All of lore.kernel.org
 help / color / mirror / Atom feed
diff for duplicates of <20161222023958.21306-7-mcgrof@kernel.org>

diff --git a/a/1.txt b/N1/1.txt
index 9623215..c34fb9e 100644
--- a/a/1.txt
+++ b/N1/1.txt
@@ -24,8 +24,8 @@ foo_fixup
 Completed initializing pci !
 Number of init entries: 1
 Initializing kprobes ...
-== OK: test_kprobe_0001 within range!
-== OK: test_kprobe_0002 not in range as expected!
+= OK: test_kprobe_0001 within range!
+= OK: test_kprobe_0002 not in range as expected!
 Completed initializing kprobes !
 Initializing kasan ...
 Early init for Kasan...
@@ -227,8 +227,7 @@ index a80f4dd94659..82a71cfe8e59 100644
 +   :doc: Linker table provenance and userspace testing
  
  Benefits of using Linker tables
- ===============================
-diff --git a/MAINTAINERS b/MAINTAINERS
+ ===============diff --git a/MAINTAINERS b/MAINTAINERS
 index c57ba50e2348..2670d55135ed 100644
 --- a/MAINTAINERS
 +++ b/MAINTAINERS
@@ -718,7 +717,7 @@ index 000000000000..65fb076765f8
 + * At least as per nasm (x86/x86_64 only), in the absence of qualifiers the
 + * defaults are as follows:
 + *
-+ * section .text    progbits  alloc   exec    nowrite  align=16
++ * section .text    progbits  alloc   exec    nowrite  align\x16
 + * section .rodata  progbits  alloc   noexec  nowrite  align=4
 + * section .lrodata progbits  alloc   noexec  nowrite  align=4
 + * section .data    progbits  alloc   noexec  write    align=4
@@ -910,7 +909,7 @@ index 000000000000..1e64674f6d7d
 + *
 + *   bool is_empty = LINKTABLE_EMPTY(some_fns);
 + */
-+#define SECTION_RANGE_EMPTY(name)	(SECTION_RANGE_SIZE(name) == 0)
++#define SECTION_RANGE_EMPTY(name)	(SECTION_RANGE_SIZE(name) = 0)
 +
 +/**
 + * SECTION_RANGE_ADDR_WITHIN - returns true if address is in the section range
@@ -1413,7 +1412,7 @@ index 000000000000..a1fbbd20fd13
 + *
 + *   bool is_empty = LINKTABLE_EMPTY(frobnicator_fns);
 + */
-+#define LINKTABLE_EMPTY(name)	(LINKTABLE_SIZE(name) == 0)
++#define LINKTABLE_EMPTY(name)	(LINKTABLE_SIZE(name) = 0)
 +
 +/**
 + * LINKTABLE_ADDR_WITHIN - returns true if address is in the linker table
@@ -1843,8 +1842,7 @@ index 000000000000..9d4e6fb0d176
 +include $(srctree)/tools/build/Makefile.include
 +
 +ifeq ($(V),1)
-+	Q=
-+	NQ=@true
++	Q+	NQ=@true
 +else
 +	Q=@
 +	NQ=@echo
@@ -1998,7 +1996,7 @@ index 000000000000..729241f9e4c4
 +++ b/tools/linker-tables/README
 @@ -0,0 +1,114 @@
 +Linux linker table userspace sandbox
-+====================================
++==================
 +
 +This is a userspace sandbox to allow easy experimentation and
 +test extensions with linker tables. It tries to mimic the Linux
@@ -2013,8 +2011,7 @@ index 000000000000..729241f9e4c4
 +application.
 +
 +History
-+=======
-+
++===+
 +This was hacked on first in an external repository, that tree has
 +the full set of history of how this work came about. Refer to that
 +tree for more details if you are interested in the logic used for
@@ -2026,8 +2023,7 @@ index 000000000000..729241f9e4c4
 +is kept in sync with the kernel.
 +
 +Compile
-+=======
-+
++===+
 +Run:
 +	make
 +
@@ -2040,8 +2036,7 @@ index 000000000000..729241f9e4c4
 +	make OUTPUT=/tmp/path/ clean
 +
 +Supported architectures
-+=======================
-+
++===========+
 +x86_64
 +
 +Currently only x86_64 is supported for the demo. It should be
@@ -2056,8 +2051,7 @@ index 000000000000..729241f9e4c4
 +file over.
 +
 +x86 Simulated boots
-+===================
-+
++=========+
 +This programs simulates boot on both bare metal and with the
 +Xen PV entry on x86.
