Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp623799pxj; Thu, 20 May 2021 18:13:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxP8Ru1hXCi8OUbX/zGVNSP+63Ql49az1lzmBVIXOySc6tFUExhAwblzuI4D8A4B0kAw+YM X-Received: by 2002:a17:907:2067:: with SMTP id qp7mr7445833ejb.333.1621559631434; Thu, 20 May 2021 18:13:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621559631; cv=none; d=google.com; s=arc-20160816; b=crwj9Ph8g4Iv7LuBFvIcBpaZzDNa807ykgEU5o5KsOXRh64isvackg5z2GiWjQQa0q PCG5mogldTuZvffRpu0r0OthwdyQN7WORu45jHUkVjS3ZotdF5YDSr3s3EcjpdcqZ4QX XJ7rx9gwEr18JLgCbzIftJEjq2GWXWVgslQTLdQViiZ0LuNYfs6IeqVDl6NnzCStSoj9 tDyAROYeJNChZ9lf3h+P3t+Q6FpPWxx7n4XdjXQEHvHVSSaJqrSs4twB7c7fioUEtg2q gv8gp4RZLJtVXuUwcktzgfoC6/eCZp5XcAqHr3IcnJTumb3n8zzIG9pwel0mnjHGXtLK Uw9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=D3rPfsLOf1B5SRWuUUoF/FHDk+RZ5uyrc4PbW1Ski/I=; b=is8ACLSPD9UJNvpGQsejHEFaZwLhGU/OB9EQh/51mQA1wB0p28DHtvKY97l7KGCplK HhRXbY6t8Kf4ODWOwDK0LO2csCSr4W1qlKkCGxfL8Ox8rw0h4irh22rCiexzv3rywFpn oGWTkdCaCI+YizKChwnAet3ZCRs1ZleH7tss/NPBMkl+jbWZtUxmYwSHbRhA25M9gDEi E5a402O3N9NicZjKiaJNvlMHo3EGM/zTt33dcXp3yT5NxdGEmI/ERkK1X/xlVkF5AyzU RAKw1933/o2mlsK0MR/8AjjmRy7OO+ytrSJDQZqL0IOpa/29ixYg3iI/wqB3dxEvsN7S Y5SA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uC4kOuAf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h15si3753678eds.519.2021.05.20.18.13.28; Thu, 20 May 2021 18:13:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=uC4kOuAf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241914AbhETLmy (ORCPT + 99 others); Thu, 20 May 2021 07:42:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:41738 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240456AbhETLWM (ORCPT ); Thu, 20 May 2021 07:22:12 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 0DC9961961; Thu, 20 May 2021 10:11:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621505498; bh=UogBEB41DP29uE+l1xlhaR64a7oRQDW4cw10EadUpeQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=uC4kOuAfPumrCRC6faQIIp6+MD3R4qpaXlR5rmLUMducEvN2PsaiaoMb+qdurJCQW CPPr+e+S/KTDyz4nJH6dES8cckD6ntOdEZmoeUEbAfUOrunKmxfeF+1QdaBE2L1yrV fc3YP+ekxkk6f8SE0S7hcy5OnT9D0TKRcusLQLW0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Michael Ellerman Subject: [PATCH 4.4 163/190] powerpc/64s: Fix crashes when toggling entry flush barrier Date: Thu, 20 May 2021 11:23:47 +0200 Message-Id: <20210520092107.555227801@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210520092102.149300807@linuxfoundation.org> References: <20210520092102.149300807@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Michael Ellerman commit aec86b052df6541cc97c5fca44e5934cbea4963b upstream. The entry flush mitigation can be enabled/disabled at runtime via a debugfs file (entry_flush), which causes the kernel to patch itself to enable/disable the relevant mitigations. However depending on which mitigation we're using, it may not be safe to do that patching while other CPUs are active. For example the following crash: sleeper[15639]: segfault (11) at c000000000004c20 nip c000000000004c20 lr c000000000004c20 Shows that we returned to userspace with a corrupted LR that points into the kernel, due to executing the partially patched call to the fallback entry flush (ie. we missed the LR restore). Fix it by doing the patching under stop machine. The CPUs that aren't doing the patching will be spinning in the core of the stop machine logic. That is currently sufficient for our purposes, because none of the patching we do is to that code or anywhere in the vicinity. Fixes: f79643787e0a ("powerpc/64s: flush L1D on kernel entry") Cc: stable@vger.kernel.org # v5.10+ Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/20210506044959.1298123-2-mpe@ellerman.id.au Signed-off-by: Greg Kroah-Hartman --- arch/powerpc/lib/feature-fixups.c | 17 ++++++++++++++++- 1 file changed, 16 insertions(+), 1 deletion(-) --- a/arch/powerpc/lib/feature-fixups.c +++ b/arch/powerpc/lib/feature-fixups.c @@ -16,6 +16,7 @@ #include #include #include +#include #include #include #include @@ -279,8 +280,9 @@ void do_uaccess_flush_fixups(enum l1d_fl : "unknown"); } -void do_entry_flush_fixups(enum l1d_flush_type types) +static int __do_entry_flush_fixups(void *data) { + enum l1d_flush_type types = *(enum l1d_flush_type *)data; unsigned int instrs[3], *dest; long *start, *end; int i; @@ -331,6 +333,19 @@ void do_entry_flush_fixups(enum l1d_flus : "ori type" : (types & L1D_FLUSH_MTTRIG) ? "mttrig type" : "unknown"); + + return 0; +} + +void do_entry_flush_fixups(enum l1d_flush_type types) +{ + /* + * The call to the fallback flush can not be safely patched in/out while + * other CPUs are executing it. So call __do_entry_flush_fixups() on one + * CPU while all other CPUs spin in the stop machine core with interrupts + * hard disabled. + */ + stop_machine(__do_entry_flush_fixups, &types, NULL); } void do_rfi_flush_fixups(enum l1d_flush_type types)