Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp555143pxb; Wed, 3 Mar 2021 09:27:20 -0800 (PST) X-Google-Smtp-Source: ABdhPJzOQ5xinxSEAE6x/pPT+kWdMjGQ6yg43IQbhE+904p8LwQI7eu+1rkcfFrN7ZdxEdtKPWw/ X-Received: by 2002:aa7:c6d2:: with SMTP id b18mr327543eds.183.1614792440052; Wed, 03 Mar 2021 09:27:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614792440; cv=none; d=google.com; s=arc-20160816; b=gbi0GM3RS1ntgzgs0Va/b9HnfAQ89INpP4z1+MrRenOQnQYCRFASyl56+tCK0N8L7s ASAqvSoC0xOICrr0FabaUinFAPMIpCOKWxdLyWndksz5hh2jy6yEyfhh4QaTttvNigLK 0MPu45+3w8NfISvf8FcL2OthZr7T4D6uRTwTzH5WZnyvm8iNrnuT255+LdV3gIpexYSG r57bcOjsy6UzIlni0x3Dii3tcqd0/xEutFh8N6rK4X86SORVnwVLQyyttR87kbBiMAj5 SmYQ6TgwyVm2jwTukpkbVs0mIcBsUm73/Wuj5/glSGdZxc0WpNb+OdVxCAZblP+7zCvM iVBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=tyWEh3ceRxv+0uEwVyCvKkFLNW/9kmD047ccE9dE6GA=; b=PVI24irNQf3CY9IJTkuwqsjmTKd8AUmPBBHBeaSFuFgXqsGxD7qG6goGMo95VIaUUf T0tmhixDQxE+0vAqVYhscOo5NrXwBWEulQOqpeIgZE/Jkw22wUne1hdWPEDXdbsME1WM bN+YPhfX9QYaFCDx/UrUnO2re3yv4eGwmcjDS5GZZjselP0WCl5+rIv0m3Zy3sL0EADD XeA8vgJbdrCeWspIBSP8Ydx8xTxDUOeZuMUb87CsfKiq3PXhK/bgvHD9i/vZ9Jn7BtDl MTbWgBR3fsdnMQqFWTW+/bcp7G7JLKNB8zsjId5hSijZr7EuKr05AK58sYTksZlrT9gB AvDQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=k5iBntDN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a3si15908718ejd.310.2021.03.03.09.26.14; Wed, 03 Mar 2021 09:27:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=k5iBntDN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1377602AbhCBAr6 (ORCPT + 99 others); Mon, 1 Mar 2021 19:47:58 -0500 Received: from mail.kernel.org ([198.145.29.99]:53408 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239728AbhCASmk (ORCPT ); Mon, 1 Mar 2021 13:42:40 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 1E0B764F6E; Mon, 1 Mar 2021 17:01:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1614618105; bh=YKOIZLt6JK+OyGakGVDrBEZGwci86HLf7KXQNm3Aekc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=k5iBntDNIMh3gRWJNLvEzt9FrNUWLctImtyZ16iHR1mvP2N+aAPYMguSFv7oovS54 sP+mGyEkNoc7AVn3u3iUYSyWwRckC1cBaM5/3DKdQY9VjMixyM3U+PDgLXaiONrWKP UcHHwCKS5rlvyqjNCjzupAravcHZs/FFYpbxDPuQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christophe Leroy , Michael Ellerman Subject: [PATCH 5.4 309/340] powerpc/32s: Add missing call to kuep_lock on syscall entry Date: Mon, 1 Mar 2021 17:14:13 +0100 Message-Id: <20210301161103.492523630@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210301161048.294656001@linuxfoundation.org> References: <20210301161048.294656001@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christophe Leroy commit 57fdfbce89137ae85cd5cef48be168040a47dd13 upstream. Userspace Execution protection and fast syscall entry were implemented independently from each other and were both merged in kernel 5.2, leading to syscall entry missing userspace execution protection. On syscall entry, execution of user space memory must be locked in the same way as on exception entry. Fixes: b86fb88855ea ("powerpc/32: implement fast entry for syscalls on non BOOKE") Cc: stable@vger.kernel.org Signed-off-by: Christophe Leroy Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/c65e105b63aaf74f91a14f845bc77192350b84a6.1612796617.git.christophe.leroy@csgroup.eu Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/kernel/entry_32.S | 3 +++ 1 file changed, 3 insertions(+) --- a/arch/powerpc/kernel/entry_32.S +++ b/arch/powerpc/kernel/entry_32.S @@ -336,6 +336,9 @@ trace_syscall_entry_irq_off: .globl transfer_to_syscall transfer_to_syscall: +#ifdef CONFIG_PPC_BOOK3S_32 + kuep_lock r11, r12 +#endif #ifdef CONFIG_TRACE_IRQFLAGS andi. r12,r9,MSR_EE beq- trace_syscall_entry_irq_off