Files
linux/arch/csky/include/asm
Arnd Bergmann e65d28d4e9 uaccess: fix integer overflow on access_ok()
commit 222ca305c9 upstream.

Three architectures check the end of a user access against the
address limit without taking a possible overflow into account.
Passing a negative length or another overflow in here returns
success when it should not.

Use the most common correct implementation here, which optimizes
for a constant 'size' argument, and turns the common case into a
single comparison.

Cc: stable@vger.kernel.org
Fixes: da55128194 ("csky: User access")
Fixes: f663b60f52 ("microblaze: Fix uaccess_ok macro")
Fixes: 7567746e1c ("Hexagon: Add user access functions")
Reported-by: David Laight <David.Laight@aculab.com>
Reviewed-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2022-03-28 09:58:45 +02:00
..
2021-02-27 22:04:14 +08:00
2021-04-20 09:58:29 +08:00
2021-04-20 09:58:29 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-01-12 09:52:40 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2020-07-31 01:55:46 +00:00
2018-10-26 00:54:22 +08:00
2020-04-03 11:14:17 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2020-02-21 15:43:25 +08:00
2021-02-27 22:04:14 +08:00
2021-07-01 11:06:03 -07:00
2020-04-03 11:14:17 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2018-10-26 00:54:26 +08:00
2021-02-27 22:04:14 +08:00
2018-12-31 23:03:53 +08:00
2021-01-12 09:52:40 +08:00
2021-01-12 09:52:40 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2021-02-27 22:04:14 +08:00
2020-04-03 11:37:51 +08:00
2021-04-20 09:58:29 +08:00