Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp1980404ybh; Tue, 14 Jul 2020 12:11:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzK7uKka+VOdFhqMMCiSVMlUvPxUv5xR4FM2xjORg/xq8wUyHHkJkFaCY8OKMo86/6tbEQo X-Received: by 2002:a05:6402:203c:: with SMTP id ay28mr6267473edb.271.1594753909387; Tue, 14 Jul 2020 12:11:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594753909; cv=none; d=google.com; s=arc-20160816; b=YGioUY0sQ+z1Y9yr8Oqz+Xe7na5LXUQs9cYUNw2phSiEwZvCkQfQV+9VperFOEhe3i J+esMzhUKkRWxWmc5y/n+oqTpisUaV1m7C5tlcUIBox/gWn9rNPP2gYGai2F0/xhRR+y Y23NBQ+j6x6w6xkN7jlKNUOFF0py9YSI8H4gv2KKPaIx+3FRv8YNgQBOc8tlyeUBjQA+ VSVI6OHfKk+Yv9jsT3WYGvPoa3L54zKo1Ygrtz3Yb3VnpbiOKD9Gi0aYgLNWbnrzvBK3 hdt/v3NiUCu761QmDyHvzJlStzvOuIvLQCBWsliTTfPKH4goh/EQlYqFzt27FQ6JWe6n eOgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=cYEYcdsg2Wj3zTblFuK/ci6hXEeMlbrfBHZ3BuWiePk=; b=YGWOOLehukkI27BpId+3OFvjJfw4rLNDwsWR1PJUtR9a8jFYzkiuyVvSXIbY1Q1mAe MZKtavrRhvE1cw1JXbEx/+i2tgTeSe3QdghSXXtkeqdOT+4WfgRtmPicNaXbZxNaKk0Z sfQwlSkiM9wxWo8yie9odl5kxH7S8XbvbLn2Gdij1fM5dc2r0ecZsVkFqSgMxm/WxTvB S8cIN3btMk6cwoXpLF7fBDee+FpKX0POdziqPkmF3w9zWTTCsmNKzIAoKerVJYwm8JBx P33qE+sR3a21zaJSa8yifMNUwZ9ZVP1FLMQ63JjtfQmbGvWZYkIxvniKC7klHttiwSze tVeQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ldz+V3zg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o10si11878975ejx.722.2020.07.14.12.11.26; Tue, 14 Jul 2020 12:11:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ldz+V3zg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729764AbgGNTLV (ORCPT + 99 others); Tue, 14 Jul 2020 15:11:21 -0400 Received: from mail.kernel.org ([198.145.29.99]:45182 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728926AbgGNStX (ORCPT ); Tue, 14 Jul 2020 14:49:23 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A2AAE22B3F; Tue, 14 Jul 2020 18:49:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1594752563; bh=4+1CY02Uuaz+/7FNehvUYc0HJJynuT1ixS30/49OQKI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ldz+V3zgFg32qCJ2GeCLPBbAbisbAebhMAkD/2KZBKQZegz3U1XthmUQE25LLpimH GmpHOfVOYXQj4q6an8TUd25u79n2WmdkVEew3na0QFCIj1fcUyexhHq+e2TnmV/+wJ e2b1uTrlKXIgg0DnkUiJ/ur/L8mWTzlQAtk5V2BQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Sasha Levin , Alexander Egorenkov Subject: [PATCH 5.4 025/109] s390/kasan: fix early pgm check handler execution Date: Tue, 14 Jul 2020 20:43:28 +0200 Message-Id: <20200714184106.735185073@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200714184105.507384017@linuxfoundation.org> References: <20200714184105.507384017@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Vasily Gorbik [ Upstream commit 998f5bbe3dbdab81c1cfb1aef7c3892f5d24f6c7 ] Currently if early_pgm_check_handler is called it ends up in pgm check loop. The problem is that early_pgm_check_handler is instrumented by KASAN but executed without DAT flag enabled which leads to addressing exception when KASAN checks try to access shadow memory. Fix that by executing early handlers with DAT flag on under KASAN as expected. Reported-and-tested-by: Alexander Egorenkov Reviewed-by: Heiko Carstens Signed-off-by: Vasily Gorbik Signed-off-by: Heiko Carstens Signed-off-by: Sasha Levin --- arch/s390/kernel/early.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/s390/kernel/early.c b/arch/s390/kernel/early.c index b432d63d0b373..2531776cf6cf9 100644 --- a/arch/s390/kernel/early.c +++ b/arch/s390/kernel/early.c @@ -169,6 +169,8 @@ static noinline __init void setup_lowcore_early(void) psw_t psw; psw.mask = PSW_MASK_BASE | PSW_DEFAULT_KEY | PSW_MASK_EA | PSW_MASK_BA; + if (IS_ENABLED(CONFIG_KASAN)) + psw.mask |= PSW_MASK_DAT; psw.addr = (unsigned long) s390_base_ext_handler; S390_lowcore.external_new_psw = psw; psw.addr = (unsigned long) s390_base_pgm_handler; -- 2.25.1