From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 34E0DC3DA7D for ; Tue, 3 Jan 2023 21:36:11 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 6B8828E0002; Tue, 3 Jan 2023 16:36:10 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 641748E0001; Tue, 3 Jan 2023 16:36:10 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4BAA68E0002; Tue, 3 Jan 2023 16:36:10 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 35E648E0001 for ; Tue, 3 Jan 2023 16:36:10 -0500 (EST) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id 0937EA0AF5 for ; Tue, 3 Jan 2023 21:36:10 +0000 (UTC) X-FDA: 80314796100.30.7F0F4F1 Received: from out03.mta.xmission.com (out03.mta.xmission.com [166.70.13.233]) by imf20.hostedemail.com (Postfix) with ESMTP id 13BBA1C0004 for ; Tue, 3 Jan 2023 21:36:06 +0000 (UTC) Authentication-Results: imf20.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=xmission.com; spf=pass (imf20.hostedemail.com: domain of ebiederm@xmission.com designates 166.70.13.233 as permitted sender) smtp.mailfrom=ebiederm@xmission.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1672781767; a=rsa-sha256; cv=none; b=SIHU6UnBYJCmJPcKRIMGgDzIzWcZ3vyta+sm3rtS6AkjWKLUZh91tBcysV+lfiBshLHgDn YW7GFszZ6ZyMs2GO5fwHFNWmczy+daKEk8WKGQRHTHYUsjXN5PB5dykZYXRA/+uGSyKdhF gtjIpJmeSNv2l4SV0shO7HvVgYzZMJE= ARC-Authentication-Results: i=1; imf20.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=xmission.com; spf=pass (imf20.hostedemail.com: domain of ebiederm@xmission.com designates 166.70.13.233 as permitted sender) smtp.mailfrom=ebiederm@xmission.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1672781767; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=RMWAO6wurCP1qhNOfDOb2XS2LuQqwS1AsnCYB69h1jY=; b=n05/H4n2QWmtd/30tzk9wgxCCQQYgilPHwdUhKY8XhvL8e5ALhiMXncBo/JI8BJ2Dt0Hlq KRYnG2HxqrdaqQfgpt/7npb5JvY8h4J0QkIxPxMO+skxHHbd4+g1k4LuBIGkFL7oYAkDDn YWoszhw9MEA/rPr5HYUyqLGWCo8soNo= Received: from in01.mta.xmission.com ([166.70.13.51]:35338) by out03.mta.xmission.com with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1pCox2-00DQGM-KE; Tue, 03 Jan 2023 14:36:04 -0700 Received: from ip68-110-29-46.om.om.cox.net ([68.110.29.46]:38124 helo=email.froward.int.ebiederm.org.xmission.com) by in01.mta.xmission.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1pCox1-009hFk-GF; Tue, 03 Jan 2023 14:36:04 -0700 From: "Eric W. Biederman" To: Yann Sionneau Cc: Paul Moore , Eric Paris , Kees Cook , linux-audit@redhat.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Clement Leger References: <20230103164359.24347-1-ysionneau@kalray.eu> <20230103164359.24347-3-ysionneau@kalray.eu> Date: Tue, 03 Jan 2023 15:35:28 -0600 In-Reply-To: <20230103164359.24347-3-ysionneau@kalray.eu> (Yann Sionneau's message of "Tue, 3 Jan 2023 17:43:36 +0100") Message-ID: <875ydnmhcv.fsf@email.froward.