diff options
Diffstat (limited to 'arch/mips/kernel/signal.c')
-rw-r--r-- | arch/mips/kernel/signal.c | 12 |
1 files changed, 6 insertions, 6 deletions
diff --git a/arch/mips/kernel/signal.c b/arch/mips/kernel/signal.c index d3a23758592c..d75337974ee9 100644 --- a/arch/mips/kernel/signal.c +++ b/arch/mips/kernel/signal.c | |||
@@ -590,7 +590,7 @@ SYSCALL_DEFINE3(sigaction, int, sig, const struct sigaction __user *, act, | |||
590 | if (act) { | 590 | if (act) { |
591 | old_sigset_t mask; | 591 | old_sigset_t mask; |
592 | 592 | ||
593 | if (!access_ok(VERIFY_READ, act, sizeof(*act))) | 593 | if (!access_ok(act, sizeof(*act))) |
594 | return -EFAULT; | 594 | return -EFAULT; |
595 | err |= __get_user(new_ka.sa.sa_handler, &act->sa_handler); | 595 | err |= __get_user(new_ka.sa.sa_handler, &act->sa_handler); |
596 | err |= __get_user(new_ka.sa.sa_flags, &act->sa_flags); | 596 | err |= __get_user(new_ka.sa.sa_flags, &act->sa_flags); |
@@ -604,7 +604,7 @@ SYSCALL_DEFINE3(sigaction, int, sig, const struct sigaction __user *, act, | |||
604 | ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); | 604 | ret = do_sigaction(sig, act ? &new_ka : NULL, oact ? &old_ka : NULL); |
605 | 605 | ||
606 | if (!ret && oact) { | 606 | if (!ret && oact) { |
607 | if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact))) | 607 | if (!access_ok(oact, sizeof(*oact))) |
608 | return -EFAULT; | 608 | return -EFAULT; |
609 | err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); | 609 | err |= __put_user(old_ka.sa.sa_flags, &oact->sa_flags); |
610 | err |= __put_user(old_ka.sa.sa_handler, &oact->sa_handler); | 610 | err |= __put_user(old_ka.sa.sa_handler, &oact->sa_handler); |
@@ -630,7 +630,7 @@ asmlinkage void sys_sigreturn(void) | |||
630 | 630 | ||
631 | regs = current_pt_regs(); | 631 | regs = current_pt_regs(); |
632 | frame = (struct sigframe __user *)regs->regs[29]; | 632 | frame = (struct sigframe __user *)regs->regs[29]; |
633 | if (!access_ok(VERIFY_READ, frame, sizeof(*frame))) | 633 | if (!access_ok(frame, sizeof(*frame))) |
634 | goto badframe; | 634 | goto badframe; |
635 | if (__copy_from_user(&blocked, &frame->sf_mask, sizeof(blocked))) | 635 | if (__copy_from_user(&blocked, &frame->sf_mask, sizeof(blocked))) |
636 | goto badframe; | 636 | goto badframe; |
@@ -667,7 +667,7 @@ asmlinkage void sys_rt_sigreturn(void) | |||
667 | 667 | ||
668 | regs = current_pt_regs(); | 668 | regs = current_pt_regs(); |
669 | frame = (struct rt_sigframe __user *)regs->regs[29]; | 669 | frame = (struct rt_sigframe __user *)regs->regs[29]; |
670 | if (!access_ok(VERIFY_READ, frame, sizeof(*frame))) | 670 | if (!access_ok(frame, sizeof(*frame))) |
671 | goto badframe; | 671 | goto badframe; |
672 | if (__copy_from_user(&set, &frame->rs_uc.uc_sigmask, sizeof(set))) | 672 | if (__copy_from_user(&set, &frame->rs_uc.uc_sigmask, sizeof(set))) |
673 | goto badframe; | 673 | goto badframe; |
@@ -705,7 +705,7 @@ static int setup_frame(void *sig_return, struct ksignal *ksig, | |||
705 | int err = 0; | 705 | int err = 0; |
706 | 706 | ||
707 | frame = get_sigframe(ksig, regs, sizeof(*frame)); | 707 | frame = get_sigframe(ksig, regs, sizeof(*frame)); |
708 | if (!access_ok(VERIFY_WRITE, frame, sizeof (*frame))) | 708 | if (!access_ok(frame, sizeof (*frame))) |
709 | return -EFAULT; | 709 | return -EFAULT; |
710 | 710 | ||
711 | err |= setup_sigcontext(regs, &frame->sf_sc); | 711 | err |= setup_sigcontext(regs, &frame->sf_sc); |
@@ -744,7 +744,7 @@ static int setup_rt_frame(void *sig_return, struct ksignal *ksig, | |||
744 | int err = 0; | 744 | int err = 0; |
745 | 745 | ||
746 | frame = get_sigframe(ksig, regs, sizeof(*frame)); | 746 | frame = get_sigframe(ksig, regs, sizeof(*frame)); |
747 | if (!access_ok(VERIFY_WRITE, frame, sizeof (*frame))) | 747 | if (!access_ok(frame, sizeof (*frame))) |
748 | return -EFAULT; | 748 | return -EFAULT; |
749 | 749 | ||
750 | /* Create siginfo. */ | 750 | /* Create siginfo. */ |