]> git.baikalelectronics.ru Git - kernel.git/commit
s390: prevent leaking kernel address in BEAR
authorSven Schnelle <svens@linux.ibm.com>
Wed, 22 Jan 2020 12:38:22 +0000 (13:38 +0100)
committerVasily Gorbik <gor@linux.ibm.com>
Tue, 10 Mar 2020 14:16:25 +0000 (15:16 +0100)
commitfc01bb625774103316b7a695cabde5d18c886227
treee1694c41af0832e7dd737cd6f4ebea668375def9
parentd6fe9b3b9a4450c232fe663ff6ee007162e4150b
s390: prevent leaking kernel address in BEAR

When userspace executes a syscall or gets interrupted,
BEAR contains a kernel address when returning to userspace.
This make it pretty easy to figure out where the kernel is
mapped even with KASLR enabled. To fix this, add lpswe to
lowcore and always execute it there, so userspace sees only
the lowcore address of lpswe. For this we have to extend
both critical_cleanup and the SWITCH_ASYNC macro to also check
for lpswe addresses in lowcore.

Fixes: 483676a7029c ("s390/kernel: add support for kernel address space layout randomization (KASLR)")
Cc: <stable@vger.kernel.org> # v5.2+
Reviewed-by: Gerald Schaefer <gerald.schaefer@de.ibm.com>
Signed-off-by: Sven Schnelle <svens@linux.ibm.com>
Signed-off-by: Vasily Gorbik <gor@linux.ibm.com>
arch/s390/include/asm/lowcore.h
arch/s390/include/asm/processor.h
arch/s390/include/asm/setup.h
arch/s390/kernel/asm-offsets.c
arch/s390/kernel/entry.S
arch/s390/kernel/process.c
arch/s390/kernel/setup.c
arch/s390/kernel/smp.c
arch/s390/mm/vmem.c