The other __copy_from_user() calls have access_ok() checks so they are
fine, but these two don't have the check.

Signed-off-by: Dan Carpenter <dan.carpen...@oracle.com>

diff --git a/drivers/block/skd_main.c b/drivers/block/skd_main.c
index 6fc0296..dfd05a9 100644
--- a/drivers/block/skd_main.c
+++ b/drivers/block/skd_main.c
@@ -1736,7 +1736,7 @@ static int skd_sg_io_get_and_check_args(struct skd_device 
*skdev,
                return -EINVAL;
        }
 
-       if (__copy_from_user(sksgio->cdb, sgp->cmdp, sgp->cmd_len)) {
+       if (copy_from_user(sksgio->cdb, sgp->cmdp, sgp->cmd_len)) {
                DPRINTK(skdev, "copy_from_user cmdp failed %p\n", sgp->cmdp);
                return -EFAULT;
        }
@@ -1767,7 +1767,7 @@ static int skd_sg_io_get_and_check_args(struct skd_device 
*skdev,
                sksgio->iov = iov;
                sksgio->iovcnt = sgp->iovec_count;
 
-               if (__copy_from_user(iov, sgp->dxferp, nbytes)) {
+               if (copy_from_user(iov, sgp->dxferp, nbytes)) {
                        DPRINTK(skdev, "copy_from_user iovec failed %p\n",
                                sgp->dxferp);
                        return -EFAULT;
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to