path: root/arch/parisc/lib/memcpy.c
diff options
authorChristoph Hellwig <>2020-06-08 21:34:50 -0700
committerLinus Torvalds <>2020-06-09 09:39:15 -0700
commit98a23609b10364a51a1bb3688f8dd1cd1aa94a9a (patch)
tree8cf32f92fccd8cd5264434d42fa68dcba4c2ab3c /arch/parisc/lib/memcpy.c
parent7676fbf21b5fa04341c8046c2cbcd1949293e7ec (diff)
maccess: always use strict semantics for probe_kernel_read
Except for historical confusion in the kprobes/uprobes and bpf tracers, which has been fixed now, there is no good reason to ever allow user memory accesses from probe_kernel_read. Switch probe_kernel_read to only read from kernel memory. [ update it for "mm, dump_page(): do not crash with invalid mapping pointer"] Signed-off-by: Christoph Hellwig <> Signed-off-by: Andrew Morton <> Cc: Alexei Starovoitov <> Cc: Daniel Borkmann <> Cc: "H. Peter Anvin" <> Cc: Ingo Molnar <> Cc: Masami Hiramatsu <> Cc: Thomas Gleixner <> Link: Signed-off-by: Linus Torvalds <>
Diffstat (limited to 'arch/parisc/lib/memcpy.c')
1 files changed, 1 insertions, 1 deletions
diff --git a/arch/parisc/lib/memcpy.c b/arch/parisc/lib/memcpy.c
index 5b75c35d1da0..94a9fe2702c2 100644
--- a/arch/parisc/lib/memcpy.c
+++ b/arch/parisc/lib/memcpy.c
@@ -57,7 +57,7 @@ void * memcpy(void * dst,const void *src, size_t count)
-bool probe_kernel_read_allowed(const void *unsafe_src, size_t size, bool strict)
+bool probe_kernel_read_allowed(const void *unsafe_src, size_t size)
if ((unsigned long)unsafe_src < PAGE_SIZE)
return false;