Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp10168ybt; Tue, 23 Jun 2020 13:55:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxF8ObLv25eh8aPo0ri5VQtWJPB4dDpG3cm08vW9mVfZubywACRXXpYPk3ZPU4adhMiQsY6 X-Received: by 2002:a17:906:3905:: with SMTP id f5mr16227780eje.15.1592945755440; Tue, 23 Jun 2020 13:55:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592945755; cv=none; d=google.com; s=arc-20160816; b=qM8bUY7/KNhn2UMAbAO8GyHZYpayjwIqckcEjxq9kumlhLO067Phzy1XlZ4RHm88U/ RVC78JgRgA0FzfUHHLwKf3b+CT9eFlgptdpKPYw36q2KH3qLUyQzDxj9bQo17HsHZiQj mYbbyGjQeodZkhzIFOS9s91N1CcRoiS9hAbQrs+8i0af3/AFjTyYI11XMDpV9W99bUZz ZRGK0QrV4JQK55KeRPiJn94LGaNdLrd933US5nCRtnhCLSut8Yrij5px38+1UYp4jUP9 lDGH7a32dOe/tnPGxawo1lUSBgrnL1RTl0iZoiZyBlWzX6002kks4bZNJpKUzPhXJ8un otnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Qzjbi3wtllZ5Mi/onSgnlQaFy3usqUzY3xzDWyGT3Xs=; b=Wc06D6vBRQdOLnX2v10HWOEEUnMAALiinMXR+AoaZDZ3D1wc9t/veifkm9FZLR3fsf Bm2DQcSSBD7XFCEtnNHMoenwwTzkQSOdPW3Q5PNJ8uVEFwI4c5yNMnGkTcDzsvcaBTPe 1cT+iX8hOlvfCZeuNl5rKHnuQhmDGohHvGOORx0OqifJLh9g0ftu6bLQszas4ROP0QQO jGpcY7FOz1jX03zHgULPsmgvewwGvjjPmSdxlcqsj8b+i9b6c2yDgVeKswv+PcDgTAL5 Ma+GErexquHNKhdcV/eiThD9FUcu91sD9CbRBr24znWP4hs3vxRfjO24lIl9eU+mWPzM Sqyg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DL54jfaq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id mc22si11731329ejb.655.2020.06.23.13.55.32; Tue, 23 Jun 2020 13:55:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DL54jfaq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404153AbgFWUxM (ORCPT + 99 others); Tue, 23 Jun 2020 16:53:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:45204 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2392901AbgFWUq6 (ORCPT ); Tue, 23 Jun 2020 16:46:58 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AC78C214DB; Tue, 23 Jun 2020 20:46:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1592945219; bh=n//SLMJu7Up4JR3PkWv7N4jc0/XL3Id7mT0hrDjIJSI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DL54jfaqsUcXgdCW/xd1nm+FtYdelZ4RMAYxZNb2v31RMV1KZvM5HvY6VKqMyG7og +mSmHG0YYt9tyRmAyKC5WoasIt/HkeIGlL1Ut3T0EUv0U6kgYCw2Y5ocmFyVWwQ8Vs jbu2eeTM/Y5k05Upo+kpK/lQw8wonbuui5JhFEfU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Stafford Horne , Sasha Levin Subject: [PATCH 4.14 085/136] openrisc: Fix issue with argument clobbering for clone/fork Date: Tue, 23 Jun 2020 21:59:01 +0200 Message-Id: <20200623195307.968710030@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200623195303.601828702@linuxfoundation.org> References: <20200623195303.601828702@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stafford Horne [ Upstream commit 6bd140e14d9aaa734ec37985b8b20a96c0ece948 ] Working on the OpenRISC glibc port I found that sometimes clone was working strange. That the tls data argument sent in r7 was always wrong. Further investigation revealed that the arguments were getting clobbered in the entry code. This patch removes the code that writes to the argument registers. This was likely due to some old code hanging around. This patch fixes this up for clone and fork. This fork clobber is harmless but also useless so remove. Signed-off-by: Stafford Horne Signed-off-by: Sasha Levin --- arch/openrisc/kernel/entry.S | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/openrisc/kernel/entry.S b/arch/openrisc/kernel/entry.S index 1107d34e45bf1..0fdfa7142f4b3 100644 --- a/arch/openrisc/kernel/entry.S +++ b/arch/openrisc/kernel/entry.S @@ -1102,13 +1102,13 @@ ENTRY(__sys_clone) l.movhi r29,hi(sys_clone) l.ori r29,r29,lo(sys_clone) l.j _fork_save_extra_regs_and_call - l.addi r7,r1,0 + l.nop ENTRY(__sys_fork) l.movhi r29,hi(sys_fork) l.ori r29,r29,lo(sys_fork) l.j _fork_save_extra_regs_and_call - l.addi r3,r1,0 + l.nop ENTRY(sys_rt_sigreturn) l.jal _sys_rt_sigreturn -- 2.25.1