On Tue, Jul 02, 2024 at 11:18:07AM -0400, Steven Rostedt wrote:
> On Tue, 2 Jul 2024 10:36:03 -0400
> Mathieu Desnoyers wrote:
>
> > > I can send a patch this week to update it. Or feel free to send a patch
> > > yourself.
> >
> > You need to reserve an unused ioctl Code and Seq# range
On Tue, Jul 02, 2024 at 11:32:53AM -0400, Mathieu Desnoyers wrote:
[...]
> Note that user events also has this issue: the ioctl is not reserved in
> the ioctl-number.rst list. See include/uapi/linux/user_events.h:
>
> #define DIAG_IOC_MAGIC '*'
>
> /* Request to register a user_event */
>
the value of
TRACE_MMAP_IOCTL_GET_READER a bit to avoid this collision.
Given that _IO('T', 0x1) is _IOC(_IOC_NONE, 'T', 0x1, 0),
something like _IOC(_IOC_NONE, 'T', 0x1, 0x1) should be OK.
Fixes: cf9f0f7c4c5bb ("tracing: Allow user-space mapping of the ring-buffer")
Signed-off-by
On Fri, May 10, 2024 at 03:04:32PM +0100, Vincent Donnefort wrote:
[...]
> diff --git a/include/uapi/linux/trace_mmap.h b/include/uapi/linux/trace_mmap.h
> index b682e9925539..bd1066754220 100644
> --- a/include/uapi/linux/trace_mmap.h
> +++ b/include/uapi/linux/trace_mmap.h
> @@ -43,4 +43,6 @@
Hi,
On Tue, Mar 30, 2021 at 12:30:52PM +1300, Chris Packham wrote:
> Hi,
>
> I've come over from https://github.com/strace/strace/issues/177
> there's a bit of context there.
>
> Crosstool-ng has hit a problem when building a recent enough version
> of strace in a configuration that uses musl
dy enforces locals=0 and fixes `break`.
>
> Tested on v5.10 on rx3600 machine (ia64 9040 CPU).
>
> CC: Oleg Nesterov
> CC: linux-i...@vger.kernel.org
> CC: linux-kernel@vger.kernel.org
> CC: Andrew Morton
> Reported-by: Dmitry V. Levin
> Bug: https://bugs.gentoo.
On Wed, Mar 03, 2021 at 03:30:19PM +0100, Oleg Nesterov wrote:
> On 03/02, Sergei Trofimovich wrote:
> >
> > > --- a/arch/ia64/include/asm/syscall.h
> > > +++ b/arch/ia64/include/asm/syscall.h
> > > @@ -32,7 +32,7 @@ static inline void syscall_rollback(struct task_struct
> > > *task,
> > >
> }
>
> Tested on v5.10 on rx3600 machine (ia64 9040 CPU).
>
> CC: linux-i...@vger.kernel.org
> CC: linux-kernel@vger.kernel.org
> CC: Andrew Morton
> Reported-by: Dmitry V. Levin
> Bug: https://bugs.gentoo.org/769614
> Signed-off-by: Sergei Trofimovich
> ---
Apparently, and
could not be included into the same
compilation unit because of a cut-and-paste typo in the former header.
Fixes: 12f7a505331e6 ("netfilter: add user-space connection tracking helper
infrastructure")
Cc: # v3.6
Signed-off-by: Dmitry V. Levin
---
include/uapi/linux
On Mon, Feb 22, 2021 at 09:53:10AM -0500, Mathieu Desnoyers wrote:
> - On Feb 22, 2021, at 6:57 AM, Dmitry V. Levin l...@altlinux.org wrote:
> > On Mon, Feb 22, 2021 at 11:04:43AM +0100, Piotr Figiel wrote:
[...]
> >> +#ifdef CONFIG_RSEQ
> >> +static long ptrace_ge
On Mon, Feb 22, 2021 at 11:04:43AM +0100, Piotr Figiel wrote:
[...]
