Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp470745yba; Wed, 15 May 2019 04:42:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqxDzRhBnpuwEvw85RpM3j7ODN1aEEx7HLhK0Gmi9o8Exg/Ppu3Ver6Rj0MKVGTbVm9JWyYg X-Received: by 2002:a17:902:7486:: with SMTP id h6mr42974511pll.58.1557920559285; Wed, 15 May 2019 04:42:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557920559; cv=none; d=google.com; s=arc-20160816; b=ZVdkZFmSgS9SISKYkvClpKv7BO8x/ztkParZV52rAkdVpPllXVxaY2sOUxlqruiLQu lAmQCew5iJI/eagTdnCrOnjZX0o0uJ47dfM8EoP1TNglfJTm3Etv8Qlj4FnvuXnQXsDf BfqWzcRaJqBtI41XlOyvPhfH2oXJGNKRfzV5V0JNrx5SFBQQc1uKHuftvYefiXsJapGM bDzH21ePdD0vlIqziPz9pkvXAFgOMstipl9Lx6tEnlfkp76GZcbjMIr2ifdZwsbgz5pJ ld1vN6GHk0alyb8wDcRE6oOXxRYAorNbjtjHn59ZD9Uu70WVFQeTngQtKmt4Hscm5OSG Z8Yg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Almza7a1QUJ49tgJwEOAf+J4AZEPTo9BtSjhXvXBLNo=; b=ncr1Fdk74VRXVEOKfi+qxefopCSjhkNxFQSsDb/IIjMw3DXfOe0wVLTZpCmQb5KjK+ XsCHfOvyE3kjzu1InaLVxmpF5AKY7N5Cq5c9B7a3agZFBJUR+nvJ4fOnE7lQFnMEsFwO Auo3alJEN+3FWRyHU4dTnCeoGB/LTXGzlDpfTP07fYDlxpzQ5evSwKbU/ZW5bJ1qOtOd zhWyM4JP9j331gRCjSDenJo1DWrvDPFJJuzbfDCEBg+RPch4y3T/JA5WJ8glpWddU16Z O1fSc7DjngWFYcNnhRDsWt56PP168HYbsDkHqzHMnvBjxmIrkOxnThYumgk5jmPtXdLk IfTg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a89si1617952pla.348.2019.05.15.04.42.24; Wed, 15 May 2019 04:42:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732462AbfEOLkl (ORCPT + 99 others); Wed, 15 May 2019 07:40:41 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:41954 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727580AbfEOLkj (ORCPT ); Wed, 15 May 2019 07:40:39 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 54D7680D; Wed, 15 May 2019 04:40:39 -0700 (PDT) Received: from fuggles.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id F169B3F71E; Wed, 15 May 2019 04:40:37 -0700 (PDT) Date: Wed, 15 May 2019 12:40:35 +0100 From: Will Deacon To: Sami Tolvanen Cc: Mark Rutland , Kees Cook , Catalin Marinas , Nick Desaulniers , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v2 3/3] arm64: use the correct function type for __arm64_sys_ni_syscall Message-ID: <20190515114035.GG24357@fuggles.cambridge.arm.com> References: <20190503191225.6684-1-samitolvanen@google.com> <20190503191225.6684-4-samitolvanen@google.com> <20190507172512.GA35803@lakrids.cambridge.arm.com> <20190507183227.GA10191@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190507183227.GA10191@google.com> User-Agent: Mutt/1.11.1+86 (6f28e57d73f2) () Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 07, 2019 at 11:32:27AM -0700, Sami Tolvanen wrote: > On Tue, May 07, 2019 at 06:25:12PM +0100, Mark Rutland wrote: > > I strongly think that we cant to fix up the common definition in > > kernel/sys_ni.c rather than having a point-hack in arm64. Other > > architectures (e.g. x86, s390) will want the same for CFI, and I'd like > > to ensure that our approached don't diverge. > > s390 already has the following in arch/s390/kernel/sys_s390.c: > > SYSCALL_DEFINE0(ni_syscall) > { > return -ENOSYS; > } > > Which, I suppose, is cleaner than calling sys_ni_syscall. > > > I took a quick look, and it looks like it's messy but possible to fix > > up the core. > > OK. How would you propose fixing this? In the absence of a patch from Mark, I'd suggest just adding a SYS_NI macro to our asm/syscall_wrapper.h file which avoids the error injection stuff. It doesn't preclude moving this to the core later on, but it unblocks the CFI work. Will