diff mbox series

arm64: alternatives: make clean_dcache_range_nopatch() noinstr-safe

Message ID 20230616103150.1238132-1-mark.rutland@arm.com (mailing list archive)
State New, archived
Headers show
Series arm64: alternatives: make clean_dcache_range_nopatch() noinstr-safe | expand

Commit Message

Mark Rutland June 16, 2023, 10:31 a.m. UTC
When patching kernel alternatives, we need to be careful not to execute
kernel code which is itself subject to patching. In general, if code is
executed after the instructions in memory have been patched but prior to
the cache maintenance and barriers completing, it could lead to
UNPREDICTABLE results.

As our regular cache maintenance routines are patched with alternatives,
we have a clean_dcache_range_nopatch() function which is *intended* to
avoid patchable code and therefore supposed to be safe in the middle of
patching alternatives. Unfortunately, it's not marked as 'noinstr', and
so can be instrumented with patchable code.

Additionally, it calls read_sanitised_ftr_reg() (which may be
instrumented with patchable code) to find the sanitized value of
CTR_EL0.DminLine, and is therefore not safe to call during patching.

Luckily, since commit:

  675b0563d6b26aa9 ("arm64: cpufeature: expose arm64_ftr_reg struct for CTR_EL0")

... we can read the sanitised CTR_EL0 value directly, and avoid the call
to read_sanitised_ftr_reg().

This patch marks clean_dcache_range_nopatch() as noinstr, and has it
read the sanitized CTR_EL0 value directly, avoiding the issues above.

As a bonus, this is also an optimization. As read_sanitised_ftr_reg()
performs a binary search to find the CTR_EL0 value, reading the value
directly avoids this binary search per applied alternative, avoiding
some unnecessary work.

Signed-off-by: Mark Rutland <mark.rutland@arm.com>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Will Deacon <will@kernel.org>
---
 arch/arm64/kernel/alternative.c | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

Hi Catalin,

This is part of a larger noinstr-safety cleanup that I'm trying to
handle for the alternatives and insn patching code. The rest of that
isn't ready yet, and I don't want to force that through this late (since
e.g. it requires some major rework to the aarch64_insn_*() code), but as
this patch is simple and also an optimization, I'd like to get it out of
the way now if you're happy to pick it up.

Mark.

Comments

Catalin Marinas June 21, 2023, 3:50 p.m. UTC | #1
On Fri, 16 Jun 2023 11:31:50 +0100, Mark Rutland wrote:
> When patching kernel alternatives, we need to be careful not to execute
> kernel code which is itself subject to patching. In general, if code is
> executed after the instructions in memory have been patched but prior to
> the cache maintenance and barriers completing, it could lead to
> UNPREDICTABLE results.
> 
> As our regular cache maintenance routines are patched with alternatives,
> we have a clean_dcache_range_nopatch() function which is *intended* to
> avoid patchable code and therefore supposed to be safe in the middle of
> patching alternatives. Unfortunately, it's not marked as 'noinstr', and
> so can be instrumented with patchable code.
> 
> [...]

Applied to arm64 (for-next/misc), thanks!

[1/1] arm64: alternatives: make clean_dcache_range_nopatch() noinstr-safe
      https://git.kernel.org/arm64/c/39138093f139
diff mbox series

Patch

diff --git a/arch/arm64/kernel/alternative.c b/arch/arm64/kernel/alternative.c
index 53d13b2e5f59e..8ff6610af4966 100644
--- a/arch/arm64/kernel/alternative.c
+++ b/arch/arm64/kernel/alternative.c
@@ -121,11 +121,11 @@  static noinstr void patch_alternative(struct alt_instr *alt,
  * accidentally call into the cache.S code, which is patched by us at
  * runtime.
  */
-static void clean_dcache_range_nopatch(u64 start, u64 end)
+static noinstr void clean_dcache_range_nopatch(u64 start, u64 end)
 {
 	u64 cur, d_size, ctr_el0;
 
-	ctr_el0 = read_sanitised_ftr_reg(SYS_CTR_EL0);
+	ctr_el0 = arm64_ftr_reg_ctrel0.sys_val;
 	d_size = 4 << cpuid_feature_extract_unsigned_field(ctr_el0,
 							   CTR_EL0_DminLine_SHIFT);
 	cur = start & ~(d_size - 1);