diff options
author | Al Viro <viro@zeniv.linux.org.uk> | 2020-02-15 17:28:09 +0100 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2020-02-15 23:26:26 +0100 |
commit | c8e3dd86600a1a7b165478cc626d69bf07967c15 (patch) | |
tree | 78340dbc13eea3b70f43b1a0c9f4df3bc238db1e /arch/x86/include/asm/uaccess.h | |
parent | Linux 5.6-rc1 (diff) | |
download | linux-c8e3dd86600a1a7b165478cc626d69bf07967c15.tar.xz linux-c8e3dd86600a1a7b165478cc626d69bf07967c15.zip |
x86 user stack frame reads: switch to explicit __get_user()
rather than relying upon the magic in raw_copy_from_user()
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'arch/x86/include/asm/uaccess.h')
-rw-r--r-- | arch/x86/include/asm/uaccess.h | 9 |
1 files changed, 0 insertions, 9 deletions
diff --git a/arch/x86/include/asm/uaccess.h b/arch/x86/include/asm/uaccess.h index 61d93f062a36..ab8eab43a8a2 100644 --- a/arch/x86/include/asm/uaccess.h +++ b/arch/x86/include/asm/uaccess.h @@ -695,15 +695,6 @@ extern struct movsl_mask { #endif /* - * We rely on the nested NMI work to allow atomic faults from the NMI path; the - * nested NMI paths are careful to preserve CR2. - * - * Caller must use pagefault_enable/disable, or run in interrupt context, - * and also do a uaccess_ok() check - */ -#define __copy_from_user_nmi __copy_from_user_inatomic - -/* * The "unsafe" user accesses aren't really "unsafe", but the naming * is a big fat warning: you have to not only do the access_ok() * checking before using them, but you have to surround them with the |