[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20190524221118.177548-1-samitolvanen@google.com>
Date: Fri, 24 May 2019 15:11:15 -0700
From: Sami Tolvanen <samitolvanen@...gle.com>
To: Catalin Marinas <catalin.marinas@....com>,
Will Deacon <will.deacon@....com>,
Mark Rutland <mark.rutland@....com>
Cc: Kees Cook <keescook@...omium.org>,
Nick Desaulniers <ndesaulniers@...gle.com>,
linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
Sami Tolvanen <samitolvanen@...gle.com>
Subject: [PATCH v3 0/3] fix function type mismatches in syscall wrappers
These patches fix type mismatches in arm64 syscall wrapper
definitions, which trip indirect call checks with Control-Flow
Integrity.
Changes in v3:
- instead of SYSCALL_DEFINE0, just define __arm64_sys_ni_syscall
with the correct type to avoid unnecessary error injection
Changes in v2:
- more informative commit message for the syscall_fn_t change
- added a patch for fixing sys_ni_syscall
Sami Tolvanen (3):
arm64: fix syscall_fn_t type
arm64: use the correct function type in SYSCALL_DEFINE0
arm64: use the correct function type for __arm64_sys_ni_syscall
arch/arm64/include/asm/syscall.h | 2 +-
arch/arm64/include/asm/syscall_wrapper.h | 18 +++++++++---------
arch/arm64/kernel/sys.c | 14 +++++++++-----
arch/arm64/kernel/sys32.c | 7 ++-----
4 files changed, 21 insertions(+), 20 deletions(-)
--
2.22.0.rc1.257.g3120a18244-goog
Powered by blists - more mailing lists