Hi,

On Wed, Jan 29, 2025 at 11:21:41PM +1000, Nicholas Piggin wrote:
> Hi,
> 
> I've been toying with the seccomp vs syscall return value problems, and
> wonder if something like this approach could give us a simpler alternative.
> Basically all the core code uses -errno return value, then we convert it
> to the powerpc convention at the last minute when returning.
> 
> This seems to pass the seccomp_bpf test cases when applied with the set
> syscall info ptrace patches
> 
> https://lore.kernel.org/lkml/20250113171054.ga...@strace.io/
> 
> With patch 1 of that series reverted.
> 
> One concern is working out exact details of what tracers can see and
> trying to ensure it doesn't break some corner case.

Does the strace test suite also pass with your changes?
My bet is it doesn't pass because do_syscall_trace_leave() is called
with a different state of struct pt_regs.

As I wrote yesterday, the traditional powerpc sc syscall return ABI is
exposed to user space not just when returning to user space, but, besides
that, at syscall exit tracepoint (trace_sys_exit), ptrace syscall exit
stop (ptrace_report_syscall_exit), and PTRACE_EVENT_SECCOMP stop
(__secure_computing).

There could be other points where this is exposed.  For example, on many
architectures the tracer can specify syscall error return value also at
ptrace syscall entry stop (ptrace_report_syscall_entry), but powerpc does
not implement this.


-- 
ldv

Reply via email to