Received: by 2002:a05:7412:7c14:b0:fa:6e18:a558 with SMTP id ii20csp264933rdb; Mon, 22 Jan 2024 03:37:19 -0800 (PST) X-Google-Smtp-Source: AGHT+IFMeYgcIHNj7hi6Z9NoUUlM+3tHpMcWZ2yjU2F4waf9S5rXJwpuKYTot5fJx2MYOLZzLPH5 X-Received: by 2002:a05:6a20:840b:b0:19a:fb32:2009 with SMTP id c11-20020a056a20840b00b0019afb322009mr6007118pzd.89.1705923439695; Mon, 22 Jan 2024 03:37:19 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705923439; cv=pass; d=google.com; s=arc-20160816; b=qhTNmIJcUXMNbwea/T5MR7tqYi1yXSr4D+z34hWA9lBSoTwa/pJyiPys5+l3Ras99V BJSPyxQcXiCW8OeR96/he0WH/BTgFSmB6ikRudyuJxy1h0kly8nRRB3mmJP/bfOZngBg Cjbx+JZ7mNUPAx64Q4N4AZXOhxY3wc0//G69dB0NzFUtrJEwNsqVPnQdPlzugEDT6NWt WI91nh+1FQWKV+YqwCKDVyTo4Nj4hd0WQSgE3Dftteih9kQa9xteLW8vE4vm3+ZFjGuH i3Awo1V7IJKY/o0/MUb8I3eMWUfAco7gjAw/nlZNFILI+vA1ATsHOWQvX0ss8HQAvoX/ hi4w== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=gezaDYff8+qaQ62UuWpeRMj/mrtbwGg4oOS/lTZbUBM=; fh=1YNwm5KBWetjB3qGkhgLqh/dZnCTsWuqRk83JW6hjgE=; b=Zvlcn4EfgPcmNMFm5riRZeBrfLD9HcVklPbffcd9Y0LvQCPU69UNkiRF3ZaeeTOrY4 Fb5mWkJWoPmxVG34/qjIlSVlU/wXFzCo3l1L9FmgW/CWpveOdYaCy7YNn1tPvktn/et5 yCQjRHxzetqGuiLH11W1SHuFCQJ5wJUxALvhLokHWQnMVx2Jy6i0lsvQJQd0sXkzW2pM q2QT+pq/MC9vW9pdH1xvNuETexFT0VL5k8Xnoe3oW50AQY8QGR97mIKg2VyB55yhJ5ku VRgMI3HyrNmpJmaAuHMqRwCXDPpuaE9xVAJtTke5B/gUu3Hfxqg1jXDO7z0MI1NgzeDA 9M/A== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YCPkoHPC; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-32813-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-32813-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [147.75.48.161]) by mx.google.com with ESMTPS id s9-20020a056a0008c900b006db7051845esi10491947pfu.42.2024.01.22.03.37.19 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 22 Jan 2024 03:37:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-32813-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) client-ip=147.75.48.161; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YCPkoHPC; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-32813-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.48.161 as permitted sender) smtp.mailfrom="linux-kernel+bounces-32813-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 13F02B2A3FE for ; Mon, 22 Jan 2024 11:05:38 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 35F233A8CC; Mon, 22 Jan 2024 11:04:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="YCPkoHPC" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 570433B7A9; Mon, 22 Jan 2024 11:04:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705921457; cv=none; b=QgfVRCc39wXjg1wlqIxejmgSiDa9IqlMjfqRFi/o3QaOQ/IVJKwg4zYDfNwaMO4V0+Fo8XeQk/ttknHwHQwCKLBnfyfI6IWES5IrbRopcgDEuOpalHM3ml/eFCHL1z7UHOfCwotBmfenNtMP7Deyttm2VzNqS67FooHAZHM5t/k= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705921457; c=relaxed/simple; bh=fU5lhbNNKhE9QJg5290En/idxniF3ADSYx6DwAHG79Q=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=JGaaVNdebrQeqpD8csGqtoY9cruDrhJNh3fW4YGy9g14530z4bm4z8dOvZY8G33+UiUsPUthkeZdHDJaWqnWfB6x+G4s56haTd6Pis3a/XO0EUDMBcZAJZzBF8DHiJ2SPwV59ptDbiVhhiqFKeyEu9rWMqAcSC0NBktF56esyXw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=YCPkoHPC; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id A95FCC433A6; Mon, 22 Jan 2024 11:04:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705921456; bh=fU5lhbNNKhE9QJg5290En/idxniF3ADSYx6DwAHG79Q=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YCPkoHPCEfIl1uz3UcOsZNK/iPt5mydVwk9d2Mz4olC+g5y2brLcFrM+8/w/O+pMD rEcrtjTEGRgfObrgVb9x89Vb2G01ugICiPgdjPWK1HuvWkG5Aqwbj/ULPJLvyKbXrn +gt70nFuKnjeCbMRYIB/TL/5fP79fHWSAM4q1Klz/I41r70TUs+24CHfn6EP5QBurg g2D1b45lfk5jJK2FaJ3r4YnrwN8bD9UrNYGsKLuxPSk7+io/ZrWC9L9EgA04x1G1SH MawWVieG0qdpgq/wfqbBc+aBMpsmboBm+yb1hiIcMPzCRMuGBnRtSNC5A9pzsoSA3W Su6vXq0LQ42tw== From: "Jiri Slaby (SUSE)" To: gregkh@linuxfoundation.org Cc: linux-serial@vger.kernel.org, linux-kernel@vger.kernel.org, "Jiri Slaby (SUSE)" Subject: [PATCH v2 05/47] tty: vt: pass proper pointers from tioclinux() Date: Mon, 22 Jan 2024 12:03:19 +0100 Message-ID: <20240122110401.7289-6-jirislaby@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240122110401.7289-1-jirislaby@kernel.org> References: <20240122110401.7289-1-jirislaby@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Pass proper types and proper pointers (the data with an offset) to the