Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp3057688ybt; Mon, 29 Jun 2020 14:09:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzVwdOgqQ88USbgm+4qz9ZZ4VMYhfM2AHAWGShBl4MDEAivLvUXbftRtMt78OSHdTYof/td X-Received: by 2002:a17:906:6558:: with SMTP id u24mr3663791ejn.364.1593464968635; Mon, 29 Jun 2020 14:09:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593464968; cv=none; d=google.com; s=arc-20160816; b=xNz8aLASZFWbr6JkgLMy7LYp7pZ+iUBaXqKBPYErtbEy7Dt8ySzA2pItT09NsVWOBL fCVyesi3+1uAvR1eH1tGszO8ef/JozugpycgYYmQtL1x46oJaZN6i+CnzaLJ4agoq0rE Tgo71YpyH+0NsFk5G5/psIym3ksBBpy0S60wnk+dFO37DjSH/SJN90Uhhc+kMjV5emvS aT9UDY/yOmNz00c6PqikwkNScJSYPOIW7WDsOV1ZECg92oyGCe2Efn6vOuuS32ZNYOPi 7tb5Y043D0OJZ9vN41igCrrq2Xld/8vcq7s7nNEKeRytD6hzhzmOxhyFvzkUP+MRCYem rMNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=qTJgY+5T/59DxKl1ymcvuJUky7SYk9GF8FzSXhHZqiU=; b=AW0RPCnBrCimY+18PlJh4XlS4Qx3BZAjO13RCvD42155eIoksKQxmYsALAWfc+BecL NJk1FdqcZoWa8CeRd8/nxxXGYgxCzWmda0fXzTe17t+Fxlv2RvmUhPCEasE7f3HGf7ma o0KDmrw4oUz9iGuVgbh+usa+gAOTTXA61JXhUh1+3tyVe/LJK4EgreKXgDSqcyTz0Bhd zWNlfjpS9psXCcd+u/JyDP1kJq0dboMLNLvCqSX4skNcbYwn5cmgfmS6oIbvDmQYuEnc i75jQGVfj304IMIXW68EN5UGws/ppMj1zaJXDiMVK6JAjpfjA3Zg9mjlzKS2U2iPy4QN dv6w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yJ4P5CgZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lj13si322655ejb.357.2020.06.29.14.09.05; Mon, 29 Jun 2020 14:09:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=yJ4P5CgZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387870AbgF2VHl (ORCPT + 99 others); Mon, 29 Jun 2020 17:07:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:53726 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730773AbgF2TKR (ORCPT ); Mon, 29 Jun 2020 15:10:17 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C2208254E9; Mon, 29 Jun 2020 15:54:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1593446042; bh=OOL5AQyC70XboO1uFudQJ7C4T+r/QhbK3Ww63OnGLbE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yJ4P5CgZhyXxJYosndbEdg/cjAc0MPgmNUEVAzLgvDo+pfbL5D6qLm1MjEF6rV0jR gmf14oDWrSBczwUGVhu7eENq/5y3ei18EKzMiEhAjsLc4LCF7U7p7zSVIDoTkLX1cg t3v1ovjntCRquShPs1wE4jrAgF/GHy1R2KLUOWRY= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Stafford Horne , Sasha Levin Subject: [PATCH 4.4 047/135] openrisc: Fix issue with argument clobbering for clone/fork Date: Mon, 29 Jun 2020 11:51:41 -0400 Message-Id: <20200629155309.2495516-48-sashal@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200629155309.2495516-1-sashal@kernel.org> References: <20200629155309.2495516-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v4.x/stable-review/patch-4.4.229-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-4.4.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 4.4.229-rc1 X-KernelTest-Deadline: 2020-07-01T15:53+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Stafford Horne [ Upstream commit 6bd140e14d9aaa734ec37985b8b20a96c0ece948 ] Working on the OpenRISC glibc port I found that sometimes clone was working strange. That the tls data argument sent in r7 was always wrong. Further investigation revealed that the arguments were getting clobbered in the entry code. This patch removes the code that writes to the argument registers. This was likely due to some old code hanging around. This patch fixes this up for clone and fork. This fork clobber is harmless but also useless so remove. Signed-off-by: Stafford Horne Signed-off-by: Sasha Levin --- arch/openrisc/kernel/entry.S | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/openrisc/kernel/entry.S b/arch/openrisc/kernel/entry.S index c17e8451d9978..3fbe420f49c43 100644 --- a/arch/openrisc/kernel/entry.S +++ b/arch/openrisc/kernel/entry.S @@ -1092,13 +1092,13 @@ ENTRY(__sys_clone) l.movhi r29,hi(sys_clone) l.ori r29,r29,lo(sys_clone) l.j _fork_save_extra_regs_and_call - l.addi r7,r1,0 + l.nop ENTRY(__sys_fork) l.movhi r29,hi(sys_fork) l.ori r29,r29,lo(sys_fork) l.j _fork_save_extra_regs_and_call - l.addi r3,r1,0 + l.nop ENTRY(sys_rt_sigreturn) l.j _sys_rt_sigreturn -- 2.25.1