Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp1892142ybb; Fri, 29 Mar 2019 13:33:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqyFkFCKEqVTV7VxXEIXMBII97uZqAi/nG8WnzWDOPVY3VARXHqzhPQVCF9eUgAu67o+LzVj X-Received: by 2002:aa7:83cb:: with SMTP id j11mr48845309pfn.117.1553891595775; Fri, 29 Mar 2019 13:33:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553891595; cv=none; d=google.com; s=arc-20160816; b=D4JALiac2zqjiWZ2hsv5qwtmSWUv0FNFQe+94sJHV+/IesGiwO/4O+u06UCCzrw7Qw iw9b+t7t5XMwEjpFToh9dLEadjMl0UNXmy/ad/8scSfycDhes69S85Xz4IYuOgyWg63n Q/py2TA9kHjHmPKGg3P0P4NacGrlq0gHHZbdKZjovvTx4l778JqSF6yHS/xY7FpbC1PI NpXQ1xQEsJMIDN2ekg1YvoAZBQibes6MoZgAq2uf4QmrJ6BF8NwuVQ8GzX9a/JkK52OV aEpViWgmpqqOCkIONwhlqIcNyd99TvZ7Y3VPFeJySlOQrn51JLC4oXgIbA3A5uTfRqNS Pllw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=lfjFGTHPdoWMlrQiPBQ7HtdrVMmoQ8cI6gpSkQvT5r8=; b=xE+Hqy+DD5kDYg6c25cnGbttD/euca85WLfND4tSiH+a4iKd4gWbZWt5F9FFy8zAV0 YCvr3H+r5R4CJ2VPvPwMKv5mnypxvawhKa0ZAq46rnJpuKPmEYAue51GYy30ev5zqKnY bJa2VhHJBDBdsmH/8/qnWVyUgsmuonvkpBlKs+5nDWSBxY6qgEG+1ViTE9xjGSRiHlLN 503MXx//HK0w8BGnoTNhGnAEqM1nLdtx7jLzIab6wBCjRUnM1I/O4vYZJiz4/35ausku PG/AcSzSbC2PoFZz6sU+YPFtQaXHD8KmxPGR3tPeVY5YsFC6lwgNi+WkV8fLby4ZQN9W ySvg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c1si2799520pla.240.2019.03.29.13.33.00; Fri, 29 Mar 2019 13:33:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730136AbfC2UcL (ORCPT + 99 others); Fri, 29 Mar 2019 16:32:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:32924 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729996AbfC2UcL (ORCPT ); Fri, 29 Mar 2019 16:32:11 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 99A97218AC; Fri, 29 Mar 2019 20:32:09 +0000 (UTC) Date: Fri, 29 Mar 2019 16:32:08 -0400 From: Steven Rostedt To: "Dmitry V. Levin" Cc: David Abdurachmanov , Will Drewry , Kees Cook , Palmer Dabbelt , linux-kernel@vger.kernel.org, Andy Lutomirski , Ingo Molnar , linux-riscv@lists.infradead.org Subject: Re: [PATCH] riscv: fix syscall_get_arguments() and syscall_set_arguments() Message-ID: <20190329163208.73f6d9fa@gandalf.local.home> In-Reply-To: <20190329181109.GA32651@altlinux.org> References: <20190329171221.GA32456@altlinux.org> <20190329131514.3e4ec93e@gandalf.local.home> <20190329135635.7e136350@gandalf.local.home> <20190329181109.GA32651@altlinux.org> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 29 Mar 2019 21:11:09 +0300 "Dmitry V. Levin" wrote: > On Fri, Mar 29, 2019 at 01:56:35PM -0400, Steven Rostedt wrote: > > On Fri, 29 Mar 2019 18:52:18 +0100 > > David Abdurachmanov wrote: > > > > > I have alternative version posted in December part of SECCOMP > > > patchset which is based on arm64 implementation. > > > > > > http://lists.infradead.org/pipermail/linux-riscv/2018-December/002450.html > > > > > > I noticed that SECCOMP wasn't working properly if filters were > > > checking syscall arguments, because populated arguments were wrong. > > > > > > Btw, I plan to send v2 of SECCOMP patchset soonish. > > > > Please do. I want to get my patch series out, which will require these > > changes. > > Sorry, I haven't seen the alternative patch posted by David before. > Apparently, besides fixing the bug it also introduces new sanity checks > of "i" and "n" arguments in syscall_get_arguments() and > syscall_set_arguments(). > > Given that your patchset removes these arguments completely, > I see little sense in adding new checks that are going to be removed > by the subsequent commit in the series. I agree. I'm going to pull in Dmitry's patches as my patches are going to rewrite most the code anyway, and no need for the extra churn of the sanity checks that are going to become irrelevant immediately afterward. -- Steve