Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2552896yba; Mon, 6 May 2019 07:55:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqwmvKRaaThMVZ+sFEX6J1EcIXHUoUSw76gt9eS1jIIxSwjeBBeAfkbm7DnGuLVX0kWvGCVr X-Received: by 2002:a17:902:28a9:: with SMTP id f38mr32380410plb.295.1557154541318; Mon, 06 May 2019 07:55:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557154541; cv=none; d=google.com; s=arc-20160816; b=02ookNs0CBPfhk3eB+Hwjol5ZMQZ2f3yvHKE3l3cKO74JPE/wgZOjdh93pV+aJPqCO kD9oC6Fyh4T/JFrL8QIs0F9U68uCNe9qkMdhMVsSztI3gN7BMWkkxKV3JKKy/vvLYkca tsoRRjZa+/iWNa0Sq+Hkhg05Mn9pco/2irbDZHni1cnzSUfyZpsiqJmto5G6JKmJTtAP BDUKKI9MN5Q8Cp9u0ikAsXNFu2r5cTOg0rJgdbGhKKsy9ANQeYZ5yeyeOZbp/P/nIchZ ZzP2VBmVf8V/G2HabJF4Mvv+Qs4QfeQQVOrxHksmU/EZgzGg1tyXxjs2uCyrjp46op7v vOKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tlpXeFXoghNzhZIjul4oTQm4Rhtz9f1mt1MvfkTtDmo=; b=v1TdXhtfn/TdNV8c1tlqrjedGumnipvlTHFYcXdhZTz3GZdJbHVbxL1ASDDqE0CJ8Q B4txKmZLj6qw7mJhqsj/P1FC+PCqWNHs48+siJdQmsG2WO3d7W61qPdMcFXrMt4XR67i dWdRo3SK+/UGyk1MJE7VqpTZk4kUJJj8d4eXZZrmn8rY0U49fcc55peE0PZMIdxDX8aS dGsDbFDot4DzdmJWXLLPRoWj4+iUYIuyL8PJkplZ57Hyz8loPzLTyo431yMuou9DhAQO lhYtxZyVYTeMaMFmIHgvlbqNWGGLXHn020Ud0Hij5ZhRNhSg6blpqsGcYp2a8oIEo6QS dk9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2SXarBdF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h18si14508996pgg.265.2019.05.06.07.55.25; Mon, 06 May 2019 07:55:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=2SXarBdF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728220AbfEFOxY (ORCPT + 99 others); Mon, 6 May 2019 10:53:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:46902 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729318AbfEFOrf (ORCPT ); Mon, 6 May 2019 10:47:35 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 38C5F205ED; Mon, 6 May 2019 14:47:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557154054; bh=3MntDR9kUmhFdar+ptPW4odvKho86UrhSYTPEEofWs8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=2SXarBdFxdIo/o9j8G+V+X09jdgtlAtDDK9YsqM61n2sQ32hadTMh+pWXij92TLkO zbscBVeSVAEAdywCFhnNjC30TUhYx5q+Zmfs2ru8SZ/4T0NNBPj4T+r3ypEhjpFX3F 9f05rIqdbQkMxq9i761qXkBACHp7lTKlq9pCdKVQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mark Rutland , Kristina Martsenko , Will Deacon , Andrey Konovalov Subject: [PATCH 4.9 20/62] arm64: mm: dont print out page table entries on EL0 faults Date: Mon, 6 May 2019 16:32:51 +0200 Message-Id: <20190506143052.802065560@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190506143051.102535767@linuxfoundation.org> References: <20190506143051.102535767@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kristina Martsenko commit bf396c09c2447a787d02af34cf167e953f85fa42 upstream. When we take a fault from EL0 that can't be handled, we print out the page table entries associated with the faulting address. This allows userspace to print out any current page table entries, including kernel (TTBR1) entries. Exposing kernel mappings like this could pose a security risk, so don't print out page table information on EL0 faults. (But still print it out for EL1 faults.) This also follows the same behaviour as x86, printing out page table entries on kernel mode faults but not user mode faults. Acked-by: Mark Rutland Signed-off-by: Kristina Martsenko Signed-off-by: Will Deacon Signed-off-by: Andrey Konovalov Signed-off-by: Greg Kroah-Hartman --- arch/arm64/mm/fault.c | 1 - 1 file changed, 1 deletion(-) --- a/arch/arm64/mm/fault.c +++ b/arch/arm64/mm/fault.c @@ -231,7 +231,6 @@ static void __do_user_fault(struct task_ pr_info("%s[%d]: unhandled %s (%d) at 0x%08lx, esr 0x%03x\n", tsk->comm, task_pid_nr(tsk), inf->name, sig, addr, esr); - show_pte(addr); show_regs(regs); }