Re: [PATCH 10/11] x86/fault: Don't run fixups for SMAP violations

2021-02-03 Thread Borislav Petkov
On Sun, Jan 31, 2021 at 09:24:41AM -0800, Andy Lutomirski wrote: > A SMAP-violating kernel access is not a recoverable condition. Imagine > kernel code that, outside of a uaccess region, dereferences a pointer to > the user range by accident. If SMAP is on, this will reliably generate > as an

[PATCH 10/11] x86/fault: Don't run fixups for SMAP violations

2021-01-31 Thread Andy Lutomirski
A SMAP-violating kernel access is not a recoverable condition. Imagine kernel code that, outside of a uaccess region, dereferences a pointer to the user range by accident. If SMAP is on, this will reliably generate as an intentional user access. This makes it easy for bugs to be overlooked if