[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <c97451ad-b8de-76cc-0849-47f9b3b32693@gmail.com>
Date: Tue, 24 Nov 2020 21:41:00 +0300
From: Dmitry Osipenko <digetx@...il.com>
To: Gabriel Krisman Bertazi <krisman@...labora.com>
Cc: tglx@...utronix.de, hch@...radead.org, mingo@...hat.com,
keescook@...omium.org, arnd@...db.de, luto@...capital.net,
wad@...omium.org, rostedt@...dmis.org, paul@...l-moore.com,
eparis@...hat.com, oleg@...hat.com, linux-arch@...r.kernel.org,
linux-kernel@...r.kernel.org, x86@...nel.org, kernel@...labora.com,
"linux-arm-kernel@...ts.infradead.org"
<linux-arm-kernel@...ts.infradead.org>,
Russell King - ARM Linux <linux@...linux.org.uk>
Subject: Re: [PATCH v2 04/10] seccomp: Migrate to use SYSCALL_WORK flag
24.11.2020 20:55, Gabriel Krisman Bertazi пишет:
> Dmitry Osipenko <digetx@...il.com> writes:
>
>> Hi,
>>
>> This patch broke seccomp on arm32 using linux-next, chromium browser
>> doesn't work anymore and there are these errors in KMSG:
>>
>> Unhandled prefetch abort: breakpoint debug exception (0x002) at ...
>>
>> Note that arm doesn't use CONFIG_GENERIC_ENTRY. Please fix, thanks in
>> advance.
>
> Hi Dmitry,
>
> I believe this is the same problem reported yesterday on this thread
>
> https://www.mail-archive.com/linux-kernel@vger.kernel.org/msg2390444.html
>
> can you please try the patch I shared on that thread?
>
> https://lore.kernel.org/patchwork/patch/1344098/
It works, thank you.
Tested-by: Dmitry Osipenko <digetx@...il.com>
Powered by blists - more mailing lists