From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751755AbdATIYO (ORCPT ); Fri, 20 Jan 2017 03:24:14 -0500 Received: from bombadil.infradead.org ([65.50.211.133]:51812 "EHLO bombadil.infradead.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751544AbdATIYN (ORCPT ); Fri, 20 Jan 2017 03:24:13 -0500 Date: Fri, 20 Jan 2017 09:24:06 +0100 From: Peter Zijlstra To: Andy Lutomirski Cc: David Smith , Thomas Gleixner , Linus Torvalds , Ingo Molnar , "H. Peter Anvin" , "linux-kernel@vger.kernel.org" , "Frank Ch. Eigler" Subject: Re: [RFC][PATCH] x86: Verify access_ok() context Message-ID: <20170120082406.GJ6515@twins.programming.kicks-ass.net> References: <20161122095715.GN3092@twins.programming.kicks-ass.net> <20161122193720.GA3045@worktop.programming.kicks-ass.net> <20161205102747.GT3092@twins.programming.kicks-ass.net> <8758e5b4-050d-a5dd-2e58-e4f9dccc734b@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23.1 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jan 18, 2017 at 04:19:47PM -0800, Andy Lutomirski wrote: > ISTM even with pagefault_disable() in play, using access_ok() from, > say, interrupt context is dangerous unless you've first checked that > you're in a task. But I guess that in_task() would still return > false, e.g. in perf. The test was created exactly because perf was using access_ok() _wrongly_. See commit: ae31fe51a3cc ("perf/x86: Restore TASK_SIZE check on frame pointer").