Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2425748ybt; Fri, 3 Jul 2020 08:45:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxzMUX+NPrsTSateoWQui3rvm5pPXRhNn2meB/Ptsn86C69SxHMkudtIIkR6oUHOgznxvP0 X-Received: by 2002:a05:6402:1803:: with SMTP id g3mr39560859edy.377.1593791124813; Fri, 03 Jul 2020 08:45:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593791124; cv=none; d=google.com; s=arc-20160816; b=gN24hN/PsQn3+4rZEOl+hKRTVzbzvxc8cxeqwFcOE5qLPiAUCAXbhPE74MHwQxBh7s 1q99djQRM7DdcEbdWi94aIfgR854kTwqP2osLs58enmzsB4oPA7x7D05tcpvsO1RV2ng ALUasKeh4QfuGgUeu+Lg4MN3lb4mEqru8bhABsLuZ26jMVg4/dhXw7l1tPoGlW0xqeqX VRUwqh4ICH3SxfJC869A7sMdk6CudS8PMMtp34wVeFeOxOCX2+29G+YPYkcZwcg1terh k2cefQPLx8Mk5T8pJP1qg6ytsr59o0oLfZCeIwdcNg1PoiWydmzMd0OuSgIYl17kU6EL avDA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=bgR7ujs6s91xFPWzUb92/oNkYCN22F3DArp9YjGmlvQ=; b=CeRGEDF+OoWJVosjPqLtCfuxZnaMcNWDttRncK8g80OUMOXrcAmnJPjVls+eSDi2bw wGureGXTPyhwL/n14//pxmFdjpEbUrPkUMnQpq//mkusXHwNSIJ5PDUlV34T3shrIXaq BagKyMrnGswR54oLxBMIsFynfXtnjlhnhbp9wULKBH12PQ+Q577gyOwfiVW+lihE0CU3 LegZ6iPkgSyHr5cMOBBxi3v/6OrYWgMcdVPFdE3fi/qPt1I9RU/DRNSd5YSsoT6sph32 c2s0xvxWCpOGEDMGTTmDA+yx3pk4QABlNCwOIDFw+znbBXm5EX5v2zz6Nfyn5I8+7gcq ORDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=v07gbwih; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yd21si8328904ejb.727.2020.07.03.08.45.02; Fri, 03 Jul 2020 08:45:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=v07gbwih; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726406AbgGCPob (ORCPT + 99 others); Fri, 3 Jul 2020 11:44:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:46242 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726035AbgGCPob (ORCPT ); Fri, 3 Jul 2020 11:44:31 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 14AD1221E6; Fri, 3 Jul 2020 15:44:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593791071; bh=cPfzhzo/Hz8MPemSNhXCJzqXELqB4+AkCWomN/ytEDQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=v07gbwihtl5CN4DnMO7gLoEvCltFpuYSTUtmTFU+VnCsiCZ/f9f2AICd9wdmzphWj rfeyeFC0Qzh/+iOaMXhaTT2ZKrBikWX8xOMltitLsywf4VntSfCyH1RGEC1DY3HsZO QdkLUBbJQEStZMSsvx+/ykTQOQxLVX23Dn0TyoWU= Date: Fri, 3 Jul 2020 16:44:27 +0100 From: Will Deacon To: Kees Cook Cc: Keno Fischer , Linux Kernel Mailing List , Oleg Nesterov , Andy Lutomirski , Will Drewry Subject: Re: ptrace: seccomp: Return value when the call was already invalid Message-ID: <20200703154426.GA19406@willie-the-truck> References: <20200703083914.GA18516@willie-the-truck> <202007030815.744AAB35D@keescook> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <202007030815.744AAB35D@keescook> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jul 03, 2020 at 08:17:19AM -0700, Kees Cook wrote: > On Fri, Jul 03, 2020 at 09:39:14AM +0100, Will Deacon wrote: > > diff --git a/arch/arm64/kernel/syscall.c b/arch/arm64/kernel/syscall.c > > index 5f5b868292f5..a13661f44818 100644 > > --- a/arch/arm64/kernel/syscall.c > > +++ b/arch/arm64/kernel/syscall.c > > @@ -121,12 +121,10 @@ static void el0_svc_common(struct pt_regs *regs, int scno, int sc_nr, > > user_exit(); > > > > if (has_syscall_work(flags)) { > > - /* set default errno for user-issued syscall(-1) */ > > - if (scno == NO_SYSCALL) > > - regs->regs[0] = -ENOSYS; > > - scno = syscall_trace_enter(regs); > > - if (scno == NO_SYSCALL) > > + if (syscall_trace_enter(regs)) > > goto trace_exit; > > + > > + scno = regs->syscallno; > > } > > > > invoke_syscall(regs, scno, sc_nr, syscall_table); > > What effect do either of these patches have on the existing seccomp > selftests: tools/testing/selftests/seccomp/seccomp_bpf ? Tests! Thanks, I'll have a look. Will