Received: by 2002:a25:2c96:0:0:0:0:0 with SMTP id s144csp1131737ybs; Mon, 25 May 2020 07:53:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzffwlQL0rMy4wqqG1kr0z6IqNHDy9bDALY5gvw+PElIz19nYNXSV77yZegVatht57YLWxE X-Received: by 2002:aa7:da8c:: with SMTP id q12mr15767064eds.334.1590418398200; Mon, 25 May 2020 07:53:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590418398; cv=none; d=google.com; s=arc-20160816; b=TiSjVdsLqw2p/lDwl4Vpbv+syjIYFsDbeiYjcOcm6BIotfdOg9YPShWGcURCmhXXbe 2vwUpfUZF42Bbi4Ji4VEt6YkC6pVYcRs/zacHVmMBLDMv+nw2f4AZFpuceNjlLeNKrE4 QRaDB0S6/QUQlVaEwwPXYY35tQpEsHPdS3w+NBOG+AYhsQkbQnHyQJ5mUlLYKneRuK+h cdN1xoWh6GZETdOalXNb0YWj0qCWY8nY9klb0nvCVYGziDERhitb1kuE31TqygFtruzE F/9q/2ziIYffsPN2j9xCg9FHPZ6KtOvZWP9r+dzeKiPvUqi6ChK4A5RPLDCsKUfDiDRZ SLNA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=G3ByXlwkFsWv/Q4T8hxab4lUId6KCPsgr9+PJ2Z4Vbo=; b=CDC4Es4Vb+g5UPuUSkAjtrnTuyAQKhGnP7ZaCq8FvqO0PNoW9+Xlplx1RwERwIU0OQ iFG/icL+tHkI/83n13wDM4BiWURvag6G+EvFHinwcWxP05m3IUcu+MLugS8YkI+Nu2Er sGj7mDPzOyqIMZ4IcaD1LEiuWVY+W33CUfc2ZM+fMELb0B2JI7sC1TDs54z/0QTjKRTo iU7ZPh5voVW5GAUHFFNl9b8lEkeGsQa5+/tPExeXar20hErLSKuQQ8ptCv2DXduh+PBE Ga5rIsR6tNnCEmPohbF2VWUNV2uNcGsUJoS4JWxpcn/tPSxlNYJk3Z4UdGazyds+vare u6Vg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q3si9823144ejb.514.2020.05.25.07.52.54; Mon, 25 May 2020 07:53:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391015AbgEYOvM (ORCPT + 99 others); Mon, 25 May 2020 10:51:12 -0400 Received: from out30-57.freemail.mail.aliyun.com ([115.124.30.57]:53947 "EHLO out30-57.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390990AbgEYOvM (ORCPT ); Mon, 25 May 2020 10:51:12 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R191e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04357;MF=laijs@linux.alibaba.com;NM=1;PH=DS;RN=6;SR=0;TI=SMTPD_---0TzckENZ_1590418264; Received: from localhost(mailfrom:laijs@linux.alibaba.com fp:SMTPD_---0TzckENZ_1590418264) by smtp.aliyun-inc.com(127.0.0.1); Mon, 25 May 2020 22:51:04 +0800 From: Lai Jiangshan To: linux-kernel@vger.kernel.org Cc: Lai Jiangshan , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , x86@kernel.org Subject: [RFC PATCH 0/5] x86/hw_breakpoint: protects more cpu entry data Date: Mon, 25 May 2020 14:50:57 +0000 Message-Id: <20200525145102.122557-1-laijs@linux.alibaba.com> X-Mailer: git-send-email 2.20.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello The patchset is based on (tag: entry-v9-the-rest, tglx-devel/x86/entry). And it is complement of 3ea11ac991d ("x86/hw_breakpoint: Prevent data breakpoints on cpu_entry_area"). After reading the code, we can see that more data needs to be protected against hw_breakpoint, otherwise it may cause dangerous/recursive/unwanted #DB. Lai Jiangshan (5): x86/hw_breakpoint: add within_area() to check data breakpoints x86/hw_breakpoint: Prevent data breakpoints on direct GDT x86/hw_breakpoint: Prevent data breakpoints on per_cpu cpu_tss_rw x86/hw_breakpoint: Prevent data breakpoints on user_pcid_flush_mask x86/hw_breakpoint: Prevent data breakpoints on debug_idt_table Cc: Andy Lutomirski Cc: Peter Zijlstra (Intel) Cc: Thomas Gleixner Cc: x86@kernel.org Link: https://lkml.kernel.org/r/20200505134058.272448010@linutronix.de Link: https://lore.kernel.org/lkml/20200521200513.656533920@linutronix.de arch/x86/kernel/hw_breakpoint.c | 71 +++++++++++++++++++++++++++++---- 1 file changed, 63 insertions(+), 8 deletions(-) -- 2.20.1