From: Bastian Blank Date: Sun, 10 Feb 2008 14:47:57 +0000 (+0200) Subject: splice: fix user pointer access in get_iovec_page_array() X-Git-Tag: v2.6.24.2~1 X-Git-Url: https://git.karo-electronics.de/?a=commitdiff_plain;h=1617e66d11d6621824f642728d62f242272fd063;p=karo-tx-linux.git splice: fix user pointer access in get_iovec_page_array() patch 712a30e63c8066ed84385b12edbfb804f49cbc44 in mainline. Commit 8811930dc74a503415b35c4a79d14fb0b408a361 ("splice: missing user pointer access verification") added the proper access_ok() calls to copy_from_user_mmap_sem() which ensures we can copy the struct iovecs from userspace to the kernel. But we also must check whether we can access the actual memory region pointed to by the struct iovec to fix the access checks properly. Signed-off-by: Bastian Blank Acked-by: Oliver Pinter Cc: Jens Axboe Cc: Andrew Morton Signed-off-by: Pekka Enberg Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- diff --git a/fs/splice.c b/fs/splice.c index 36fdc614c3a0..e3134783806f 100644 --- a/fs/splice.c +++ b/fs/splice.c @@ -1239,7 +1239,7 @@ static int get_iovec_page_array(const struct iovec __user *iov, if (unlikely(!len)) break; error = -EFAULT; - if (unlikely(!base)) + if (!access_ok(VERIFY_READ, base, len)) break; /*