Received: by 10.213.65.68 with SMTP id h4csp145418imn; Thu, 15 Mar 2018 12:14:08 -0700 (PDT) X-Google-Smtp-Source: AG47ELvRbu4cBqnFshb5+/I1xdlSI0md3jqLZxL6HKBpxuWTYupODzIZ4szEWXk3W5OEyNzI85z4 X-Received: by 2002:a17:902:122:: with SMTP id 31-v6mr9498229plb.280.1521141248060; Thu, 15 Mar 2018 12:14:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521141248; cv=none; d=google.com; s=arc-20160816; b=EwLC23/IpBLZphNfefuMvOovCQCkYe47Xt4f8an/kWuibiRvIWpZb8hEmLn7oWpJnp Eq6J8jlHgf5WnNvYj3yBfbIdwWd6auoRB08JKnyXED7SOTsiR0XOLYPH2oKpijoPmR3H a3VAh9sQbHJ9sWSZ165i0CQiPZ9+o8phAK9Ef1tfLdlokUAmxD1Yg7hM/JTJcif9ac/f HrZAiWeJ0IaCBd0uMN+ZZcmRPb69sDGw/6eD+sI/6smBAtSan4Y7XO+HfzuuPQklcjPh seCWtxBXagFSzy0yh0t3ymZdXn5P0qt6E2Xov6AFaU9hnv1eNoEiVFMNP/rhueE/7Wri PvLQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=HZ4TeKh/7FA/6Q9dymKoX/x+YIHRgPEJohiaRW7l6f0=; b=Cggvc/xG1xULiZr6JSodm1rfiF8wTI7dmGmMmi0y4Nr+JBF5ORwPPWRGWb1LxvV+O7 LqM8OtOLqWq77ep+PVe0CcCjLbiCIth2OA4rw3j/DriMUGSXkAogxahM82nZwGyBGKam eB5gb+8DSsjq0c0HhSvBXYT6GoEZ/3Jnw/Yp4G6sYpyxXFxQn9WzibUJZqDfcCnYfU15 aAsYxgKrhXUSix55yUnpuh3S7vku+1p5PWanf/eGGfn2AGRsc3vxnwv7hPFzaGDlfHuI ucEDkxlzRNOV2g+KqNw5ltuFuHVvT5lqmSdwqQkn40AYY6e0LEfbXOwa3nFtUClBrVKG AzLQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t18-v6si143703plo.704.2018.03.15.12.13.53; Thu, 15 Mar 2018 12:14:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932652AbeCOTGW (ORCPT + 99 others); Thu, 15 Mar 2018 15:06:22 -0400 Received: from isilmar-4.linta.de ([136.243.71.142]:35802 "EHLO isilmar-4.linta.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932496AbeCOTGT (ORCPT ); Thu, 15 Mar 2018 15:06:19 -0400 Received: from light.dominikbrodowski.net (isilmar.linta [10.0.0.1]) by isilmar-4.linta.de (Postfix) with ESMTPS id F1AEA20090A; Thu, 15 Mar 2018 19:06:17 +0000 (UTC) Received: by light.dominikbrodowski.net (Postfix, from userid 1000) id 066CE2065F; Thu, 15 Mar 2018 20:05:39 +0100 (CET) From: Dominik Brodowski To: linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, viro@zeniv.linux.org.uk Cc: luto@kernel.org, mingo@kernel.org, akpm@linux-foundation.org, arnd@arndb.de, Thomas Gleixner , Ingo Molnar , Jiri Slaby , x86@kernel.org Subject: [PATCH v2 13/36] x86/ioport: add ksys_ioperm() helper; remove in-kernel calls to sys_ioperm() Date: Thu, 15 Mar 2018 20:05:06 +0100 Message-Id: <20180315190529.20943-14-linux@dominikbrodowski.net> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180315190529.20943-1-linux@dominikbrodowski.net> References: <20180315190529.20943-1-linux@dominikbrodowski.net> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Using this helper allows us to avoid the in-kernel calls to the sys_ioperm() syscall. Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Jiri Slaby Cc: x86@kernel.org Acked-by: Greg Kroah-Hartman Signed-off-by: Dominik Brodowski --- arch/x86/include/asm/syscalls.h | 1 + arch/x86/kernel/ioport.c | 7 ++++++- drivers/tty/vt/vt_ioctl.c | 6 +++--- 3 files changed, 10 insertions(+), 4 deletions(-) diff --git a/arch/x86/include/asm/syscalls.h b/arch/x86/include/asm/syscalls.h index bad25bb80679..1c0bebbd039e 100644 --- a/arch/x86/include/asm/syscalls.h +++ b/arch/x86/include/asm/syscalls.h @@ -17,6 +17,7 @@ /* Common in X86_32 and X86_64 */ /* kernel/ioport.c */ +long ksys_ioperm(unsigned long from, unsigned long num, int turn_on); asmlinkage long sys_ioperm(unsigned long, unsigned long, int); asmlinkage long sys_iopl(unsigned int); diff --git a/arch/x86/kernel/ioport.c b/arch/x86/kernel/ioport.c index 38deafebb21b..0fe1c8782208 100644 --- a/arch/x86/kernel/ioport.c +++ b/arch/x86/kernel/ioport.c @@ -23,7 +23,7 @@ /* * this changes the io permissions bitmap in the current task. */ -SYSCALL_DEFINE3(ioperm, unsigned long, from, unsigned long, num, int, turn_on) +long ksys_ioperm(unsigned long from, unsigned long num, int turn_on) { struct thread_struct *t = ¤t->thread; struct tss_struct *tss; @@ -96,6 +96,11 @@ SYSCALL_DEFINE3(ioperm, unsigned long, from, unsigned long, num, int, turn_on) return 0; } +SYSCALL_DEFINE3(ioperm, unsigned long, from, unsigned long, num, int, turn_on) +{ + return ksys_ioperm(from, num, turn_on); +} + /* * sys_iopl has to be used when you want to access the IO ports * beyond the 0x3ff range: to get the full 65536 ports bitmapped diff --git a/drivers/tty/vt/vt_ioctl.c b/drivers/tty/vt/vt_ioctl.c index d61be307256a..a78ad10a119b 100644 --- a/drivers/tty/vt/vt_ioctl.c +++ b/drivers/tty/vt/vt_ioctl.c @@ -57,7 +57,7 @@ extern struct tty_driver *console_driver; */ #ifdef CONFIG_X86 -#include +#include #endif static void complete_change_console(struct vc_data *vc); @@ -420,12 +420,12 @@ int vt_ioctl(struct tty_struct *tty, ret = -EINVAL; break; } - ret = sys_ioperm(arg, 1, (cmd == KDADDIO)) ? -ENXIO : 0; + ret = ksys_ioperm(arg, 1, (cmd == KDADDIO)) ? -ENXIO : 0; break; case KDENABIO: case KDDISABIO: - ret = sys_ioperm(GPFIRST, GPNUM, + ret = ksys_ioperm(GPFIRST, GPNUM, (cmd == KDENABIO)) ? -ENXIO : 0; break; #endif -- 2.16.2