Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756512Ab2BQCZg (ORCPT ); Thu, 16 Feb 2012 21:25:36 -0500 Received: from terminus.zytor.com ([198.137.202.10]:36522 "EHLO mail.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753305Ab2BQCZe (ORCPT ); Thu, 16 Feb 2012 21:25:34 -0500 Message-ID: <4F3DBA76.8090104@zytor.com> Date: Thu, 16 Feb 2012 18:24:54 -0800 From: "H. Peter Anvin" User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:10.0) Gecko/20120131 Thunderbird/10.0 MIME-Version: 1.0 To: Eric Paris CC: Will Drewry , Markus Gutschke , linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, kernel-hardening@lists.openwall.com, netdev@vger.kernel.org, x86@kernel.org, arnd@arndb.de, davem@davemloft.net, mingo@redhat.com, oleg@redhat.com, peterz@infradead.org, rdunlap@xenotime.net, mcgrathr@chromium.org, tglx@linutronix.de, luto@mit.edu, serge.hallyn@canonical.com, djm@mindrot.org, scarybeasts@gmail.com, indan@nul.nu, pmoore@redhat.com, akpm@linux-foundation.org, corbet@lwn.net, eric.dumazet@gmail.com, keescook@chromium.org Subject: Re: [PATCH v8 3/8] seccomp: add system call filtering using BPF References: <1329422549-16407-1-git-send-email-wad@chromium.org> <1329422549-16407-3-git-send-email-wad@chromium.org> <4F3D61CB.2000301@zytor.com> <4F3D7250.6040504@zytor.com> <4F3D766E.7040205@zytor.com> <4F3D7DD4.6070103@zytor.com> <1329439809.2337.32.camel@localhost> In-Reply-To: <1329439809.2337.32.camel@localhost> X-Enigmail-Version: 1.3.5 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 844 Lines: 24 On 02/16/2012 04:50 PM, Eric Paris wrote: > > I don't know if anyone cares, but include/linux/audit.h tries to expose > this type of information so audit userspace can later piece things back > together. (we get this info from the syscall entry exit code so we know > which arch it is). > > Not sure how x32 is hoping to expose its syscall info, but others are > going to have the same/similar problem. > It would be nice if audit could (eventually?) use the same facility, too. -hpa -- H. Peter Anvin, Intel Open Source Technology Center I work for Intel. I don't speak on their behalf. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/