Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932470AbaDHQMt (ORCPT ); Tue, 8 Apr 2014 12:12:49 -0400 Received: from smarthost01c.mail.zen.net.uk ([212.23.1.5]:44711 "EHLO smarthost01c.mail.zen.net.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757061AbaDHQMr (ORCPT ); Tue, 8 Apr 2014 12:12:47 -0400 Message-ID: <1396973561.14809.26.camel@linaro1.home> Subject: Re: [PATCH 2/2] ARM: mm: make text and rodata read-only From: "Jon Medhurst (Tixy)" To: Kees Cook Cc: Rabin Vincent , Russell King , Catalin Marinas , Will Deacon , LKML , Laura Abbott , Alexander Holler , "linux-arm-kernel@lists.infradead.org" Date: Tue, 08 Apr 2014 17:12:41 +0100 In-Reply-To: References: <1396577719-14786-1-git-send-email-keescook@chromium.org> <1396577719-14786-3-git-send-email-keescook@chromium.org> <20140404195818.GA21028@debian> <1396960898.3567.55.camel@linaro1.home> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.4.4-3 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-Originating-smarthost01c-IP: [82.69.122.217] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 2014-04-08 at 09:01 -0700, Kees Cook wrote: > On Tue, Apr 8, 2014 at 5:41 AM, Jon Medhurst (Tixy) wrote: > > On Fri, 2014-04-04 at 17:07 -0700, Kees Cook wrote: > >> On Fri, Apr 4, 2014 at 12:58 PM, Rabin Vincent wrote: > > [...] > >> > You need a TLB flush. I had a flush_tlb_all() in my example patch, > >> > http://lists.infradead.org/pipermail/linux-arm-kernel/2014-April/244335.html, > >> > but the following is probably nicer (on top of this patch): > >> > > >> > diff --git a/arch/arm/mm/init.c b/arch/arm/mm/init.c > >> > index 9bea524..a92c45a 100644 > >> > --- a/arch/arm/mm/init.c > >> > +++ b/arch/arm/mm/init.c > >> > @@ -741,6 +741,8 @@ static inline bool arch_has_strict_perms(void) > >> > addr += SECTION_SIZE) \ > >> > section_update(addr, perms[i].mask, \ > >> > perms[i].field); \ > >> > + \ > >> > + flush_tlb_kernel_range(perms[i].start, perms[i].end); \ > >> > } \ > >> > } > >> > > >> > >> When I do this, I hang the system, and get a WARN due to the tlb call > >> attempting to flush on all CPUs, I think: > >> > >> [ 34.246034] WARNING: at > >> /mnt/host/source/src/third_party/kernel-next/kernel/smp.c:466 > >> smp_call_function_many+0xac/0x26c() > >> ... > >> [ 34.246617] Backtrace: > >> [ 34.246697] [] (unwind_backtrace+0x0/0x118) from > >> [] (dump_stack+0x28/0x30) > >> [ 34.246765] [] (dump_stack+0x28/0x30) from [] > >> (warn_slowpath_null+0x44/0x5c) > >> [ 34.246824] [] (warn_slowpath_null+0x44/0x5c) from > >> [] (smp_call_function_many+0xac/0x26c) > >> [ 34.246881] [] (smp_call_function_many+0xac/0x26c) from > >> [] (smp_call_function+0x3c/0x48) > >> [ 34.246937] [] (smp_call_function+0x3c/0x48) from > >> [] (broadcast_tlb_a15_erratum+0x40/0x4c) > >> [ 34.246994] [] (broadcast_tlb_a15_erratum+0x40/0x4c) from > >> [] (flush_tlb_kernel_range+0x74/0xa0) > >> [ 34.247046] [] (flush_tlb_kernel_range+0x74/0xa0) from > >> [] (set_kernel_text_rw+0xd8/0xec) > >> [ 34.247099] [] (set_kernel_text_rw+0xd8/0xec) from > >> [] (__ftrace_modify_code+0x14/0x28) > >> [ 34.247156] [] (__ftrace_modify_code+0x14/0x28) from > >> [] (stop_machine_cpu_stop+0xc0/0x114) > >> [ 34.247212] [] (stop_machine_cpu_stop+0xc0/0x114) from > >> [] (cpu_stopper_thread+0xd8/0x164) > >> [ 34.247266] [] (cpu_stopper_thread+0xd8/0x164) from > >> [] (kthread+0xc8/0xd8) > >> [ 34.247323] [] (kthread+0xc8/0xd8) from [] > >> (ret_from_fork+0x14/0x20) > >> > >> Using local_flush_tlb_kernel_range() fixed it though. > > > > What about if another CPU had a TLB entry with the old permissions in? > > Or do you consider that the likelihood and consequences of that aren't > > significant? > > The purpose of the function is to temporarily make text writable, do > the write, and then restore read-only. Since only the writer needs to > care about TLB state, this works fine. It's actually nice that only > the current CPU can make text writes. And is the page table being modified unique to the current CPU? I thought a common set of page tables was shared across all of them. If that is the case then one CPU can modify the PTE to be writeable, another CPU take a TLB miss and pull in that writeable entry, which will stay there until it drops out the TLB at some indefinite point in the future. That's the scenario I was getting at with my previous comment. -- Tixy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/