Message ID | 20200710135706.537715-2-hch@lst.de |
---|---|
State | In Next |
Commit | 9b637f02017c812fb9e2533124a729be526a8bfd |
Headers | show |
Series |
|
Related | show |
diff --git a/include/linux/syscalls.h b/include/linux/syscalls.h index b951a87da9877c..e933a43d4a69ac 100644 --- a/include/linux/syscalls.h +++ b/include/linux/syscalls.h @@ -263,7 +263,7 @@ static inline void addr_limit_user_check(void) return; #endif - if (CHECK_DATA_CORRUPTION(!segment_eq(get_fs(), USER_DS), + if (CHECK_DATA_CORRUPTION(uaccess_kernel(), "Invalid address limit on user-mode return")) force_sig(SIGKILL);
Use the uaccess_kernel helper instead of duplicating it. Signed-off-by: Christoph Hellwig <hch@lst.de> --- include/linux/syscalls.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)