Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp6024210ybc; Wed, 27 Nov 2019 13:35:47 -0800 (PST) X-Google-Smtp-Source: APXvYqwKYFdF4nubnlXA73iCLrtXRv37NxbC2iC7gBHw6S67EOPMcACJBDhxbKMRUCWSW+nyMrZw X-Received: by 2002:a17:906:1c07:: with SMTP id k7mr36582850ejg.229.1574890547254; Wed, 27 Nov 2019 13:35:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574890547; cv=none; d=google.com; s=arc-20160816; b=RyfQArB4LO83PQObMeMOlqclYhW4Nf+bgvjqzcqSuXargifpzO+0zapdr/8+2dcwFh hWMPZeENd5zXMuzD97rgTfI5ph2SomET/mw0QvD56jvSKYAe89N5Jec6WSUQDkGC0rH8 Mvpxf8X1mLr31zt02OSkwah43KiQjKaCI+mIOsWRtxz4YGX9nL33T5J+ukR4TurFZnvY 9C7VlVdEQHeD9J2xT91hkmohArfbcJ+V61CVv+5R2w6kmKweSTFa2YHAJ8b4/JgEc2yk ZpD/ZXEeh0Scw8w1jH7zbf5nuEjPTcgehR51f7+KxahVeCOvYeQw0I55qliT2FB5XOJc HPzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=FhbLyig36LgE+Q142gfxAfiOJVJZ2YPdKRPQmHJwn5Q=; b=r/tSvg+X7WlnE0xUflFLys7k5H/EkT1dVp5NRf65KWcBWMN/aSAJbdnIP6W+u1kWXv hSk5S5bkHZOpiYBklUt7keS/eH1rz0rsyxRAg1zuVr7zs89CUQyrc4GUrTvRyZ83iaDj QVpiu/Xz+KouZVHRVSVUtwnDO/rIB7kDYCHHhqKc9UsrthYKttfvw70k5wl3KgNPxf6P GDeRH27B4azGac4IOEIlv9U8tw7levZjSkimMoA78D6MVtkduE+8V0IngAvV7NkRTQpn L5nBWLPVbgKhxvkxQYjlbU3lYDB7uo0o/YnCwNkX7emeqSuUMYPhF6iCLNOH18v88a3c qvzg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TNDWqm5G; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a23si10402875ejj.373.2019.11.27.13.35.23; Wed, 27 Nov 2019 13:35:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TNDWqm5G; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729239AbfK0Vcf (ORCPT + 99 others); Wed, 27 Nov 2019 16:32:35 -0500 Received: from mail.kernel.org ([198.145.29.99]:41552 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728366AbfK0UxL (ORCPT ); Wed, 27 Nov 2019 15:53:11 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 33CEB21774; Wed, 27 Nov 2019 20:53:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1574887990; bh=tbtk4ZJrPTtjXR+uDo9oZZx5WFHNPAYVSs9Zpfb6ccY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TNDWqm5GXrrD8uxciaqmXcuTaM7uYzvG6WWDiWWPExgC8EnvOLLSHrwtuYQaBqkoi OAmhuW919Uphjc5pAOfAawJYBrwx8Ywg/Nwhd2aHIBdVLufu3TeLDwWH0O1mk62Y98 lmuKhfcluobnjLiFcB0nlTKFUxjL+watGGnwXrgY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Hari Vyas , Will Deacon , Catalin Marinas , Lee Jones Subject: [PATCH 4.14 172/211] arm64: fix for bad_mode() handler to always result in panic Date: Wed, 27 Nov 2019 21:31:45 +0100 Message-Id: <20191127203110.120376346@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191127203049.431810767@linuxfoundation.org> References: <20191127203049.431810767@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Hari Vyas commit e4ba15debcfd27f60d43da940a58108783bff2a6 upstream. The bad_mode() handler is called if we encounter an uunknown exception, with the expectation that the subsequent call to panic() will halt the system. Unfortunately, if the exception calling bad_mode() is taken from EL0, then the call to die() can end up killing the current user task and calling schedule() instead of falling through to panic(). Remove the die() call altogether, since we really want to bring down the machine in this "impossible" case. Signed-off-by: Hari Vyas Signed-off-by: Will Deacon Signed-off-by: Catalin Marinas Signed-off-by: Lee Jones Signed-off-by: Greg Kroah-Hartman --- arch/arm64/kernel/traps.c | 1 - 1 file changed, 1 deletion(-) --- a/arch/arm64/kernel/traps.c +++ b/arch/arm64/kernel/traps.c @@ -648,7 +648,6 @@ asmlinkage void bad_mode(struct pt_regs handler[reason], smp_processor_id(), esr, esr_get_class_string(esr)); - die("Oops - bad mode", regs, 0); local_irq_disable(); panic("bad mode"); }