Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp890292imc; Mon, 11 Mar 2019 01:32:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqwn1KKblE3v2G8A67ogm6uK0ToBU/GCTccQGGYDGH9vAIKtJ/YWwfCZfk2FVGb3gI+GPPs+ X-Received: by 2002:a63:1322:: with SMTP id i34mr28608482pgl.208.1552293136097; Mon, 11 Mar 2019 01:32:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552293136; cv=none; d=google.com; s=arc-20160816; b=SbjtUhN4HS0gIRUVjBa2NRHmRDLDr0a/0tyosRDUxVyq5UHGKRUwe91cKKhOUsqQGh tu8vTX5txbz9g3XDNQ61RRMJY7Z/0EIQK0T32BygexCDd13SFtcDI8bN+mjVtPC4eK35 zMPN3x6GLrJDplFwQzwbP6U/dC/xsea/qRe5oXlKv9JljKS/DI/eK3x/uFbwYDBTi5mm hOw7HH5tWH6C5NEFOCCHahPa64wMprIur5ziRqzBdByATpl54jT+5V8Rr7YKCpopjRGf EN98cLDHtI24CXiKDguz0XqFV8gXj/gmyRAYE93vP4etu4JKd6V/e9WAxXf6OxpWx+zY hEAg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:cc:to:subject:from:references :in-reply-to:message-id:dkim-signature; bh=B0nQyqiGH3aRlHcYu8sdot3Amd5XK2pi0D6V13MJmPk=; b=Sjp5euYOE/qSHaAfZAT4nF9JG264AA4VK63HZWhholJKhjALqZzr8BiALzJAXuPc2t K2vHGetebVJmZZ4XtpaJC30GNcX1Q3VTMwQjYX91uX4wGC8kYggn2A4aZjJxA2YoRkkh ZnSuJadCAsok16SgNn77Wp9eStQDcbnNVAUOgvdKQfmdxzJ/OdQ3OcwAyYHCfc9o6Lxv BUjOCBHpfd2auHsG/eT9zemFfBPpSOKHWfpYszKTaLVZG1+PWpzQkFbYIPm2O9dQ2xbX mzDKfX5/For9FntuRBOr9FFzJ6knNWNCmDV3WR7R2WiTP3pVpWtH0VZP4ug/XPmBS0cE fPbQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=KGnQAfLF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h9si2183296pgq.57.2019.03.11.01.32.00; Mon, 11 Mar 2019 01:32:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@c-s.fr header.s=mail header.b=KGnQAfLF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727167AbfCKIbA (ORCPT + 99 others); Mon, 11 Mar 2019 04:31:00 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:5136 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727048AbfCKIaf (ORCPT ); Mon, 11 Mar 2019 04:30:35 -0400 Received: from localhost (mailhub1-int [192.168.12.234]) by localhost (Postfix) with ESMTP id 44Hrs15BQNzB09Zw; Mon, 11 Mar 2019 09:30:29 +0100 (CET) Authentication-Results: localhost; dkim=pass reason="1024-bit key; insecure key" header.d=c-s.fr header.i=@c-s.fr header.b=KGnQAfLF; dkim-adsp=pass; dkim-atps=neutral X-Virus-Scanned: Debian amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [192.168.12.234]) (amavisd-new, port 10024) with ESMTP id D6tdU4J6SN2J; Mon, 11 Mar 2019 09:30:29 +0100 (CET) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 44Hrs145BBzB09ZD; Mon, 11 Mar 2019 09:30:29 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=c-s.fr; s=mail; t=1552293029; bh=B0nQyqiGH3aRlHcYu8sdot3Amd5XK2pi0D6V13MJmPk=; h=In-Reply-To:References:From:Subject:To:Cc:Date:From; b=KGnQAfLFxiWggUQIE8W9R1EN3SZoOtdD8P2KOnSUOkZPsqJjr4xa1/5VO4ghoP1Al RFXGPl7XG1ZQbCe5nhKpzlK+qRAfvc3/2tGJIe1QGGGTg6p9iE9lvhMiNz7WbuwC7Y WIOxF2zS9wF+tN82kLOEYjiSXfh00TV18IEClO54= Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 151DA8B813; Mon, 11 Mar 2019 09:30:34 +0100 (CET) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id