ARM: software-based priviledged-no-access support
authorRussell King <rmk+kernel@arm.linux.org.uk>
Wed, 19 Aug 2015 19:40:41 +0000 (20:40 +0100)
committerRussell King <rmk+kernel@arm.linux.org.uk>
Wed, 26 Aug 2015 19:34:24 +0000 (20:34 +0100)
commita5e090acbf545c0a3b04080f8a488b17ec41fe02
treeae603e2e67bcac0564b2eba0a7771f8c5cebf352
parent2190fed67ba6f3e8129513929f2395843645e928
ARM: software-based priviledged-no-access support

Provide a software-based implementation of the priviledged no access
support found in ARMv8.1.

Userspace pages are mapped using a different domain number from the
kernel and IO mappings.  If we switch the user domain to "no access"
when we enter the kernel, we can prevent the kernel from touching
userspace.

However, the kernel needs to be able to access userspace via the
various user accessor functions.  With the wrapping in the previous
patch, we can temporarily enable access when the kernel needs user
access, and re-disable it afterwards.

This allows us to trap non-intended accesses to userspace, eg, caused
by an inadvertent dereference of the LIST_POISON* values, which, with
appropriate user mappings setup, can be made to succeed.  This in turn
can allow use-after-free bugs to be further exploited than would
otherwise be possible.

Signed-off-by: Russell King <rmk+kernel@arm.linux.org.uk>
arch/arm/Kconfig
arch/arm/include/asm/assembler.h
arch/arm/include/asm/domain.h
arch/arm/include/asm/uaccess.h
arch/arm/kernel/process.c
arch/arm/kernel/swp_emulate.c
arch/arm/lib/csumpartialcopyuser.S
This page took 0.025872 seconds and 5 git commands to generate.