Message ID | 1677235015-21717-1-git-send-email-yangtiezhu@loongson.cn |
---|---|
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:5915:0:0:0:0:0 with SMTP id v21csp830845wrd; Fri, 24 Feb 2023 02:46:48 -0800 (PST) X-Google-Smtp-Source: AK7set9/RtfYAAzatI6PGEIR48QwaQSEtsnbVuc7VTPZ1XvSqCXCIKcBc1xxF+WK7dNoQ9AoVFfB X-Received: by 2002:a17:902:ec8e:b0:196:89bc:7100 with SMTP id x14-20020a170902ec8e00b0019689bc7100mr21903147plg.16.1677235608207; Fri, 24 Feb 2023 02:46:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1677235608; cv=none; d=google.com; s=arc-20160816; b=wpYBiIuxSXX0oeeEX65Y5/CPKWRc+wXFN8laHT4eHf5VdY4UEcN52RRU9s773oKn7O nPtO6BqOAZnMu4aOY2c2cjHDr2omlM/s1kjQzvzM/tJgTsOY+2vx7yjT6tP0mb9sIGqx JuLkcloPP3g734s4PtGSx5veSoH9Lb3cDbsb/N3AK7b802W4RHMzPizToGyxuUJm72vZ w7rVgUr3SgZ3mUt0kcUiREMXYbYE0Ft1N9t56FqT1yo72kK0iUWH9CqLAnTeGmpY5nE8 Xi6jZfzt5sFoPEFIeFOfYXbSeD2UgBolu/mEe1HZv8KGnxBxzi5vYKRyAaTt2VgoZJne D8eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from; bh=PmW39J3peQAxIewg6+vY2mTZTk7CwCApuoVu3CcFsEg=; b=Mk4v4CPYq3OhBtWZsdnMkFGHvcSodMT8ZaNMgbcZUHAq8Y2UyXJGFP3tqPwMjqdQsu aaDRtC/FKBRn1P8Bn2nA+m/mprl47zjA/8L1yxhXH3vdaNZFTcByWXfCjSBG7o1gQ+dJ FqmPQEd5hfgmbPAECPAqpLztRePdXEX8vXp8hxaOA1dRIYIM9jwlOHlXsVrR9kDQWXOm zw+aYeDn3+wPXOheaMioyLZTAK1xbLRsbLrrJYVP88LjXWeF9uv1f9esUorpdb0lKokn iMAEKlGL+XbmR2Ez/GMipDLGjqn1n150qFIsOa31pcR0gTLTunaFModMSue22i7aWx8c k9Wg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l38-20020a635726000000b00502d7c858b1si10377762pgb.768.2023.02.24.02.46.34; Fri, 24 Feb 2023 02:46:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229916AbjBXKig (ORCPT <rfc822;jeff.pang.chn@gmail.com> + 99 others); Fri, 24 Feb 2023 05:38:36 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:36042 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229637AbjBXKhz (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 24 Feb 2023 05:37:55 -0500 Received: from loongson.cn (mail.loongson.cn [114.242.206.163]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A17BCA5EC; Fri, 24 Feb 2023 02:36:57 -0800 (PST) Received: from loongson.cn (unknown [113.200.148.30]) by gateway (Coremail) with SMTP id _____8AxII9Ik_hj_6YEAA--.3564S3; Fri, 24 Feb 2023 18:36:56 +0800 (CST) Received: from linux.localdomain (unknown [113.200.148.30]) by localhost.localdomain (Coremail) with SMTP id AQAAf8CxQuVHk_hjToM6AA--.5828S2; Fri, 24 Feb 2023 18:36:56 +0800 (CST) From: Tiezhu Yang <yangtiezhu@loongson.cn> To: Alexei Starovoitov <ast@kernel.org>, Daniel Borkmann <daniel@iogearbox.net>, Andrii Nakryiko <andrii@kernel.org> Cc: bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH bpf-next v2 0/3] Fix some build errors for bpf selftest on LoongArch Date: Fri, 24 Feb 2023 18:36:52 +0800 Message-Id: <1677235015-21717-1-git-send-email-yangtiezhu@loongson.cn> X-Mailer: git-send-email 2.1.0 X-CM-TRANSID: AQAAf8CxQuVHk_hjToM6AA--.5828S2 X-CM-SenderInfo: p1dqw3xlh2x3gn0dqz5rrqw2lrqou0/ X-Coremail-Antispam: 1Uk129KBjDUn29KB7ZKAUJUUUUU529EdanIXcx71UUUUU7KY7 ZEXasCq-sGcSsGvfJ3Ic02F40EFcxC0VAKzVAqx4xG6I80ebIjqfuFe4nvWSU5nxnvy29K BjDU0xBIdaVrnRJUUUkFb4IE77IF4wAFF20E14v26r1j6r4UM7CY07I20VC2zVCF04k26c xKx2IYs7xG6rWj6s0DM7CIcVAFz4kK6r106r15M28lY4IEw2IIxxk0rwA2F7IY1VAKz4vE j48ve4kI8wA2z4x0Y4vE2Ix0cI8IcVAFwI0_Jr0_JF4l84ACjcxK6xIIjxv20xvEc7CjxV