aboutsummaryrefslogtreecommitdiff
path: root/lib/test_fortify/write_overflow-strlcpy-src.c
diff options
context:
space:
mode:
authorOliver Upton <[email protected]>2022-05-03 06:02:00 +0000
committerMarc Zyngier <[email protected]>2022-05-03 11:14:33 +0100
commit28eda7b5e82489b9dcffc630af68c207552b4f4d (patch)
treee2b478c1412aa41a0149a68f6602f5303b2aedee /lib/test_fortify/write_overflow-strlcpy-src.c
parent001bb819994cd1bd037b6aefdb233f1720ee2126 (diff)
KVM: arm64: Don't write to Rt unless sys_reg emulation succeeds
emulate_sys_reg() returns 1 unconditionally, even though a a system register access can fail. Furthermore, kvm_handle_sys_reg() writes to Rt for every register read, regardless of if it actually succeeded. Though this pattern is safe (as params.regval is initialized with the current value of Rt) it is a bit ugly. Indicate failure if the register access could not be emulated and only write to Rt on success. Signed-off-by: Oliver Upton <[email protected]> Signed-off-by: Marc Zyngier <[email protected]> Link: https://lore.kernel.org/r/[email protected]
Diffstat (limited to 'lib/test_fortify/write_overflow-strlcpy-src.c')
0 files changed, 0 insertions, 0 deletions