From: Christoph Hellwig <h...@lst.de> Patch series "clean up address limit helpers", v2.
In preparation for eventually phasing out direct use of set_fs(), this series removes the segment_eq() arch helper that is only used to implement or duplicate the uaccess_kernel() API, and then adds descriptive helpers to force the kernel address limit. This patch (of 6): Use the uaccess_kernel helper instead of duplicating it. Link: http://lkml.kernel.org/r/20200714105505.935079-1-...@lst.de Link: http://lkml.kernel.org/r/20200710135706.537715-1-...@lst.de Link: http://lkml.kernel.org/r/20200710135706.537715-2-...@lst.de Signed-off-by: Christoph Hellwig <h...@lst.de> Acked-by: Linus Torvalds <torva...@linux-foundation.org> Cc: Nick Hu <nic...@andestech.com> Cc: Greentime Hu <green...@gmail.com> Cc: Vincent Chen <deanbo...@gmail.com> Cc: Paul Walmsley <paul.walms...@sifive.com> Cc: Palmer Dabbelt <pal...@dabbelt.com> Cc: Geert Uytterhoeven <ge...@linux-m68k.org> Signed-off-by: Andrew Morton <a...@linux-foundation.org> Signed-off-by: Stephen Rothwell <s...@canb.auug.org.au> --- include/linux/syscalls.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h index b951a87da987..e933a43d4a69 100644 --- a/include/linux/syscalls.h +++ b/include/linux/syscalls.h @@ -263,7 +263,7 @@ static inline void addr_limit_user_check(void) return; #endif - if (CHECK_DATA_CORRUPTION(!segment_eq(get_fs(), USER_DS), + if (CHECK_DATA_CORRUPTION(uaccess_kernel(), "Invalid address limit on user-mode return")) force_sig(SIGKILL); -- 2.25.0