Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp3010989ybx; Fri, 8 Nov 2019 12:40:37 -0800 (PST) X-Google-Smtp-Source: APXvYqxCiel7/vk6UFYDj3mnVGs6VQVRQ/nQj+BQ4gysn8wyewNpATAndcFxdei1lYcp4FddRiIb X-Received: by 2002:a17:906:cca:: with SMTP id l10mr10726586ejh.161.1573245637424; Fri, 08 Nov 2019 12:40:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573245637; cv=none; d=google.com; s=arc-20160816; b=uIxVWP8ONBcU29kUIB20SUIZG7FqV2V9MFmaaQhTSICnvzbySLHAU0JHX4Ovul5V+N CKAKBJ33YjX8B86WXTJMbIE+1qtKn1b9touvWB9hASEoElxMp5BDAQPp9cFSR2+KPXHL Vb+ms52Xv3aLy6GIUer5p8EkDE5IlZYxcEWXwgFFumnHWPu0X8eJ5GOVkrRxGUo75MZn c0N00EUy/rgqF7aE+1HcZP7OxAxx6dq1Wb6bKwH6Lb6QiPzjf0XFiFvOhzLGL+hfjZEI A2YMOO//4wTMvup82xZblU7jSRxG8Hmc5wG4OyVLvn74VAPBoApckGSdwb6a5bWdxMpD jqvw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=TaIq8R7Bkuv+GQo/80AQt5TDsV5gTLgIBfEA/uJWyyY=; b=oku9CFgNOlRtARnCIgNjjOZOZYP8aMEiZJ91+Sc5Aj/tOBswe+pKWkrb2an+d3IQ2I kohTHaG4t59/xepMB+lPs9UuDesNG4B4+dUNUaYRAj7QZfOXTdCII25frliACDaZgilz 1hvak+ja2evTnVsovFrTeIJ9lbUeM4lbd88WCRea3gZBtp7CAygM6VAN/mYMwd8mW1Kt VRjcQ2lqZHM04HbsBFdhh1tOplBvF7rfHVEcxOd0e9co4ngzv3P6szfbZFA86kgJ3sSM SM4lF0pWkC2oqho0lldmIFcu0G/sqBQsGdJyMG0e98GlfsFYOJFH8a6M6d3AchWqcuaJ 0xyQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f4si4405161ejc.218.2019.11.08.12.40.14; Fri, 08 Nov 2019 12:40:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731386AbfKHUh3 (ORCPT + 99 others); Fri, 8 Nov 2019 15:37:29 -0500 Received: from mout.kundenserver.de ([212.227.17.10]:43475 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729617AbfKHUh3 (ORCPT ); Fri, 8 Nov 2019 15:37:29 -0500 Received: from threadripper.lan ([149.172.19.189]) by mrelayeu.kundenserver.de (mreue107 [212.227.15.145]) with ESMTPA (Nemesis) id 1MJW5G-1iDiWE2fua-00Jr4T; Fri, 08 Nov 2019 21:37:18 +0100 From: Arnd Bergmann To: y2038@lists.linaro.org, Sudip Mukherjee , Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, Arnd Bergmann , stable@vger.kernel.org, Bamvor Jian Zhang , "Michael S. Tsirkin" , Thomas Gleixner Subject: [PATCH 7/8] ppdev: fix PPGETTIME/PPSETTIME ioctls Date: Fri, 8 Nov 2019 21:34:30 +0100 Message-Id: <20191108203435.112759-8-arnd@arndb.de> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20191108203435.112759-1-arnd@arndb.de> References: <20191108203435.112759-1-arnd@arndb.de> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Provags-ID: V03:K1:qYLl7Lv1RPZHuaMmx5Y4HTBUG3IUIT6OHrwxfxk1rYIY9q0J5mB ID3W+2I3bIRJN9pb9/4We7gDyPXbqHtuj1j4jbHZqPHOQssbaXzIS5oG4kS2fmZvcPatud4 28UbJl9c5SgBe7fdAKp7oJ+CbG/oBp2vCDyjiOe+T82VoBh+JiGWqcuzcRbpDWbUGG9ilIT oXkl6SZaCeu/b9K9+rWgA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1;V03:K0:27jegMmATLs=:NTdMdmiXmyy5b2BfGtixk+ QSkp4BY2cue8C4JNNeidfsutKRhw3wMg3l/slepabQusaphf9a2XzM/Xib4pCK19c/jh6uVYw