Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1438573pxb; Thu, 4 Mar 2021 11:15:38 -0800 (PST) X-Google-Smtp-Source: ABdhPJwlm90ZcvH9YjSE1U5O+3MHvd4M+NV09Wb83Dvks2HORxn9CNx1A7Ez9o86vq1meDP6Chlq X-Received: by 2002:a17:907:9709:: with SMTP id jg9mr5866816ejc.276.1614885337743; Thu, 04 Mar 2021 11:15:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614885337; cv=none; d=google.com; s=arc-20160816; b=YrM3K2qgZkgLpSMzNWLaoL8uMkXogUWplzegYdFDt/Oc13s4aDXnS92rFnV9jSYF/G 6T78ir1ZqsXgA77cQ5FJ0dH8qtRXQgPYowiaicYT7yR1wwoPWpmNyXYhjcAsltUkbYdA hhexuEjcGQdN9Irtihor0F4TGIDCeXbjpC94j2yUMsah8/Krpf+iTOwBw81hxwYviUds DKw5DSHl4vMb1xhHkyOZxrBEiRV8unGaiS8nzp2DtbOCQRFhQtGgFvRE7LoPJ2jDhZ81 QoBSijGYH9tyAf+FJeDGpFrYQsf3QBiwSM79gYBTAhpXYFaOTTQuS0qD/kWiN5btkBHp WiUw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=OTVwNzH1uaCVLF/4Ac2f4TriWOpqkUZowqj8fIB9cHs=; b=CV3oEOZ6pCiN6XstHJ67687lCTHmrMfLR+fqQhziCVPy393yEIW3xdPAM7MyV4M4yO I61d7Pza5JlCeDzEnuzE/oQjfoksyppJxjN4cupf0W7oD48MfFnBwxBckxw3+iY/FBtR z/lFFf94zG0sW2iT2dflFqFF+IxM30MwWOzqbXOTd/Ws3hq3jSsN0rpKoi+AmUyUaxZq nzjRLT1cVZZ9RKGT/HV0ql3/xw8keMLQnMWZWkAVmBfCrnjsmNRahZRbdKh4zBqb9F/w vHjYHQj8ld7dSClzMWgzKEK/5IMQXaVkKAild9BrKmwIMqVj8yGUTPQ9eSYZiwFlCuyu y+MQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="X3QynV/G"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bo20si236979edb.479.2021.03.04.11.15.15; Thu, 04 Mar 2021 11:15:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="X3QynV/G"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237388AbhCDTHI (ORCPT + 99 others); Thu, 4 Mar 2021 14:07:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:38866 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236972AbhCDTGu (ORCPT ); Thu, 4 Mar 2021 14:06:50 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 0D47964F6B; Thu, 4 Mar 2021 19:06:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1614884770; bh=7LrZWfNLol5t2kvnpVyfLtni2s7+fi4sO40UtEpltH8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X3QynV/GJPQswWurxr5/JAjmkjfcmhnYgq27jl4BHFJQmtXR7KQsmbP5b7JsOMr1o xHCpi2yCvl0+wpxFwBN46tOD9rAO08dJjy/vIyR+8HmEGEbgkxpN8PEb5CY8kTQaVy bBeahgurMMa4G/nedwjKP4pV61PAbXljmoOBcoVYrswh+BIrm7i9r1qCAk80GhOctC lyvEETN/+sfYeco38jPfAyY9E+31yA6YzJpm69DIs4Al7Ee9PCN6Uq9z8z+UJDi9B+ BYUO7iCrP0VQuMt+oI8eEtyyZ6+aD1tU6GORoWHKVDT3vAoKvWYluPw0FLB2jPr9+u WYBh7ibJHZ+yQ== From: Andy Lutomirski To: x86@kernel.org Cc: LKML , Mark Rutland , Andy Lutomirski Subject: [PATCH v3 03/11] x86/dumpstack: Remove unnecessary range check fetching opcode bytes Date: Thu, 4 Mar 2021 11:05:56 -0800 Message-Id: X-Mailer: git-send-email 2.29.2 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org copy_from_user_nmi() validates that the pointer is in the user range, so there is no need for an extra check in copy_code(). Signed-off-by: Andy Lutomirski --- arch/x86/kernel/dumpstack.c | 6 ------ 1 file changed, 6 deletions(-) diff --git a/arch/x86/kernel/dumpstack.c b/arch/x86/kernel/dumpstack.c index 299c20f0a38b..55cf3c8325c6 100644 --- a/arch/x86/kernel/dumpstack.c +++ b/arch/x86/kernel/dumpstack.c @@ -81,12 +81,6 @@ static int copy_code(struct pt_regs *regs, u8 *buf, unsigned long src, /* The user space code from other tasks cannot be accessed. */ if (regs != task_pt_regs(current)) return -EPERM; - /* - * Make sure userspace isn't trying to trick us into dumping kernel - * memory by pointing the userspace instruction pointer at it. - */ - if (__chk_range_not_ok(src, nbytes, TASK_SIZE_MAX)) - return -EINVAL; /* * Even if named copy_from_user_nmi() this can be invoked from -- 2.29.2