Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2300159imc; Tue, 12 Mar 2019 10:55:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqw+G7X4B7iK9d0tfa+BJb/8P+lOpxKeR0azLEFEgGijt0LgekavtgoKmktvhwiIVjDfI/OR X-Received: by 2002:a17:902:8506:: with SMTP id bj6mr40599852plb.60.1552413305124; Tue, 12 Mar 2019 10:55:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552413305; cv=none; d=google.com; s=arc-20160816; b=hbem/iZq/I07HNz+uVgFrxcyzAQIxcJCPbF5i1NWAA8kdr0dkqCFZZwBmR1eoAvLwe Suna1++F8+GdKBtlik7RzOrgPAp6CmG/bmBiTU4k4YhFgZCDCVpodbPaimpBJnF6G10S 4ORtDHfVPB8BYTKzsWHGfTWCsUXmmrDYgp7VQYlS5nRnwXyxxadJUPz3F6vatVdFlpxm viR8RiPz681gS4rdAQpoKRcV5N8FW3iyuLgrWi3MSPX5o/c8RJq4LWXrsxDCRa8Gm+el 5AL9dwzaQuGq9RgRyzp+5g+rXNzdTUAb7wI9COJz+h65A2zECKI7nm/Sx9wlk+yarmvK 6P4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jy/08JDITTzzToPJ3QenDOHpts05UAju5zk5OmYmIwA=; b=XIwOpQ2BTFPKMKsIdlENxQvSNrYQ1ZxL8nF3N2mIzlb9n9NnCyAaBNc5AeExab4Pmy pEj/7nuQSAwhhZGLZo08nf3BSsmqg8/w2MkZOM6iSFeDThPGPAEdi4R5d45+p0KfdXjE URwr4H+Ec7EDXlE1G30/K87sivBDvMpu4m5+DKo6YCoT9XsNTWtXtIGWnfT8ELzlmAH1 eEF0v0Vksg/lpukX71wwOq3aJUbWmfVgdR5IbGR8dJAJoTlrq1y5ADEqls2N0r355M36 YE07Su0XDxJS7l0ahVFra9iJTaOrOwyvzHvFaCQkzK/PE/yAZ9zF5vTq/NR21IUe9wkr u+XA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nGgwWcG6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m11si7864428pfh.47.2019.03.12.10.54.48; Tue, 12 Mar 2019 10:55:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=nGgwWcG6; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729474AbfCLRxq (ORCPT + 99 others); Tue, 12 Mar 2019 13:53:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:52590 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728284AbfCLROP (ORCPT ); Tue, 12 Mar 2019 13:14:15 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9957921741; Tue, 12 Mar 2019 17:14:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552410854; bh=kPhVsSOUda0XGK3FMydXXYqX79wMdprLv3/I8kA2GR4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nGgwWcG6DtvyB+fsMs4o5v8+uHzJlakqfuxWJXTFb6P7Vv2URRSt0ChKpu2xIyEjp sNTQX79F4VRfPQVoXsVcnPdpzSmsZ7m1t1O8+pAUKEocfO54dIhZVcuXAMuq7G+w23 NLmIofjtjNGQ339t3dAig7PVrc0tqcs3bHYyqhgY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christoffer Dall , James Morse , Masami Hiramatsu , Will Deacon , Sasha Levin Subject: [PATCH 4.19 050/149] arm64: kprobe: Always blacklist the KVM world-switch code Date: Tue, 12 Mar 2019 10:07:48 -0700 Message-Id: <20190312170353.960116595@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312170349.421581206@linuxfoundation.org> References: <20190312170349.421581206@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit f2b3d8566d81deaca31f4e3163def0bea7746e11 ] On systems with VHE the kernel and KVM's world-switch code run at the same exception level. Code that is only used on a VHE system does not need to be annotated as __hyp_text as it can reside anywhere in the kernel text. __hyp_text was also used to prevent kprobes from patching breakpoint instructions into this region, as this code runs at a different exception level. While this is no longer true with VHE, KVM still switches VBAR_EL1, meaning a kprobe's breakpoint executed in the world-switch code will cause a hyp-panic. Move the __hyp_text check in the kprobes blacklist so it applies on VHE systems too, to cover the common code and guest enter/exit assembly. Fixes: 888b3c8720e0 ("arm64: Treat all entry code as non-kprobe-able") Reviewed-by: Christoffer Dall Signed-off-by: James Morse Acked-by: Masami Hiramatsu Signed-off-by: Will Deacon Signed-off-by: Sasha Levin --- arch/arm64/kernel/probes/kprobes.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/arch/arm64/kernel/probes/kprobes.c b/arch/arm64/kernel/probes/kprobes.c index b5a367d4bba6..30bb13797034 100644 --- a/arch/arm64/kernel/probes/kprobes.c +++ b/arch/arm64/kernel/probes/kprobes.c @@ -478,13 +478,13 @@ bool arch_within_kprobe_blacklist(unsigned long addr) addr < (unsigned long)__entry_text_end) || (addr >= (unsigned long)__idmap_text_start && addr < (unsigned long)__idmap_text_end) || + (addr >= (unsigned long)__hyp_text_start && + addr < (unsigned long)__hyp_text_end) || !!search_exception_tables(addr)) return true; if (!is_kernel_in_hyp_mode()) { - if ((addr >= (unsigned long)__hyp_text_start && - addr < (unsigned long)__hyp_text_end) || - (addr >= (unsigned long)__hyp_idmap_text_start && + if ((addr >= (unsigned long)__hyp_idmap_text_start && addr < (unsigned long)__hyp_idmap_text_end)) return true; } -- 2.19.1