Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp458524yba; Wed, 15 May 2019 04:28:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqwA9mtaHNQn2ZJaCNulRQxhUG5QGweWKfYIW60I0BV/8L9Wafhe+WfIy05SYrvD3GcMZ+mT X-Received: by 2002:a63:db4e:: with SMTP id x14mr28015791pgi.119.1557919695930; Wed, 15 May 2019 04:28:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557919695; cv=none; d=google.com; s=arc-20160816; b=C/buGIayDIGe4CaWiATUu7vPDoGEyElH0iUzfEwfsROToD9XCSUSq6RsSZO7bfmVMt qjBkC+xHtl7zLrDbNVdv4msJEg6qBaGLdwp+W5y+YJHrf8lYyEvpzYCW/CAQLb2Z26E+ muoIKl9ZlBbN5MNiZd03MWU48QmYqdTQEg9eZqn95vkx0j3f3OdtF/5rMgA7YTd/Sn/V YVWQes9lZOdLTHY+pRjneJ1OAhpxmj4L8QpRC89dW4IRru9HWDkSo+NW9qD2glgUYRJg rUylAE29E0UFlup3w57S9C3IF2E4HaYFzv3xdB2P3XWAwV0jLvfoM6sPdNqmtlpaSFVh fJ3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=OmZdzqJ5rz9+sKviTohL16vpVVOGr+lw593IJRjGgWc=; b=LWkBl1dSMhvL6hKh9GotYo8/5MEYF0z/8f55LBlQLUeM3uKE9gXKlg/c6Fpf7YJwZA 6fR/6mjreALOJgmxGzI61/49nes2S0QQWrwTJFo0GEBZahF+9rDGja76gjh88q7yLtld mbDjDexX0b81S3E/P4aESL/FRUP94ttDR9zgi/tM5Oho8yZUuE3IZVlFDRlExE3qG9Ij doD2Fnge+kVKyVn+gnahi3fjPpXCSgAtNJDlPUohO2OGyI2JaH7chdqrv/5Ax0Ie7VHI VZYBjkKYUQ+tyMCh3SwsrsiTbD/UgqU64jJDs5gFNdTeWJf1a9tiY7WSJS6hEbsXH7hS AzKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Kp5Zs5pB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w67si1931218pfb.125.2019.05.15.04.28.00; Wed, 15 May 2019 04:28:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Kp5Zs5pB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731739AbfEOLZb (ORCPT + 99 others); Wed, 15 May 2019 07:25:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:36244 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731550AbfEOLZ2 (ORCPT ); Wed, 15 May 2019 07:25:28 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 809A42089E; Wed, 15 May 2019 11:25:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1557919528; bh=vUQzSnELn00Y8vO8upYf8r+N3HxY9LCoXUePa8jzX6E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Kp5Zs5pB1lLUTx6GQB1JzUwYb0xvo3iw6wjPYpeQ/q4s3D1O4+J7vsyAgMGfCLDSf 6GgA7o4kjcb5FwxptN1v1Fd9GJxGFZ8z1b/SGjXSflXuwXVR91QqPIrv7ak1ZpSHqv RWHhPnKu///F48faGz4VKpZcHIA/XUTk9Pi1/NGM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Russell Currey , Akshay Adiga , Nicholas Piggin , Michael Ellerman Subject: [PATCH 4.19 109/113] powerpc/powernv/idle: Restore IAMR after idle Date: Wed, 15 May 2019 12:56:40 +0200 Message-Id: <20190515090701.956280463@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190515090652.640988966@linuxfoundation.org> References: <20190515090652.640988966@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Russell Currey commit a3f3072db6cad40895c585dce65e36aab997f042 upstream. Without restoring the IAMR after idle, execution prevention on POWER9 with Radix MMU is overwritten and the kernel can freely execute userspace without faulting. This is necessary when returning from any stop state that modifies user state, as well as hypervisor state. To test how this fails without this patch, load the lkdtm driver and do the following: $ echo EXEC_USERSPACE > /sys/kernel/debug/provoke-crash/DIRECT which won't fault, then boot the kernel with powersave=off, where it will fault. Applying this patch will fix this. Fixes: 3b10d0095a1e ("powerpc/mm/radix: Prevent kernel execution of user space") Cc: stable@vger.kernel.org # v4.10+ Signed-off-by: Russell Currey Reviewed-by: Akshay Adiga Reviewed-by: Nicholas Piggin Signed-off-by: Michael Ellerman Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/kernel/idle_book3s.S | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) --- a/arch/powerpc/kernel/idle_book3s.S +++ b/arch/powerpc/kernel/idle_book3s.S @@ -170,6 +170,9 @@ core_idle_lock_held: bne- core_idle_lock_held blr +/* Reuse an unused pt_regs slot for IAMR */ +#define PNV_POWERSAVE_IAMR _DAR + /* * Pass requested state in r3: * r3 - PNV_THREAD_NAP/SLEEP/WINKLE in POWER8 @@ -200,6 +203,12 @@ pnv_powersave_common: /* Continue saving state */ SAVE_GPR(2, r1) SAVE_NVGPRS(r1) + +BEGIN_FTR_SECTION + mfspr r5, SPRN_IAMR + std r5, PNV_POWERSAVE_IAMR(r1) +END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) + mfcr r5 std r5,_CCR(r1) std r1,PACAR1(r13) @@ -924,6 +933,17 @@ BEGIN_FTR_SECTION END_FTR_SECTION_IFSET(CPU_FTR_HVMODE) REST_NVGPRS(r1) REST_GPR(2, r1) + +BEGIN_FTR_SECTION + /* IAMR was saved in pnv_powersave_common() */ + ld r5, PNV_POWERSAVE_IAMR(r1) + mtspr SPRN_IAMR, r5 + /* + * We don't need an isync here because the upcoming mtmsrd is + * execution synchronizing. + */ +END_FTR_SECTION_IFSET(CPU_FTR_ARCH_207S) + ld r4,PACAKMSR(r13) ld r5,_LINK(r1) ld r6,_CCR(r1)