[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <65ae9404-5d7d-42a3-969e-7e2ceb56c433@app.fastmail.com>
Date: Wed, 19 Nov 2025 06:31:30 -0800
From: "Andy Lutomirski" <luto@...nel.org>
To: "Valentin Schneider" <vschneid@...hat.com>,
"Linux Kernel Mailing List" <linux-kernel@...r.kernel.org>,
linux-mm@...ck.org, rcu@...r.kernel.org,
"the arch/x86 maintainers" <x86@...nel.org>,
linux-arm-kernel@...ts.infradead.org, loongarch@...ts.linux.dev,
linux-riscv@...ts.infradead.org, linux-arch@...r.kernel.org,
linux-trace-kernel@...r.kernel.org
Cc: "Thomas Gleixner" <tglx@...utronix.de>, "Ingo Molnar" <mingo@...hat.com>,
"Borislav Petkov" <bp@...en8.de>,
"Dave Hansen" <dave.hansen@...ux.intel.com>,
"H. Peter Anvin" <hpa@...or.com>,
"Peter Zijlstra (Intel)" <peterz@...radead.org>,
"Arnaldo Carvalho de Melo" <acme@...nel.org>,
"Josh Poimboeuf" <jpoimboe@...nel.org>,
"Paolo Bonzini" <pbonzini@...hat.com>, "Arnd Bergmann" <arnd@...db.de>,
"Frederic Weisbecker" <frederic@...nel.org>,
"Paul E. McKenney" <paulmck@...nel.org>,
"Jason Baron" <jbaron@...mai.com>,
"Steven Rostedt" <rostedt@...dmis.org>,
"Ard Biesheuvel" <ardb@...nel.org>,
"Sami Tolvanen" <samitolvanen@...gle.com>,
"David S. Miller" <davem@...emloft.net>,
"Neeraj Upadhyay" <neeraj.upadhyay@...nel.org>,
"Joel Fernandes" <joelagnelf@...dia.com>,
"Josh Triplett" <josh@...htriplett.org>,
"Boqun Feng" <boqun.feng@...il.com>,
"Uladzislau Rezki" <urezki@...il.com>,
"Mathieu Desnoyers" <mathieu.desnoyers@...icios.com>,
"Mel Gorman" <mgorman@...e.de>,
"Andrew Morton" <akpm@...ux-foundation.org>,
"Masahiro Yamada" <masahiroy@...nel.org>,
"Han Shen" <shenhan@...gle.com>, "Rik van Riel" <riel@...riel.com>,
"Jann Horn" <jannh@...gle.com>,
"Dan Carpenter" <dan.carpenter@...aro.org>,
"Oleg Nesterov" <oleg@...hat.com>, "Juri Lelli" <juri.lelli@...hat.com>,
"Clark Williams" <williams@...hat.com>,
"Yair Podemsky" <ypodemsk@...hat.com>,
"Marcelo Tosatti" <mtosatti@...hat.com>,
"Daniel Wagner" <dwagner@...e.de>, "Petr Tesarik" <ptesarik@...e.com>,
"Shrikanth Hegde" <sshegde@...ux.ibm.com>
Subject: Re: [RFC PATCH v7 29/31] x86/mm/pti: Implement a TLB flush immediately after a
switch to kernel CR3
On Fri, Nov 14, 2025, at 7:14 AM, Valentin Schneider wrote:
> Deferring kernel range TLB flushes requires the guarantee that upon
> entering the kernel, no stale entry may be accessed. The simplest way to
> provide such a guarantee is to issue an unconditional flush upon switching
> to the kernel CR3, as this is the pivoting point where such stale entries
> may be accessed.
>
Doing this together with the PTI CR3 switch has no actual benefit: MOV CR3 doesn’t flush global pages. And doing this in asm is pretty gross. We don’t even get a free sync_core() out of it because INVPCID is not documented as being serializing.
Why can’t we do it in C? What’s the actual risk? In order to trip over a stale TLB entry, we would need to deference a pointer to newly allocated kernel virtual memory that was not valid prior to our entry into user mode. I can imagine BPF doing this, but plain noinstr C in the entry path? Especially noinstr C *that has RCU disabled*? We already can’t follow an RCU pointer, and ISTM the only style of kernel code that might do this would use RCU to protect the pointer, and we are already doomed if we follow an RCU pointer to any sort of memory.
We do need to watch out for NMI/MCE hitting before we flush.
Powered by blists - more mailing lists