lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 21 May 2020 01:37:16 +0100 From: Al Viro <viro@...IV.linux.org.uk> To: netdev@...r.kernel.org Cc: davem@...emloft.net, viro@...iv.linux.org.uk, linux-kernel@...r.kernel.org Subject: [PATCH net-next 14/19] batadv_socket_read(): get rid of pointless access_ok() From: Al Viro <viro@...iv.linux.org.uk> address is passed only to copy_to_user() Signed-off-by: Al Viro <viro@...iv.linux.org.uk> --- net/batman-adv/icmp_socket.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/net/batman-adv/icmp_socket.c b/net/batman-adv/icmp_socket.c index ccb535c77e5d..8bdabc03b0b2 100644 --- a/net/batman-adv/icmp_socket.c +++ b/net/batman-adv/icmp_socket.c @@ -135,9 +135,6 @@ static ssize_t batadv_socket_read(struct file *file, char __user *buf, if (!buf || count < sizeof(struct batadv_icmp_packet)) return -EINVAL; - if (!access_ok(buf, count)) - return -EFAULT; - error = wait_event_interruptible(socket_client->queue_wait, socket_client->queue_len); -- 2.11.0
Powered by blists - more mailing lists