* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall [not found] ` <YdxcszwEslyQJSuF@zeniv-ca.linux.org.uk> @ 2022-01-10 17:54 ` Geert Uytterhoeven 2022-01-10 20:37 ` Al Viro 2022-01-11 1:33 ` Michael Schmitz 0 siblings, 2 replies; 10+ messages in thread From: Geert Uytterhoeven @ 2022-01-10 17:54 UTC (permalink / raw) To: Al Viro Cc: Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, Michael Schmitz, linux-m68k Hi Al, CC Michael/m68k, On Mon, Jan 10, 2022 at 5:20 PM Al Viro <viro@zeniv.linux.org.uk> wrote: > On Mon, Jan 10, 2022 at 04:26:57PM +0100, Geert Uytterhoeven wrote: > > On Mon, Jan 3, 2022 at 10:33 PM Eric W. Biederman <ebiederm@xmission.com> wrote: > > > The generic function ptrace_report_syscall does a little more > > > than syscall_trace on m68k. The function ptrace_report_syscall > > > stops early if PT_TRACED is not set, it sets ptrace_message, > > > and returns the result of fatal_signal_pending. > > > > > > Setting ptrace_message to a passed in value of 0 is effectively not > > > setting ptrace_message, making that additional work a noop. > > > > > > Returning the result of fatal_signal_pending and letting the caller > > > ignore the result becomes a noop in this change. > > > > > > When a process is ptraced, the flag PT_PTRACED is always set in > > > current->ptrace. Testing for PT_PTRACED in ptrace_report_syscall is > > > just an optimization to fail early if the process is not ptraced. > > > Later on in ptrace_notify, ptrace_stop will test current->ptrace under > > > tasklist_lock and skip performing any work if the task is not ptraced. > > > > > > Cc: Geert Uytterhoeven <geert@linux-m68k.org> > > > Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> > > > > As this depends on the removal of a parameter from > > ptrace_report_syscall() earlier in this series: > > Acked-by: Geert Uytterhoeven <geert@linux-m68k.org> > > FWIW, I would suggest taking it a bit further: make syscall_trace_enter() > and syscall_trace_leave() in m68k ptrace.c unconditional, replace the > calls of syscall_trace() in entry.S with syscall_trace_enter() and > syscall_trace_leave() resp. and remove syscall_trace(). > > Geert, do you see any problems with that? The only difference is that > current->ptrace_message would be set to 1 for ptrace stop on entry and > 2 - on leave. Currently m68k just has it 0 all along. > > It is user-visible (the whole point is to let the tracer see which > stop it is - entry or exit one), so somebody using PTRACE_GETEVENTMSG > on syscall stops would start seeing 1 or 2 instead of "0 all along". > That's how it works on all other architectures (including m68k-nommu), > and I doubt that anything in userland will get broken. > > Behaviour of PTRACE_GETEVENTMSG for other stops (fork, etc.) remains > as-is, of course. In fact Michael did so in "[PATCH v7 1/2] m68k/kernel - wire up syscall_trace_enter/leave for m68k"[1], but that's still stuck... [1] https://lore.kernel.org/r/1624924520-17567-2-git-send-email-schmitzmic@gmail.com/ Gr{oetje,eeting}s, Geert -- Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org In personal conversations with technical people, I call myself a hacker. But when I'm talking to journalists I just say "programmer" or something like that. -- Linus Torvalds ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-10 17:54 ` [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall Geert Uytterhoeven @ 2022-01-10 20:37 ` Al Viro 2022-01-10 21:18 ` Eric W. Biederman 2022-01-11 1:33 ` Michael Schmitz 1 sibling, 1 reply; 10+ messages in thread From: Al Viro @ 2022-01-10 20:37 UTC (permalink / raw) To: Geert Uytterhoeven Cc: Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, Michael Schmitz, linux-m68k On Mon, Jan 10, 2022 at 06:54:57PM +0100, Geert Uytterhoeven wrote: > In fact Michael did so in "[PATCH v7 1/2] m68k/kernel - wire up > syscall_trace_enter/leave for m68k"[1], but that's still stuck... > > [1] https://lore.kernel.org/r/1624924520-17567-2-git-send-email-schmitzmic@gmail.com/ Looks sane, but I'd split it in two - switch to calling syscall_trace_{enter,leave} and then handling the return values... The former would keep the current behaviour (modulo reporting enter vs. leave via PTRACE_GETEVENTMSG), the latter would allow syscall number change by tracer and/or handling of seccomp/audit/whatnot. For exit+signal work the former would suffice, and IMO it would be a good idea to put that one into a shared branch to be pulled both by seccomp and by signal series. Would reduce the conflicts... Objections? ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-10 20:37 ` Al Viro @ 2022-01-10 21:18 ` Eric W. Biederman 0 siblings, 0 replies; 10+ messages in thread From: Eric W. Biederman @ 2022-01-10 21:18 UTC (permalink / raw) To: Al Viro Cc: Geert Uytterhoeven, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, Michael Schmitz, linux-m68k Al Viro <viro@zeniv.linux.org.uk> writes: > On Mon, Jan 10, 2022 at 06:54:57PM +0100, Geert Uytterhoeven wrote: > >> In fact Michael did so in "[PATCH v7 1/2] m68k/kernel - wire up >> syscall_trace_enter/leave for m68k"[1], but that's still stuck... >> >> [1] https://lore.kernel.org/r/1624924520-17567-2-git-send-email-schmitzmic@gmail.com/ > > Looks sane, but I'd split it in two - switch to calling syscall_trace_{enter,leave} > and then handling the return values... > > The former would keep the current behaviour (modulo reporting enter vs. leave > via PTRACE_GETEVENTMSG), the latter would allow syscall number change by tracer > and/or handling of seccomp/audit/whatnot. > > For exit+signal work the former would suffice, and IMO it would be a good idea > to put that one into a shared branch to be pulled both by seccomp and by signal > series. Would reduce the conflicts... > > Objections? I have the version that Geert ack'ed queued up for v5.17 in my signal-for-v5.17 branch, along with a couple others prior fixes in this series of changes where it was clear they were just obviously correct bug fixes. No need to delay the removal of profiling bits for example. I would love to see the m68k perform syscall_trace_{enter,leave} but just getting as far as ptrace_report_syscall will be enough to avoid any dependencies on my side. Eric ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-10 17:54 ` [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall Geert Uytterhoeven 2022-01-10 20:37 ` Al Viro @ 2022-01-11 1:33 ` Michael Schmitz 2022-01-11 22:42 ` Finn Thain 1 sibling, 1 reply; 10+ messages in thread From: Michael Schmitz @ 2022-01-11 1:33 UTC (permalink / raw) To: Geert Uytterhoeven, Al Viro Cc: Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, linux-m68k Hi Geert, Am 11.01.2022 um 06:54 schrieb Geert Uytterhoeven: > Hi Al, > > CC Michael/m68k, > > On Mon, Jan 10, 2022 at 5:20 PM Al Viro <viro@zeniv.linux.org.uk> wrote: >> On Mon, Jan 10, 2022 at 04:26:57PM +0100, Geert Uytterhoeven wrote: >>> On Mon, Jan 3, 2022 at 10:33 PM Eric W. Biederman <ebiederm@xmission.com> wrote: >>>> The generic function ptrace_report_syscall does a little more >>>> than syscall_trace on m68k. The function ptrace_report_syscall >>>> stops early if PT_TRACED is not set, it sets ptrace_message, >>>> and returns the result of fatal_signal_pending. >>>> >>>> Setting ptrace_message to a passed in value of 0 is effectively not >>>> setting ptrace_message, making that additional work a noop. >>>> >>>> Returning the result of fatal_signal_pending and letting the caller >>>> ignore the result becomes a noop in this change. >>>> >>>> When a process is ptraced, the flag PT_PTRACED is always set in >>>> current->ptrace. Testing for PT_PTRACED in ptrace_report_syscall is >>>> just an optimization to fail early if the process is not ptraced. >>>> Later on in ptrace_notify, ptrace_stop will test current->ptrace under >>>> tasklist_lock and skip performing any work if the task is not ptraced. >>>> >>>> Cc: Geert Uytterhoeven <geert@linux-m68k.org> >>>> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> >>> >>> As this depends on the removal of a parameter from >>> ptrace_report_syscall() earlier in this series: >>> Acked-by: Geert Uytterhoeven <geert@linux-m68k.org> >> >> FWIW, I would suggest taking it a bit further: make syscall_trace_enter() >> and syscall_trace_leave() in m68k ptrace.c unconditional, replace the >> calls of syscall_trace() in entry.S with syscall_trace_enter() and >> syscall_trace_leave() resp. and remove syscall_trace(). >> >> Geert, do you see any problems with that? The only difference is that >> current->ptrace_message would be set to 1 for ptrace stop on entry and >> 2 - on leave. Currently m68k just has it 0 all along. >> >> It is user-visible (the whole point is to let the tracer see which >> stop it is - entry or exit one), so somebody using PTRACE_GETEVENTMSG >> on syscall stops would start seeing 1 or 2 instead of "0 all along". >> That's how it works on all other architectures (including m68k-nommu), >> and I doubt that anything in userland will get broken. >> >> Behaviour of PTRACE_GETEVENTMSG for other stops (fork, etc.) remains >> as-is, of course. > > In fact Michael did so in "[PATCH v7 1/2] m68k/kernel - wire up > syscall_trace_enter/leave for m68k"[1], but that's still stuck... > > [1] https://lore.kernel.org/r/1624924520-17567-2-git-send-email-schmitzmic@gmail.com/ That patch (for reasons I never found out) did interact badly with Christoph Hellwig's 'remove set_fs' patches (and Al's signal fixes which Christoph's patches are based upon). Caused format errors under memory stress tests quite reliably, on my 030 hardware. Probably needs a fresh look - the signal return path got changed by Al's patches IIRC, and I might have relied on offsets to data on the stack that are no longer correct with these patches. Or there's a race between the syscall trap and signal handling when returning from interrupt context ... Still school hols over here so I won't have much peace and quiet until February. Cheers, Michael > > Gr{oetje,eeting}s, > > Geert > > -- > Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org > > In personal conversations with technical people, I call myself a hacker. But > when I'm talking to journalists I just say "programmer" or something like that. > -- Linus Torvalds > ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-11 1:33 ` Michael Schmitz @ 2022-01-11 22:42 ` Finn Thain 2022-01-12 0:20 ` Michael Schmitz 0 siblings, 1 reply; 10+ messages in thread From: Finn Thain @ 2022-01-11 22:42 UTC (permalink / raw) To: Michael Schmitz Cc: Geert Uytterhoeven, Al Viro, Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, linux-m68k On Tue, 11 Jan 2022, Michael Schmitz wrote: > Am 11.01.2022 um 06:54 schrieb Geert Uytterhoeven: > > Hi Al, > > > > CC Michael/m68k, > > > > On Mon, Jan 10, 2022 at 5:20 PM Al Viro <viro@zeniv.linux.org.uk> wrote: > >> On Mon, Jan 10, 2022 at 04:26:57PM +0100, Geert Uytterhoeven wrote: > >>> On Mon, Jan 3, 2022 at 10:33 PM Eric W. Biederman <ebiederm@xmission.com> > >>> wrote: > >>>> The generic function ptrace_report_syscall does a little more > >>>> than syscall_trace on m68k. The function ptrace_report_syscall > >>>> stops early if PT_TRACED is not set, it sets ptrace_message, > >>>> and returns the result of fatal_signal_pending. > >>>> > >>>> Setting ptrace_message to a passed in value of 0 is effectively not > >>>> setting ptrace_message, making that additional work a noop. > >>>> > >>>> Returning the result of fatal_signal_pending and letting the caller > >>>> ignore the result becomes a noop in this change. > >>>> > >>>> When a process is ptraced, the flag PT_PTRACED is always set in > >>>> current->ptrace. Testing for PT_PTRACED in ptrace_report_syscall is > >>>> just an optimization to fail early if the process is not ptraced. > >>>> Later on in ptrace_notify, ptrace_stop will test