[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <87bl5d7chn.fsf@disp2133>
Date: Tue, 31 Aug 2021 12:25:24 -0500
From: ebiederm@...ssion.com (Eric W. Biederman)
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: <linux-kernel@...r.kernel.org>,
Michael Schmitz <schmitzmic@...il.com>,
Geert Uytterhoeven <geert@...ux-m68k.org>,
Arnd Bergmann <arnd@...db.de>, Cyril Hrubis <chrubis@...e.cz>,
Kees Cook <keescook@...omium.org>
Subject: [GIT PULL] exit cleanups for v5.15-rc1
Please pull the exit-cleanups-for-v5.15 branch from the git tree:
git://git.kernel.org/pub/scm/linux/kernel/git/ebiederm/user-namespace.git exit-cleanups-for-v5.15
HEAD: d21918e5a94a862ccb297b9f2be38574c865fda0 signal/seccomp: Dump core when there is only one live thread
In preparation of doing something about PTRACE_EVENT_EXIT I have started
cleaning up various pieces of code related to do_exit. Most of that
code I did not manage to get tested and reviewed before the merge window
opened but a handful of very useful cleanups are ready to be merged.
The first change is simply the removal of the bdflush system call. The
code has now been disabled long enough that even the oldest userspace
working userspace setups anyone can find to test are fine with the
bdflush system call being removed.
Changing m68k fsp040_die to use force_sigsegv(SIGSEGV) instead of
calling do_exit directly is interesting only in that it is nearly the
most difficult of the incorrect uses of do_exit to remove.
The change to the seccomp code to simply send a signal instead of
calling do_coredump directly is a very nice little cleanup made possible
by realizing the existing signal sending helpers were missing a little
bit of functionality that is easy to provide.
Eric W. Biederman (4):
exit/bdflush: Remove the deprecated bdflush system call
signal/m68k: Use force_sigsegv(SIGSEGV) in fpsp040_die
signal/seccomp: Refactor seccomp signal and coredump generation
signal/seccomp: Dump core when there is only one live thread
arch/alpha/kernel/syscalls/syscall.tbl | 2 +-
arch/arm/tools/syscall.tbl | 2 +-
arch/arm64/include/asm/unistd32.h | 2 +-
arch/ia64/kernel/syscalls/syscall.tbl | 2 +-
arch/m68k/fpsp040/skeleton.S | 3 +-
arch/m68k/kernel/syscalls/syscall.tbl | 2 +-
arch/m68k/kernel/traps.c | 2 +-
arch/microblaze/kernel/syscalls/syscall.tbl | 2 +-
arch/mips/kernel/syscalls/syscall_o32.tbl | 2 +-
arch/parisc/kernel/syscalls/syscall.tbl | 2 +-
arch/powerpc/kernel/syscalls/syscall.tbl | 2 +-
arch/s390/kernel/syscalls/syscall.tbl | 2 +-
arch/sh/kernel/syscalls/syscall.tbl | 2 +-
arch/sparc/kernel/syscalls/syscall.tbl | 2 +-
arch/x86/entry/syscalls/syscall_32.tbl | 2 +-
arch/xtensa/kernel/syscalls/syscall.tbl | 2 +-
fs/buffer.c | 27 --------------
include/linux/sched/signal.h | 1 +
include/linux/syscalls.h | 1 -
include/uapi/linux/capability.h | 1 -
kernel/seccomp.c | 42 ++++------------------
kernel/signal.c | 30 +++++++++++++---
kernel/sys_ni.c | 1 -
tools/perf/arch/powerpc/entry/syscalls/syscall.tbl | 2 +-
tools/perf/arch/s390/entry/syscalls/syscall.tbl | 2 +-
25 files changed, 53 insertions(+), 87 deletions(-)
Eric
Powered by blists - more mailing lists