[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140911150212.GP6158@arm.com>
Date: Thu, 11 Sep 2014 16:02:12 +0100
From: Will Deacon <will.deacon@....com>
To: Yang Yingliang <yangyingliang@...wei.com>
Cc: "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"linux-arm-kernel@...ts.infradead.org"
<linux-arm-kernel@...ts.infradead.org>,
Catalin Marinas <Catalin.Marinas@....com>
Subject: Re: [PATCH v2] arm64: add guard macros of unistd.h to prevent double
inclusion
On Thu, Sep 11, 2014 at 10:21:18AM +0100, Yang Yingliang wrote:
> From: Yang Yingliang <yangyingliang@...wei.com>
>
> Add guard macros for uapi/asm/unistd.h, asm/unistd.h and
> asm/unistd32.h.
Hmm, so I applied this and now my machine panics when we hit userspace. I
think the issue is that we no longer generate our syscall table in
arch/arm64/kernel/sys.c, because unistd.h is already included via
linux/syscalls.h but without the __SYSCALL definition.
So, a couple of questions:
(1) Is the lack of header guards actually causing you a problem?
(2) How did you test this?
I've dropped the patch.
Will
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists