Re: [Coverity] Untrusted user data in kernel

From: Oliver Neukum
Date: Fri Dec 17 2004 - 14:45:22 EST

> But the difference between you example (cp /dev/zero /dev/mem) and
> passing unchecked data to the kernel is... you _can_ check the data and

This is the difference:
static int open_port(struct inode * inode, struct file * filp)
return capable(CAP_SYS_RAWIO) ? 0 : -EPERM;
(from mem.c)

To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at
Please read the FAQ at