BACKPORT: arm64: Add CNTFRQ_EL0 trap handler
authorMarc Zyngier <marc.zyngier@arm.com>
Wed, 20 Dec 2017 09:34:10 +0000 (14:34 +0530)
committerWinnie Hsu <whsu@nvidia.com>
Mon, 12 Mar 2018 17:19:10 +0000 (10:19 -0700)
commitd38815850d8e7ce9f5b6a43a7ea06910b9f921e8
tree153ad7051696c625a9d78fcec8808cbf93678468
parent80d6c0e87a98ae0973e9d76c1eb4678c85b5a8d4
BACKPORT: arm64: Add CNTFRQ_EL0 trap handler

We now trap accesses to CNTVCT_EL0 when the counter is broken
enough to require the kernel to mediate the access. But it
turns out that some existing userspace (such as OpenMPI) do
probe for the counter frequency, leading to an UNDEF exception
as CNTVCT_EL0 and CNTFRQ_EL0 share the same control bit.

The fix is to handle the exception the same way we do for CNTVCT_EL0.

Bug 2031796
CVE-2017-13218

Fixes: a86bd139f2ae ("arm64: arch_timer: Enable CNTVCT_EL0 trap if workaround is enabled")
Reported-by: Hanjun Guo <guohanjun@huawei.com>
Tested-by: Hanjun Guo <guohanjun@huawei.com>
Reviewed-by: Hanjun Guo <guohanjun@huawei.com>
Signed-off-by: Marc Zyngier <marc.zyngier@arm.com>
Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
(cherry picked from commit 9842119a238bfb92cbab63258dabb54f0e7b111b)
Change-Id: Ie5a9a93fcca238d6097ecacd6df0e540be90220b
Signed-off-by: Gagan Grover <ggrover@nvidia.com>
Reviewed-on: https://git-master.nvidia.com/r/1623696
(cherry picked from commit b7437af000c530e53cedce73a942571405766245)
Reviewed-on: https://git-master.nvidia.com/r/1648568
Reviewed-by: Jeetesh Burman <jburman@nvidia.com>
Tested-by: Jeetesh Burman <jburman@nvidia.com>
Reviewed-by: Bibek Basu <bbasu@nvidia.com>
GVS: Gerrit_Virtual_Submit
arch/arm64/include/asm/esr.h
arch/arm64/kernel/traps.c