Received: by 2002:a05:7412:8521:b0:e2:908c:2ebd with SMTP id t33csp265198rdf; Thu, 2 Nov 2023 22:54:08 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFvhouGLpSM+wGHxAwfMOwPKPzfMwPvFDQvZ5haBD63sgVWgz0B6vQoc9FHFgcZ77Km3Qla X-Received: by 2002:a81:b50a:0:b0:5a8:3cb:7c1f with SMTP id t10-20020a81b50a000000b005a803cb7c1fmr1814552ywh.13.1698990847712; Thu, 02 Nov 2023 22:54:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698990847; cv=none; d=google.com; s=arc-20160816; b=dHLf6aN1gB3M8pC1abZNZz5LQDUpq4noiO9JyoHcJ+v+F5499CmXr/jW/aru+rsVV7 ZRzKXUh1bMgAjj0DYlab04lm8eSqvTBvOvcOMMzTrOSi84Xn9Maw2ETJvcShUPp3jMRC vzk5nP9q8pUYj51zD69v6zlumZqM3FkxNxT5e9qv932Mnj73OSIXi2jHEIRfDX0VIMch OQHzBJJydHh4scND6xUokfHXe/OIE/FZILGSZ2sVbzEGqa86dIS8AJoQgoWfBSjkPL5a 9f892cwTghRKE0irKseYszPWrCR3cZR408JmxM7iv+SqMGKWWqWWzfMlLF4pCl4N3h9G 65TA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=bUX8fIDoFNKAW/SOoTNCS6mLlAOq6L31O37z5PknPfI=; fh=tkpfpTsWpB6rmj9y1dQc2mYLvMWOlsnfV1l4Ui9Bi3A=; b=I7yZurg5iSeRf/fXHhmmrYuMWlqdKTG+6q1+wKej/VSe99WtCR7zLUI2UbFlvf9P9s VyHILz2molDXtSD/Qs4tpVAk/+JrdLwwBfjpMH5Qyko7Jm1itcqunoO9r+8e0jgVQX5G q1thYXrrBSpEA3K4RPNo+eipJa6CvIti8dVl0qC02sRyq/yAb80XBvBeGR6/msCLUVbA rDk4UMYAUNsQ5f5MN7ECSOd563Op0mYQ+/NThP9QhKL06DK9gSvL9e8NWvxNvvmlpHXd CwLfZxDlEB82FuR1FaJzHlVweCw4R+VJ1adyCadjenVRTS1kagFRcSD+gvGHCjrcTgxJ a6jQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=l36GQT4I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [23.128.96.33]) by mx.google.com with ESMTPS id ca27-20020a056a00419b00b006bcf4cb2849si925989pfb.154.2023.11.02.22.54.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Nov 2023 22:54:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) client-ip=23.128.96.33; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=l36GQT4I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.33 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id CBD1D82554B6; Thu, 2 Nov 2023 22:54:02 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229975AbjKCFxj (ORCPT + 99 others); Fri, 3 Nov 2023 01:53:39 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59840 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229807AbjKCFxi (ORCPT ); Fri, 3 Nov 2023 01:53:38 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AEB72CA for ; Thu, 2 Nov 2023 22:53:32 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D5115C433C7; Fri, 3 Nov 2023 05:53:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1698990812; bh=SLDh5CRv5TerU2o1EBxZL6kLDkZ+m92HwcWGlcin2Do=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=l36GQT4IS9SgDme6D1V6VJfiJ4NIIfbzjSgcULp2gv2xoZl4as+v23Vm6IeIjas9P zOyYl6rFRxei/LG9K/esfeKO5kuILIKoIyTNE61ReIwJeOYw+F/PNBAZS7qiEzUut/ seWtOBfck9HldM0pbHGe21ldsL3nNUy0XEFUSkgs= Date: Fri, 3 Nov 2023 06:53:29 +0100 From: Greg Kroah-Hartman To: Philipp Stanner Cc: Ian Abbott , H Hartley Sweeten , Ivan Orlov , Benjamin Tissoires , linux-kernel@vger.kernel.org, Dave Airlie Subject: Re: [PATCH] drivers/comedi: copy userspace array safely Message-ID: <2023110348-drained-tameness-b943@gregkh> References: <20231102190848.51376-2-pstanner@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20231102190848.51376-2-pstanner@redhat.com> X-Spam-Status: No, score=-1.3 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Thu, 02 Nov 2023 22:54:02 -0700 (PDT) On Thu, Nov 02, 2023 at 08:08:49PM +0100, Philipp Stanner wrote: > comedi_fops.c utilizes memdup_user() to copy a userspace array. This > does not check for an overflow. Is there potential for an overflow today? > > Use the new wrapper memdup_array_user() to copy the array more safely. How about saying something like: "Use the new function memdup_array_user() in case things change in the future which would prevent overflows if something were to change in the size of the structures". Or something to the affect of "all is good today, but make it easy to be correct in the future as well". thanks, greg k-h