From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262157AbULQTlT (ORCPT ); Fri, 17 Dec 2004 14:41:19 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262134AbULQTfw (ORCPT ); Fri, 17 Dec 2004 14:35:52 -0500 Received: from mail1.kontent.de ([81.88.34.36]:32437 "EHLO Mail1.KONTENT.De") by vger.kernel.org with ESMTP id S262148AbULQTaP (ORCPT ); Fri, 17 Dec 2004 14:30:15 -0500 From: Oliver Neukum To: Tomas Carnecky Subject: Re: [Coverity] Untrusted user data in kernel Date: Fri, 17 Dec 2004 20:30:04 +0100 User-Agent: KMail/1.6.2 Cc: linux-os@analogic.com, Bill Davidsen , James Morris , Patrick McHardy , Bryan Fulton , netdev@oss.sgi.com, netfilter-devel@lists.netfilter.org, linux-kernel@vger.kernel.org References: <41C26DD1.7070006@trash.net> <41C330F7.4000806@dbservice.com> In-Reply-To: <41C330F7.4000806@dbservice.com> MIME-Version: 1.0 Content-Disposition: inline Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: 7bit Message-Id: <200412172030.04831.oliver@neukum.org> Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org > But the difference between you example (cp /dev/zero /dev/mem) and > passing unchecked data to the kernel is... you _can_ check the data and This is the difference: static int open_port(struct inode * inode, struct file * filp) { return capable(CAP_SYS_RAWIO) ? 0 : -EPERM; } (from mem.c) Regards Oliver