Re: [Coverity] Untrusted user data in kernel

From: Oliver Neukum
Date: Fri Dec 17 2004 - 14:45:22 EST



> But the difference between you example (cp /dev/zero /dev/mem) and
> passing unchecked data to the kernel is... you _can_ check the data and

This is the difference:
static int open_port(struct inode * inode, struct file * filp)
{
return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
}
(from mem.c)

Regards
Oliver
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/