qgoqRcope7ZcvaczaCTqwuVEOQ19cb1yCth63skQddVaME5+3q0OiGk14MCUEu+SyPOElob9b Qn/YeUBZAR3oXA2iHAYPA7mROXI3Bn7dgaIShyHnylMLGP2uqmZMOllngsqQHKIWE89EWnRug 18W44axbZpxj22LSrEmOeVvaa4iJIkOdHDnXjF6hx8fT24K5b1x9XnNBqnzPwuOG0bYWl8D3+ tDSlHep+MWILVxEz0z2VBYIFRb/gqAtqd0edvpKxcnv4Q6auK3yIGRJayQS962j4gNgOndn77 0fXWlAP0cS3hrK6+4LrfRAdwDWQEM2OYpI5pP7j/hi8Wm+jrmvLn9PYgU68KOKoPMCa1q2Yhj h9nfnueEp5sP8Y6GnRXHD51s4wdw6vjhs9M6W5j4NodYDU1pyZiWYbKIAlPNRF6eH7l5AQjsS ogCgJxDmRvlDQ1MdM2xC0EnxSzjPcLA7GGrAWgVfNevSn0DIwiUxCtGZIiFgo/HG/2reHnWw2 2cMlV1d4OLUq6tEx14Z8gWn5FdQBJpS3h1RQDXv5keY2Lbz/EBwscpvG+QqeHjF2SXoz/OBpH T4vEyyqnuyq1z4hRmUI0mYY+hNztZI18aZDDo+/iy9qlGDbIc0PCwp1/RHEdM5Xjfoy9+7Jmm MTgQ64hTlGXkXWvKrIp/7yenLu4c9AKDQqLC42HchjLAPJ6crLFiylBhIItSCnYqCWe8Tyle3 mNAzDqk5r3RJ1GgTpL4QW8DP8nhhYfuSFLqdmsNXGmvrPVtcClQZK5bb+XFwFrqMAehuhAUZN BhhYhfG6EkYlzncjY87g== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Going through the uses of timeval in the user space API, I noticed two bugs in ppdev that were introduced in the y2038 conversion: * The range check was accidentally moved from ppsettime to ppgettime * On sparc64, the microseconds are in the other half of the 64-bit word. Fix both, and mark the fix for stable backports. Cc: stable@vger.kernel.org Fixes: 3b9ab374a1e6 ("ppdev: convert to y2038 safe") Signed-off-by: Arnd Bergmann --- drivers/char/ppdev.c | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/drivers/char/ppdev.c b/drivers/char/ppdev.c index c86f18aa8985..34bb88fe0b0a 100644 --- a/drivers/char/ppdev.c +++ b/drivers/char/ppdev.c @@ -619,20 +619,27 @@ static int pp_do_ioctl(struct file *file, unsigned int cmd, unsigned long arg) if (copy_from_user(time32, argp, sizeof(time32))) return -EFAULT; + if ((time32[0] < 0) || (time32[1] < 0)) + return -EINVAL; + return pp_set_timeout(pp->pdev, time32[0], time32[1]); case PPSETTIME64: if (copy_from_user(time64, argp, sizeof(time64))) return -EFAULT; + if ((time64[0] < 0) || (time64[1] < 0)) + return -EINVAL; + + if (IS_ENABLED(CONFIG_SPARC64) && !in_compat_syscall()) + time64[1] >>= 32; + return pp_set_timeout(pp->pdev, time64[0], time64[1]); case PPGETTIME32: jiffies_to_timespec64(pp->pdev->timeout, &ts); time32[0] = ts.tv_sec; time32[1] = ts.tv_nsec / NSEC_PER_USEC; - if ((time32[0] < 0) || (time32[1] < 0)) - return -EINVAL; if (copy_to_user(argp, time32, sizeof(time32))) return -EFAULT; @@ -643,8 +650,9 @@ static int pp_do_ioctl(struct file *file, unsigned int cmd, unsigned long arg) jiffies_to_timespec64(pp->pdev->timeout, &ts); time64[0] = ts.tv_sec; time64[1] = ts.tv_nsec / NSEC_PER_USEC; - if ((time64[0] < 0) || (time64[1] < 0)) - return -EINVAL; + + if (IS_ENABLED(CONFIG_SPARC64) && !in_compat_syscall()) + time64[1] <<= 32; if (copy_to_user(argp, time64, sizeof(time64))) return -EFAULT; -- 2.20.0