Michael Schmitz <schmitzmic@xxxxxxxxx> writes:
Patch 3 adds the test for TIF_SECCOMP thread info flag to call into syscall_trace_enter() when seccomp syscall filtering is active, which was missing from earlier versions (classic MMU m68k only - need some help with the test for 68000 and coldfire). The previous version required the TIF_SYSCALL_TRACE flag to be set for syscall filtering to work The rest of the series remains unchanged from v9. Tested on ARAnyM, 63 out of 89 seccomp_bpf tests now pass (33 with the old version). I hope you didn't waste too much effort on testing v8/v9, Adrian. Should have a suitably large brown paper bag somewhere yet :-(
Has any progress been made on testing or merging this patch series? I was just thinking it might be nice if the only callers of ptrace_report_syscall were ptrace_report_syscall_entry and ptrace_report_syscall_exit. Eric