> --- a/include/uapi/linux/ptrace.h
> +++ b/include/uapi/linux/ptrace.h
> @@ -102,6 +102,14 @@ struct ptrace_syscall_info {
> };
> };
>
> +#define PTRACE_GET_RSEQ_CONFIGURATION0x420f
> +
> +struct
rent: 10001, fork returned: 10001
current: 10001, parent: 1, fork returned: 10003
current: 1, parent: 0, fork returned: 10001
This bug was found by strace test suite.
Cc: Eric W. Biederman
Cc: sta...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
v2: Replaced task_active_pid_ns(p) wi
, "wait");
}
return !WIFEXITED(status) || WEXITSTATUS(status) != 0;
}
EOF
$ sh -c ./a.out
current: 10001, parent: 1, fork returned: 10002
current: 1, parent: 0, fork returned: 10001
Cc: Eric W. Biederman
Cc: sta...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
e example in ioctl_ns(2) manual page doesn't work
when e.g. it's compiled with -m32 on a 64-bit kernel.
> "Dmitry V. Levin" writes:
> > On Fri, Jul 24, 2020 at 11:20:26AM +0200, Arnd Bergmann wrote:
> >> On Fri, Jul 24, 2020 at 2:12 AM Dmitry V. Levin wrote:
> >>
syscall_info`.
>
> Cc: sta...@vger.kernel.org
> Fixes: 201766a20e30 ("ptrace: add PTRACE_GET_SYSCALL_INFO request")
> Suggested-by: Dan Carpenter
> Signed-off-by: Peilin Ye
> ---
> Change in v3:
> - Remove unnecessary `__aligned__` attribute. (Suggested
f
> doing memset() on `info`. (Suggested by Dmitry V. Levin
> )
>
> Reference: https://lwn.net/Articles/417989/
>
> $ # before:
> $ pahole -C "ptrace_syscall_info" kernel/ptrace.o
> struct ptrace_syscall_info {
> __u8
On Mon, Jul 27, 2020 at 05:36:44PM -0400, Peilin Ye wrote:
> ptrace_get_syscall_info() is copying uninitialized stack memory to
> userspace due to the compiler not initializing holes in statically
> allocated structures. Fix it by initializing `info` with memset().
>
> Cc: sta...@vger.kernel.org
On Fri, Jul 24, 2020 at 11:20:26AM +0200, Arnd Bergmann wrote:
> On Fri, Jul 24, 2020 at 2:12 AM Dmitry V. Levin wrote:
> >
> > According to Documentation/driver-api/ioctl.rst, in order to support
> > 32-bit user space running on a 64-bit kernel, each subsystem or drive
iptor")
Cc: sta...@vger.kernel.org # v4.9+
Signed-off-by: Dmitry V. Levin
---
fs/nsfs.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/fs/nsfs.c b/fs/nsfs.c
index 800c1d0eb0d0..a00236bffa2c 100644
--- a/fs/nsfs.c
+++ b/fs/nsfs.c
@@ -21,6 +21,7 @@ static long ns_ioctl(struct file *filp, unsigned int
ce changes")
Cc: Elvira Khabirova
Cc: sta...@vger.kernel.org # v2.6.28+
Signed-off-by: Dmitry V. Levin
---
arch/s390/include/asm/syscall.h | 12 +++-
1 file changed, 11 insertions(+), 1 deletion(-)
diff --git a/arch/s390/include/asm/syscall.h b/arch/s390/include/asm/syscall.
