Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756104AbaGSVvR (ORCPT ); Sat, 19 Jul 2014 17:51:17 -0400 Received: from imap.thunk.org ([74.207.234.97]:45419 "EHLO imap.thunk.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756003AbaGSVvO (ORCPT ); Sat, 19 Jul 2014 17:51:14 -0400 Date: Sat, 19 Jul 2014 17:50:55 -0400 From: "Theodore Ts'o" To: Kees Cook Cc: James Morris , linux-security-module , LKML , Andy Lutomirski , Oleg Nesterov , Will Drewry , Julien Tinnes , David Drysdale Subject: Re: [PULL] seccomp update (3.17) Message-ID: <20140719215055.GA5017@thunk.org> Mail-Followup-To: Theodore Ts'o , Kees Cook , James Morris , linux-security-module , LKML , Andy Lutomirski , Oleg Nesterov , Will Drewry , Julien Tinnes , David Drysdale References: <20140718191908.GA20534@www.outflux.net> <20140719061658.GK18775@thunk.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) X-SA-Exim-Connect-IP: X-SA-Exim-Mail-From: tytso@thunk.org X-SA-Exim-Scanned: No (on imap.thunk.org); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jul 19, 2014 at 07:49:55AM -0700, Kees Cook wrote: > > No worries -- the only user of the seccomp syscall that I know of is > the seccomp regression testing suite, and that'd be trivially to fix. > > I would note that the seccomp series includes adding the syscall also > to ARM and MIPS, so from a collision fixing perspective, it may be > fewer edits to fix getrandom instead. :) I've only wired up x86 and x86_64 for getrandom(2) so far. I had assumed the ARM and MIPS folks would prefer to wire up new syscalls on their own... - Ted -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/