[PATCH] arm64: ensure __dump_instr() checks addr_limit

Catalin Marinas catalin.marinas at arm.com
Thu Nov 2 11:31:24 PDT 2017


On Thu, Nov 02, 2017 at 04:12:03PM +0000, Mark Rutland wrote:
> It's possible for a user to deliberately trigger __dump_instr with a
> chosen kernel address.
> 
> Let's avoid problems resulting from this by using get_user() rather than
> __get_user(), ensuring that we don't erroneously access kernel memory.
> 
> Where we use __dump_instr() on kernel text, we already switch to
> KERNEL_DS, so this shouldn't adversely affect those cases.
> 
> Signed-off-by: Mark Rutland <mark.rutland at arm.com>
> Fixes: 60ffc30d5652810d ("arm64: Exception handling")
> Cc: Catalin Marinas <catalin.marinas at arm.com>
> Cc: Will Deacon <will.deacon at arm.com>
> Cc: stable at vger.kernel.org

Queued for 4.14. Thanks.

-- 
Catalin



More information about the linux-arm-kernel mailing list