-
Notifications
You must be signed in to change notification settings - Fork 25
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kernel fault when decrypting to user buffer #56
Comments
I suppose that it occurs with TLS. |
The kernel has to validate user buffers before accessing them. copy_page_to_iter does this for you, but the decryption api does not. |
why was this issue closed? |
Patch is available here. Btw, it is not necessary in ktls with revamped buffer management since those keep decrypted data in skbuffs and never decrypts straight to user memory. |
I will take a look at your implementation ASAP. Not to forget about this, reopening since fix is not available in ktls/af_ktls master. |
Fixed, no longer needed now that using skbs |
If a client makes a syscall like this:
And the decryption is done straight to user memory (the else{} in tls_recvmsg) a kernel fault is triggered
http://pastebin.com/XjGu0dHx
The text was updated successfully, but these errors were encountered: