From: mark.rutland@arm.com (Mark Rutland)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH 1/2] arm64: swp emulation: bound LL/SC retries before rescheduling
Date: Wed, 19 Oct 2016 15:04:14 +0100 [thread overview]
Message-ID: <20161019140414.GB11036@leverpostej> (raw)
In-Reply-To: <1476874784-16214-1-git-send-email-will.deacon@arm.com>
On Wed, Oct 19, 2016 at 11:59:43AM +0100, Will Deacon wrote:
> If a CPU does not implement a global monitor for certain memory types,
> then userspace can attempt a kernel DoS by issuing SWP instructions
> targetting the problematic memory (for example, a framebuffer mapped
> with non-cacheable attributes).
>
> The SWP emulation code protects against these sorts of attacks by
> checking for pending signals and potentially rescheduling when the STXR
> instruction fails during the emulation. Whilst this is good for avoiding
> livelock, it harms emulation of legitimate SWP instructions on CPUs
> where forward progress is not guaranteed if there are memory accesses to
> the same reservation granule (up to 2k) between the failing STXR and
> the retry of the LDXR.
>
> This patch solves the problem by retrying the STXR a bounded number of
> times (4) before breaking out of the LL/SC loop and looking for
> something else to do.
>
> Signed-off-by: Will Deacon <will.deacon@arm.com>
Assuming I've followed all the operand numbering correctly, this looks
correct to me per my reading of the requirements in the ARM ARM.
FWIW:
Reviewed-by: Mark Rutland <mark.rutland@arm.com>
Thanks,
Mark.
> ---
> arch/arm64/kernel/armv8_deprecated.c | 36 ++++++++++++++++++++++--------------
> 1 file changed, 22 insertions(+), 14 deletions(-)
>
> diff --git a/arch/arm64/kernel/armv8_deprecated.c b/arch/arm64/kernel/armv8_deprecated.c
> index 42ffdb54e162..b0988bb1bf64 100644
> --- a/arch/arm64/kernel/armv8_deprecated.c
> +++ b/arch/arm64/kernel/armv8_deprecated.c
> @@ -280,35 +280,43 @@ static void __init register_insn_emulation_sysctl(struct ctl_table *table)
> /*
> * Error-checking SWP macros implemented using ldxr{b}/stxr{b}
> */
> -#define __user_swpX_asm(data, addr, res, temp, B) \
> +
> +/* Arbitrary constant to ensure forward-progress of the LL/SC loop */
> +#define __SWP_LL_SC_LOOPS 4
> +
> +#define __user_swpX_asm(data, addr, res, temp, temp2, B) \
> __asm__ __volatile__( \
> + " mov %w3, %w7\n" \
> ALTERNATIVE("nop", SET_PSTATE_PAN(0), ARM64_HAS_PAN, \
> CONFIG_ARM64_PAN) \
> - "0: ldxr"B" %w2, [%3]\n" \
> - "1: stxr"B" %w0, %w1, [%3]\n" \
> + "0: ldxr"B" %w2, [%4]\n" \
> + "1: stxr"B" %w0, %w1, [%4]\n" \
> " cbz %w0, 2f\n" \
> - " mov %w0, %w4\n" \
> + " sub %w3, %w3, #1\n" \
> + " cbnz %w3, 0b\n" \
> + " mov %w0, %w5\n" \
> " b 3f\n" \
> "2:\n" \
> " mov %w1, %w2\n" \
> "3:\n" \
> " .pushsection .fixup,\"ax\"\n" \
> " .align 2\n" \
> - "4: mov %w0, %w5\n" \
> + "4: mov %w0, %w6\n" \
> " b 3b\n" \
> " .popsection" \
> _ASM_EXTABLE(0b, 4b) \
> _ASM_EXTABLE(1b, 4b) \
> ALTERNATIVE("nop", SET_PSTATE_PAN(1), ARM64_HAS_PAN, \
> CONFIG_ARM64_PAN) \
> - : "=&r" (res), "+r" (data), "=&r" (temp) \
> - : "r" (addr), "i" (-EAGAIN), "i" (-EFAULT) \
> + : "=&r" (res), "+r" (data), "=&r" (temp), "=&r" (temp2) \
> + : "r" (addr), "i" (-EAGAIN), "i" (-EFAULT), \
> + "i" (__SWP_LL_SC_LOOPS) \
> : "memory")
>
> -#define __user_swp_asm(data, addr, res, temp) \
> - __user_swpX_asm(data, addr, res, temp, "")
> -#define __user_swpb_asm(data, addr, res, temp) \
> - __user_swpX_asm(data, addr, res, temp, "b")
> +#define __user_swp_asm(data, addr, res, temp, temp2) \
> + __user_swpX_asm(data, addr, res, temp, temp2, "")
> +#define __user_swpb_asm(data, addr, res, temp, temp2) \
> + __user_swpX_asm(data, addr, res, temp, temp2, "b")
>
> /*
> * Bit 22 of the instruction encoding distinguishes between
> @@ -328,12 +336,12 @@ static int emulate_swpX(unsigned int address, unsigned int *data,
> }
>
> while (1) {
> - unsigned long temp;
> + unsigned long temp, temp2;
>
> if (type == TYPE_SWPB)
> - __user_swpb_asm(*data, address, res, temp);
> + __user_swpb_asm(*data, address, res, temp, temp2);
> else
> - __user_swp_asm(*data, address, res, temp);
> + __user_swp_asm(*data, address, res, temp, temp2);
>
> if (likely(res != -EAGAIN) || signal_pending(current))
> break;
> --
> 2.1.4
>
>
> _______________________________________________
> linux-arm-kernel mailing list
> linux-arm-kernel at lists.infradead.org
> http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
>
prev parent reply other threads:[~2016-10-19 14:04 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-10-19 10:59 [PATCH 1/2] arm64: swp emulation: bound LL/SC retries before rescheduling Will Deacon
2016-10-19 10:59 ` [PATCH 2/2] arm64: percpu: rewrite ll/sc loops in assembly Will Deacon
2016-10-19 14:20 ` Mark Rutland
2016-10-19 14:04 ` Mark Rutland [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20161019140414.GB11036@leverpostej \
--to=mark.rutland@arm.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox