On Wed, Apr 26, 2006 at 05:47:54PM +0200, Blaisorblade wrote: > If we can do without MASK_STRICT_VERIFY, that works fully, and > anyway it's simpler - however, say, when running strace -e read,tee > (sys_tee will soon be added, it seems) this call would fail, while it > would be desirable to have it work as strace -e read. > > MASK_STRICT_VERIFY isn't necessarily the best solution, but if > userspace must search the maximum allowed syscall by multiple > attempts, we've still a bad API. > > Probably, a better option (_instead_ of MASK_STRICT_VERIFY) would be > to return somewhere an "extended error code" saying which is the > last allowed syscall or (better) which is the first syscall which > failed. I.e. if there is strace -e read,splice,tee and nor splice nor > tee are supported, then this value would be __NR_splice and strace (or > any app) could then decide what to do.
Why not just zero out the bits that the kernel knows about? Then, if we return -EINVAL, the process just looks at the remaining bits that are set to see what system calls the kernel didn't know about. Jeff ------------------------------------------------------- Using Tomcat but need to do more? Need to support web services, security? Get stuff done quickly with pre-integrated technology to make your job easier Download IBM WebSphere Application Server v.1.0.1 based on Apache Geronimo http://sel.as-us.falkag.net/sel?cmd=lnk&kid=120709&bid=263057&dat=121642 _______________________________________________ User-mode-linux-devel mailing list User-mode-linux-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/user-mode-linux-devel