Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp273520pxu; Wed, 2 Dec 2020 22:54:01 -0800 (PST) X-Google-Smtp-Source: ABdhPJwaua3fSD7jaQ+wp4Ln5poAcIMEcGAyqQjRFwIdwskmn/wKpd18pJEdycuxkwHQWs8CBIey X-Received: by 2002:a17:906:60c8:: with SMTP id f8mr1257388ejk.14.1606978441568; Wed, 02 Dec 2020 22:54:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606978441; cv=none; d=google.com; s=arc-20160816; b=kc5KHLHPuMiZ7FEZUHkKTBiGFkvNimQ4VWezjCd7TXBkOUYhyt2DIigZNiLuh6CJ4J wXuX1WvXOROrjOMPXiL2lnyzuVPKdhwmXZYf0SBqbIUSoOUVBzGm7AuEZI+/S5q2B7JH ZbFiZisQPd91LEN5IBUp9A0qWlQHT+LUk8A5EsHxiYc++ISIFXgyNf+xM628zFrgghhX q+ALy8r2zPd66xDzAh0SQEg2ZE3U2wgL2fE7gG2TbdE7/1THlxdWmzLK4VNFzOuo4R2v 0Sq9W/JGo0ZLnkU1+swfTBr35nmfgmjRjvfGcOt2n7tBzwEtCt6Onn9yjfrtwW87OV4w LRgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=FcYXbQf4cC40Cw/obQwa2RC+TLslat4iIVpbG/4aU9s=; b=07S0r6J90p+MXeKzaANK2rkC01zO2iotQNoO6i8fIlW5vfFt7DaPOH+ihg04UpFd98 5/FcDd+AU+AmK70+ckZO8GTLzimLOOHELVCAXiZd/qllgl3aXnvcQ+CSmczwvcpF4+1D Ys1Em+m5si1iAi2Bywytl936uV5zs7lGh3EajdTZcFzEEtE32j/7b27xftSVDAq/q0AS IyY/mz2ZjBlq6yf0L5VFz6rzdbe3M46Kjcun7tbpvIIvVrfjtgkVrnIIjoABFyQFUXBG hcUM3vuqdvuUNlUban+5Vt+kEqRFX8HtFJoUIJXpKmFKFaXqAvP4Im6/eflaGkC72Kdy dctw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g18si396530edh.40.2020.12.02.22.53.38; Wed, 02 Dec 2020 22:54:01 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729782AbgLCGuQ (ORCPT + 99 others); Thu, 3 Dec 2020 01:50:16 -0500 Received: from exmail.andestech.com ([60.248.187.195]:56804 "EHLO ATCSQR.andestech.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729114AbgLCGuQ (ORCPT ); Thu, 3 Dec 2020 01:50:16 -0500 Received: from mail.andestech.com (atcpcs16.andestech.com [10.0.1.222]) by ATCSQR.andestech.com with ESMTP id 0B36nZGV099083; Thu, 3 Dec 2020 14:49:35 +0800 (GMT-8) (envelope-from tesheng@andestech.com) Received: from atcfdc88.andestech.com (10.0.15.120) by ATCPCS16.andestech.com (10.0.1.222) with Microsoft SMTP Server id 14.3.487.0; Thu, 3 Dec 2020 14:49:20 +0800 From: Eric Lin To: , , , , , , , , , , CC: Eric Lin Subject: [PATCH v2 0/2] Let illegal access to user-space memory die Date: Thu, 3 Dec 2020 14:48:24 +0800 Message-ID: <20201203064826.30832-1-tesheng@andestech.com> X-Mailer: git-send-email 2.17.0 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.0.15.120] X-DNSRBL: X-MAIL: ATCSQR.andestech.com 0B36nZGV099083 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Accesses to user-space memory without calling uaccess routine leads to hanging in page fault handler. Like arm64, we let it die earlier in page fault handler. Changes in v2: -Add a die_kernel_fault() helper -Split one long line code into two Eric Lin (2): riscv/mm: Introduce a die_kernel_fault() helper function riscv/mm: Prevent kernel module to access user memory without uaccess routines arch/riscv/mm/fault.c | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) -- 2.17.0