Paul Burton adcc81f148
MIPS: math-emu: Write-protect delay slot emulation pages
Mapping the delay slot emulation page as both writeable & executable
presents a security risk, in that if an exploit can write to & jump into
the page then it can be used as an easy way to execute arbitrary code.

Prevent this by mapping the page read-only for userland, and using
access_process_vm() with the FOLL_FORCE flag to write to it from
mips_dsemul().

This will likely be less efficient due to copy_to_user_page() performing
cache maintenance on a whole page, rather than a single line as in the
previous use of flush_cache_sigtramp(). However this delay slot
emulation code ought not to be running in any performance critical paths
anyway so this isn't really a problem, and we can probably do better in
copy_to_user_page() anyway in future.

A major advantage of this approach is that the fix is small & simple to
backport to stable kernels.

Reported-by: Andy Lutomirski <luto@kernel.org>
Signed-off-by: Paul Burton <paul.burton@mips.com>
Fixes: 432c6bacbd0c ("MIPS: Use per-mm page to execute branch delay slot instructions")
Cc: stable@vger.kernel.org # v4.8+
Cc: linux-mips@vger.kernel.org
Cc: linux-kernel@vger.kernel.org
Cc: Rich Felker <dalias@libc.org>
Cc: David Daney <david.daney@cavium.com>
2018-12-20 10:00:01 -08:00
..
2018-12-03 13:42:38 -08:00
2017-02-13 18:57:34 +00:00
2017-11-03 09:02:30 -07:00
2017-11-03 09:02:30 -07:00
2018-10-31 08:54:16 -07:00
2013-02-01 10:00:22 +01:00
2013-02-01 10:00:22 +01:00
2013-02-01 10:00:22 +01:00
2017-01-03 16:34:34 +01:00
2018-01-10 16:47:25 +01:00
2016-05-09 12:00:02 +02:00
2018-10-31 08:54:16 -07:00
2018-06-24 09:26:01 -07:00
2018-08-31 11:49:20 -07:00
2018-08-01 13:20:15 -07:00
2018-08-01 13:20:15 -07:00
2017-11-15 11:36:08 -08:00
2014-05-24 00:07:01 +02:00
2018-10-31 08:54:16 -07:00
2018-12-03 13:42:38 -08:00