On Thu, Sep 19, 2019 at 09:55:30AM -0700, Kees Cook wrote:
> On Thu, Sep 19, 2019 at 01:42:51PM +0300, Dmitry V. Levin wrote:
> > On Wed, Sep 18, 2019 at 10:33:09AM -0700, Kees Cook wrote:
> > > This is actually fixed in -next already (and, yes, with the Fixes line
> &g
On Wed, Sep 18, 2019 at 10:33:09AM -0700, Kees Cook wrote:
> On Wed, Sep 18, 2019 at 11:15:12AM +0200, Tyler Hicks wrote:
> > On 2019-09-18 10:48:31, Christian Brauner wrote:
> > > Add tw missing ptrace ifdefines to avoid compilation errors on systems
> > > that do not provide
On Wed, Sep 11, 2019 at 04:54:47PM +0200, Christian Brauner wrote:
> On Wed, Sep 11, 2019 at 03:32:13PM +0100, Eugene Syromiatnikov wrote:
> > On Wed, Sep 11, 2019 at 04:16:36PM +0200, Christian Brauner wrote:
> > > On Wed, Sep 11, 2019 at 03:52:36PM +0200, Christian Brauner wrote:
> > > > On Wed,
re's no sane reason to accept them.
>
> * kernel/fork.c (copy_clone_args_from_user): Fail with -EINVAL if
> args.exit_signal converted to unsigned int is not equal to the original
> value.
>
> Signed-off-by: Eugene Syromiatnikov
Reviewed-by: Dmitry V. Levin
--
ldv
On Mon, Jul 29, 2019 at 05:35:30PM +0800, kernel test robot wrote:
> FYI, we noticed the following commit (built with gcc-7):
>
> commit: 201766a20e30f982ccfe36bebfad9602c3ff574a ("ptrace: add
> PTRACE_GET_SYSCALL_INFO request")
>
On Wed, Jul 17, 2019 at 03:04:56PM -0700, Linus Torvalds wrote:
> On Wed, Jul 17, 2019 at 2:59 PM Dmitry V. Levin wrote:
> >
> > So this ended up as commit 7b9afb86b6328f10dc2cad9223d7def12d60e505
> > (thanks to Anatoly for bisecting) and introduced a regression:
> >
Hi,
On Tue, Jun 25, 2019 at 04:37:08PM +0200, Christoph Hellwig wrote:
> The sparc64 code is mostly equivalent to the generic one, minus various
> bugfixes and two arch overrides that this patch adds to pgtable.h.
>
> Signed-off-by: Christoph Hellwig
> Reviewed-by: Khalid Aziz
> ---
>
("fork: add clone3")
Bisected-and-tested-by: Anatoly Pugachev
Signed-off-by: Dmitry V. Levin
---
arch/x86/ia32/sys_ia32.c | 4
include/linux/sched/task.h | 1 +
kernel/fork.c | 17 +++--
3 files changed, 20 insertions(+), 2 deletions(-)
diff --git a/arc
On Sun, Jul 14, 2019 at 04:23:05PM +0200, Christian Brauner wrote:
> On Sun, Jul 14, 2019 at 05:10:08PM +0300, Dmitry V. Levin wrote:
> > On Sun, Jul 14, 2019 at 02:17:25PM +0200, Christian Brauner wrote:
> > > On Sun, Jul 14, 2019 at 03:02:06PM +0300, Dmi
On Sun, Jul 14, 2019 at 02:17:25PM +0200, Christian Brauner wrote:
> On Sun, Jul 14, 2019 at 03:02:06PM +0300, Dmitry V. Levin wrote:
> > The introduction of clone3 syscall accidentally broke CLONE_PIDFD
> > support in traditional clone syscall on compat x86 and those
> > a
("fork: add clone3")
Bisected-and-tested-by: Anatoly Pugachev
Signed-off-by: Dmitry V. Levin
---
arch/x86/ia32/sys_ia32.c | 1 +
kernel/fork.c| 1 +
2 files changed, 2 insertions(+)
diff --git a/arch/x86/ia32/sys_ia32.c b/arch/x86/ia32/sys_ia32.c
index 64a6c952091e..98754baf4
The syscall entry/exit is now exposed via PTRACE_GETEVENTMSG,
update the test accordingly.
