]> git.proxmox.com Git - mirror_ubuntu-bionic-kernel.git/commit
dax: explain how read(2)/write(2) addresses are validated
authorRoss Zwisler <ross.zwisler@linux.intel.com>
Wed, 6 Sep 2017 23:18:54 +0000 (16:18 -0700)
committerLinus Torvalds <torvalds@linux-foundation.org>
Thu, 7 Sep 2017 00:27:24 +0000 (17:27 -0700)
commita2e050f5a9a9bd2b632d67bd06d87088e6a02dae
treea7cc6d57eccb6b9e168c51ff5d1baf065f62dae7
parent527b19d0808e75fbba896beb2435c2b4d6bcd32a
dax: explain how read(2)/write(2) addresses are validated

Add a comment explaining how the user addresses provided to read(2) and
write(2) are validated in the DAX I/O path.

We call dax_copy_from_iter() or copy_to_iter() on these without calling
access_ok() first in the DAX code, and there was a concern that the user
might be able to read/write to arbitrary kernel addresses with this
path.

Link: http://lkml.kernel.org/r/20170816173615.10098-1-ross.zwisler@linux.intel.com
Signed-off-by: Ross Zwisler <ross.zwisler@linux.intel.com>
Reviewed-by: Jan Kara <jack@suse.cz>
Cc: Christoph Hellwig <hch@lst.de>
Cc: Dan Williams <dan.j.williams@intel.com>
Cc: Matthew Wilcox <mawilcox@microsoft.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
fs/dax.c