From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 77919 invoked by alias); 10 Nov 2016 05:47:05 -0000 Mailing-List: contact libc-alpha-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-alpha-owner@sourceware.org Received: (qmail 62287 invoked by uid 89); 10 Nov 2016 05:44:34 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.4 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE,RCVD_IN_SORBS_SPAM autolearn=no version=3.3.2 spammy=HX-HELO:sk:homiema X-HELO: homiemail-a83.g.dreamhost.com Subject: Re: [PATCH 2/6] New internal function __access_noerrno To: Adhemerval Zanella , libc-alpha@sourceware.org References: <1477320168-23397-1-git-send-email-siddhesh@sourceware.org> <1477320168-23397-3-git-send-email-siddhesh@sourceware.org> <317e63c8-1681-84b1-e278-c6ecae71e657@linaro.org> <4f13d235-084b-25f8-b763-053889b0dfdb@gotplt.org> From: Siddhesh Poyarekar Message-ID: <9fee5a6f-bde3-6f5f-d8ee-5ab6c8771873@gotplt.org> Date: Thu, 10 Nov 2016 05:47:00 -0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: <4f13d235-084b-25f8-b763-053889b0dfdb@gotplt.org> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-SW-Source: 2016-11/txt/msg00373.txt.bz2 On Wednesday 09 November 2016 12:30 AM, Siddhesh Poyarekar wrote: > I can hack at sysdeps/unix/sysv/linux/access.c and drop > sysdeps/unix/access_noerrno.c. Turns out I can't do this because I will be breaking non-Linux configurations that use the SYS_ prefix instead of the __NR_ prefix. I also discovered that I hadn't actually tested the code properly on aarch64 and it is broken, so I'll resend the patchset. Siddhesh