diff options
author | Al Viro <viro@zeniv.linux.org.uk> | 2017-06-29 21:42:43 -0400 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2017-06-29 22:21:21 -0400 |
commit | b0377fedb6528087ed319b0d054d6ed82240372c (patch) | |
tree | ec1836456be61ee80f6cd416d9d98fcdbe548cd5 /include/linux/uaccess.h | |
parent | 9c5f6908de03a4f52ba7364b11fcd6116225480c (diff) | |
download | linux-stable-b0377fedb6528087ed319b0d054d6ed82240372c.tar.gz linux-stable-b0377fedb6528087ed319b0d054d6ed82240372c.tar.bz2 linux-stable-b0377fedb6528087ed319b0d054d6ed82240372c.zip |
copy_{to,from}_user(): consolidate object size checks
... and move them into thread_info.h, next to check_object_size()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'include/linux/uaccess.h')
-rw-r--r-- | include/linux/uaccess.h | 28 |
1 files changed, 2 insertions, 26 deletions
diff --git a/include/linux/uaccess.h b/include/linux/uaccess.h index e57328896a16..80b587085e79 100644 --- a/include/linux/uaccess.h +++ b/include/linux/uaccess.h @@ -139,43 +139,19 @@ extern unsigned long _copy_to_user(void __user *, const void *, unsigned long); #endif -extern void __compiletime_error("usercopy buffer size is too small") -__bad_copy_user(void); - -static inline void copy_user_overflow(int size, unsigned long count) -{ - WARN(1, "Buffer overflow detected (%d < %lu)!\n", size, count); -} - static __always_inline unsigned long __must_check copy_from_user(void *to, const void __user *from, unsigned long n) { - int sz = __compiletime_object_size(to); - - if (likely(sz < 0 || sz >= n)) { - check_object_size(to, n, false); + if (likely(check_copy_size(to, n, false))) n = _copy_from_user(to, from, n); - } else if (!__builtin_constant_p(n)) - copy_user_overflow(sz, n); - else - __bad_copy_user(); - return n; } static __always_inline unsigned long __must_check copy_to_user(void __user *to, const void *from, unsigned long n) { - int sz = __compiletime_object_size(from); - - if (likely(sz < 0 || sz >= n)) { - check_object_size(from, n, true); + if (likely(check_copy_size(from, n, true))) n = _copy_to_user(to, from, n); - } else if (!__builtin_constant_p(n)) - copy_user_overflow(sz, n); - else - __bad_copy_user(); - return n; } #ifdef CONFIG_COMPAT |