current->ptrace under > >>>> tasklist_lock and skip performing any work if the task is not ptraced. > >>>> > >>>> Cc: Geert Uytterhoeven <geert@linux-m68k.org> > >>>> Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> > >>> > >>> As this depends on the removal of a parameter from > >>> ptrace_report_syscall() earlier in this series: > >>> Acked-by: Geert Uytterhoeven <geert@linux-m68k.org> > >> > >> FWIW, I would suggest taking it a bit further: make syscall_trace_enter() > >> and syscall_trace_leave() in m68k ptrace.c unconditional, replace the > >> calls of syscall_trace() in entry.S with syscall_trace_enter() and > >> syscall_trace_leave() resp. and remove syscall_trace(). > >> > >> Geert, do you see any problems with that? The only difference is that > >> current->ptrace_message would be set to 1 for ptrace stop on entry and > >> 2 - on leave. Currently m68k just has it 0 all along. > >> > >> It is user-visible (the whole point is to let the tracer see which > >> stop it is - entry or exit one), so somebody using PTRACE_GETEVENTMSG > >> on syscall stops would start seeing 1 or 2 instead of "0 all along". > >> That's how it works on all other architectures (including m68k-nommu), > >> and I doubt that anything in userland will get broken. > >> > >> Behaviour of PTRACE_GETEVENTMSG for other stops (fork, etc.) remains > >> as-is, of course. > > > > In fact Michael did so in "[PATCH v7 1/2] m68k/kernel - wire up > > syscall_trace_enter/leave for m68k"[1], but that's still stuck... > > > > [1] > > https://lore.kernel.org/r/1624924520-17567-2-git-send-email-schmitzmic@gmail.com/ > > That patch (for reasons I never found out) did interact badly with > Christoph Hellwig's 'remove set_fs' patches (and Al's signal fixes which > Christoph's patches are based upon). Caused format errors under memory > stress tests quite reliably, on my 030 hardware. > Those patches have since been merged, BTW. > Probably needs a fresh look - the signal return path got changed by Al's > patches IIRC, and I might have relied on offsets to data on the stack > that are no longer correct with these patches. Or there's a race between > the syscall trap and signal handling when returning from interrupt > context ... > > Still school hols over here so I won't have much peace and quiet until > February. > So the patch works okay with Aranym 68040 but not Motorola 68030? Since there is at least one known issue affecting both Motorola 68030 and Hatari 68030, perhaps this patch is not the problem. In anycase, Al's suggestion to split the patch into two may help in that testing two smaller patches might narrow down the root cause. ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-11 22:42 ` Finn Thain @ 2022-01-12 0:20 ` Michael Schmitz 2022-01-12 3:32 ` Finn Thain 2022-01-12 7:55 ` Geert Uytterhoeven 0 siblings, 2 replies; 10+ messages in thread From: Michael Schmitz @ 2022-01-12 0:20 UTC (permalink / raw) To: Finn Thain Cc: Geert Uytterhoeven, Al Viro, Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, linux-m68k Hi Finn, Am 12.01.2022 um 11:42 schrieb Finn Thain: > On Tue, 11 Jan 2022, Michael Schmitz wrote: >>> In fact Michael did so in "[PATCH v7 1/2] m68k/kernel - wire up >>> syscall_trace_enter/leave for m68k"[1], but that's still stuck... >>> >>> [1] >>> https://lore.kernel.org/r/1624924520-17567-2-git-send-email-schmitzmic@gmail.com/ >> >> That patch (for reasons I never found out) did interact badly with >> Christoph Hellwig's 'remove set_fs' patches (and Al's signal fixes which >> Christoph's patches are based upon). Caused format errors under memory >> stress tests quite reliably, on my 030 hardware. >> > > Those patches have since been merged, BTW. Yes, that's why I advised caution with mine. > >> Probably needs a fresh look - the signal return path got changed by Al's >> patches IIRC, and I might have relied on offsets to data on the stack >> that are no longer correct with these patches. Or