Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2777338ybk; Tue, 12 May 2020 07:57:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx4KjSUle/qUb5WbNOBHxJVqlhU9ylhJcxhBpAYs4gD31VnOJo13hJ8RmjXZn5rCyrYGKa1 X-Received: by 2002:aa7:d495:: with SMTP id b21mr9575549edr.16.1589295423234; Tue, 12 May 2020 07:57:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589295423; cv=none; d=google.com; s=arc-20160816; b=Q8W/8gGvLIodkTbibSYND6oIT3Zc30OiC+fL4cEk0SnAKDhjdv/d9RCpIZrz+YHzVJ Xht39Qyv/44m2d9SU3K0+QMYuHAX72nKUBYe7SKKyqwET1hdpSIWbD1loZgaNhKqtzYP 2K4GcxoqJKUGw8S7sCJWeBOboIAz/+XKVLQUJvjkTOLXuPcWWY1qeR7VciaouBbXIFqG vftyzzx4QbIsVw/k+BUQRgkQrBVf0Hvi5zirXOFFqgau9crjfNxyyDdIf+Ht6vVzzdNN WNz9TxBfFEZJ0OBUAl8ElzOE2//ACIaUOKHYxyPAiQV0omrvjX5QRP4Y/V/W8libHW/w wX0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=ySoj9YwhO+nzwfHSuzSdHbSenNSQx8oN+eAc5Epp8Vg=; b=vRPu6ZC2ks83JBNuz7yn/sbh8PV7WG5TfTNCbKoD0xOmEHuva9tv2O0zaF6hUUSvVl tHrtgPHa67fiSRi1lK2+sKCoby/0Ewt9QuV9/X+EMVz0eaXPDbs4E/yiYFSMWLaQskZr pz1FNyokhO9EdxlR+S3B69lNSkqsitu+KjgbUwj2bcjEuDzd+RSa36/bB0fS3syoJmqq tXCqF78YsFcQ+oJgLW/kw49p2bFMyYbDGT9aSTP/Ia7iikd1F2bvgjF0B5vgsQ3yTkJM CfLIPySXNTdcBs6xJkw/mChzeT1odtKUaO5o31DnEBA2Mlq3JgwcR0v1W2yWeQSN5kQf uQyg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o5si7900486ejr.501.2020.05.12.07.56.39; Tue, 12 May 2020 07:57:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730394AbgELOzL (ORCPT + 99 others); Tue, 12 May 2020 10:55:11 -0400 Received: from mga05.intel.com ([192.55.52.43]:29538 "EHLO mga05.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726300AbgELOzK (ORCPT ); Tue, 12 May 2020 10:55:10 -0400 IronPort-SDR: irdUGMSg1wCWkrNpILLMfIXQLzaqQtmeS5Q9xxRflgyW53QufH1Vm5b6tuI5hZ4/PowrFPKuhN nsPHMxE2uwZA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 May 2020 07:55:08 -0700 IronPort-SDR: yz6+Y/azMzkeEK1dNt8OSDFG7bqgE/MryKUfcN7gUu5F6ZlEe6D9sGfLolS3RYmWDvrB7SVkj6 9FN+TIAWjSOw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,384,1583222400"; d="scan'208";a="371587800" Received: from yyu32-desk.sc.intel.com ([143.183.136.146]) by fmsmga001.fm.intel.com with ESMTP; 12 May 2020 07:55:08 -0700 From: Yu-cheng Yu To: linux-kernel@vger.kernel.org, x86@kernel.org, "H. Peter Anvin" , Thomas Gleixner , Ingo Molnar , Dave Hansen , Tony Luck , Andy Lutomirski , Borislav Petkov , Rik van Riel , "Ravi V. Shankar" , Sebastian Andrzej Siewior , Fenghua Yu , Peter Zijlstra Cc: Dave Hansen , Yu-cheng Yu , Borislav Petkov Subject: [PATCH v4 01/10] x86/fpu/xstate: Rename validate_xstate_header() to validate_user_xstate_header() Date: Tue, 12 May 2020 07:54:35 -0700 Message-Id: <20200512145444.15483-2-yu-cheng.yu@intel.com> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20200512145444.15483-1-yu-cheng.yu@intel.com> References: <20200512145444.15483-1-yu-cheng.yu@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Fenghua Yu The function validate_xstate_header() validates an xstate header coming from userspace (PTRACE or sigreturn). To make it clear, rename it to validate_user_xstate_header(). Suggested-by: Dave Hansen Signed-off-by: Fenghua Yu Signed-off-by: