merge the lsm stuff and adjust __NR_compat_syscalls as Stephen did, or to take this patch from Florian in the meantime: https://lore.kernel.org/r/20240109010906.429652-1-florian.fainelli@broadcom.com Cheers, Will