TIOCL_* handlers. So that they need not to cast or add anything to the passed pointer. This makes obvious what is passed/consumed. Signed-off-by: Jiri Slaby (SUSE) --- drivers/tty/vt/selection.c | 8 ++++---- drivers/tty/vt/vt.c | 19 ++++++++++--------- include/linux/selection.h | 2 +- 3 files changed, 15 insertions(+), 14 deletions(-) diff --git a/drivers/tty/vt/selection.c b/drivers/tty/vt/selection.c index 8967c3a0d916..e172ede235a0 100644 --- a/drivers/tty/vt/selection.c +++ b/drivers/tty/vt/selection.c @@ -7,7 +7,7 @@ * 'int set_selection_kernel(struct tiocl_selection *, struct tty_struct *)' * 'void clear_selection(void)' * 'int paste_selection(struct tty_struct *)' - * 'int sel_loadlut(char __user *)' + * 'int sel_loadlut(u32 __user *)' * * Now that /dev/vcs exists, most of this can disappear again. */ @@ -111,15 +111,15 @@ static inline int inword(const u32 c) /** * sel_loadlut() - load the LUT table - * @p: user table + * @lut: user table * * Load the LUT table from user space. The caller must hold the console * lock. Make a temporary copy so a partial update doesn't make a mess. */ -int sel_loadlut(char __user *p) +int sel_loadlut(u32 __user *lut) { u32 tmplut[ARRAY_SIZE(inwordLut)]; - if (copy_from_user(tmplut, (u32 __user *)(p+4), sizeof(inwordLut))) + if (copy_from_user(tmplut, lut, sizeof(inwordLut))) return -EFAULT; memcpy(inwordLut, tmplut, sizeof(inwordLut)); return 0; diff --git a/drivers/tty/vt/vt.c b/drivers/tty/vt/vt.c index e131edea00da..079dbff562fd 100644 --- a/drivers/tty/vt/vt.c +++ b/drivers/tty/vt/vt.c @@ -145,7 +145,7 @@ static void gotoxy(struct vc_data *vc, int new_x, int new_y); static void save_cur(struct vc_data *vc); static void reset_terminal(struct vc_data *vc, int do_clear); static void con_flush_chars(struct tty_struct *tty); -static int set_vesa_blanking(char __user *p); +static int set_vesa_blanking(u8 __user *mode); static void set_cursor(struct vc_data *vc); static void hide_cursor(struct vc_data *vc); static void console_callback(struct work_struct *ignored); @@ -3134,6 +3134,8 @@ int tioclinux(struct tty_struct *tty, unsigned long arg) { char type, data; char __user *p = (char __user *)arg; + void __user *param_aligned32 = (u32 __user *)arg + 1; + void __user *param = (void __user *)arg + 1; int lines; int ret; @@ -3147,8 +3149,7 @@ int tioclinux(struct tty_struct *tty, unsigned long arg) case TIOCL_SETSEL: if (!capable(CAP_SYS_ADMIN)) return -EPERM; - return set_selection_user((struct tiocl_selection - __user *)(p+1), tty); + return set_selection_user(param, tty); case TIOCL_PASTESEL: if (!capable(CAP_SYS_ADMIN)) return -EPERM; @@ -3162,7 +3163,7 @@ int tioclinux(struct tty_struct *tty, unsigned long arg) if (!capable(CAP_SYS_ADMIN)) return -EPERM; console_lock(); - ret = sel_loadlut(p); + ret = sel_loadlut(param_aligned32); console_unlock(); break; case TIOCL_GETSHIFTSTATE: @@ -3181,7 +3182,7 @@ int tioclinux(struct tty_struct *tty, unsigned long arg) return put_user(data, p); case TIOCL_SETVESABLANK: console_lock(); - ret = set_vesa_blanking(p); + ret = set_vesa_blanking(param); console_unlock(); break; case TIOCL_GETKMSGREDIRECT: @@ -3204,7 +3205,7 @@ int tioclinux(struct tty_struct *tty, unsigned long arg) */ return fg_console; case TIOCL_SCROLLCONSOLE: - if (get_user(lines, (s32 __user *)(p+4))) + if (get_user(lines, (s32 __user *)param_aligned32)) return -EFAULT; /* @@ -4262,11 +4263,11 @@ postcore_initcall(vtconsole_class_init); * Screen blanking */ -static int set_vesa_blanking(char __user *p) +static int set_vesa_blanking(u8 __user *mode_user) { - unsigned int mode; + u8 mode; - if (get_user(mode, p + 1)) + if (get_user(mode, mode_user)) return -EFAULT; vesa_blank_mode = (mode < 4) ? mode : 0; diff --git a/include/linux/selection.h b/include/linux/selection.h index 170ef28ff26b..b7cd23e56a2b 100644 --- a/include/linux/selection.h +++ b/include/linux/selection.h @@ -20,7 +20,7 @@ extern int set_selection_user(const struct tiocl_selection __user *sel, extern int set_selection_kernel(struct tiocl_selection *v, struct tty_struct *tty); extern int paste_selection(struct tty_struct *tty); -extern int sel_loadlut(char __user *p); +extern int sel_loadlut(u32 __user *lut); extern int mouse_reporting(void); extern void mouse_report(struct tty_struct * tty, int butt, int mrx, int mry); -- 2.43.0