Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1503361ybt; Thu, 2 Jul 2020 07:08:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJySgse2t4KOPJ/Wmg56F0QvoQEL4PdUxAibxoZB1MOBgQWwBITJLVMi9SnOtF8fCiwHckiS X-Received: by 2002:a05:6402:3064:: with SMTP id bs4mr35751058edb.350.1593698934264; Thu, 02 Jul 2020 07:08:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593698934; cv=none; d=google.com; s=arc-20160816; b=KJaDBEZ05Ib0bp/t2k9mpWaPbZv3DxlsfsfpAZW0IdTiXrAxfeJcekkJsxtVm4Qw5U dz/m/f6sMvjKUq1MQxzjN/5TR7ZxmOyxuRvOWbQgxVdioU62WCDO0Pk+uLsRziQejIO1 OwEeM6gWwOho8+4GWFzl3jC5UZQasSmpKccMVy81jS94EnNoqLWYrLZFme1/+ldvdn2m 5oXuhe0zf+D/YjXe+zVBk4WNMsS8z01III3PgKJwOuk4Icmb5f92bfwVMHStQtd8begP ttrqCZhJCEsWoNcjNHPWidNb8fgvDF5ynv4OPBmwsLFNgylWE2xCoU00PeCy9/Ka5aSm NkOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=qboDJf2Nb5QmNEY7NCksUXA3tcZQt1xh7hEpUK/EjYQ=; b=fvEhSDlx74VfKp2D6mRlOpsVv6XURdwCoNQDpSFGlFgXkXEhaI5c/XJhMUcKcvvToW BirRMO1m76TX/DwnOgAz8oAakPPi+UHU8w2QUpgXBWzsQdRbASzu1CcWK91OvzrEfb2u aj3csnaHGaeyAarI0NxeD/NWKGI6tEYUJiLOU9UgY60AzdRBMWEV6bSPPv2GK5/3khFc jZ9pOta0lIr37J/QexzbmiFXq3fcYOfh7ivVZwMAG8gAQxJ8xOPyHqXT/ycFZ5HjwAN9 dBbHpTDgSzsm/UlEM+1HyeCARFI1+HgdsCdnsrlbTI9CSE6RBnI3YrrZraeTx643RwLS JFIA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y21si5772072edt.483.2020.07.02.07.08.30; Thu, 02 Jul 2020 07:08:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729560AbgGBOEy (ORCPT + 99 others); Thu, 2 Jul 2020 10:04:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43652 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729552AbgGBOEy (ORCPT ); Thu, 2 Jul 2020 10:04:54 -0400 Received: from ZenIV.linux.org.uk (zeniv.linux.org.uk [IPv6:2002:c35c:fd02::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 78879C08C5C1 for ; Thu, 2 Jul 2020 07:04:54 -0700 (PDT) Received: from viro by ZenIV.linux.org.uk with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1jqzpX-003ydg-K7; Thu, 02 Jul 2020 14:04:47 +0000 Date: Thu, 2 Jul 2020 15:04:47 +0100 From: Al Viro To: Michael Ellerman Cc: Linus Torvalds , Christophe Leroy , Josh Poimboeuf , Peter Zijlstra , the arch/x86 maintainers , Linux Kernel Mailing List Subject: Re: objtool clac/stac handling change.. Message-ID: <20200702140447.GN2786714@ZenIV.linux.org.uk> References: <20200701184131.GI2786714@ZenIV.linux.org.uk> <20200701195914.GK2786714@ZenIV.linux.org.uk> <87lfk26nx4.fsf@mpe.ellerman.id.au> <20200702140159.GM2786714@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200702140159.GM2786714@ZenIV.linux.org.uk> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jul 02, 2020 at 03:01:59PM +0100, Al Viro wrote: > On Thu, Jul 02, 2020 at 11:34:31PM +1000, Michael Ellerman wrote: > > > I think we can do something to make it work. > > > > We don't have an equivalent of x86's ex_handler_uaccess(), so it's not > > quite as easy as whacking a user_access_end() in there. > > > > Probably the simplest option for us is to just handle it in our > > unsafe_op_wrap(). I'll try and come up with something tomorrow. > > The goal is to avoid using unsafe_op_wrap()... Incidentally, the change Linus proposes would affect unsafe_put_user() as well. And you are not using unsafe_op_wrap() anywhere on that path...