On Tue, May 24, 2016 at 03:48:44PM -0700, Andy Lutomirski wrote:
> +     if (unlikely(!is_user_ds && !pagefault_disabled())) {
> +             if (extra < TASK_SIZE_MAX) {
> +                     /*
> +                      * Accessing user address under KERNEL_DS.  This is a
> +                      * bug and should be fixed, but OOPSing is not helpful
> +                      * for exploit mitigation.
> +                      */
> +                     WARN_ONCE(1, "BUG: uaccess fault at 0x%lx with 
> KERNEL_DS\n",

                        WARN and BUG?

Also, let's have this string and the one below differ for finding out
where we are during debugging.

> +                               extra);
> +             } else {
> +                     /*
> +                      * If a bug that allows user-controlled KERNEL_DS
> +                      * access exists, this will prevent it from being used
> +                      * to trivially bypass kASLR.
> +                      */
> +                     pr_crit("BUG: uaccess fault at 0x%lx with KERNEL_DS\n",
> +                             extra);

-- 
Regards/Gruss,
    Boris.

ECO tip #101: Trim your mails when you reply.

Reply via email to