On Mon, Feb 18, 2019 at 9:58 AM Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx> wrote: > > So I've pulled the existing pull request, because it papers over one > particular issue, but the real fix would require: > > - knowing whether it's kernel or user space you access Actually, it would be good to split the "kernel space" access into finer granularities, because it would be good to limit those addresses by what you expect to happen. For example, on x86-64, we have a separate virtual mapping for kernel text. If you're following a data pointer, you probably shouldn't even look at that area, and just disallow it up-front. And the vmalloc space, we should probably look up the vmalloc descriptor for the address, to make sure we don't go into ioremap'ed areas (but we'd generally *do* want to follow pages for module data, or for vmap'ed stacks). And fixmap and/or percpu pointers may or may not be something that we'd want to follow. Etc. So it would be good to not just say "user or kernel", but actually say what *kind* of kernel access it expects. Linus