there's a race between >> the syscall trap and signal handling when returning from interrupt >> context ... >> >> Still school hols over here so I won't have much peace and quiet until >> February. >> > > So the patch works okay with Aranym 68040 but not Motorola 68030? Since Correct - I seem to recall we also tested those on your 040 and there was no regression there, but I may be misremembering that. > there is at least one known issue affecting both Motorola 68030 and Hatari > 68030, perhaps this patch is not the problem. In anycase, Al's suggestion I hadn't ever made that connection, but it might be another explanation, yes. > to split the patch into two may help in that testing two smaller patches > might narrow down the root cause. That's certainly true. What's the other reason these patches are still stuck, Geert? Did we ever settle the dispute about what return code ought to abort a syscall (in the seccomp context)? Cheers, Michael ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-12 0:20 ` Michael Schmitz @ 2022-01-12 3:32 ` Finn Thain 2022-01-12 7:54 ` Michael Schmitz 2022-01-12 7:55 ` Geert Uytterhoeven 1 sibling, 1 reply; 10+ messages in thread From: Finn Thain @ 2022-01-12 3:32 UTC (permalink / raw) To: Michael Schmitz Cc: Geert Uytterhoeven, Al Viro, Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, linux-m68k On Wed, 12 Jan 2022, Michael Schmitz wrote: > > I seem to recall we also tested those on your 040 and there was no > regression there, but I may be misremembering that. > I abandoned that regression testing exercise when unpatched mainline kernels began failing on that machine. I'm in the process of setting up a different 68040 machine. ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-12 3:32 ` Finn Thain @ 2022-01-12 7:54 ` Michael Schmitz 0 siblings, 0 replies; 10+ messages in thread From: Michael Schmitz @ 2022-01-12 7:54 UTC (permalink / raw) To: Finn Thain Cc: Geert Uytterhoeven, Al Viro, Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, linux-m68k Hi Finn, Am 12.01.2022 um 16:32 schrieb Finn Thain: > On Wed, 12 Jan 2022, Michael Schmitz wrote: > >> >> I seem to recall we also tested those on your 040 and there was no >> regression there, but I may be misremembering that. >> > > I abandoned that regression testing exercise when unpatched mainline > kernels began failing on that machine. I'm in the process of setting up a > different 68040 machine. > Thanks for refreshing my memory! Splitting my first patch as suggested by Al in order to defer handling of the syscall_trace_enter() return code would achieve what Geert suggested (eliminate m68k syscall_trace() altogether) without risk of regression. This would need to replace Eric's patch 8. Do you want me to send such a version based on my old patch series, or would you rather prepare that yourself, Eric? Cheers, Michael ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-12 0:20 ` Michael Schmitz 2022-01-12 3:32 ` Finn Thain @ 2022-01-12 7:55 ` Geert Uytterhoeven 2022-01-12 8:05 ` Michael Schmitz 1 sibling, 1 reply; 10+ messages in thread From: Geert Uytterhoeven @ 2022-01-12 7:55 UTC (permalink / raw) To: Michael Schmitz Cc: Finn Thain, Al Viro, Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, linux-m68k Hi Michael, On Wed, Jan 12, 2022 at 1:20 AM Michael Schmitz <schmitzmic@gmail.com> wrote: > Am 12.01.2022 um 11:42 schrieb Finn Thain: > > On Tue, 11 Jan 2022, Michael Schmitz wrote: > >>> In fact Michael did so in "[PATCH v7 1/2] m68k/kernel - wire up > >>> syscall_trace_enter/leave for m68k"[1], but that's still stuck... > >>> > >>> [1] > >>> https://lore.kernel.org/r/1624924520-17567-2-git-send-email-schmitzmic@gmail.com/ > >> > >> That patch (for reasons I never found out) did interact badly with > >> Christoph Hellwig's 'remove set_fs' patches (and Al's signal fixes which > >> Christoph's patches are based upon). Caused format errors under memory > >> stress tests quite