aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAl Viro <viro@zeniv.linux.org.uk>2012-04-22 16:34:27 -0400
committerAl Viro <viro@zeniv.linux.org.uk>2012-05-21 16:29:02 -0400
commitffc51be82b17e1c515fdb2dd5b92605798216b30 (patch)
treeefaedf7c6979ff33e83eda9870c10f287d6be6d6
parent0088b6ec8fa4773dd56b861bfc1630f4c3c069db (diff)
um: missing checks of __put_user()/__get_user() return values
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
-rw-r--r--arch/x86/um/signal.c4
-rw-r--r--arch/x86/um/syscalls_32.c12
2 files changed, 8 insertions, 8 deletions
diff --git a/arch/x86/um/signal.c b/arch/x86/um/signal.c
index 35b283d3df0..bb0fb03b9f8 100644
--- a/arch/x86/um/signal.c
+++ b/arch/x86/um/signal.c
@@ -544,8 +544,8 @@ int setup_signal_stack_si(unsigned long stack_top, int sig,
544 set->sig[0]); 544 set->sig[0]);
545 err |= __put_user(&frame->fpstate, &frame->uc.uc_mcontext.fpstate); 545 err |= __put_user(&frame->fpstate, &frame->uc.uc_mcontext.fpstate);
546 if (sizeof(*set) == 16) { 546 if (sizeof(*set) == 16) {
547 __put_user(set->sig[0], &frame->uc.uc_sigmask.sig[0]); 547 err |= __put_user(set->sig[0], &frame->uc.uc_sigmask.sig[0]);
548 __put_user(set->sig[1], &frame->uc.uc_sigmask.sig[1]); 548 err |= __put_user(set->sig[1], &frame->uc.uc_sigmask.sig[1]);
549 } 549 }
550 else 550 else
551 err |= __copy_to_user(&frame->uc.uc_sigmask, set, 551 err |= __copy_to_user(&frame->uc.uc_sigmask, set,
diff --git a/arch/x86/um/syscalls_32.c b/arch/x86/um/syscalls_32.c
index 70ca357393b..b853e8600b9 100644
--- a/arch/x86/um/syscalls_32.c
+++ b/arch/x86/um/syscalls_32.c
@@ -44,10 +44,10 @@ long sys_sigaction(int sig, const struct old_sigaction __user *act,
44 old_sigset_t mask; 44 old_sigset_t mask;
45 if (!access_ok(VERIFY_READ, act, sizeof(*act)) || 45 if (!access_ok(VERIFY_READ, act, sizeof(*act)) ||
46 __get_user(new_ka.sa.sa_handler, &act->sa_handler) || 46 __get_user(new_ka.sa.sa_handler, &act->sa_handler) ||
47 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer)) 47 __get_user(new_ka.sa.sa_restorer, &act->sa_restorer) ||
48 __get_user(new_ka.sa.sa_flags, &act->sa_flags) ||
49 __get_user(mask, &act->sa_mask))
48 return -EFAULT; 50 return -EFAULT;
49 __get_user(new_ka.sa.sa_flags, &act->sa_flags);
50 __get_user(mask, &act->sa_mask);
51 siginitset(&new_ka.sa.sa_mask, mask); 51 siginitset(&new_ka.sa.sa_mask, mask);
52 } 52 }
53 53
@@ -56,10 +56,10 @@ long sys_sigaction(int sig, const struct old_sigaction __user *act,
56 if (!ret && oact) { 56 if (!ret && oact) {
57 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) || 57 if (!access_ok(VERIFY_WRITE, oact, sizeof(*oact)) ||
58 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) || 58 __put_user(old_ka.sa.sa_handler, &oact->sa_handler) ||
59 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer)) 59 __put_user(old_ka.sa.sa_restorer, &oact->sa_restorer) ||
60 __put_user(old_ka.sa.sa_flags, &oact->sa_flags) ||
61 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask))
60 return -EFAULT; 62 return -EFAULT;
61 __put_user(old_ka.sa.sa_flags, &oact->sa_flags);
62 __put_user(old_ka.sa.sa_mask.sig[0], &oact->sa_mask);
63 } 63 }
64 64
65 return ret; 65 return ret;