x86/hw_breakpoint: Prevent data breakpoints on cpu_entry_area
authorAndy Lutomirski <luto@kernel.org>
Mon, 24 Feb 2020 12:24:58 +0000 (13:24 +0100)
committerThomas Gleixner <tglx@linutronix.de>
Thu, 11 Jun 2020 13:14:33 +0000 (15:14 +0200)
commit24ae0c91cbc57c2deb0401bd653453a508acdcee
tree757bf36dcca535e0e58bee390fa9b9d0423d6cfc
parent1f1fbc70c10e81f70e9fbe2102d439c883269811
x86/hw_breakpoint: Prevent data breakpoints on cpu_entry_area

A data breakpoint near the top of an IST stack will cause unrecoverable
recursion.  A data breakpoint on the GDT, IDT, or TSS is terrifying.
Prevent either of these from happening.

Co-developed-by: Peter Zijlstra <peterz@infradead.org>
Signed-off-by: Andy Lutomirski <luto@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Borislav Petkov <bp@suse.de>
Reviewed-by: Lai Jiangshan <jiangshanlai@gmail.com>
Reviewed-by: Alexandre Chartre <alexandre.chartre@oracle.com>
Link: https://lkml.kernel.org/r/20200505134058.272448010@linutronix.de
arch/x86/kernel/hw_breakpoint.c