lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 11 Oct 2018 14:05:03 +0530
From:   Firoz Khan <firoz.khan@...aro.org>
To:     Arnd Bergmann <arnd@...db.de>
Cc:     linux-ia64@...r.kernel.org, Tony Luck <tony.luck@...el.com>,
        Fenghua Yu <fenghua.yu@...el.com>,
        Thomas Gleixner <tglx@...utronix.de>,
        Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
        Philippe Ombredanne <pombredanne@...b.com>,
        Kate Stewart <kstewart@...uxfoundation.org>,
        y2038 Mailman List <y2038@...ts.linaro.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Linux-Arch <linux-arch@...r.kernel.org>,
        Deepa Dinamani <deepa.kernel@...il.com>,
        Marcin Juszkiewicz <marcin.juszkiewicz@...aro.org>
Subject: Re: [PATCH v3 7/7] ia64: wire up system calls

Hi Arnd,

On Thu, 11 Oct 2018 at 12:55, Arnd Bergmann <arnd@...db.de> wrote:
>
> On Thu, Oct 11, 2018 at 6:26 AM Firoz Khan <firoz.khan@...aro.org> wrote:
> >
> > wire up perf_event_open, seccomp, pkey_mprotect, pkey_alloc,
> > pkey_free, statx, io_pgetevents and rseq system calls
> >
> > This require an architecture specific implementation as it not
> > present now.
> >
> > Signed-off-by: Firoz Khan <firoz.khan@...aro.org>
> > ---
> >  arch/ia64/kernel/syscalls/syscall.tbl | 16 ++++++++++++++++
> >  1 file changed, 16 insertions(+)
> >
> > diff --git a/arch/ia64/kernel/syscalls/syscall.tbl b/arch/ia64/kernel/syscalls/syscall.tbl
> > index 6b64f60..1f42b60 100644
> > --- a/arch/ia64/kernel/syscalls/syscall.tbl
> > +++ b/arch/ia64/kernel/syscalls/syscall.tbl
> > @@ -335,3 +335,19 @@
> >  323     common  copy_file_range                 sys_copy_file_range
> >  324     common  preadv2                         sys_preadv2
> >  325     common  pwritev2                        sys_pwritev2
> > +# perf_event_open requires an architecture specific implementation
> > +326    common  perf_event_open                 sys_perf_event_open
> > +# seccomp requires an architecture specific implementation
> > +327    common  seccomp                         sys_seccomp
>
> I don't think that's correct for these two. perf_event_open() of
> course requires 'perf' support that ia64 does not have, but
> at least seccomp should just work.
>
> > +# pkey_mprotect requires an architecture specific implementation
> > +328    common  pkey_mprotect                   sys_pkey_mprotect
> > +# pkey_alloc requires an architecture specific implementation
> > +329    common  pkey_alloc                      sys_pkey_alloc
> > +# pkey_free requires an architecture specific implementation
> > +330    common  pkey_free                       sys_pkey_free
>
> One comment for all pkey calls would be sufficient. More importantly
> it requires hardware support that ia64 does not have AFAICT.
>
> > +# statx requires an architecture specific implementation
> > +331    common  statx                           sys_statx
> > +# io_pgetevents requires an architecture specific implementation
> > +332    common  io_pgetevents                   sys_io_pgetevents
>
> It certainly does not require any support from the architecture for these.
>
> > +# rseq requires an architecture specific implementation
> > +333    common  rseq                            sys_rseq
>
> Maybe leave rseq and pkey_* commented out so we reserve
> the number but don't add it for real? Maybe the ia64 maintainers
> have a preference.
>
> As asm-generic maintainer, I'd like to have the various asm/unistd.h
> headers be as similar as possible and at least reserve all the
> numbers even if we don't need the calls on a given architecture.
>

Thanks for your review.

Firoz

>        Arnd

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