lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 18 Sep 2020 14:45:24 +0200 From: Christoph Hellwig <hch@....de> To: Alexander Viro <viro@...iv.linux.org.uk> Cc: Andrew Morton <akpm@...ux-foundation.org>, Jens Axboe <axboe@...nel.dk>, Arnd Bergmann <arnd@...db.de>, David Howells <dhowells@...hat.com>, linux-arm-kernel@...ts.infradead.org, x86@...nel.org, linux-kernel@...r.kernel.org, linux-mips@...r.kernel.org, linux-parisc@...r.kernel.org, linuxppc-dev@...ts.ozlabs.org, linux-s390@...r.kernel.org, sparclinux@...r.kernel.org, linux-block@...r.kernel.org, linux-scsi@...r.kernel.org, linux-fsdevel@...r.kernel.org, linux-aio@...ck.org, io-uring@...r.kernel.org, linux-arch@...r.kernel.org, linux-mm@...ck.org, netdev@...r.kernel.org, keyrings@...r.kernel.org, linux-security-module@...r.kernel.org Subject: let import_iovec deal with compat_iovecs as well Hi Al, this series changes import_iovec to transparently deal with comat iovec structures, and then cleanups up a lot of code dupliation. But to get there it first has to fix the pre-existing bug that io_uring compat contexts don't trigger the in_compat_syscall() check. This has so far been relatively harmless as very little code callable from io_uring used the check, and even that code that could be called usually wasn't. Diffstat arch/arm64/include/asm/unistd32.h | 10 arch/mips/kernel/syscalls/syscall_n32.tbl | 10 arch/mips/kernel/syscalls/syscall_o32.tbl | 10 arch/parisc/kernel/syscalls/syscall.tbl | 10 arch/powerpc/kernel/syscalls/syscall.tbl | 10 arch/s390/kernel/syscalls/syscall.tbl | 10 arch/sparc/include/asm/compat.h | 3 arch/sparc/kernel/syscalls/syscall.tbl | 10 arch/x86/entry/syscall_x32.c | 5 arch/x86/entry/syscalls/syscall_32.tbl | 10 arch/x86/entry/syscalls/syscall_64.tbl | 10 arch/x86/include/asm/compat.h | 2 block/scsi_ioctl.c | 12 drivers/scsi/sg.c | 9 fs/aio.c | 38 -- fs/io_uring.c | 21 - fs/read_write.c | 307 ++++----------------- fs/splice.c | 57 --- include/linux/compat.h | 29 - include/linux/fs.h | 7 include/linux/sched.h | 1 include/linux/uio.h | 7 include/uapi/asm-generic/unistd.h | 12 lib/iov_iter.c | 30 -- mm/process_vm_access.c | 69 ---- net/compat.c | 4 security/keys/compat.c | 37 -- security/keys/internal.h | 5 security/keys/keyctl.c | 2 tools/include/uapi/asm-generic/unistd.h | 12 tools/perf/arch/powerpc/entry/syscalls/syscall.tbl | 10 tools/perf/arch/s390/entry/syscalls/syscall.tbl | 10 tools/perf/arch/x86/entry/syscalls/syscall_64.tbl | 10 33 files changed, 207 insertions(+), 582 deletions(-)
Powered by blists - more mailing lists