 +
@@ -2070,7 +2064,7 @@ index 000000000000..729241f9e4c4
 +./demo -x
 +
 +Testing new features
-+====================
++==========
 +
 +A copy of each kernel header file is maintained in tools/include/,
 +as well as a respective generated asm file for each sandbox supported
@@ -2089,8 +2083,7 @@ index 000000000000..729241f9e4c4
 +each respective tools/linker-tables/arch/$(ARCH)/include/asm/.
 +
 +Features evaluation
-+===================
-+
++=========+
 +This lists features currently being evaluated in the sandbox, not yet
 +present upstream. These make use of the existing set of header files
 +without modification.
@@ -2672,15 +2665,15 @@ index 000000000000..c4e42beae55b
 +{
 +	if (SECTION_RANGE_ADDR_WITHIN(kprobes, addr))
 +		if (should_match)
-+			pr_info("== OK: %s within range!\n", test);
++			pr_info("= OK: %s within range!\n", test);
 +		else
-+			pr_info("== FAIL: %s should not be in range...\n",
++			pr_info("= FAIL: %s should not be in range...\n",
 +				test);
 +	else
 +		if (should_match)
-+			pr_info("== FAIL: %s should be in range...\n", test);
++			pr_info("= FAIL: %s should be in range...\n", test);
 +		else
-+			pr_info("== OK: %s not in range as expected!\n", test);
++			pr_info("= OK: %s not in range as expected!\n", test);
 +}
 +
 +void early_init_kprobes(void)
diff --git a/a/content_digest b/N1/content_digest
index 5410c49..51a5251 100644
--- a/a/content_digest
+++ b/N1/content_digest
@@ -2,7 +2,7 @@
  "ref\020161222023958.21306-1-mcgrof@kernel.org\0"
  "From\0Luis R. Rodriguez <mcgrof@kernel.org>\0"
  "Subject\0[PATCH v2 6/6] tools: add userspace linker table sandbox\0"
- "Date\0Wed, 21 Dec 2016 18:39:58 -0800\0"
+ "Date\0Thu, 22 Dec 2016 02:39:58 +0000\0"
  "To\0hpa@zytor.com"
   acme@redhat.com
   tglx@linutronix.de
@@ -81,8 +81,8 @@
  "Completed initializing pci !\n"
  "Number of init entries: 1\n"
  "Initializing kprobes ...\n"
- "== OK: test_kprobe_0001 within range!\n"
- "== OK: test_kprobe_0002 not in range as expected!\n"
+ "= OK: test_kprobe_0001 within range!\n"
+ "= OK: test_kprobe_0002 not in range as expected!\n"
  "Completed initializing kprobes !\n"
  "Initializing kasan ...\n"
  "Early init for Kasan...\n"
@@ -284,8 +284,7 @@
  "+   :doc: Linker table provenance and userspace testing\n"
  " \n"
  " Benefits of using Linker tables\n"
- " ===============================\n"
- "diff --git a/MAINTAINERS b/MAINTAINERS\n"
+ " ===============diff --git a/MAINTAINERS b/MAINTAINERS\n"
  "index c57ba50e2348..2670d55135ed 100644\n"
  "--- a/MAINTAINERS\n"
  "+++ b/MAINTAINERS\n"
@@ -775,7 +774,7 @@
  "+ * At least as per nasm (x86/x86_64 only), in the absence of qualifiers the\n"
  "+ * defaults are as follows:\n"
  "+ *\n"
- "+ * section .text    progbits  alloc   exec    nowrite  align=16\n"
+ "+ * section .text    progbits  alloc   exec    nowrite  align\026\n"
  "+ * section .rodata  progbits  alloc   noexec  nowrite  align=4\n"
  "+ * section .lrodata progbits  alloc   noexec  nowrite  align=4\n"
  "+ * section .data    progbits  alloc   noexec  write    align=4\n"
@@ -967,7 +966,7 @@
  "+ *\n"
  "+ *   bool is_empty = LINKTABLE_EMPTY(some_fns);\n"
  "+ */\n"
- "+#define SECTION_RANGE_EMPTY(name)\t(SECTION_RANGE_SIZE(name) == 0)\n"
+ "+#define SECTION_RANGE_EMPTY(name)\t(SECTION_RANGE_SIZE(name) = 0)\n"
  "+\n"
  "+/**\n"
  "+ * SECTION_RANGE_ADDR_WITHIN - returns true if address is in the section range\n"
@@ -1470,7 +1469,7 @@
  "+ *\n"
