In read/write system call, check that the read/write buffer address
resides not in the kernel segment. ie, check buffer address and TASK_SIZE,
address + size etc..
That may seem silly.. but it would stop any later problems by drivers
which dont check this themselves, or handle it incorrectly or inconsistantly..
1) clear security integrity check (so drivers etc are less worried)
2) clearly defined behaviour (error codes etc) when this occurs (easier
on the drivers again).
If its not possible to do this in the system call directly any chance of
putting such a check early on in the generic driver code present?
perhaps the buffer in read/write means something other than a userspace
buffer/array, to someone, but i cant think of any read/write behaviour to
counter-claim this..
perhaps a dumb suggestion.. open to feedback :)
-- Silvio - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/