Hi Michael! On 1/27/22 08:41, Michael Schmitz wrote:
Patch 3 adds the test for TIF_SECCOMP thread info flag to call into syscall_trace_enter() when seccomp syscall filtering is active, which was missing from earlier versions (classic MMU m68k only - need some help with the test for 68000 and coldfire). The previous version required the TIF_SYSCALL_TRACE flag to be set for syscall filtering to work The rest of the series remains unchanged from v9. Tested on ARAnyM, 63 out of 89 seccomp_bpf tests now pass (33 with the old version). I hope you didn't waste too much effort on testing v8/v9, Adrian. Should have a suitably large brown paper bag somewhere yet :-(
Sorry, I haven't found the time for the tests yet, I'm really busy at the moment. If you want to test libsecomp, you can check it out from my Github, then build it and run the testsuite. See: https://github.com/glaubitz/libseccomp/tree/m68k Adrian -- .''`. John Paul Adrian Glaubitz : :' : Debian Developer - glaubitz@xxxxxxxxxx `. `' Freie Universitaet Berlin - glaubitz@xxxxxxxxxxxxxxxxxxx `- GPG: 62FF 8A75 84E0 2956 9546 0006 7426 3B37 F5B5 F913