Reported-by: kernel test robot
Signed-off-by: Dmitry V. Levin
---
tools/testing/selftests/seccomp/seccomp_bpf.c | 13 +
1 file changed, 9 insertions(+), 4 deletions(-)
diff --git a/tools
On Mon, Jun 24, 2019 at 01:59:43PM +0200, Christian Brauner wrote:
> On Mon, Jun 24, 2019 at 11:49:40AM +0200, Christian Brauner wrote:
> > On Sun, Jun 23, 2019 at 02:27:17PM +0300, Dmitry V. Levin wrote:
> > > Userspace needs a cheap and reliable way to tell whether CLONE_PIDFD
On Sat, Jun 22, 2019 at 12:13:39AM +0200, Christian Brauner wrote:
[...]
> Out of curiosity: what makes the new flag different than say
> CLONE_NEWCGROUP or any new clone flag that got introduced?
> CLONE_NEWCGROUP too would not be detectable apart from the method I gave
> you above; same for
Initialize pidfd to an invalid descriptor, to fail gracefully on
those kernels that do not implement CLONE_PIDFD and leave pidfd
unchanged.
Signed-off-by: Dmitry V. Levin
---
samples/pidfd/pidfd-metadata.c | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/samples/pidfd
to extend legacy clone syscall
this way.
So remove the pidfd == 0 check. Userspace that needs to be portable
to kernels without CLONE_PIDFD support is advised to initialize pidfd
with -1 and check the pidfd value returned by CLONE_PIDFD.
Signed-off-by: Dmitry V. Levin
---
kernel/f
On Thu, Jun 20, 2019 at 01:10:37PM +0200, Christian Brauner wrote:
> On Thu, Jun 20, 2019 at 02:00:37PM +0300, Dmitry V. Levin wrote:
> > Cc'ed more people as the issue is not just with the example but
> > with the interface itself.
> >
> > On Thu, Jun 20, 2019 at
Cc'ed more people as the issue is not just with the example but
with the interface itself.
On Thu, Jun 20, 2019 at 12:31:06PM +0200, Christian Brauner wrote:
> On Thu, Jun 20, 2019 at 06:11:44AM +0300, Dmitry V. Levin wrote:
> > Initialize pidfd to an invalid descriptor, to fail g
Initialize pidfd to an invalid descriptor, to fail gracefully on
those kernels that do not implement CLONE_PIDFD and leave pidfd
unchanged.
Signed-off-by: Dmitry V. Levin
---
samples/pidfd/pidfd-metadata.c | 8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/samples/pidfd
Hi Baruch, Geert,
Could you share these findings with bpf and netdev people, please?
On Fri, May 03, 2019 at 02:16:04PM +0200, Geert Uytterhoeven wrote:
> Hi Baruch,
>
> On Fri, May 3, 2019 at 1:52 PM Baruch Siach wrote:
> > On Fri, May 03 2019, Geert Uytterhoeven wrote:
> > > On Fri, May 3,
[looks like linux-abi is a typo, Cc'ed linux-api instead]
On Thu, May 16, 2019 at 05:50:22PM +0100, Al Viro wrote:
> [linux-abi cc'd]
>
> On Thu, May 16, 2019 at 06:31:52PM +0200, Christian Brauner wrote:
> > On Thu, May 16, 2019 at 05:22:59PM +0100, Al Viro wrote:
> > > On Thu, May 16, 2019 at
-by: Paul Burton
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Ralf Baechle
Cc: James Hogan
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-m...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v11: unchanged
v10: unchanged
v9: unchanged
v8: unchanged
v7
-by: Helge Deller # parisc
Cc: James E.J. Bottomley
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-par...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v11: unchanged
v10: unchanged
v9: unchanged
v8: added Acked-by from
: Richard Kuo
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-hexa...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Richard, this patch is waiting for ACK since November.
Notes:
v11: unchanged
v10: unchanged
v9: unchanged
v8
-by: Michael Ellerman
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Benjamin Herrenschmidt
Cc: Paul Mackerras
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linuxppc-...@lists.ozlabs.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v11: added Acked-by from
https://lore.kernel.org/lkml
ceeds the size
specified by "addr" argument, the output is truncated.
Co-authored-by: Dmitry V. Levin
Reviewed-by: Oleg Nesterov
Reviewed-by: Kees Cook
Cc: Andy Lutomirski
Cc: Eugene Syromyatnikov
Cc: linux-...@vger.kernel.org
Cc: strace-de...@lists.strace.io
Signed-off-by:
Check whether PTRACE_GET_SYSCALL_INFO semantics implemented in the kernel
matches userspace expectations.
Acked-by: Shuah Khan
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: linux-kselft...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes
.
Reported-by: kbuild test robot
Fixes: 1932fbe36e02 ("nds32: System calls handling")
Acked-by: Greentime Hu
Cc: Vincent Chen
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Signed-off-by: Dmitry V. Levin
---
Notes:
v11: unchanged
v10: a
Hi,
On Tue, Apr 23, 2019 at 09:28:48PM +0200, Arnd Bergmann wrote:
> The following changes since commit 9e98c678c2d6ae3a17cb2de55d17f69dddaa231b:
>
> Linux 5.1-rc1 (2019-03-17 14:22:26 -0700)
>
> are available in the Git repository at:
>
>
Check whether PTRACE_GET_SYSCALL_INFO semantics implemented in the kernel
matches userspace expectations.
Acked-by: Shuah Khan
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: linux-kselft...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes
ceeds the size
specified by "addr" argument, the output is truncated.
Co-authored-by: Dmitry V. Levin
Reviewed-by: Oleg Nesterov
Reviewed-by: Kees Cook
Cc: Andy Lutomirski
Cc: Eugene Syromyatnikov
Cc: linux-...@vger.kernel.org
Cc: strace-de...@lists.strace.io
Signed-off-by:
: Michael Ellerman
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Benjamin Herrenschmidt
Cc: Paul Mackerras
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linuxppc-...@lists.ozlabs.org
Signed-off-by: Dmitry V. Levin
---
Michael, this patch is waiting for ACK since early December.
Notes:
v10
-by: Paul Burton
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Ralf Baechle
Cc: James Hogan
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-m...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v10: unchanged
v9: unchanged
v8: unchanged
v7: added Acked-by
v6
: Richard Kuo
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-hexa...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Richard, this patch is waiting for ACK since November.
Notes:
v10: unchanged
v9: unchanged
v8: moved syscall_get_arch
.
Reported-by: kbuild test robot
Fixes: 1932fbe36e02 ("nds32: System calls handling")
Acked-by: Greentime Hu
Cc: Vincent Chen
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Signed-off-by: Dmitry V. Levin
---
Notes:
v10: added Acked-by
v
-by: Helge Deller # parisc
Cc: James E.J. Bottomley
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-par...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v10: unchanged
v9: unchanged
v8: added Acked-by
v7: unchanged
On Mon, Apr 08, 2019 at 11:51:45AM -0600, shuah wrote:
> On 4/8/19 11:42 AM, Dmitry V. Levin wrote:
> > Check whether PTRACE_GET_SYSCALL_INFO semantics implemented in the kernel
> > matches userspace expectations.
> >
> > Cc: Oleg Nesterov
> > Cc: Andy Lutom
Check whether PTRACE_GET_SYSCALL_INFO semantics implemented in the kernel
matches userspace expectations.
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: Shuah Khan
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: linux-kselft...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v9
ceeds the size
specified by "addr" argument, the output is truncated.
