From mboxrd@z Thu Jan 1 00:00:00 1970 From: "David S. Miller" Subject: Re: [Coverity] Untrusted user data in kernel Date: Fri, 17 Dec 2004 11:16:34 -0800 Message-ID: <20041217111634.740d4d46.davem@davemloft.net> References: <41C2DCBC.1080302@dbservice.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Cc: bryan@coverity.com, jmorris@redhat.com, netdev@oss.sgi.com, netfilter-devel@lists.netfilter.org, linux-kernel@vger.kernel.org, kaber@trash.net Return-path: To: Tomas Carnecky In-Reply-To: <41C2DCBC.1080302@dbservice.com> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: netfilter-devel-bounces@lists.netfilter.org Errors-To: netfilter-devel-bounces@lists.netfilter.org List-Id: netdev.vger.kernel.org On Fri, 17 Dec 2004 14:18:52 +0100 Tomas Carnecky wrote: > IMHO such things (passing values between user/kernel space) should > always be checked. As per Patrick's posting, which James was responding to, it is checked at the level above this function.