reliably, on my 030 hardware. > >> > > > > Those patches have since been merged, BTW. > > Yes, that's why I advised caution with mine. > > > > >> Probably needs a fresh look - the signal return path got changed by Al's > >> patches IIRC, and I might have relied on offsets to data on the stack > >> that are no longer correct with these patches. Or there's a race between > >> the syscall trap and signal handling when returning from interrupt > >> context ... > >> > >> Still school hols over here so I won't have much peace and quiet until > >> February. > >> > > > > So the patch works okay with Aranym 68040 but not Motorola 68030? Since > > Correct - I seem to recall we also tested those on your 040 and there > was no regression there, but I may be misremembering that. > > > there is at least one known issue affecting both Motorola 68030 and Hatari > > 68030, perhaps this patch is not the problem. In anycase, Al's suggestion > > I hadn't ever made that connection, but it might be another explanation, > yes. > > > to split the patch into two may help in that testing two smaller patches > > might narrow down the root cause. > > That's certainly true. > > What's the other reason these patches are still stuck, Geert? Did we > ever settle the dispute about what return code ought to abort a syscall > (in the seccomp context)? IIRC, some (self)tests were still failing? Gr{oetje,eeting}s, Geert -- Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org In personal conversations with technical people, I call myself a hacker. But when I'm talking to journalists I just say "programmer" or something like that. -- Linus Torvalds ^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall 2022-01-12 7:55 ` Geert Uytterhoeven @ 2022-01-12 8:05 ` Michael Schmitz 0 siblings, 0 replies; 10+ messages in thread From: Michael Schmitz @ 2022-01-12 8:05 UTC (permalink / raw) To: Geert Uytterhoeven Cc: Finn Thain, Al Viro, Eric W. Biederman, Linux Kernel Mailing List, Linux-Arch, Linus Torvalds, Oleg Nesterov, Kees Cook, Linux API, linux-m68k Hi Geert, Am 12.01.2022 um 20:55 schrieb Geert Uytterhoeven: > Hi Michael, > >> What's the other reason these patches are still stuck, Geert? Did we >> ever settle the dispute about what return code ought to abort a syscall >> (in the seccomp context)? > > IIRC, some (self)tests were still failing? Too true - but I don't think my way of building the testsuite was entirely according to the book. And I'm not sure I ran the testsuite with more than one of the return code options. In all honesty, I had been waiting for Adrian Glaubitz to test the patches with his seccomp library port instead of relying on the testsuite. Still, reason enough to split off the removal of syscall_trace() from the seccomp stuff if it helps with Eric's patch series. Cheers, Michael > > Gr{oetje,eeting}s, > > Geert > > -- > Geert Uytterhoeven -- There's lots of Linux beyond ia32 -- geert@linux-m68k.org > > In personal conversations with technical people, I call myself a hacker. But > when I'm talking to journalists I just say "programmer" or something like that. > -- Linus Torvalds > ^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2022-01-12 8:05 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <87r19opkx1.fsf_-_@email.froward.int.ebiederm.org>
[not found] ` <20220103213312.9144-8-ebiederm@xmission.com>
[not found] ` <CAMuHMdWsNBjOJh0QEx9sppA9x3WoL8H2icqukNqECFhOPremjw@mail.gmail.com>
[not found] ` <YdxcszwEslyQJSuF@zeniv-ca.linux.org.uk>
2022-01-10 17:54 ` [PATCH 08/17] ptrace/m68k: Stop open coding ptrace_report_syscall Geert Uytterhoeven
2022-01-10 20:37 ` Al Viro
2022-01-10 21:18 ` Eric W. Biederman
2022-01-11 1:33 ` Michael Schmitz
2022-01-11 22:42 ` Finn Thain
2022-01-12 0:20 ` Michael Schmitz
2022-01-12 3:32 ` Finn Thain
2022-01-12 7:54 ` Michael Schmitz
2022-01-12 7:55 ` Geert Uytterhoeven
2022-01-12 8:05 ` Michael Schmitz
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox