Received: by 2002:a05:7412:e794:b0:fa:551:50a7 with SMTP id o20csp355985rdd; Tue, 9 Jan 2024 06:24:25 -0800 (PST) X-Google-Smtp-Source: AGHT+IEwQhRf54tUXZwhLhb40I+usWp1QMu1FJYzwjiARH1Xsgg8qn8qjMJq8BJzzDKoughxobJs X-Received: by 2002:a17:902:b181:b0:1d0:6ffd:ced0 with SMTP id s1-20020a170902b18100b001d06ffdced0mr2535581plr.137.1704810265450; Tue, 09 Jan 2024 06:24:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1704810265; cv=none; d=google.com; s=arc-20160816; b=sI2dKFPXeA9QSOoKTMHPj7iO6zqev/1+B7SSfcohQNYz7ZGuVv6uTQrlk7FK3tEVyz 7KqjPlb/rmZcs90xLNaiIWx3mDugHk6SYub0Y2yVUVVKCTxCLZe2Y8HyVMCV5D2UL5sS 9Lfgt3m7OrU12zJF7933o43kE20Bs71da3Votya/sXN9X1UxzeLmvrANu8kLTxCoiZqF RDe2JD8KG8f7/JqjMlmzPyJxx56h36/ce5SzyJ3Qu3RNKt8zKyo+mvCBmkx+VSokaOrN puYmhsZEE04fRydLdFLU0EZTG1xyxLDF8Ze0NSl5XQmS9UvI1mraRtjw+/7GO1IjqQPt BSkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=7WwP6iUfsaah2a71BQtFTSitXtJieu0KuVzLhqeFo/c=; fh=pSynRLdU2Nl2RGLQhrj/rVxfI5MbXW5dvYJKx79wSTo=; b=gXwtFOt5CkU3SWryuN3gEJ6K9KsoIW8+dIE88V+MwW1kCbnkj1+mVlI8JQ1MZkUCIQ zyZ3SQzkHOYs428948iHSnD5pAqyLIlVKnhYQSwEJCI7MS5H8OFWbJn9dCBvtq1vb6tY J/VDBwX9aM8GKYsjv4iVcmrc3I1ELMWdVvbeT9CtWHmisURnxX1uCd7FBVODGU5Guak0 tepyvMoGquUJThXbsCdRKkrYn9vj89E/YJXDw/XQWAd5n3DYNyV+z1m4wQlSa2JYd88Y FRqJEybiXgFAlyCr62aM3rNk6bY6lC8Psi4XfOYo8So/sIZoQ5Dy40pF3AdMdqXiXTOB sTmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=neutral (body hash did not verify) header.i=@kernel.org header.s=k20201202 header.b=PIL4c66Y; spf=pass (google.com: domain of linux-kernel+bounces-20975-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-20975-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id jj17-20020a170903049100b001d4b1ddc8e0si1544923plb.67.2024.01.09.06.24.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 09 Jan 2024 06:24:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-20975-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; dkim=neutral (body hash did not verify) header.i=@kernel.org header.s=k20201202 header.b=PIL4c66Y; spf=pass (google.com: domain of linux-kernel+bounces-20975-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-20975-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id E8B72B23AFD for ; Tue, 9 Jan 2024 14:24:15 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 0BA0439AC8; Tue, 9 Jan 2024 14:24:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="PIL4c66Y" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3E2A539848; Tue, 9 Jan 2024 14:24:03 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 12ACFC433C7; Tue, 9 Jan 2024 14:24:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1704810243; bh=jtlAf7GbJEb8KC+GO5s0+NRGfPU8y1/U2gB+ZyxG2Jg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=PIL4c66YEFKrl/oUi0AvJbJow6+eqXBvJQu3E+B7mkXl2QWTeN5MVNYOnU/r5AH8G PR185TTOjTqifbB+AOt5KCoz/7HBQH0JKdsxBooULuNEs8w5O5E/GtTxYDKJwwq0K6 erIklOjQErOoFhuIEX+rfwb1Pq1IRox1d+1evUCsrsKYDCNpZD9ZUw9f/P0V9fd3RC Cqnz1GQURYtRAaVfVCo5y7o4wAVjuYn79Smv1qda4AUrXGNvpbUyVHZpXRHC3ZR4YO ICZYHFSXUwrpIdP/tkzkEZXI2jC1o73UboGqTkDvqp23QT2JK4hUbVi353lxqzfOy/ 02DzZBYrOOQaQ== Date: Tue, 9 Jan 2024 15:23:58 +0100 From: Christian Brauner To: Linus Torvalds Cc: Catalin Marinas , Will Deacon , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [GIT PULL] vfs mount api updates Message-ID: <20240109-bitten-anzetteln-af76df71c9b3@brauner> References: <20240105-vfs-mount-5e94596bd1d1@brauner> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: On Mon, Jan 08, 2024 at 05:02:48PM -0800, Linus Torvalds wrote: > On Fri, 5 Jan 2024 at 04:47, Christian Brauner wrote: > > > > This contains the work to retrieve detailed information about mounts via two > > new system calls. > > Gaah. While I have an arm64 laptop now, I don't do arm64 builds in > between each pull like I do x86 ones. > > I *did* just start one, because I got the arm64 pull request. > > And this fails the arm64 build, because __NR_statmount and > __NR_listmount (457 and 458 respectively) exceed the compat system > call array size, which is > > arch/arm64/include/asm/unistd.h: > #define __NR_compat_syscalls 457 > > I don't think this is a merge error, I think the error is there in the > original, but I'm about to go off and have dinner, so I'm just sending > this out for now. > > How was this not noted in linux-next? Am I missing something? > > Now, admittedly this looks like an easy mistake to make due to that > whole odd situation where the compat system calls are listed in > unistd32.h, but then the max number is in unistd.h, but I would still > have expected this to have raised flags before it hit my tree.. Bah. I think Will already provided a good explantion for how this came to be. But for full transparency: I've ran into this exact issue before with other system calls we added and I've been notified/saved by Arnd who pointed out that this file needs to be updated. 32 bit arm has this annoying extra file where you need to bump that single line. But it'd be nice if we finally had some: /add-new-syscall script that could automate adding a new system call number into all relevant architectures. Sorry for the breakage. I see that it's already fixed. I'll make a note to reactivate my cross-compilation toolsuite.