net/compat: Fix minor information leak in siocdevprivate_ioctl()
authorBen Hutchings <bhutchings@solarflare.com>
Mon, 18 Nov 2013 17:04:58 +0000 (17:04 +0000)
committerBen Hutchings <bhutchings@solarflare.com>
Mon, 18 Nov 2013 23:50:12 +0000 (23:50 +0000)
We don't need to check that ifr_data itself is a valid user pointer,
but we should check &ifr_data is.  Thankfully the copy of ifr_name is
checked, so this can only leak a few bytes from immediately above the
user address limit.

Signed-off-by: Ben Hutchings <bhutchings@solarflare.com>
net/socket.c

diff --cc net/socket.c
Simple merge