[LTP] [PATCH] syscalls/prctl04: Allow __NR_waitid in the syscall filter

Petr Vorel pvorel@suse.cz
Tue Jun 27 14:57:04 CEST 2023


Hi Randolph,

> From: Randolph <randolph@andestech.com>

> The __NR_wait4 syscall is not available in y2038 safe 32-bit systems,
> waitid should be used instead. In the 32ABI system, the __NR_waitid
> must be allowed as well in the filter.

Acked-by: Petr Vorel <pvorel@suse.cz>
LGTM, thanks!

Kind regards,
Petr

> refer:
> https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=9b2cf9482a9397c4711c9e7f42f8d718b6306bdc
> linux: Use waitid on wait4 if __NR_wait4 is not defined

> Signed-off-by: Randolph <randolph@andestech.com>
> Signed-off-by: Dylan Jhong <dylan@andestech.com>
> ---
>  testcases/kernel/syscalls/prctl/prctl04.c | 1 +
>  1 file changed, 1 insertion(+)

> diff --git a/testcases/kernel/syscalls/prctl/prctl04.c b/testcases/kernel/syscalls/prctl/prctl04.c
> index f6e1f0fea..8b135d611 100644
> --- a/testcases/kernel/syscalls/prctl/prctl04.c
> +++ b/testcases/kernel/syscalls/prctl/prctl04.c
> @@ -45,6 +45,7 @@
>  static const struct sock_filter  strict_filter[] = {
>  	BPF_STMT(BPF_LD | BPF_W | BPF_ABS, (offsetof(struct seccomp_data, nr))),

> +	BPF_JUMP(BPF_JMP | BPF_JEQ, __NR_waitid, 7, 0),
>  	BPF_JUMP(BPF_JMP | BPF_JEQ, __NR_rt_sigprocmask, 6, 0),
>  	BPF_JUMP(BPF_JMP | BPF_JEQ, __NR_close, 5, 0),
>  	BPF_JUMP(BPF_JMP | BPF_JEQ, __NR_exit,  4, 0),


More information about the ltp mailing list