From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0B535C433F5 for ; Mon, 7 Feb 2022 12:25:26 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 8776D6B0075; Mon, 7 Feb 2022 07:25:26 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 827676B0078; Mon, 7 Feb 2022 07:25:26 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 6EFB56B007B; Mon, 7 Feb 2022 07:25:26 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0074.hostedemail.com [216.40.44.74]) by kanga.kvack.org (Postfix) with ESMTP id 625716B0075 for ; Mon, 7 Feb 2022 07:25:26 -0500 (EST) Received: from smtpin05.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 1F3FB96741 for ; Mon, 7 Feb 2022 12:25:26 +0000 (UTC) X-FDA: 79115904252.05.2904879 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by imf07.hostedemail.com (Postfix) with ESMTP id 3C1FE4000B for ; Mon, 7 Feb 2022 12:25:24 +0000 (UTC) Received: from canpemm500002.china.huawei.com (unknown [172.30.72.53]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4Jslgm5HKqzbjxB; Mon, 7 Feb 2022 20:24:20 +0800 (CST) Received: from [10.174.177.76] (10.174.177.76) by canpemm500002.china.huawei.com (7.192.104.244) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.21; Mon, 7 Feb 2022 20:25:20 +0800 Subject: Re: [PATCH] mm: Remove usercopy_warn() To: Christophe Leroy CC: , , Stephen Kitt , Kees Cook , Andrew Morton References: <5f26643fc70b05f8455b60b99c30c17d635fa640.1644231910.git.christophe.leroy@csgroup.eu> From: Miaohe Lin Message-ID: Date: Mon, 7 Feb 2022 20:25:19 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.6.0 MIME-Version: 1.0 In-Reply-To: <5f26643fc70b05f8455b60b99c30c17d635fa640.1644231910.git.christophe.leroy@csgroup.eu> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.177.76] X-ClientProxiedBy: dggems703-chm.china.huawei.com (10.3.19.180) To canpemm500002.china.huawei.com (7.192.104.244) X-CFilter-Loop: Reflected Authentication-Results: imf07.hostedemail.com; dkim=none; spf=pass (imf07.hostedemail.com: domain of linmiaohe@huawei.com designates 45.249.212.188 as permitted sender) smtp.mailfrom=linmiaohe@huawei.com; dmarc=pass (policy=quarantine) header.from=huawei.com X-Rspam-User: nil X-Rspamd-Queue-Id: 3C1FE4000B X-Stat-Signature: bh8neucac5gcmyqamh9zsi4jsjmigrg3 X-Rspamd-Server: rspam12 X-HE-Tag: 1644236724-500163 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On 2022/2/7 19:05, Christophe Leroy wrote: > Users of usercopy_warn() were removed by > commit 53944f171a89 ("mm: remove HARDENED_USERCOPY_FALLBACK") > > Remote it. s/Remote/Remove/ Except the above nit, this patch looks good to me. Thanks. Reviewed-by: Miaohe Lin > > Cc: Stephen Kitt > Cc: Kees Cook > Signed-off-by: Christophe Leroy > --- > include/linux/uaccess.h | 2 -- > mm/usercopy.c | 11 ----------- > 2 files changed, 13 deletions(-) > > diff --git a/include/linux/uaccess.h b/include/linux/uaccess.h > index ac0394087f7d..bca27b4e5eb2 100644 > --- a/include/linux/uaccess.h > +++ b/include/linux/uaccess.h > @@ -401,8 +401,6 @@ static inline void user_access_restore(unsigned long flags) { } > #endif > > #ifdef CONFIG_HARDENED_USERCOPY > -void usercopy_warn(const char *name, const char *detail, bool to_user, > - unsigned long offset, unsigned long len); > void __noreturn usercopy_abort(const char *name, const char *detail, > bool to_user, unsigned long offset, > unsigned long len); > diff --git a/mm/usercopy.c b/mm/usercopy.c > index d0d268135d96..e7b0cb49daa1 100644 > --- a/mm/usercopy.c > +++ b/mm/usercopy.c > @@ -70,17 +70,6 @@ static noinline int check_stack_object(const void *obj, unsigned long len) > * kmem_cache_create_usercopy() function to create the cache (and > * carefully audit the whitelist range). > */ > -void usercopy_warn(const char *name, const char *detail, bool to_user, > - unsigned long offset, unsigned long len) > -{ > - WARN_ONCE(1, "Bad or missing usercopy whitelist? Kernel memory %s attempt detected %s %s%s%s%s (offset %lu, size %lu)!\n", > - to_user ? "exposure" : "overwrite", > - to_user ? "from" : "to", > - name ? : "unknown?!", > - detail ? " '" : "", detail ? : "", detail ? "'" : "", > - offset, len); > -} > - > void __noreturn usercopy_abort(const char *name, const char *detail, > bool to_user, unsigned long offset, > unsigned long len) >