Yu-cheng Yu Reviewed-by: Dave Hansen Reviewed-by: Tony Luck Reviewed-by: Borislav Petkov --- v3: - Change validate_xstate_header_from_user() to validate_user_xstate_header(). arch/x86/include/asm/fpu/xstate.h | 2 +- arch/x86/kernel/fpu/regset.c | 2 +- arch/x86/kernel/fpu/signal.c | 2 +- arch/x86/kernel/fpu/xstate.c | 6 +++--- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/arch/x86/include/asm/fpu/xstate.h b/arch/x86/include/asm/fpu/xstate.h index c6136d79f8c0..fc4db51f3b53 100644 --- a/arch/x86/include/asm/fpu/xstate.h +++ b/arch/x86/include/asm/fpu/xstate.h @@ -56,6 +56,6 @@ int copy_kernel_to_xstate(struct xregs_state *xsave, const void *kbuf); int copy_user_to_xstate(struct xregs_state *xsave, const void __user *ubuf); /* Validate an xstate header supplied by userspace (ptrace or sigreturn) */ -extern int validate_xstate_header(const struct xstate_header *hdr); +int validate_user_xstate_header(const struct xstate_header *hdr); #endif diff --git a/arch/x86/kernel/fpu/regset.c b/arch/x86/kernel/fpu/regset.c index d652b939ccfb..bd1d0649f8ce 100644 --- a/arch/x86/kernel/fpu/regset.c +++ b/arch/x86/kernel/fpu/regset.c @@ -139,7 +139,7 @@ int xstateregs_set(struct task_struct *target, const struct user_regset *regset, } else { ret = user_regset_copyin(&pos, &count, &kbuf, &ubuf, xsave, 0, -1); if (!ret) - ret = validate_xstate_header(&xsave->header); + ret = validate_user_xstate_header(&xsave->header); } /* diff --git a/arch/x86/kernel/fpu/signal.c b/arch/x86/kernel/fpu/signal.c index 400a05e1c1c5..585e3651b98f 100644 --- a/arch/x86/kernel/fpu/signal.c +++ b/arch/x86/kernel/fpu/signal.c @@ -366,7 +366,7 @@ static int __fpu__restore_sig(void __user *buf, void __user *buf_fx, int size) ret = __copy_from_user(&fpu->state.xsave, buf_fx, state_size); if (!ret && state_size > offsetof(struct xregs_state, header)) - ret = validate_xstate_header(&fpu->state.xsave.header); + ret = validate_user_xstate_header(&fpu->state.xsave.header); } if (ret) goto err_out; diff --git a/arch/x86/kernel/fpu/xstate.c b/arch/x86/kernel/fpu/xstate.c index 32b153d38748..8ed64397c78b 100644 --- a/arch/x86/kernel/fpu/xstate.c +++ b/arch/x86/kernel/fpu/xstate.c @@ -472,7 +472,7 @@ int using_compacted_format(void) } /* Validate an xstate header supplied by userspace (ptrace or sigreturn) */ -int validate_xstate_header(const struct xstate_header *hdr) +int validate_user_xstate_header(const struct xstate_header *hdr) { /* No unknown or supervisor features may be set */ if (hdr->xfeatures & (~xfeatures_mask | XFEATURE_MASK_SUPERVISOR)) @@ -1147,7 +1147,7 @@ int copy_kernel_to_xstate(struct xregs_state *xsave, const void *kbuf) memcpy(&hdr, kbuf + offset, size); - if (validate_xstate_header(&hdr)) + if (validate_user_xstate_header(&hdr)) return -EINVAL; for (i = 0; i < XFEATURE_MAX; i++) { @@ -1201,7 +1201,7 @@ int copy_user_to_xstate(struct xregs_state *xsave, const void __user *ubuf) if (__copy_from_user(&hdr, ubuf + offset, size)) return -EFAULT; - if (validate_xstate_header(&hdr)) + if (validate_user_xstate_header(&hdr)) return -EINVAL; for (i = 0; i < XFEATURE_MAX; i++) { -- 2.21.0