From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752415AbbCWLpI (ORCPT ); Mon, 23 Mar 2015 07:45:08 -0400 Received: from mail-bn1on0134.outbound.protection.outlook.com ([157.56.110.134]:43856 "EHLO na01-bn1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752152AbbCWLpF (ORCPT ); Mon, 23 Mar 2015 07:45:05 -0400 Message-ID: <550FFCAB.8080409@freescale.com> Date: Mon, 23 Mar 2015 13:44:43 +0200 From: Purcareata Bogdan User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0 MIME-Version: 1.0 To: Benjamin Herrenschmidt , Michael Ellerman CC: Bogdan Purcareata , , , , , , , Scott Wood Subject: Re: [PATCH v4 0/3] powerpc: Enable seccomp filter support References: <1424247413-20753-1-git-send-email-bogdan.purcareata@freescale.com> <54F01C85.2020602@freescale.com> <1425070490.4645.86.camel@kernel.crashing.org> In-Reply-To: <1425070490.4645.86.camel@kernel.crashing.org> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [192.88.166.1] X-ClientProxiedBy: AM3PR03CA038.eurprd03.prod.outlook.com (10.141.191.166) To BY2PR03MB191.namprd03.prod.outlook.com (10.242.36.143) Authentication-Results: freescale.com; dkim=none (message not signed) header.d=none; X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BY2PR03MB191; X-Microsoft-Antispam-PRVS: X-Forefront-Antispam-Report: BMV:1;SFV:NSPM;SFS:(10019020)(6049001)(6009001)(24454002)(45074003)(51704005)(377424004)(15975445007)(47776003)(65956001)(50986999)(54356999)(76176999)(77096005)(40100003)(66066001)(2950100001)(77156002)(122386002)(42186005)(62966003)(83506001)(33656002)(23676002)(59896002)(87976001)(50466002)(19580395003)(36756003)(46102003)(86362001)(92566002)(42262002);DIR:OUT;SFP:1102;SCL:1;SRVR:BY2PR03MB191;H:[10.171.74.29];FPR:;SPF:None;MLV:sfv;LANG:en; X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(5005006)(5002010);SRVR:BY2PR03MB191;BCL:0;PCL:0;RULEID:;SRVR:BY2PR03MB191; X-Forefront-PRVS: 05245CA661 X-OriginatorOrg: freescale.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 23 Mar 2015 11:44:54.3862 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR03MB191 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 27.02.2015 22:54, Benjamin Herrenschmidt wrote: > On Fri, 2015-02-27 at 09:28 +0200, Purcareata Bogdan wrote: >> Ping? > > What is the ping for ? > > Ben. Hello Ben, I just wanted to check with you what's the current status of these patches. I noticed in patchwork [1][2][3] that the patches are marked as non-applicable. As of today, I cloned Michael Ellerman's tree [4], applied the patches on the master branch, compiled and tested. Tests pass both with the libseccomp regression suite and my LXC tests. Is there a specific tree I should send them against, or on another mailing list? Is there any other reason the patches are not applicable? [1] https://patchwork.ozlabs.org/patch/440827/ [2] https://patchwork.ozlabs.org/patch/440828/ [3] https://patchwork.ozlabs.org/patch/440829/ [4] git://git.kernel.org/pub/scm/linux/kernel/git/mpe/linux.git Thank you, Bogdan P. >> On 18.02.2015 10:16, Bogdan Purcareata wrote: >>> Add the missing pieces in order to enable SECCOMP_FILTER on PowerPC >>> architectures, and enable this support. >>> >>> Testing has been pursued using libseccomp with the latest ppc support patches >>> [1][2], on Freescale platforms for both ppc and ppc64. Support on ppc64le has >>> also been tested, courtesy of Mike Strosaker. >>> >>> [1] https://groups.google.com/forum/#!topic/libseccomp/oz42LfMDsxg >>> [2] https://groups.google.com/forum/#!topic/libseccomp/TQWfCt_nD7c >>> >>> v4: >>> - rebased on top of 3.19 >>> >>> v3: >>> - keep setting ENOSYS in syscall entry assembly when syscall tracing is disabled >>> >>> v2: >>> - move setting ENOSYS from syscall entry assembly to do_syscall_trace_enter >>> >>> Bogdan Purcareata (3): >>> powerpc: Don't force ENOSYS as error on syscall fail >>> powerpc: Relax secure computing on syscall entry trace >>> powerpc: Enable HAVE_ARCH_SECCOMP_FILTER >>> >>> arch/powerpc/Kconfig | 1 + >>> arch/powerpc/kernel/entry_32.S | 7 ++++++- >>> arch/powerpc/kernel/entry_64.S | 5 +++-- >>> arch/powerpc/kernel/ptrace.c | 8 ++++++-- >>> 4 files changed, 16 insertions(+), 5 deletions(-) >>> > >