diff options
author | Christoph Hellwig <hch@lst.de> | 2020-09-03 16:22:34 +0200 |
---|---|---|
committer | Al Viro <viro@zeniv.linux.org.uk> | 2020-09-08 22:21:32 -0400 |
commit | 36e2c7421f02a22f71c9283e55fdb672a9eb58e7 (patch) | |
tree | 43b45747ad654e093c8d4a7dd9a90456590c2321 /fs/afs/security.c | |
parent | 4d03e3cc59828c82ee89ea6e27a2f3cdf95aaadf (diff) |
fs: don't allow splice read/write without explicit ops
default_file_splice_write is the last piece of generic code that uses
set_fs to make the uaccess routines operate on kernel pointers. It
implements a "fallback loop" for splicing from files that do not actually
provide a proper splice_read method. The usual file systems and other
high bandwidth instances all provide a ->splice_read, so this just removes
support for various device drivers and procfs/debugfs files. If splice
support for any of those turns out to be important it can be added back
by switching them to the iter ops and using generic_file_splice_read.
Signed-off-by: Christoph Hellwig <hch@lst.de>
Reviewed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
Diffstat (limited to 'fs/afs/security.c')
0 files changed, 0 insertions, 0 deletions