diff options
author | Al Viro <viro@zeniv.linux.org.uk> | 2012-04-22 16:34:27 -0400 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2012-05-21 16:29:02 -0400 |
commit | ffc51be82b17e1c515fdb2dd5b92605798216b30 (patch) | |
tree | efaedf7c6979ff33e83eda9870c10f287d6be6d6 /arch/x86/um | |
parent | 0088b6ec8fa4773dd56b861bfc1630f4c3c069db (diff) |
um: missing checks of __put_user()/__get_user() return values
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'arch/x86/um')
-rw-r--r-- | arch/x86/um/signal.c | 4 | ||||
-rw-r--r-- | arch/x86/um/syscalls_32.c | 12 |
2 files changed, 8 insertions, 8 deletions
diff --git a/arch/x86/um/signal.c b/arch/x86/um/signal.c index 35b283d3df0c..bb0fb03b9f85 100644 --- a/arch/x86/um/signal.c +++ b/arch/x86/um/signal.c | |||
@@ -544,8 +544,8 @@ int setup_signal_stack_si(unsigned long stack_top, int sig, | |||
544 | set->sig[0]); | 544 | set->sig[0]); |
545 | err |= __put_user(&frame->fpstate, &frame->uc.uc_mcontext.fpstate); | 545 | err |= __put_user(&frame->fpstate, &frame->uc.uc_mcontext.fpstate); |
546 | if (sizeof(*set) == 16) { | 546 | if (sizeof(*set) == 16) { |
547 | __put_user(set->sig[0], &frame->uc.uc_sigmask.sig[0]); | 547 | err |= __put_user(set->sig[0], &frame->uc.uc_sigmask.sig[0]); |
548 | __put_user(set->sig[1], &frame->uc.uc_sigmask.sig[1]); | 548 | err |= __put_user(set->sig[1], &frame->uc.uc_sigmask.sig[1]); |
549 | } | 549 | } |
550 | else | 550 | else |
551 | err |= __copy_to_user(&frame->uc.uc_sigmask, set, | 551 | err |= __copy_to_user(&frame->uc.uc_sigmask, set, |
diff --git a/arch/x86/um/syscalls_32.c b/arch/x86/um/syscalls_32.c index 70ca357393b8..b853e8600b9d 100644 --- a/arch/x86/um/syscalls_32.c +++ b/arch/x86/um/syscalls_32.c | |||
@@ -44,10 +44,10 @@ long sys_sigaction(int sig, const struct old_sigaction __user *act, | |||
44 | old_sigset_t mask; | 44 | old_sigset_t mask; |
45 | if (!access_ok(VERIFY_READ, act, sizeof(*act)) || | 45 | if (!access_ok(VERIFY_READ, act, sizeof(*act)) || |
46 | __get_user(new_ka.sa.sa_handler, &act->sa_handler) || | 46 | __get_user(new_ka.sa.sa_handler, &act->sa_handler) || |
47 | __get_user(new_ka.sa.sa_restorer, &act->sa_restorer)) | 47 | __get_user(new_ka.sa.sa_restorer, &act->sa_restorer) || |
48 | __get_user(new_ka.sa.sa_flags, &act->sa_flags) || | ||
49 | __get_user(mask, &act->sa_mask)) | ||
48 | return -EFAULT; | 50 | return -EFAULT; |
49 | __get_user(new_ka.sa.sa_flags, &act->sa_flags); | ||
50 | __get_user(mask, &act->sa_mask); | ||
51 | siginitset(&new_ka.sa.sa_mask, mask); | 51 | siginitset(&new_ka.sa.sa_mask, mask); |
52 | } | 52 | } |
53 | 53 | ||
@@ -56,10 +56,10 @@ long sys_sigaction(int sig, const struct old_sigaction __user *act, | |||
56 | if (!ret && oact) { | 56 | if (!ret && oact) { |
57 | if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) || | 57 | if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) || |
58 | __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || | 58 | __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || |
59 | __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) | 59 | __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer) || |
60 | __put_user(old_ka.sa.sa_flags, &oact->sa_flags) || | ||
61 | __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask)) | ||
60 | return -EFAULT; | 62 | return -EFAULT; |
61 | __put_user(old_ka.sa.sa_flags, &oact->sa_flags); | ||
62 | __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask); | ||
63 | } | 63 | } |
64 | 64 | ||
65 | return ret; | 65 | return ret; |