On Fri, 2020-01-24 at 11:54:40 UTC, Christophe Leroy wrote: > At the moment, bad_kuap_fault() reports a fault only if a bad access > to userspace occurred while access to userspace was not granted. > > But if a fault occurs for a write outside the allowed userspace > segment(s) that have been unlocked, bad_kuap_fault() fails to > detect it and the kernel loops forever in do_page_fault(). > > Fix it by checking that the accessed address is within the allowed > range. > > Fixes: a68c31fc01ef ("powerpc/32s: Implement Kernel Userspace Access Protection") > Cc: stable@xxxxxxxxxxxxxxx # v5.2+ > Signed-off-by: Christophe Leroy <christophe.leroy@xxxxxx> > Signed-off-by: Michael Ellerman <mpe@xxxxxxxxxxxxxx> > Link: https://lore.kernel.org/r/1e07c7de4ffdd9cda35d1ffe8258af75579d3e91.1579715466.git.christophe.leroy@xxxxxx Patches 2-7 applied to powerpc next, thanks. https://git.kernel.org/powerpc/c/6ec20aa2e510b6297906c45f009aa08b2d97269a cheers