Re: [PATCH v3 2/4] x86/syscall: update and extend selftest syscall_numbering_64
From: H. Peter Anvin
Date: Mon May 17 2021 - 20:26:55 EST
Sure. I am also working on implementing Andy's request of adding a ptracer; it will probably take me a few days to clear off the time to do so.
On May 16, 2021 12:52:06 AM PDT, Ingo Molnar <mingo@xxxxxxxxxx> wrote:
>* H. Peter Anvin <hpa@xxxxxxxxx> wrote:
>> From: "H. Peter Anvin (Intel)" <hpa@xxxxxxxxx>
>> Update the syscall_numbering_64 selftest to reflect that a system
>> is to be extended from 32 bits. Add a mix of tests for valid and
>> invalid system calls in 64-bit and x32 space.
>> Use an explicit system call instruction, because we cannot know if
>> glibc syscall() wrapper intercepts instructions, extends the system
>> call number independently, or anything similar.
>> Use long long instead of long to make it possible to compile this
>> on x32 as well as 64 bits.
>> Signed-off-by: H. Peter Anvin (Intel) <hpa@xxxxxxxxx>
>> .../testing/selftests/x86/syscall_numbering.c | 274
>> 1 file changed, 222 insertions(+), 52 deletions(-)
>Small request: I'd suggest moving this to the first place - so that we
>easily test before/after effects of (current) patch #1/4.
Sent from my Android device with K-9 Mail. Please excuse my brevity.