Co-authored-by: Dmitry V. Levin
Reviewed-by: Oleg Nesterov
Reviewed-by: Kees Cook
Cc: Andy Lutomirski
Cc: Eugene Syromyatnikov
Cc: linux-...@vger.kernel.org
Cc: strace-de...@lists.strace.io
Signed-off-by:
-by: Helge Deller # parisc
Cc: James E.J. Bottomley
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-par...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v9: unchanged
v8: added Acked-by
v7: unchanged
v6: unchanged
v5
-by: Paul Burton
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Ralf Baechle
Cc: James Hogan
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-m...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v9: unchanged
v8: unchanged
v7: added Acked-by
v6: unchanged
v5
.
Reported-by: kbuild test robot
Fixes: 1932fbe36e02 ("nds32: System calls handling")
Cc: Greentime Hu
Cc: Vincent Chen
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Signed-off-by: Dmitry V. Levin
---
Dear nds32 maintainers, this fix is waiti
: Richard Kuo
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-hexa...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Richard, this patch is waiting for ACK since November.
Notes:
v9: unchanged
v8: moved syscall_get_arch to separate audit
On Mon, Apr 08, 2019 at 11:31:31AM +1000, Stephen Rothwell wrote:
> Hi all,
>
> Today's linux-next merge of the audit tree got conflicts in:
>
> arch/mips/kernel/ptrace.c
> kernel/seccomp.c
>
> between commit:
>
> b35f549df1d7 ("syscalls: Remove start and number from
>
On Mon, Apr 01, 2019 at 09:41:07AM -0400, Steven Rostedt wrote:
> From: "Dmitry V. Levin"
>
> RISC-V syscall arguments are located in orig_a0,a1..a5 fields
> of struct pt_regs.
>
> Due to an off-by-one bug and a bug in pointer arithmetic
> syscall_get_argume
On Mon, Apr 01, 2019 at 09:41:08AM -0400, Steven Rostedt wrote:
> From: "Dmitry V. Levin"
>
> C-SKY syscall arguments are located in orig_a0,a1,a2,a3,regs[0],regs[1]
> fields of struct pt_regs.
>
> Due to an off-by-one bug and a bug in pointer arithmetic
> sysc
On Wed, Dec 12, 2018 at 11:55:16AM +0300, Dmitry V. Levin wrote:
> On Mon, Dec 10, 2018 at 04:30:25PM +0300, Dmitry V. Levin wrote:
> > On Mon, Dec 10, 2018 at 02:06:28PM +0100, Geert Uytterhoeven wrote:
> > > On Mon, Dec 10, 2018 at 1:41 PM Dmitry V. Levin wrote:
> >
On Fri, Mar 29, 2019 at 11:12:18AM -0700, Linus Torvalds wrote:
> On Fri, Mar 29, 2019 at 10:40 AM Steven Rostedt wrote:
> >
> > I'll keep it around for now, but this should go as a warning to Dmitry,
> > to get something using it soon, or they may be dropped.
>
> I don't think _that_ is the
On Fri, Mar 29, 2019 at 01:15:14PM -0400, Steven Rostedt wrote:
> On Fri, 29 Mar 2019 20:12:21 +0300
> "Dmitry V. Levin" wrote:
>
> > RISC-V syscall arguments are located in orig_a0,a1..a5 fields
> > of struct pt_regs.
> >
> > Due to an off
On Fri, Mar 29, 2019 at 01:56:35PM -0400, Steven Rostedt wrote:
> On Fri, 29 Mar 2019 18:52:18 +0100
> David Abdurachmanov wrote:
>
> > I have alternative version posted in December part of SECCOMP
> > patchset which is based on arm64 implementation.
> >
> >
: e2c0cdfba7f69 ("RISC-V: User-facing API")
Cc: Steven Rostedt
Cc: Ingo Molnar
Cc: Kees Cook
Cc: Andy Lutomirski
Cc: Will Drewry
Cc: linux-ri...@lists.infradead.org
Cc: sta...@vger.kernel.org # v4.15+
Signed-off-by: Dmitry V. Levin
---
arch/riscv/include/asm/syscall.h | 12 +++---
instead.