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1pCox1-009hFk-GF;;;mid=<875ydnmhcv.fsf@email.froward.int.ebiederm.org>;;;hst=in01.mta.xmission.com;;;ip=68.110.29.46;;;frm=ebiederm@xmission.com;;;spf=pass X-XM-AID: U2FsdGVkX18zTivb3taYGRDictjAGoI8aGmfYtFodes= X-SA-Exim-Connect-IP: 68.110.29.46 X-SA-Exim-Mail-From: ebiederm@xmission.com Subject: Re: [RFC PATCH 02/25] kvx: Add ELF-related definitions X-SA-Exim-Version: 4.2.1 (built Sat, 08 Feb 2020 21:53:50 +0000) X-SA-Exim-Scanned: Yes (on in01.mta.xmission.com) X-Rspam-User: X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: 13BBA1C0004 X-Stat-Signature: ybcu7iu77w6sgtkronqkw3q5ihd9xs78 X-HE-Tag: 1672781766-996575 X-HE-Meta: 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Yann Sionneau writes: > Add ELF-related definitions for kvx, including: EM_KVX, > AUDIT_ARCH_KVX and NT_KVX_TCA. Has someone written an SYSVABI architecture specification for your architecture? I feel uncomfortable with the linux-kernel headers being the authoritative place for the ELF abi definitions. Especially since the linux kernel does not deal with relocations, and the kernel headers could diverge from the real world and no one would notice.. I know at least at one point the linux standards base was taking up the work on collecting up some of these definitions. I would be happy if there was anything outside of the linux kernel that people could refer too. Eric > CC: Paul Moore > CC: Eric Paris > CC: Eric Biederman > CC: Kees Cook > CC: linux-audit@redhat.com > CC: linux-kernel@vger.kernel.org > CC: linux-mm@kvack.org > Co-developed-by: Clement Leger > Signed-off-by: Clement Leger > Signed-off-by: Yann Sionneau > --- > include/uapi/linux/audit.h | 1 + > include/uapi/linux/elf-em.h | 1 + > include/uapi/linux/elf.h | 1 + > 3 files changed, 3 insertions(+) > > diff --git a/include/uapi/linux/audit.h b/include/uapi/linux/audit.h > index d676ed2b246e..4db7aa3f84c7 100644 > --- a/include/uapi/linux/audit.h > +++ b/include/uapi/linux/audit.h > @@ -402,6 +402,7 @@ enum { > #define AUDIT_ARCH_HEXAGON (EM_HEXAGON) > #define AUDIT_ARCH_I386 (EM_386|__AUDIT_ARCH_LE) > #define AUDIT_ARCH_IA64 (EM_IA_64|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) > +#define AUDIT_ARCH_KVX (EM_KVX|__AUDIT_ARCH_64BIT|__AUDIT_ARCH_LE) > #define AUDIT_ARCH_M32R (EM_M32R) > #define AUDIT_ARCH_M68K (EM_68K) > #define AUDIT_ARCH_MICROBLAZE (EM_MICROBLAZE) > diff --git a/include/uapi/linux/elf-em.h b/include/uapi/linux/elf-em.h > index ef38c2bc5ab7..9cc348be7f86 100644 > --- a/include/uapi/linux/elf-em.h > +++ b/include/uapi/linux/elf-em.h > @@ -51,6 +51,7 @@ > #define EM_RISCV 243 /* RISC-V */ > #define EM_BPF 247 /* Linux BPF - in-kernel virtual machine */ > #define EM_CSKY 252 /* C-SKY */ > +#define EM_KVX 256 /* Kalray VLIW Architecture */ > #define EM_LOONGARCH 258 /* LoongArch */ > #define EM_FRV 0x5441 /* Fujitsu FR-V */ > > diff --git a/include/uapi/linux/elf.h b/include/uapi/linux/elf.h > index c7b056af9ef0..49094f3be06c 100644 > --- a/include/uapi/linux/elf.h > +++ b/include/uapi/linux/elf.h > @@ -444,6 +444,7 @@ typedef struct elf64_shdr { > #define NT_LOONGARCH_LSX 0xa02 /* LoongArch Loongson SIMD Extension registers */ > #define NT_LOONGARCH_LASX 0xa03 /* LoongArch Loongson Advanced SIMD Extension registers */ > #define NT_LOONGARCH_LBT 0xa04 /* LoongArch Loongson Binary Translation registers */ > +#define NT_KVX_TCA 0x900 /* kvx TCA registers */ > > /* Note types with note name "GNU" */ > #define NT_GNU_PROPERTY_TYPE_0 5