Re: [PATCH 1/5] powerpc/64s: Guarded Userspace Access Prevention

2018-10-31 Thread LEROY Christophe
Russell Currey a écrit : On Sun, 2018-10-28 at 18:57 +0100, LEROY Christophe wrote: Russell Currey a écrit : > Guarded Userspace Access Prevention (GUAP) utilises a feature of > the Radix MMU which disallows read and write access to userspace > addresses. By utilising this, the kernel is

Re: [PATCH 1/5] powerpc/64s: Guarded Userspace Access Prevention

2018-10-30 Thread Russell Currey
On Sun, 2018-10-28 at 18:57 +0100, LEROY Christophe wrote: > Russell Currey a écrit : > > > Guarded Userspace Access Prevention (GUAP) utilises a feature of > > the Radix MMU which disallows read and write access to userspace > > addresses. By utilising this, the kernel is prevented from > >

Re: [PATCH 1/5] powerpc/64s: Guarded Userspace Access Prevention

2018-10-29 Thread kbuild test robot
Hi Russell, I love your patch! Yet something to improve: [auto build test ERROR on powerpc/next] [also build test ERROR on next-20181029] [cannot apply to v4.19] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url:

Re: [PATCH 1/5] powerpc/64s: Guarded Userspace Access Prevention

2018-10-28 Thread LEROY Christophe
Russell Currey a écrit : Guarded Userspace Access Prevention (GUAP) utilises a feature of the Radix MMU which disallows read and write access to userspace addresses. By utilising this, the kernel is prevented from accessing user data from outside of trusted paths that perform proper safety

Re: [PATCH 1/5] powerpc/64s: Guarded Userspace Access Prevention

2018-10-26 Thread kbuild test robot
Hi Russell, I love your patch! Yet something to improve: [auto build test ERROR on powerpc/next] [also build test ERROR on next-20181019] [cannot apply to v4.19] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url:

[PATCH 1/5] powerpc/64s: Guarded Userspace Access Prevention

2018-10-26 Thread Russell Currey
Guarded Userspace Access Prevention (GUAP) utilises a feature of the Radix MMU which disallows read and write access to userspace addresses. By utilising this, the kernel is prevented from accessing user data from outside of trusted paths that perform proper safety checks, such as