  "+ *   bool is_empty = LINKTABLE_EMPTY(frobnicator_fns);\n"
  "+ */\n"
- "+#define LINKTABLE_EMPTY(name)\t(LINKTABLE_SIZE(name) == 0)\n"
+ "+#define LINKTABLE_EMPTY(name)\t(LINKTABLE_SIZE(name) = 0)\n"
  "+\n"
  "+/**\n"
  "+ * LINKTABLE_ADDR_WITHIN - returns true if address is in the linker table\n"
@@ -1900,8 +1899,7 @@
  "+include $(srctree)/tools/build/Makefile.include\n"
  "+\n"
  "+ifeq ($(V),1)\n"
- "+\tQ=\n"
- "+\tNQ=@true\n"
+ "+\tQ+\tNQ=@true\n"
  "+else\n"
  "+\tQ=@\n"
  "+\tNQ=@echo\n"
@@ -2055,7 +2053,7 @@
  "+++ b/tools/linker-tables/README\n"
  "@@ -0,0 +1,114 @@\n"
  "+Linux linker table userspace sandbox\n"
- "+====================================\n"
+ "+==================\n"
  "+\n"
  "+This is a userspace sandbox to allow easy experimentation and\n"
  "+test extensions with linker tables. It tries to mimic the Linux\n"
@@ -2070,8 +2068,7 @@
  "+application.\n"
  "+\n"
  "+History\n"
- "+=======\n"
- "+\n"
+ "+===+\n"
  "+This was hacked on first in an external repository, that tree has\n"
  "+the full set of history of how this work came about. Refer to that\n"
  "+tree for more details if you are interested in the logic used for\n"
@@ -2083,8 +2080,7 @@
  "+is kept in sync with the kernel.\n"
  "+\n"
  "+Compile\n"
- "+=======\n"
- "+\n"
+ "+===+\n"
  "+Run:\n"
  "+\tmake\n"
  "+\n"
@@ -2097,8 +2093,7 @@
  "+\tmake OUTPUT=/tmp/path/ clean\n"
  "+\n"
  "+Supported architectures\n"
- "+=======================\n"
- "+\n"
+ "+===========+\n"
  "+x86_64\n"
  "+\n"
  "+Currently only x86_64 is supported for the demo. It should be\n"
@@ -2113,8 +2108,7 @@
  "+file over.\n"
  "+\n"
  "+x86 Simulated boots\n"
- "+===================\n"
- "+\n"
+ "+=========+\n"
  "+This programs simulates boot on both bare metal and with the\n"
  "+Xen PV entry on x86.\n"
  "+\n"
@@ -2127,7 +2121,7 @@
  "+./demo -x\n"
  "+\n"
  "+Testing new features\n"
- "+====================\n"
+ "+==========\n"
  "+\n"
  "+A copy of each kernel header file is maintained in tools/include/,\n"
  "+as well as a respective generated asm file for each sandbox supported\n"
@@ -2146,8 +2140,7 @@
  "+each respective tools/linker-tables/arch/$(ARCH)/include/asm/.\n"
  "+\n"
  "+Features evaluation\n"
- "+===================\n"
- "+\n"
+ "+=========+\n"
  "+This lists features currently being evaluated in the sandbox, not yet\n"
  "+present upstream. These make use of the existing set of header files\n"
  "+without modification.\n"
@@ -2729,15 +2722,15 @@
  "+{\n"
  "+\tif (SECTION_RANGE_ADDR_WITHIN(kprobes, addr))\n"
  "+\t\tif (should_match)\n"
- "+\t\t\tpr_info(\"== OK: %s within range!\\n\", test);\n"
+ "+\t\t\tpr_info(\"= OK: %s within range!\\n\", test);\n"
  "+\t\telse\n"
- "+\t\t\tpr_info(\"== FAIL: %s should not be in range...\\n\",\n"
+ "+\t\t\tpr_info(\"= FAIL: %s should not be in range...\\n\",\n"
  "+\t\t\t\ttest);\n"
  "+\telse\n"
  "+\t\tif (should_match)\n"
- "+\t\t\tpr_info(\"== FAIL: %s should be in range...\\n\", test);\n"
+ "+\t\t\tpr_info(\"= FAIL: %s should be in range...\\n\", test);\n"
  "+\t\telse\n"
- "+\t\t\tpr_info(\"== OK: %s not in range as expected!\\n\", test);\n"
+ "+\t\t\tpr_info(\"= OK: %s not in range as expected!\\n\", test);\n"
  "+}\n"
  "+\n"
  "+void early_init_kprobes(void)\n"
@@ -3972,4 +3965,4 @@
  "-- \n"
  2.10.1
 
-cca375f04ecd1e2e1cc8fc9bb1549a9b4597796d1e1569ee3624cf93a9ae0376
+9377d954273d3485f3ebf96a098ab0004957edb2986075e821d5aba48dbd5724

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.