From: Omar Sandoval
I found that on x86, copy_to_kernel_nofault() still faults on addresses
outside of the kernel address range (including NULL):
# echo ttyS0 > /sys/module/kgdboc/parameters/kgdboc
# echo g > /proc/sysrq-trigger
...
[15]kdb> mm 0 1234
[ 94.652476] BUG: ke
From: Omar Sandoval
Hi,
I hit a case where copy_to_kernel_nofault() will fault (lol): if the
destination address is in userspace and x86 Supervisor Mode Access
Prevention is enabled. Patch 2 has the details and the fix. Patch 1
renames a helper function so that its use in patch 2 makes more
On Mon, Sep 02, 2024 at 08:19:33AM +0200, Christophe Leroy wrote:
>
>
> Le 02/09/2024 à 07:31, Omar Sandoval a écrit :
> > [Vous ne recevez pas souvent de courriers de osan...@osandov.com. Découvrez
> > pourquoi ceci est important à https://aka.ms/LearnAbou
From: Omar Sandoval
All of the existing checks are applicable to both the "from" and "to"
directions, and the next patch needs it for copy_to_kernel_nofault().
Signed-off-by: Omar Sandoval
---
arch/arm/mm/fault.c | 2 +-
arch/loongarch/mm/maccess.c | 2 +-
ar
On Mon, Sep 02, 2024 at 10:56:27AM +0200, David Hildenbrand wrote:
> On 02.09.24 08:31, Omar Sandoval wrote:
> > On Mon, Sep 02, 2024 at 08:19:33AM +0200, Christophe Leroy wrote:
> > >
> > >
> > > Le 02/09/2024 à 07:31, Omar Sandoval a écrit :
> > > &
On Wed, Sep 04, 2024 at 09:50:56AM +0200, Christophe Leroy wrote:
> Hi,
>
> Le 02/09/2024 à 07:31, Omar Sandoval a écrit :
> > [Vous ne recevez pas souvent de courriers de osan...@osandov.com. Découvrez
> > pourquoi ceci est important à https://aka.ms/LearnAbou