Fixes: 4859bfca11c7d ("csky: System Call")
Cc: Steven Rostedt
Cc: Ingo Molnar
Cc: Kees Cook
Cc: Andy Lutomirski
Cc: Will Drewry
Cc: sta...@vger.kernel.org # v4.20+
Signed-off-by: Dmitry V. Levin
---
arch/csky/include/asm/syscall.h | 10 ++
1 file changed, 6 insert
On Wed, Mar 27, 2019 at 11:52:19PM +0100, Thomas Gleixner wrote:
> On Thu, 28 Mar 2019, Dmitry V. Levin wrote:
> > On Wed, Mar 27, 2019 at 03:29:16PM +0100, Thomas Gleixner wrote:
> > > On Wed, 27 Mar 2019, Dmitry V. Levin wrote:
> > > > On Tue, Mar 26, 2019 at 0
On Wed, Mar 27, 2019 at 03:29:16PM +0100, Thomas Gleixner wrote:
> On Wed, 27 Mar 2019, Dmitry V. Levin wrote:
> > On Tue, Mar 26, 2019 at 04:12:45PM +0100, Oleg Nesterov wrote:
> > > On 03/23, Thomas Gleixner wrote:
> > [...]
> > > > 2) syscall_set_arguments(
On Tue, Mar 26, 2019 at 04:12:45PM +0100, Oleg Nesterov wrote:
> On 03/23, Thomas Gleixner wrote:
[...]
> > 2) syscall_set_arguments() has been introduced in 2008 and we still have
> > no caller. Instead of polishing it, can it be removed completely or are
> > there plans to actually use
On Mon, Mar 25, 2019 at 08:41:54PM +0800, Guo Ren wrote:
> On Mon, Mar 25, 2019 at 03:17:54PM +0300, Dmitry V. Levin wrote:
> > On Mon, Mar 25, 2019 at 08:03:39PM +0800, guo...@kernel.org wrote:
> > [...]
> > > diff --git a/arch/csky/include/uapi/asm/ptrace.h
> >
On Mon, Mar 25, 2019 at 08:03:39PM +0800, guo...@kernel.org wrote:
[...]
> diff --git a/arch/csky/include/uapi/asm/ptrace.h
> b/arch/csky/include/uapi/asm/ptrace.h
> index a4eaa8d..9bf5b1a 100644
> --- a/arch/csky/include/uapi/asm/ptrace.h
> +++ b/arch/csky/include/uapi/asm/ptrace.h
> @@ -62,6
ceeds the size
specified by "addr" argument, the output is truncated.
Co-authored-by: Dmitry V. Levin
Reviewed-by: Oleg Nesterov
Reviewed-by: Kees Cook
Cc: Andy Lutomirski
Cc: Eugene Syromyatnikov
Cc: linux-...@vger.kernel.org
Cc: strace-de...@lists.strace.io
Signed-off-by:
Check whether PTRACE_GET_SYSCALL_INFO semantics implemented in the kernel
matches userspace expectations.
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: Shuah Khan
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: linux-kselft...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v8
-by: Helge Deller # parisc
Cc: James E.J. Bottomley
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-par...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v8: added Acked-by
v7: unchanged
v6: unchanged
v5: initial revision
-by: Paul Burton
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Ralf Baechle
Cc: James Hogan
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-m...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v8: unchanged
v7: added Acked-by
v6: unchanged
v5: initial revision
.
Reported-by: kbuild test robot
Fixes: 1932fbe36e02 ("nds32: System calls handling")
Cc: Greentime Hu
Cc: Vincent Chen
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: sta...@vger.kernel.org # v4.17+
Signed-off-by: Dmitry V. Levin
---
Not
: Richard Kuo
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-hexa...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
Notes:
v8: moved syscall_get_arch to separate audit patchset
v7: unchanged
v6: added missing includes
v5: added
On Tue, Mar 19, 2019 at 12:19:57PM -0700, Andrei Vagin wrote:
> There are a few system calls (pselect, ppoll, etc) which replace a task
> sigmask while they are running in a kernel-space
>
> When a task calls one of these syscalls, the kernel saves a current
> sigmask in task->saved_sigmask and
with PTRACE_GET_SYSCALL_INFO request.
Acked-by: Paul Moore
Cc: Guan Xuetao
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
Notes:
v2: unchanged
arch/unicore32/include/asm/elf.h | 3 +--
include/uapi/linux/elf
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch/nds32/include/asm/syscall.h | 29 ++---
1 file changed, 18 insertions(+), 11 deletions(-)
diff --git a/arch/nds32/include/asm/syscall.h b/arch/nds32/include/asm/syscall.h
index f7
: Michael Ellerman
Cc: Benjamin Herrenschmidt
Cc: Paul Mackerras
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: linuxppc-...@lists.ozlabs.org
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
Notes:
v7: unchanged
: Helge Deller
Cc: James E.J. Bottomley
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: linux-par...@vger.kernel.org
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
Notes:
v7: unchanged
v6: unchanged
v5
-by: Paul Moore
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Guan Xuetao
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch/unicore32/include/asm/syscall.h | 12
with PTRACE_GET_SYSCALL_INFO request.
Acked-by: Paul Moore
Cc: Guan Xuetao
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch/unicore32/include/asm/elf.h | 3
-by: Paul Moore
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Ley Foon Tan
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: nios2-...@lists.rocketboards.org
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch/nios2/include/asm
request.
Acked-by: Paul Moore
Cc: Greentime Hu
Cc: Vincent Chen
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch/nds32/include/asm
-by: Paul Moore
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Greentime Hu
Cc: Vincent Chen
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch/nds32/include/asm/syscall.h | 9
-by: Paul Moore
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Richard Kuo
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: linux-hexa...@vger.kernel.org
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch/hexagon/include/asm
with PTRACE_GET_SYSCALL_INFO request.
Acked-by: Paul Moore
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: Richard Kuo
Cc: linux-hexa...@vger.kernel.org
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch
-by: Paul Moore
Cc: Elvira Khabirova
Cc: Eugene Syromyatnikov
Cc: Yoshinori Sato
Cc: Oleg Nesterov
Cc: Andy Lutomirski
Cc: uclinux-h8-de...@lists.sourceforge.jp
Cc: linux-au...@redhat.com
Signed-off-by: Dmitry V. Levin
---
This is just a gentle ping, the patch is unchanged.
arch/h8300
On Sat, Feb 09, 2019 at 01:22:19AM +0300, Dmitry V. Levin wrote:
> On Thu, Jan 17, 2019 at 03:34:44PM -0500, Richard Guy Briggs wrote:
> > On 2019-01-09 15:40, Dmitry V. Levin wrote:
> > > syscall_get_arch() is required to be implemented on all architectures in
> >
Hi,
On Sun, Feb 17, 2019 at 05:34:46PM +0100, Niklas Hambüchen wrote:
> Until now, the man page said:
>
> Attachment and subsequent commands are per thread:
> in a multi‐ threaded process, every thread can be individually attached
> to a
> (potentially different) tracer, or left not
On Sat, Feb 16, 2019 at 05:55:24PM +0100, Helge Deller wrote:
> On 16.02.19 14:10, Dmitry V. Levin wrote:
> > Commit 910cd32e552e ("parisc: Fix and enable seccomp filter support")
> > introduced a regression in ptrace-based syscall tampering: when tracer
> &g
2e ("parisc: Fix and enable seccomp filter support")
Cc: sta...@vger.kernel.org # v4.5+
Signed-off-by: Dmitry V. Levin
---
v2: Updated comments.
Set gr[28] to -ENOSYS after tracehook_report_syscall_entry() invocation
because setting of syscall return code by tracer on entering syscall
1 - 100 of 680 matches
Mail list logo