Le 27/03/2021 à 03:11, Zach Reizner a écrit :
> The kernel allows a NULL msg in recvfrom so that he size of the next
> message may be queried before allocating a correctly sized buffer. This
> change allows the syscall translator to pass along the NULL msg pointer
> instead of returning early with EFAULT.
> 
> Signed-off-by: Zach Reizner <za...@google.com>
> ---
> v2:
>  - return -TARGET_EFAULT on non-null invalid msg pointer
> 
>  linux-user/syscall.c | 11 ++++++++---
>  1 file changed, 8 insertions(+), 3 deletions(-)
> 
> diff --git a/linux-user/syscall.c b/linux-user/syscall.c
> index 1e508576c7..294779c86f 100644
> --- a/linux-user/syscall.c
> +++ b/linux-user/syscall.c
> @@ -3679,9 +3679,14 @@ static abi_long do_recvfrom(int fd, abi_ulong
> msg, size_t len, int flags,
>      void *host_msg;
>      abi_long ret;
> 
> -    host_msg = lock_user(VERIFY_WRITE, msg, len, 0);
> -    if (!host_msg)
> -        return -TARGET_EFAULT;
> +    if (!msg) {
> +        host_msg = NULL;
> +    } else {
> +        host_msg = lock_user(VERIFY_WRITE, msg, len, 0);
> +        if (!host_msg) {
> +            return -TARGET_EFAULT;
> +        }
> +    }
>      if (target_addr) {
>          if (get_user_u32(addrlen, target_addrlen)) {
>              ret = -TARGET_EFAULT;
> 

Reviewed-by: Laurent Vivier <laur...@vivier.eu>

Reply via email to