fJbmNdOhlnHB; Mon, 11 Mar 2019 09:30:34 +0100 (CET) Received: from po16846vm.idsi0.si.c-s.fr (po15451.idsi0.si.c-s.fr [172.25.231.2]) by messagerie.si.c-s.fr (Postfix) with ESMTP id EBA328B7FE; Mon, 11 Mar 2019 09:30:33 +0100 (CET) Received: by po16846vm.idsi0.si.c-s.fr (Postfix, from userid 0) id DA3DB6FA08; Mon, 11 Mar 2019 08:30:33 +0000 (UTC) Message-Id: <4abe5532a0a3a6165342c5ff3ff76f18bf4cdef6.1552292207.git.christophe.leroy@c-s.fr> In-Reply-To: References: From: Christophe Leroy Subject: [PATCH v2 06/10] powerpc/8xx: Add Kernel Userspace Execution Prevention To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , ruscur@russell.cc Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Date: Mon, 11 Mar 2019 08:30:33 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch adds Kernel Userspace Execution Prevention on the 8xx. When a page is Executable, it is set Executable for Key 0 and NX for Key 1. Up to now, the User group is defined with Key 0 for both User and Supervisor. By changing the group to Key 0 for User and Key 1 for Supervisor, this patch prevents the Kernel from being able to execute user code. Signed-off-by: Christophe Leroy --- arch/powerpc/include/asm/nohash/32/mmu-8xx.h | 7 +++++++ arch/powerpc/mm/8xx_mmu.c | 12 ++++++++++++ arch/powerpc/platforms/Kconfig.cputype | 1 + 3 files changed, 20 insertions(+) diff --git a/arch/powerpc/include/asm/nohash/32/mmu-8xx.h b/arch/powerpc/include/asm/nohash/32/mmu-8xx.h index fc5a653d5dd2..3cb743284e09 100644 --- a/arch/powerpc/include/asm/nohash/32/mmu-8xx.h +++ b/arch/powerpc/include/asm/nohash/32/mmu-8xx.h @@ -41,6 +41,13 @@ */ #define MI_APG_INIT 0x4fffffff +/* + * 0 => Kernel => 01 (all accesses performed according to page definition) + * 1 => User => 10 (all accesses performed according to swaped page definition) + * 2-16 => NA => 11 (all accesses performed as user iaw page definition) + */ +#define MI_APG_KUEP 0x6fffffff + /* The effective page number register. When read, contains the information * about the last instruction TLB miss. When MI_RPN is written, bits in * this register are used to create the TLB entry. diff --git a/arch/powerpc/mm/8xx_mmu.c b/arch/powerpc/mm/8xx_mmu.c index fe1f6443d57f..e257a0c9bd08 100644 --- a/arch/powerpc/mm/8xx_mmu.c +++ b/arch/powerpc/mm/8xx_mmu.c @@ -213,3 +213,15 @@ void flush_instruction_cache(void) mtspr(SPRN_IC_CST, IDC_INVALL); isync(); } + +#ifdef CONFIG_PPC_KUEP +void __init setup_kuep(bool disabled) +{ + if (disabled) + return; + + pr_info("Activating Kernel Userspace Execution Prevention\n"); + + mtspr(SPRN_MI_AP, MI_APG_KUEP); +} +#endif diff --git a/arch/powerpc/platforms/Kconfig.cputype b/arch/powerpc/platforms/Kconfig.cputype index 2e45a6e2bc99..00fa0d110dcb 100644 --- a/arch/powerpc/platforms/Kconfig.cputype +++ b/arch/powerpc/platforms/Kconfig.cputype @@ -34,6 +34,7 @@ config PPC_8xx bool "Freescale 8xx" select FSL_SOC select SYS_SUPPORTS_HUGETLBFS + select PPC_HAVE_KUEP config 40x bool "AMCC 40x" -- 2.13.3