From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Date: Mon, 7 Feb 2005 11:28:37 -0800 From: "David S. Miller" Subject: Re: [patch 19/24] TASK_SIZE is variable. Message-Id: <20050207112837.5594c314.davem@davemloft.net> In-Reply-To: <20050207081106.GA16035@wotan.suse.de> References: <20050205090619.C30866@flint.arm.linux.org.uk> <20050205154448.1cc89ee9.davem@davemloft.net> <20050206105047.GB6819@wotan.suse.de> <20050206131947.6524ece9.davem@davemloft.net> <20050206213148.GI18245@wotan.suse.de> <20050206133110.528ce713.davem@davemloft.net> <20050206215020.GJ18245@wotan.suse.de> <20050206143110.59dc039f.davem@davemloft.net> <20050207081106.GA16035@wotan.suse.de> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit To: Andi Kleen Cc: rmk@arm.linux.org.uk, torvalds@osdl.org, akpm@osdl.org, dwmw2@infradead.org, linux-arch@vger.kernel.org List-ID: On Mon, 7 Feb 2005 09:11:06 +0100 Andi Kleen wrote: > Also BTW your proposed check wouldn't catch all cases anyways, > it would only handle the case where the access_ok() check is > done inside the KERNEL_DS. There must be a verify area done (either via explicit call or via the user access macros which do not have the "__" prefix) for each range of "userspace" accesses done through the uaccess.h accessors.