On Fri, 2020-01-24 at 11:54:40 UTC, Christophe Leroy wrote: > At the moment, bad_kuap_fault() reports a fault only if a bad access > to userspace occurred while access to userspace was not granted. > > But if a fault occurs for a write outside the allowed userspace > segment(s) that have been unlocked, bad_kuap_fault() fails to > detect it and the kernel loops forever in do_page_fault(). > > Fix it by checking that the accessed address is within the allowed > range. > > Fixes: a68c31fc01ef ("powerpc/32s: Implement Kernel Userspace Access > Protection") > Cc: sta...@vger.kernel.org # v5.2+ > Signed-off-by: Christophe Leroy <christophe.le...@c-s.fr> > Signed-off-by: Michael Ellerman <m...@ellerman.id.au> > Link: > https://lore.kernel.org/r/1e07c7de4ffdd9cda35d1ffe8258af75579d3e91.1579715466.git.christophe.le...@c-s.fr
Patches 2-7 applied to powerpc next, thanks. https://git.kernel.org/powerpc/c/6ec20aa2e510b6297906c45f009aa08b2d97269a cheers