From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.0 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E282EC433E0 for ; Wed, 12 Aug 2020 21:03:19 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id C093D207F7 for ; Wed, 12 Aug 2020 21:03:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597266199; bh=8gJoNJK/YGNpJLbR8LPhKzVepWZ0KSvsk+/NCEDtLzc=; h=Date:From:To:Subject:Reply-To:List-ID:From; b=lVgHKM4NMWB/fXmSaFc+v5nCOq8Y5c4cTd5i8kD47ZNgVc7ntwCl1AIBG9oOCmvKQ SKcoyNP4RQUBY8U0HXsyyrxU8G2SNmqAqVuqlLm5QSnX8LKsuG0Tik+1QKCa7ptdtJ Jw8yqI7AukhIbpVSFVwt38UIKmUsFobNkeZG48XU= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726611AbgHLVDT (ORCPT ); Wed, 12 Aug 2020 17:03:19 -0400 Received: from mail.kernel.org ([198.145.29.99]:52770 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726557AbgHLVDT (ORCPT ); Wed, 12 Aug 2020 17:03:19 -0400 Received: from localhost.localdomain (c-71-198-47-131.hsd1.ca.comcast.net [71.198.47.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6FB5520774; Wed, 12 Aug 2020 21:03:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1597266197; bh=8gJoNJK/YGNpJLbR8LPhKzVepWZ0KSvsk+/NCEDtLzc=; h=Date:From:To:Subject:From; b=yDyRc/0RxS3uwsj35UjcLDOdHvl5SngnIQnrkHSnfL9OpKJ7DydESOckJwaYmS1Ki bbw3PqoL/vtAbvFIYKjS+Qwks5Y7xdwPz1eOSV21SKmtvya6PvdiFc58tMph+gukfP WQ0XKB1d1IGNwOnAH6n4WSYX747iOJgu1KjlGG1c= Date: Wed, 12 Aug 2020 14:03:17 -0700 From: akpm@linux-foundation.org To: deanbo422@gmail.com, geert@linux-m68k.org, green.hu@gmail.com, hch@lst.de, linux@roeck-us.net, mm-commits@vger.kernel.org, nickhu@andestech.com, palmer@dabbelt.com, paul.walmsley@sifive.com, torvalds@linux-foundation.org Subject: [merged] syscalls-use-uaccess_kernel-in-addr_limit_user_check.patch removed from -mm tree Message-ID: <20200812210317.EWcTeEHlc%akpm@linux-foundation.org> User-Agent: s-nail v14.8.16 Sender: mm-commits-owner@vger.kernel.org Precedence: bulk Reply-To: linux-kernel@vger.kernel.org List-ID: X-Mailing-List: mm-commits@vger.kernel.org The patch titled Subject: syscalls: use uaccess_kernel in addr_limit_user_check has been removed from the -mm tree. Its filename was syscalls-use-uaccess_kernel-in-addr_limit_user_check.patch This patch was dropped because it was merged into mainline or a subsystem tree ------------------------------------------------------ From: Christoph Hellwig Subject: syscalls: use uaccess_kernel in addr_limit_user_check Patch series "clean up address limit helpers", v2. In preparation for eventually phasing out direct use of set_fs(), this series removes the segment_eq() arch helper that is only used to implement or duplicate the uaccess_kernel() API, and then adds descriptive helpers to force the kernel address limit. This patch (of 6): Use the uaccess_kernel helper instead of duplicating it. [hch@lst.de: arm: don't call addr_limit_user_check for nommu] Link: http://lkml.kernel.org/r/20200721045834.GA9613@lst.de Link: http://lkml.kernel.org/r/20200714105505.935079-1-hch@lst.de Link: http://lkml.kernel.org/r/20200710135706.537715-1-hch@lst.de Link: http://lkml.kernel.org/r/20200710135706.537715-2-hch@lst.de Signed-off-by: Christoph Hellwig Acked-by: Linus Torvalds Tested-by: Guenter Roeck Cc: Nick Hu Cc: Greentime Hu Cc: Vincent Chen Cc: Paul Walmsley Cc: Palmer Dabbelt Cc: Geert Uytterhoeven Signed-off-by: Andrew Morton --- arch/arm/kernel/signal.c | 2 ++ include/linux/syscalls.h | 2 +- 2 files changed, 3 insertions(+), 1 deletion(-) --- a/arch/arm/kernel/signal.c~syscalls-use-uaccess_kernel-in-addr_limit_user_check +++ a/arch/arm/kernel/signal.c @@ -713,7 +713,9 @@ struct page *get_signal_page(void) /* Defer to generic check */ asmlinkage void addr_limit_check_failed(void) { +#ifdef CONFIG_MMU addr_limit_user_check(); +#endif } #ifdef CONFIG_DEBUG_RSEQ --- a/include/linux/syscalls.h~syscalls-use-uaccess_kernel-in-addr_limit_user_check +++ a/include/linux/syscalls.h @@ -263,7 +263,7 @@ static inline void addr_limit_user_check return; #endif - if (CHECK_DATA_CORRUPTION(!segment_eq(get_fs(), USER_DS), + if (CHECK_DATA_CORRUPTION(uaccess_kernel(), "Invalid address limit on user-mode return")) force_sig(SIGKILL); _ Patches currently in -mm which might be from hch@lst.de are