From patchwork Wed Apr 3 10:31:14 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Will Deacon X-Patchwork-Id: 161691 Delivered-To: patch@linaro.org Received: by 2002:a02:c6d8:0:0:0:0:0 with SMTP id r24csp149993jan; Wed, 3 Apr 2019 03:31:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqwWIXHufCPuyK3rBrz6xMfvEyIZeuMT5FFpqGUoiXhgst7P4HSz7IG3wQ1XtVq7fgh0RP8m X-Received: by 2002:a63:5a4b:: with SMTP id k11mr71557200pgm.119.1554287492308; Wed, 03 Apr 2019 03:31:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554287492; cv=none; d=google.com; s=arc-20160816; b=kTgw/a/ptPEK02YN7V8ms/zWy1dzys22C2Zs8suyYoLGzr94FQt9YQpdkXL4DDfUxd /EWUxnD58imNjrKGowKN6CBDJZ3Y4RuPKrNIDGBcNi3s+vpUpFL9KvVIyBf0pUZEsq6+ ko11O5XaMxEiWJgqFx6wVBEEFx0WuaG/zyvdWYelxYuiythtzsajVx9tS4W+IfLC5lsk ViaZPRtNQhIEyLga2TK38CBuVmjape05PGj38TaIcwIQZcisM9FRUxusxLB7Ztxa4mYc Zmy9o1KLWRvJvTeVpzMasdoYpGjF1y14u7nwdpZC/eEJvwIi+FHz3T9JLyF4h1yGcrhZ nDAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=jJ4yhJO7V7Zyd0ryQSbsM2P0QXemDxcSWjFvKP7xyao=; b=TIfGeArHLjYDtjDX4Jxh5pva7pK8EtMwvu2f2D30TAbldxL/EIupasz7UlpYhQRSgh NS0HAKLGJFiqVCtbCqq36Dff9lJUNeOer61+BKPNTasumRMHKkiGqydDvM0a84XZu8qi +g0AcQlMnMrI2Ovml1u2vwMVEWbCZcDFHSfuOSOQE8UZcvtXU55BPm9SJ9TuTSPHUbVC tPrRCIbqaLeFYGdDRunm8fc4M+hW+pA0p5UVGVic9LCV4huaqRJTAH4LPhC5zHPCWbR8 hVuXboMu3E5kVxv3URRgE8hO7FcE7bd72Se/8KIdqbjH13iWpzbLybfsnOHpfWCDj9JC +xEg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s34si13630095pgl.97.2019.04.03.03.31.32; Wed, 03 Apr 2019 03:31:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of stable-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=stable-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726471AbfDCKb0 (ORCPT + 14 others); Wed, 3 Apr 2019 06:31:26 -0400 Received: from foss.arm.com ([217.140.101.70]:37004 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726264AbfDCKbZ (ORCPT ); Wed, 3 Apr 2019 06:31:25 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 2202E1596; Wed, 3 Apr 2019 03:31:25 -0700 (PDT) Received: from fuggles.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id E22443F59C; Wed, 3 Apr 2019 03:31:23 -0700 (PDT) From: Will Deacon To: gregkh@linuxfoundation.org Cc: stable@vger.kernel.org, linux-kernel@vger.kernel.org, sashal@kernel.org, Will Deacon , Catalin Marinas Subject: [PATCH 4.4 BACKPORT 2/2] arm64: debug: Ensure debug handlers check triggering exception level Date: Wed, 3 Apr 2019 11:31:14 +0100 Message-Id: <20190403103114.29050-2-will.deacon@arm.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20190403103114.29050-1-will.deacon@arm.com> References: <20190403103114.29050-1-will.deacon@arm.com> Sender: stable-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: stable@vger.kernel.org Commit 6bd288569b50bc89fa5513031086746968f585cb upstream. Debug exception handlers may be called for exceptions generated both by user and kernel code. In many cases, this is checked explicitly, but in other cases things either happen to work by happy accident or they go slightly wrong. Fix this issue in the most stable-friendly fashion by simply adding explicit checks of the triggering exception level to all of our debug exception handlers. Cc: # 4.4.y Reviewed-by: Mark Rutland Signed-off-by: Will Deacon Signed-off-by: Catalin Marinas --- arch/arm64/kernel/kgdb.c | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-) -- 2.11.0 diff --git a/arch/arm64/kernel/kgdb.c b/arch/arm64/kernel/kgdb.c index bcac81e600b9..f72743dc070d 100644 --- a/arch/arm64/kernel/kgdb.c +++ b/arch/arm64/kernel/kgdb.c @@ -215,22 +215,31 @@ int kgdb_arch_handle_exception(int exception_vector, int signo, static int kgdb_brk_fn(struct pt_regs *regs, unsigned int esr) { + if (user_mode(regs)) + return DBG_HOOK_ERROR; + kgdb_handle_exception(1, SIGTRAP, 0, regs); - return 0; + return DBG_HOOK_HANDLED; } static int kgdb_compiled_brk_fn(struct pt_regs *regs, unsigned int esr) { + if (user_mode(regs)) + return DBG_HOOK_ERROR; + compiled_break = 1; kgdb_handle_exception(1, SIGTRAP, 0, regs); - return 0; + return DBG_HOOK_HANDLED; } static int kgdb_step_brk_fn(struct pt_regs *regs, unsigned int esr) { + if (user_mode(regs)) + return DBG_HOOK_ERROR; + kgdb_handle_exception(1, SIGTRAP, 0, regs); - return 0; + return DBG_HOOK_HANDLED; } static struct break_hook kgdb_brkpt_hook = {