Re: BUG REPORT: User/Kernel Pointer bug in sys_poll

From: Alan Cox
Date: Thu Oct 28 2004 - 15:57:37 EST


On Iau, 2004-10-28 at 10:48, Andrew Morton wrote:
> is safe. We know that the address is in the 0x00000000-0xbfffffff range by
> the time we call __put_user(). And if the page at *addr it not writeable
> the kernel will take a fault.
>
> So I see no hole. But I wouldn't have coded it that way...

On x86 maybe. I think he's right in the sense that we may have a non x86
platform that this is not safe on.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/