Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp2091801pxb; Fri, 25 Mar 2022 10:56:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOiaZkJGAuDCOyGpYSPt5dnihs/eetZRJ9t3YF3RVXTFK/mO9VmktVENmhObVtOQdC2P0x X-Received: by 2002:a65:5941:0:b0:375:9bfd:473d with SMTP id g1-20020a655941000000b003759bfd473dmr602890pgu.348.1648231014997; Fri, 25 Mar 2022 10:56:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1648231014; cv=none; d=google.com; s=arc-20160816; b=IoKolfL6nEMNfhVjpfB5kdQTakl6IroOHXhPZCku6DmFUWAaYzXuke9K0/Z8VMWrwg iDU8gZIeu1+8EVptDEcwKE/N4f1Eut8lpEFCfdfWurH5FUj1bsZKxzCsCEzoQzagv7L/ O1o5no4QFZL2u7sN+6tPO9ppDV1dfdJxIs1x4LN//mKJeed88t0W7nyUWicriDRJzUxE +cI3jQXytCztkMtNQHHbclHWbGqW9XVds0RRAO3nvoWHX/5TNLLDXkjro5eWriiBzMrS m1Wlt1g479YCbjzPypnaltzUgYtppWIKxi+DnCww+aQ2Ilu9hHXZCG+01/lTDZqaisD1 HG8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=7IzHpsJ+2kKuqyyDjXsPAadLsPzyG8VJioeqFckfh/4=; b=Lk3IUzku/ppxJ5efnc1ijt8Kzil8YV7n3im8QTlFvm5S6NFOPY9MLNsDYL/K+aJCB9 CznxGN8puS6n0N1TYocDIHdUrQLG+uEyOTuE2DJFMMq+gm+W5OgODBg3qi2jjs9vzh0Q ytV6g1bTykt1kru+I2bP7UPIDlfemgk891V+CjrcV7lUqEa4wFnw08Cb0KZIWgxU060U u+V7Jkbf8icTuswSWKWXTYlFM3R0crkxoAxnYmUY8nioHyd3I82U9yX1hDOnXUJqQ2s3 KBeXWLU6P5btCHNbzMHaO/4Vk0RA01j9j00AHH1W4Y+1aHWvi+ElDFBrH5JqCJ2NomJ7 QDPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=y+WKUlfP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id d37-20020a631d65000000b003816043ee1asi3021393pgm.15.2022.03.25.10.56.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 25 Mar 2022 10:56:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=y+WKUlfP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id CBBA910A7D1; Fri, 25 Mar 2022 10:36:19 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377369AbiCYPd0 (ORCPT + 99 others); Fri, 25 Mar 2022 11:33:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58732 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1376756AbiCYPXY (ORCPT ); Fri, 25 Mar 2022 11:23:24 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 42A6E6E296; Fri, 25 Mar 2022 08:16:45 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id 3BC63B82865; Fri, 25 Mar 2022 15:16:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7F905C340E9; Fri, 25 Mar 2022 15:16:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1648221371; bh=2Y7SEJ45GUxU9Jc1FeEiiIgPS7sVZVqp/nNW4EwEPk4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=y+WKUlfPbMmwq7xvX0e2xVfwp03JtJUXxntKi1XzCnzhlwfgwMu8tnzMB1xOp9Ayb QEV2Xj67Y5rgbvy/9iuMJ/GHzjXRd6SHra+sDh/bNFgHyRLk4Nyzva0nx2Y9BEybMN igJiqL1lGT0eLSxwsRnjzkJZduZm/WMNc5Mo8k2A= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christoph Hellwig , Arnd Bergmann Subject: [PATCH 5.15 36/37] m68k: fix access_ok for coldfire Date: Fri, 25 Mar 2022 16:14:37 +0100 Message-Id: <20220325150420.964665740@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220325150419.931802116@linuxfoundation.org> References: <20220325150419.931802116@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-3.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Arnd Bergmann commit 26509034bef198525d5936c116cbd0c3fa491c0b upstream. While most m68k platforms use separate address spaces for user and kernel space, at least coldfire does not, and the other ones have a TASK_SIZE that is less than the entire 4GB address range. Using the default implementation of __access_ok() stops coldfire user space from trivially accessing kernel memory. Reviewed-by: Christoph Hellwig Cc: stable@vger.kernel.org Signed-off-by: Arnd Bergmann Signed-off-by: Greg Kroah-Hartman --- arch/m68k/include/asm/uaccess.h | 15 +++++++++------ 1 file changed, 9 insertions(+), 6 deletions(-) --- a/arch/m68k/include/asm/uaccess.h +++ b/arch/m68k/include/asm/uaccess.h @@ -12,14 +12,17 @@ #include /* We let the MMU do all checking */ -static inline int access_ok(const void __user *addr, +static inline int access_ok(const void __user *ptr, unsigned long size) { - /* - * XXX: for !CONFIG_CPU_HAS_ADDRESS_SPACES this really needs to check - * for TASK_SIZE! - */ - return 1; + unsigned long limit = TASK_SIZE; + unsigned long addr = (unsigned long)ptr; + + if (IS_ENABLED(CONFIG_CPU_HAS_ADDRESS_SPACES) || + !IS_ENABLED(CONFIG_MMU)) + return 1; + + return (size <= limit) && (addr <= (limit - size)); } /*