fix minor infoleak in get_user_ex()
authorAl Viro <viro@ZenIV.linux.org.uk>
Thu, 15 Sep 2016 01:35:29 +0000 (02:35 +0100)
committerSasha Levin <alexander.levin@verizon.com>
Thu, 6 Oct 2016 02:40:20 +0000 (22:40 -0400)
commite58d9a8251584d92976d4cc7f46ab30963c9e99a
tree580d690c92b26c0b0d82d796e97b587e6e9717ee
parent0772cbae23cefb135c5214aed8631b344f791a43
fix minor infoleak in get_user_ex()

[ Upstream commit 1c109fabbd51863475cd12ac206bdd249aee35af ]

get_user_ex(x, ptr) should zero x on failure.  It's not a lot of a leak
(at most we are leaking uninitialized 64bit value off the kernel stack,
and in a fairly constrained situation, at that), but the fix is trivial,
so...

Cc: stable@vger.kernel.org
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
[ This sat in different branch from the uaccess fixes since mid-August ]
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Sasha Levin <alexander.levin@verizon.com>
arch/x86/include/asm/uaccess.h