AFwI0_Jr0_Gr1l84ACjcxK6I8E87Iv67AKxVW8Jr0_Cr1UM28EF7xvwVC2z280aVCY1x02 67AKxVW8Jr0_Cr1UM2AIxVAIcxkEcVAq07x20xvEncxIr21l57IF6xkI12xvs2x26I8E6x ACxx1l5I8CrVACY4xI64kE6c02F40Ex7xfMcIj6xIIjxv20xvE14v26r106r15McIj6I8E 87Iv67AKxVW8JVWxJwAm72CE4IkC6x0Yz7v_Jr0_Gr1lF7xvr2IYc2Ij64vIr41l42xK82 IYc2Ij64vIr41l4I8I3I0E4IkC6x0Yz7v_Jr0_Gr1lx2IqxVAqx4xG67AKxVWUJVWUGwC2 0s026x8GjcxK67AKxVWUGVWUWwC2zVAF1VAY17CE14v26r126r1DMIIYrxkI7VAKI48JMI IF0xvE2Ix0cI8IcVAFwI0_Jr0_JF4lIxAIcVC0I7IYx2IY6xkF7I0E14v26r1j6r4UMIIF 0xvE42xK8VAvwI8IcIk0rVWUJVWUCwCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E87 Iv6xkF7I0E14v26r1j6r4UYxBIdaVFxhVjvjDU0xZFpf9x07j0sjUUUUUU= X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1758709004969997229?= X-GMAIL-MSGID: =?utf-8?q?1758709004969997229?= |
Series |
Fix some build errors for bpf selftest on LoongArch
|
|
Message
Tiezhu Yang
Feb. 24, 2023, 10:36 a.m. UTC
v2: Modify patch #3 to avoid breaking user_ringbuf test on x86 Tiezhu Yang (3): libbpf: Use struct user_pt_regs to define __PT_REGS_CAST() for LoongArch selftests/bpf: Check __TARGET_ARCH_loongarch if target is bpf for LoongArch selftests/bpf: Use __NR_prlimit64 instead of __NR_getrlimit in user_ringbuf test tools/include/uapi/asm/bitsperlong.h | 2 +- tools/lib/bpf/bpf_tracing.h | 2 ++ tools/testing/selftests/bpf/prog_tests/user_ringbuf.c | 2 +- tools/testing/selftests/bpf/progs/user_ringbuf_success.c | 2 +- 4 files changed, 5 insertions(+), 3 deletions(-)
Comments
On Fri, Feb 24, 2023 at 2:37 AM Tiezhu Yang <yangtiezhu@loongson.cn> wrote: > > v2: Modify patch #3 to avoid breaking user_ringbuf test on x86 > > Tiezhu Yang (3): > libbpf: Use struct user_pt_regs to define __PT_REGS_CAST() for > LoongArch > selftests/bpf: Check __TARGET_ARCH_loongarch if target is bpf for > LoongArch > selftests/bpf: Use __NR_prlimit64 instead of __NR_getrlimit in > user_ringbuf test I've applied patches 1 and 3 to bpf-next, but we can't do what patch 2 does. Also, please provide a proper cover letter message next time, just version log isn't enough. > > tools/include/uapi/asm/bitsperlong.h | 2 +- > tools/lib/bpf/bpf_tracing.h | 2 ++ > tools/testing/selftests/bpf/prog_tests/user_ringbuf.c | 2 +- > tools/testing/selftests/bpf/progs/user_ringbuf_success.c | 2 +- > 4 files changed, 5 insertions(+), 3 deletions(-) > > -- > 2.1.0 >
Hello: This series was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@kernel.org>: On Fri, 24 Feb 2023 18:36:52 +0800 you wrote: > v2: Modify patch #3 to avoid breaking user_ringbuf test on x86 > > Tiezhu Yang (3): > libbpf: Use struct user_pt_regs to define __PT_REGS_CAST() for > LoongArch > selftests/bpf: Check __TARGET_ARCH_loongarch if target is bpf for > LoongArch > selftests/bpf: Use __NR_prlimit64 instead of __NR_getrlimit in > user_ringbuf test > > [...] Here is the summary with links: - [bpf-next,v2,1/3] libbpf: Use struct user_pt_regs to define __PT_REGS_CAST() for LoongArch https://git.kernel.org/bpf/bpf-next/c/29c66ad1c3ad - [bpf-next,v2,2/3] selftests/bpf: Check __TARGET_ARCH_loongarch if target is bpf for LoongArch (no matching commit) - [bpf-next,v2,3/3] selftests/bpf: Use __NR_prlimit64 instead of __NR_getrlimit in user_ringbuf test https://git.kernel.org/bpf/bpf-next/c/84c22fa83f9c You are awesome, thank you!