Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1871430yba; Tue, 2 Apr 2019 18:22:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqyJ4cb/YIsdMnHX9ZNitwxREgQK+MkO31HGk2K5zKe8fuv9SIa9g3XJgpiO/N14hUeHTVu+ X-Received: by 2002:a17:902:a7:: with SMTP id a36mr74436910pla.267.1554254552683; Tue, 02 Apr 2019 18:22:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554254552; cv=none; d=google.com; s=arc-20160816; b=lQ5+6lAO4yL57ZKT3vUpkQkjJRRANQ23f8KUx+GFD9yUj76I0Erg2MujHEJ8dn7CF/ aRN84OyJjKyagXQVpXjisSc+zbCaa/+9kC3q3wec3jdWEyEjbJR6ifNN47pII6NaYedv YJF+LuBmcSxoHqbFlZ8tdCP9lmrZ+/0+QEYWgN3ap+5uBRRF+HJhErYsbrbIweHFLROQ vPSF81TkHdrvz3KKO2Ji662d+1Of28e/lAUpoQxJTpTC0fXivw8j6tmz1EvmjjnLAthk TvsIwfga8yAIZJybRQIV0cDHjDZfEz7DR2+VKH7kb79SxfoF6J/WEmTapETHRajkTeTY I02A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=mU/p8oGFoT8rnI4LcYzY5OM9foUVIxCCNeCzeIhssso=; b=MIblTiebYErKcQqKDDOmby8QrGV3k3aWHElrcrP3VAf2Nb9S26AEpyBWGBXCFoPy7u HHDPV+WbCGe5FfhlsSEC7zSJDQLaza7h4w+1XouxBeM24EhXTNVlxjYGbOZRHxQCFsP2 VF5+pGXFz0XEqBkzz2WY65P2KBMQdGmK/wXRNRfyC62WVJpZq0NEANTCK7eVE+Xvrbfh oyWDeG8z50mqgxG04QOAnLkZavbmNmlY7amN3Djbx+xhQcbB8Kev/8owRCiTCGe24D58 y6DtwxumjhaNX+EeCdf+nWSq5yCtfJ1KnzKkdSNbO2vjJf8+NZOtP8DOZAJf/AFpNrW1 wDWA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p2si12558205pgp.519.2019.04.02.18.22.16; Tue, 02 Apr 2019 18:22:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727948AbfDCBUC (ORCPT + 99 others); Tue, 2 Apr 2019 21:20:02 -0400 Received: from ozlabs.org ([203.11.71.1]:41751 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726724AbfDCBUB (ORCPT ); Tue, 2 Apr 2019 21:20:01 -0400 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 44YpCT5B81z9sPS; Wed, 3 Apr 2019 12:19:49 +1100 (AEDT) From: Michael Ellerman To: Arnd Bergmann Cc: Andrew Morton , Richard Henderson , Ivan Kokshaysky , Matt Turner , Russell King , Catalin Marinas , Will Deacon , Tony Luck , Fenghua Yu , Geert Uytterhoeven , Michal Simek , Ralf Baechle , Paul Burton , James Hogan , "James E . J . Bottomley" , Helge Deller , Benjamin Herrenschmidt , Paul Mackerras , Martin Schwidefsky , Heiko Carstens , Rich Felker , "David S . Miller" , Max Filippov , Firoz Khan , alpha , Linux Kernel Mailing List , Linux ARM , linux-ia64@vger.kernel.org, linux-m68k , linux-mips@vger.kernel.org, Parisc List , linuxppc-dev , linux-s390 , Linux-sh list , sparclinux Subject: Re: [PATCH 2/2] arch: add pidfd and io_uring syscalls everywhere In-Reply-To: References: <20190325143521.34928-1-arnd@arndb.de> <20190325144737.703921-1-arnd@arndb.de> <87y34vl6ji.fsf@concordia.ellerman.id.au> Date: Wed, 03 Apr 2019 12:19:49 +1100 Message-ID: <87wokb28cq.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Arnd Bergmann writes: > On Sun, Mar 31, 2019 at 5:47 PM Michael Ellerman wrote: >> >> Arnd Bergmann writes: >> > Add the io_uring and pidfd_send_signal system calls to all architectures. >> > >> > These system calls are designed to handle both native and compat tasks, >> > so all entries are the same across architectures, only arm-compat and >> > the generic tale still use an old format. >> > >> > Signed-off-by: Arnd Bergmann >> > --- >> > arch/alpha/kernel/syscalls/syscall.tbl | 4 ++++ >> > arch/arm/tools/syscall.tbl | 4 ++++ >> > arch/arm64/include/asm/unistd.h | 2 +- >> > arch/arm64/include/asm/unistd32.h | 8 ++++++++ >> > arch/ia64/kernel/syscalls/syscall.tbl | 4 ++++ >> > arch/m68k/kernel/syscalls/syscall.tbl | 4 ++++ >> > arch/microblaze/kernel/syscalls/syscall.tbl | 4 ++++ >> > arch/mips/kernel/syscalls/syscall_n32.tbl | 4 ++++ >> > arch/mips/kernel/syscalls/syscall_n64.tbl | 4 ++++ >> > arch/mips/kernel/syscalls/syscall_o32.tbl | 4 ++++ >> > arch/parisc/kernel/syscalls/syscall.tbl | 4 ++++ >> > arch/powerpc/kernel/syscalls/syscall.tbl | 4 ++++ >> >> Have you done any testing? >> >> I'd rather not wire up syscalls that have never been tested at all on >> powerpc. > > No, I have not. I did review the system calls carefully and added the first > patch to fix the bug on x86 compat mode before adding the same bug > on the other compat architectures though ;-) > > Generally, my feeling is that adding system calls is not fundamentally > different from adding other ABIs, and we should really do it at > the same time across all architectures, rather than waiting for each > maintainer to get around to reviewing and testing the new calls > first. This is not a problem on powerpc, but a lot of other architectures > are less active, which is how we have always ended up with > different sets of system calls across architectures. Well it's still something of a problem on powerpc. No one has volunteered to test io_uring on powerpc, so at this stage it will go in completely untested. If there was a selftest in the tree I'd be a bit happier, because at least then our CI would start testing it as soon as the syscalls were wired up in linux-next. And yeah obviously I should test it, but I don't have infinite time unfortunately. > The problem here is that this makes it harder for the C library to > know when a system call is guaranteed to be available. glibc > still needs a feature test for newly added syscalls to see if they > are working (they might be backported to an older kernel, or > disabled), but whenever the minimum kernel version is increased, > it makes sense to drop those checks and assume non-optional > system calls will work if they were part of that minimum version. But that's the thing, if we just wire them up untested they may not actually work. And then you have the far worse situation where the syscall exists in kernel version x but does not actually work properly. See the mess we have with pkeys for example. > In the future, I'd hope that any new system calls get added > right away on all architectures when they land (it was a bit > tricky this time, because I still did a bunch of reworks that > conflicted with the new calls). Bugs will happen of course, but > I think adding them sooner makes it more likely to catch those > bugs early on so we have a chance to fix them properly, > and need fewer arch specific workarounds (ideally none) > for system calls. For syscalls that have a selftest in the tree, and don't rely on anything arch specific I agree. I'm a bit more wary of things that are not easily tested and have the potential to work differently across arches. cheers