On 14/01/25 13:45, Dave Hansen wrote:
On 1/14/25 09:51, Valentin Schneider wrote:
- cr4 = this_cpu_read(cpu_tlbstate.cr4);
- asm volatile("mov %0,%%cr4": : "r" (cr4 ^ X86_CR4_PGE) : "memory");
- asm volatile("mov %0,%%cr4": : "r" (cr4) : "memory");
- /*
* In lieu of not having the pinning crap, hard fail if CR4 doesn't
* match the expected value. This ensures that anybody doing dodgy gets
* the fallthrough check.
*/
- BUG_ON(cr4 != this_cpu_read(cpu_tlbstate.cr4));
Let's say someone managed to write to cpu_tlbstate.cr4 where they cleared one of the pinned bits.
Before this patch, CR4 pinning would WARN_ONCE() about it pretty quickly and also reset the cleared bits.
After this patch, the first native_flush_tlb_global() can clear pinned bits, at least until native_write_cr4() gets called the next time. That seems like it'll undermine CR4 pinning at least somewhat.
The BUG_ON() should still catch any pinned bit mishandling, however...
What keeps native_write_cr4() from being noinstr-compliant now? Is it just the WARN_ONCE()?
I don't think that's even an issue since __WARN_printf() wraps the print in instrumentation_{begin,end}(). In v3 I made native_write_cr4() noinstr and added a non-noinstr wrapper to be used in existing callsites.
AFAICT if acceptable we could make the whole thing noinstr and stick with that; Peter, is there something I missed that made you write the handmade noinstr CR4 RMW?