On Thu, 21 May 2020 17:22:48 +0200 Christoph Hellwig <h...@lst.de> wrote:

> Currently architectures have to override every routine that probes
> kernel memory, which includes a pure read and strcpy, both in strict
> and not strict variants.  Just provide a single arch hooks instead to
> make sure all architectures cover all the cases.

Fix a buildo.

--- a/arch/x86/mm/maccess.c~maccess-unify-the-probe-kernel-arch-hooks-fix
+++ a/arch/x86/mm/maccess.c
@@ -29,6 +29,6 @@ bool probe_kernel_read_allowed(const voi
 {
        if (!strict)
                return true;
-       return (unsigned long)vaddr >= TASK_SIZE_MAX;
+       return (unsigned long)unsafe_src >= TASK_SIZE_MAX;
 }
 #endif
_

Reply via email to