[PATCH] arm: ensure dump_instr() checks addr_limit
Greg KH
gregkh at linuxfoundation.org
Thu Nov 2 09:47:06 PDT 2017
On Thu, Nov 02, 2017 at 04:34:52PM +0000, Mark Rutland wrote:
> Signed-off-by: Mark Rutland <mark.rutland at arm.com>
Huh? What's that doing up here?
> When CONFIG_DEBUG_USER is enabled, it's possible for a user to
> deliberately trigger dump_instr() with a chosen kernel address.
>
> Let's avoid problems resulting from this by using get_user() rather than
> __get_user(), ensuring that we don't erroneously access kernel memory.
>
> So that we can use the same code to dump user instructions and kernel
> instructions, the common dumping code is factored out to __dump_instr(),
> with the fs manipulated appropriately in dump_instr() around calls to
> this.
>
> Signed-off-by: Mark Rutland <mark.rutland at arm.com>
> Cc: Russell King <rmk+kernel at armlinux.org.uk>
> Cc: stable at vger.kernel.org
It's right here...
confused.
greg k-h
More information about the linux-arm-kernel
mailing list