From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ingo Molnar Subject: Re: [RFC] new SYSCALL_DEFINE/COMPAT_SYSCALL_DEFINE wrappers Date: Fri, 30 Mar 2018 12:58:02 +0200 Message-ID: <20180330105802.7df5pacjfqsqwa6l@gmail.com> References: <20180319232342.GX30522@ZenIV.linux.org.uk> <20180322001532.GA18399@ZenIV.linux.org.uk> <20180326004017.GA2211@ZenIV.linux.org.uk> <20180326034750.GN30522@ZenIV.linux.org.uk> <428751c8-6920-096b-8694-a3f1b8990bdf@physik.fu-berlin.de> <8a8ee344-fb19-3ed9-f7dc-db63f703e6d3@physik.fu-berlin.de> <7753539f-c72d-9e5a-eb2d-939e5514404b@physik.fu-berlin.de> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <7753539f-c72d-9e5a-eb2d-939e5514404b@physik.fu-berlin.de> Sender: linux-kernel-owner@vger.kernel.org To: John Paul Adrian Glaubitz Cc: Linus Torvalds , Al Viro , Dominik Brodowski , Linux Kernel Mailing List , Arnd Bergmann , linux-arch , Ralf Baechle , James Hogan , linux-mips , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , ppc-dev , Martin Schwidefsky , Heiko Carstens , linux-s390 , "David S . Miller" , sparclinux@vger.kernel.org, Ingo Molnar List-Id: linux-arch.vger.kernel.org * John Paul Adrian Glaubitz wrote: > On 03/27/2018 12:40 PM, Linus Torvalds wrote: > > On Mon, Mar 26, 2018 at 4:37 PM, John Paul Adrian Glaubitz > > wrote: > >> > >> What about a tarball with a minimal Debian x32 chroot? Then you can > >> install interesting packages you would like to test yourself. > > > > That probably works fine. > > I just created a fresh Debian x32 unstable chroot using this command: > > $ debootstrap --no-check-gpg --variant=minbase --arch=x32 unstable debian-x32-unstable http://ftp.ports.debian.org/debian-ports > > It can be downloaded from my Debian webspace along checksum files for > verification: > > > https://people.debian.org/~glaubitz/chroots/ > > Let me know if you run into any issues. Here's the direct download link: $ wget https://people.debian.org/~glaubitz/chroots/debian-x32-unstable.tar.gz Checksum should be: $ sha256sum debian-x32-unstable.tar.gz 010844bcc76bd1a3b7a20fe47f7067ed8e429a84fa60030a2868626e8fa7ec3b debian-x32-unstable.tar.gz Seems to work fine here (on a distro kernel) even if I extract all the files as a non-root user and do: ~/s/debian-x32-unstable> fakechroot /usr/sbin/chroot . /usr/bin/dpkg -l | tail -2 ERROR: ld.so: object 'libfakechroot.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ii util-linux:x32 2.31.1-0.5 x32 miscellaneous system utilities ii zlib1g:x32 1:1.2.8.dfsg-5 x32 compression library - runtime So that 'dpkg' instance appears to be running inside the chroot environment and is listing x32 installed packages. Although I did get this warning: ERROR: ld.so: object 'libfakechroot.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. Even with that warning, is still still a sufficiently complex test of x32 syscall code paths? BTW., "fakechroot /usr/sbin/chroot ." crashes instead of giving me a bash shell. Thanks, Ingo From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wr0-f195.google.com ([209.85.128.195]:46517 "EHLO mail-wr0-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750794AbeC3K6H (ORCPT ); Fri, 30 Mar 2018 06:58:07 -0400 Date: Fri, 30 Mar 2018 12:58:02 +0200 From: Ingo Molnar Subject: Re: [RFC] new SYSCALL_DEFINE/COMPAT_SYSCALL_DEFINE wrappers Message-ID: <20180330105802.7df5pacjfqsqwa6l@gmail.com> References: <20180319232342.GX30522@ZenIV.linux.org.uk> <20180322001532.GA18399@ZenIV.linux.org.uk> <20180326004017.GA2211@ZenIV.linux.org.uk> <20180326034750.GN30522@ZenIV.linux.org.uk> <428751c8-6920-096b-8694-a3f1b8990bdf@physik.fu-berlin.de> <8a8ee344-fb19-3ed9-f7dc-db63f703e6d3@physik.fu-berlin.de> <7753539f-c72d-9e5a-eb2d-939e5514404b@physik.fu-berlin.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <7753539f-c72d-9e5a-eb2d-939e5514404b@physik.fu-berlin.de> Sender: linux-arch-owner@vger.kernel.org List-ID: To: John Paul Adrian Glaubitz Cc: Linus Torvalds , Al Viro , Dominik Brodowski , Linux Kernel Mailing List , Arnd Bergmann , linux-arch , Ralf Baechle , James Hogan , linux-mips , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , ppc-dev , Martin Schwidefsky , Heiko Carstens , linux-s390 , "David S . Miller" , sparclinux@vger.kernel.org, Ingo Molnar , Jiri Slaby , the arch/x86 maintainers Message-ID: <20180330105802.TMFbwdOIdKq7n7CNxdMZKlAbI-DGfLHxoPxb24o_-zs@z> * John Paul Adrian Glaubitz wrote: > On 03/27/2018 12:40 PM, Linus Torvalds wrote: > > On Mon, Mar 26, 2018 at 4:37 PM, John Paul Adrian Glaubitz > > wrote: > >> > >> What about a tarball with a minimal Debian x32 chroot? Then you can > >> install interesting packages you would like to test yourself. > > > > That probably works fine. > > I just created a fresh Debian x32 unstable chroot using this command: > > $ debootstrap --no-check-gpg --variant=minbase --arch=x32 unstable debian-x32-unstable http://ftp.ports.debian.org/debian-ports > > It can be downloaded from my Debian webspace along checksum files for > verification: > > > https://people.debian.org/~glaubitz/chroots/ > > Let me know if you run into any issues. Here's the direct download link: $ wget https://people.debian.org/~glaubitz/chroots/debian-x32-unstable.tar.gz Checksum should be: $ sha256sum debian-x32-unstable.tar.gz 010844bcc76bd1a3b7a20fe47f7067ed8e429a84fa60030a2868626e8fa7ec3b debian-x32-unstable.tar.gz Seems to work fine here (on a distro kernel) even if I extract all the files as a non-root user and do: ~/s/debian-x32-unstable> fakechroot /usr/sbin/chroot . /usr/bin/dpkg -l | tail -2 ERROR: ld.so: object 'libfakechroot.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. ii util-linux:x32 2.31.1-0.5 x32 miscellaneous system utilities ii zlib1g:x32 1:1.2.8.dfsg-5 x32 compression library - runtime So that 'dpkg' instance appears to be running inside the chroot environment and is listing x32 installed packages. Although I did get this warning: ERROR: ld.so: object 'libfakechroot.so' from LD_PRELOAD cannot be preloaded (cannot open shared object file): ignored. Even with that warning, is still still a sufficiently complex test of x32 syscall code paths? BTW., "fakechroot /usr/sbin/chroot ." crashes instead of giving me a bash shell. Thanks, Ingo