Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2445157yba; Mon, 15 Apr 2019 11:46:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqxUmcv5TexSk6eoZj4OOh9gpNsUZ6IF3ig7q/+8TXSChRQVebvwImd91WP81cz6859iof7X X-Received: by 2002:a62:b61a:: with SMTP id j26mr77949181pff.203.1555354017859; Mon, 15 Apr 2019 11:46:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555354017; cv=none; d=google.com; s=arc-20160816; b=uUpW2ZTvilWZFrrw/+BCdY+qsp9SW1Oz3fETen+ksci0VUZG/0ZqHJ4xWE5Cudn642 nyTldjCH2w9+5AFgdfZSz1JIm0twQlwL743W85GworSicZ4VhaHAI52LADyAFSZmH31F EBu+5lWsqeZy8GCv3REGtKQgx3bh5Eb1SdcPukfDreiORwuh5CHpanPdkq2OJhuwQMKP BLo1gQutuzlUj7BAIk4sffMEdpXJeycBTtwKaDIpsRBIl558vIWD6wMj3l7zLY6jWAvQ t2HigjLMeLyX6hlBED44SmEybnTQyHAqcR8e2koxuMpGirc3tkJGtw69fjw5HQ90Pl/l GnHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=2Z37cmBmHHo+RqBmE3K3g9/dSb4ol6tDpWuIieyRhOs=; b=cGk7rr7xau0OyfAMZFcrsej8LGjFO2G6XDRjfgsyzzQ42GOzG1MtH4bNN0HtHHXwpY Dw/ue+lMXmjBDhjg1Umtq/F6XKYxPqXXDpoUbnRAOJKDFV60BLIrmhOWJQqc6Cl4ibCZ 9kkrdsVEpRkIB1UlX/AWcV8aFy2qa3eIowm3/zIYLuo6YyY46MT2cebWO1yCRzQm5H9a JV2c+ItR+dFaSjzCOKUCNdI4P+doccuMVDQ1HYuvGycfGH8Q91BHGpcuXvJlzxJ7zL4p 7rrWHLRVv34hNeDEDq/x/AfxnDrE0algSoXK4p7AeWUvRzgla0Ta9roHmcSX00LEj6ov ydxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lFqCwSdQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d4si32648905pgc.304.2019.04.15.11.46.41; Mon, 15 Apr 2019 11:46:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=lFqCwSdQ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728443AbfDOSpo (ORCPT + 99 others); Mon, 15 Apr 2019 14:45:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:48182 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728393AbfDOSpn (ORCPT ); Mon, 15 Apr 2019 14:45:43 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2C17B2073F; Mon, 15 Apr 2019 18:45:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1555353942; bh=O8ghSaqomER1TdRDCFfbm6Wh9mkw0U4JbgVizdDs5PI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lFqCwSdQ5PqYZ3sDVtwu0XoV2rXvA40BK5IoqWV6f+9sxgSjzMAC3vVhHTWfUl/mz Dz29+PUhbzAMVxZvPYbFtZRTivF47NTdisukkTf9TEF4onmKRel+qR4hdcFy3fawd1 Rd+3bCdriY1IUHKK8owToR0AWLQGT0h9xtGCF64I= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michael Neuling , Nicholas Piggin , Christophe Leroy , Michael Ellerman , Sasha Levin Subject: [PATCH 4.9 13/76] powerpc: Avoid code patching freed init sections Date: Mon, 15 Apr 2019 20:43:37 +0200 Message-Id: <20190415183711.514716690@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190415183707.712011689@linuxfoundation.org> References: <20190415183707.712011689@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org commit 51c3c62b58b357e8d35e4cc32f7b4ec907426fe3 upstream. This stops us from doing code patching in init sections after they've been freed. In this chain: kvm_guest_init() -> kvm_use_magic_page() -> fault_in_pages_readable() -> __get_user() -> __get_user_nocheck() -> barrier_nospec(); We have a code patching location at barrier_nospec() and kvm_guest_init() is an init function. This whole chain gets inlined, so when we free the init section (hence kvm_guest_init()), this code goes away and hence should no longer be patched. We seen this as userspace memory corruption when using a memory checker while doing partition migration testing on powervm (this starts the code patching post migration via /sys/kernel/mobility/migration). In theory, it could also happen when using /sys/kernel/debug/powerpc/barrier_nospec. Cc: stable@vger.kernel.org # 4.13+ Signed-off-by: Michael Neuling Reviewed-by: Nicholas Piggin Reviewed-by: Christophe Leroy Signed-off-by: Michael Ellerman Signed-off-by: Sasha Levin --- arch/powerpc/include/asm/setup.h | 1 + arch/powerpc/lib/code-patching.c | 8 ++++++++ arch/powerpc/mm/mem.c | 2 ++ 3 files changed, 11 insertions(+) diff --git a/arch/powerpc/include/asm/setup.h b/arch/powerpc/include/asm/setup.h index 703ddf752516..709f4e739ae8 100644 --- a/arch/powerpc/include/asm/setup.h +++ b/arch/powerpc/include/asm/setup.h @@ -8,6 +8,7 @@ extern void ppc_printk_progress(char *s, unsigned short hex); extern unsigned int rtas_data; extern unsigned long long memory_limit; +extern bool init_mem_is_free; extern unsigned long klimit; extern void *zalloc_maybe_bootmem(size_t size, gfp_t mask); diff --git a/arch/powerpc/lib/code-patching.c b/arch/powerpc/lib/code-patching.c index 753d591f1b52..c77c486fbf24 100644 --- a/arch/powerpc/lib/code-patching.c +++ b/arch/powerpc/lib/code-patching.c @@ -14,12 +14,20 @@ #include #include #include +#include +#include int patch_instruction(unsigned int *addr, unsigned int instr) { int err; + /* Make sure we aren't patching a freed init section */ + if (init_mem_is_free && init_section_contains(addr, 4)) { + pr_debug("Skipping init section patching addr: 0x%px\n", addr); + return 0; + } + __put_user_size(instr, addr, 4, err); if (err) return err; diff --git a/arch/powerpc/mm/mem.c b/arch/powerpc/mm/mem.c index 5f844337de21..1e93dbc88e80 100644 --- a/arch/powerpc/mm/mem.c +++ b/arch/powerpc/mm/mem.c @@ -62,6 +62,7 @@ #endif unsigned long long memory_limit; +bool init_mem_is_free; #ifdef CONFIG_HIGHMEM pte_t *kmap_pte; @@ -396,6 +397,7 @@ void __init mem_init(void) void free_initmem(void) { ppc_md.progress = ppc_printk_progress; + init_mem_is_free = true; free_initmem_default(POISON_FREE_INITMEM); } -- 2.19.1