diff options
author | Richard Weinberger <richard@nod.at> | 2015-05-31 20:21:51 +0300 |
---|---|---|
committer | Richard Weinberger <richard@nod.at> | 2015-05-31 20:21:51 +0300 |
commit | d2313084e2c3488e254796617fcda45d69731b21 (patch) | |
tree | 3e1a011f87f645cfc5c09330d8a56741d8f019d1 /arch/um/include | |
parent | 6c684465587aab2a0d2712ee755c0164fa33efd1 (diff) | |
download | linux-d2313084e2c3488e254796617fcda45d69731b21.tar.xz |
um: Catch unprotected user memory access
If the kernel tries to access user memory without copy_from_user()
a trap will happen as kernel and userspace run in different processes
on the host side. Currently this special page fault cannot be resolved
and will happen over and over again. As result UML will lockup.
This patch allows the page fault code to detect that situation and
causes a panic() such that the root cause of the unprotected memory
access can be found and fixed.
Signed-off-by: Richard Weinberger <richard@nod.at>
Diffstat (limited to 'arch/um/include')
0 files changed, 0 insertions, 0 deletions