The patch titled Subject: lib/test_user_copy.c: check legit kernel accesses has been removed from the -mm tree. Its filename was test_user_copy-check-legit-kernel-accesses.patch This patch was dropped because an updated version will be merged ------------------------------------------------------ From: James Hogan <james.hogan@xxxxxxxxxx> Subject: lib/test_user_copy.c: check legit kernel accesses These patches extend the test_user_copy test module to handle lots more cases of user accessors which architectures can override separately, and in particular those which are important for checking the MIPS Enhanced Virtual Addressing (EVA) implementations, which need to handle overlapping user and kernel address spaces, with special instructions for accessing user address space from kernel mode. - Checking that kernel pointers are accepted when user address limit is set to KERNEL_DS, as done by the kernel when it internally invokes system calls with kernel pointers. - Checking of the unchecked accessors (which don't call access_ok()). Some of the tests are special cased for EVA at the moment which has stricter hardware guarantees for bad user accesses than other configurations. - Checking of other sets of user accessors, including the inatomic user copies, copy_in_user, clear_user, the user string accessors, and the user checksum functions, all of which need special handling in arch code with EVA. Tested on MIPS with and without EVA, and on x86_64. This patch (of 7): Check that the use of the user accessors for accessing kernel memory succeed as expected after set_fs(get_ds()) is used to increases the address limit, as used by the kernel to directly invoke system call code with kernel pointers. The tests are basically the same as the tests normally expected to be treated as invalid, but without any user addresses (no reversed copies), and with the result inverted such that they should succeed instead. New tests: - legitimate all-kernel copy_from_user - legitimate all-kernel copy_to_user - legitimate kernel get_user - legitimate kernel put_user Signed-off-by: James Hogan <james.hogan@xxxxxxxxxx> Acked-by: Kees Cook <keescook@xxxxxxxxxxxx> Cc: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx> Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> --- lib/test_user_copy.c | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff -puN lib/test_user_copy.c~test_user_copy-check-legit-kernel-accesses lib/test_user_copy.c --- a/lib/test_user_copy.c~test_user_copy-check-legit-kernel-accesses +++ a/lib/test_user_copy.c @@ -41,6 +41,7 @@ static int __init test_user_copy_init(vo char *bad_usermem; unsigned long user_addr; unsigned long value = 0x5A; + mm_segment_t fs = get_fs(); kmem = kmalloc(PAGE_SIZE * 2, GFP_KERNEL); if (!kmem) @@ -86,6 +87,28 @@ static int __init test_user_copy_init(vo ret |= test(!put_user(value, (unsigned long __user *)kmem), "illegal put_user passed"); + /* + * Test access to kernel memory by adjusting address limit. + * This is used by the kernel to invoke system calls with kernel + * pointers. + */ + set_fs(get_ds()); + + /* Legitimate usage: none of these should fail. */ + ret |= test(copy_from_user(kmem, (char __user *)(kmem + PAGE_SIZE), + PAGE_SIZE), + "legitimate all-kernel copy_from_user failed"); + ret |= test(copy_to_user((char __user *)kmem, kmem + PAGE_SIZE, + PAGE_SIZE), + "legitimate all-kernel copy_to_user failed"); + ret |= test(get_user(value, (unsigned long __user *)kmem), + "legitimate kernel get_user failed"); + ret |= test(put_user(value, (unsigned long __user *)kmem), + "legitimate kernel put_user failed"); + + /* Restore previous address limit. */ + set_fs(fs); + vm_munmap(user_addr, PAGE_SIZE * 2); kfree(kmem); _ Patches currently in -mm which might be from james.hogan@xxxxxxxxxx are test_user_copy-check-unchecked-accessors.patch test_user_copy-check-__clear_user-clear_user.patch test_user_copy-check-__copy_in_user-copy_in_user.patch test_user_copy-check-__copy_tofrom_user_inatomic.patch test_user_copy-check-user-string-accessors.patch test_user_copy-check-user-checksum-functions.patch linux-next.patch -- To unsubscribe from this list: send the line "unsubscribe mm-commits" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html