]> git.ipfire.org Git - thirdparty/man-pages.git/commitdiff
seccomp_unotify.2: srcfix: Add a further FIXME relating to SA_RESTART behavior
authorMichael Kerrisk <mtk.manpages@gmail.com>
Mon, 26 Oct 2020 09:45:24 +0000 (10:45 +0100)
committerMichael Kerrisk <mtk.manpages@gmail.com>
Wed, 9 Jun 2021 22:40:17 +0000 (10:40 +1200)
Signed-off-by: Michael Kerrisk <mtk.manpages@gmail.com>
man2/seccomp_unotify.2

index befe476abe3bb94d97ee43cd14ede6884dcd0756..21896d5e5e67bda84cb98a0c975e89f405ce8352 100644 (file)
@@ -768,6 +768,15 @@ flag.
 .\" I mean, it's not like seccomp doesn't already expose weirdness with
 .\" syscall restarts. Not even arm64 compat agrees[3] with arm32 in this
 .\" regard. :(
+.
+.\" FIXME
+.\" Michael Kerrisk:
+.\" I wonder about the effect of this oddity for system calls that
+.\" are normally nonrestartable because they have timeouts. My
+.\" understanding is that the kernel doesn't restart those system
+.\" calls because it's impossible for the kernel to restart the call
+.\" with the right timeout value. I wonder what happens when those
+.\" system calls are restarted in the scenario we're discussing.)
 .SH BUGS
 If a
 .BR SECCOMP_IOCTL_NOTIF_RECV