Skip to content

Commit 1dfe3a5

Browse files
mrutland-armKAGA-KOKO
authored andcommitted
entry: Remove empty addr_limit_user_check()
Back when set_fs() was a generic API for altering the address limit, addr_limit_user_check() was a safety measure to prevent userspace being able to issue syscalls with an unbound limit. With the the removal of set_fs() as a generic API, the last user of addr_limit_user_check() was removed in commit: b5a5a01 ("arm64: uaccess: remove addr_limit_user_check()") ... as since that commit, no architecture defines TIF_FSCHECK, and hence addr_limit_user_check() always expands to nothing. Remove addr_limit_user_check(), updating the comment in exit_to_user_mode_prepare() to no longer refer to it. At the same time, the comment is reworded to be a little more generic so as to cover kmap_assert_nomap() in addition to lockdep_sys_exit(). No functional change. Signed-off-by: Mark Rutland <mark.rutland@arm.com> Signed-off-by: Thomas Gleixner <tglx@linutronix.de> Link: https://lore.kernel.org/r/20230821163526.2319443-1-mark.rutland@arm.com
1 parent 6eaae19 commit 1dfe3a5

File tree

2 files changed

+1
-18
lines changed

2 files changed

+1
-18
lines changed

include/linux/syscalls.h

Lines changed: 0 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -283,22 +283,6 @@ static inline int is_syscall_trace_event(struct trace_event_call *tp_event)
283283
#define SYSCALL32_DEFINE6 SYSCALL_DEFINE6
284284
#endif
285285

286-
/*
287-
* Called before coming back to user-mode. Returning to user-mode with an
288-
* address limit different than USER_DS can allow to overwrite kernel memory.
289-
*/
290-
static inline void addr_limit_user_check(void)
291-
{
292-
#ifdef TIF_FSCHECK
293-
if (!test_thread_flag(TIF_FSCHECK))
294-
return;
295-
#endif
296-
297-
#ifdef TIF_FSCHECK
298-
clear_thread_flag(TIF_FSCHECK);
299-
#endif
300-
}
301-
302286
/*
303287
* These syscall function prototypes are kept in the same order as
304288
* include/uapi/asm-generic/unistd.h. Architecture specific entries go below,

kernel/entry/common.c

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -205,8 +205,7 @@ static void exit_to_user_mode_prepare(struct pt_regs *regs)
205205

206206
arch_exit_to_user_mode_prepare(regs, ti_work);
207207

208-
/* Ensure that the address limit is intact and no locks are held */
209-
addr_limit_user_check();
208+
/* Ensure that kernel state is sane for a return to userspace */
210209
kmap_assert_nomap();
211210
lockdep_assert_irqs_disabled();
212211
lockdep_sys_exit();

0 commit comments

Comments
 (0)