]> git.hungrycats.org Git - linux/commitdiff
parisc: Purge TLB before setting PTE
authorJohn David Anglin <dave.anglin@bell.net>
Wed, 7 Dec 2016 02:47:04 +0000 (21:47 -0500)
committerBen Hutchings <ben@decadent.org.uk>
Thu, 23 Feb 2017 03:54:43 +0000 (03:54 +0000)
commit c78e710c1c9fbeff43dddc0aa3d0ff458e70b0cc upstream.

The attached change interchanges the order of purging the TLB and
setting the corresponding page table entry.  TLB purges are strongly
ordered.  It occurred to me one night that setting the PTE first might
have subtle ordering issues on SMP machines and cause random memory
corruption.

A TLB lock guards the insertion of user TLB entries.  So after the TLB
is purged, a new entry can't be inserted until the lock is released.
This ensures that the new PTE value is used when the lock is released.

Since making this change, no random segmentation faults have been
observed on the Debian hppa buildd servers.

Signed-off-by: John David Anglin <dave.anglin@bell.net>
Signed-off-by: Helge Deller <deller@gmx.de>
[bwh: Backported to 3.16: adjust context]
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
arch/parisc/include/asm/pgtable.h

index 22b89d1edba7a9d24939fa824a378e920dc61755..b6762dfbe4fe895b5bc3db4c3d1a27e44ddee040 100644 (file)
@@ -48,8 +48,8 @@ extern void purge_tlb_entries(struct mm_struct *, unsigned long);
        do {                                                    \
                unsigned long flags;                            \
                spin_lock_irqsave(&pa_dbit_lock, flags);        \
-               set_pte(ptep, pteval);                          \
                purge_tlb_entries(mm, addr);                    \
+               set_pte(ptep, pteval);                          \
                spin_unlock_irqrestore(&pa_dbit_lock, flags);   \
        } while (0)
 
@@ -452,8 +452,8 @@ static inline int ptep_test_and_clear_young(struct vm_area_struct *vma, unsigned
                spin_unlock_irqrestore(&pa_dbit_lock, flags);
                return 0;
        }
-       set_pte(ptep, pte_mkold(pte));
        purge_tlb_entries(vma->vm_mm, addr);
+       set_pte(ptep, pte_mkold(pte));
        spin_unlock_irqrestore(&pa_dbit_lock, flags);
        return 1;
 }
@@ -466,8 +466,8 @@ static inline pte_t ptep_get_and_clear(struct mm_struct *mm, unsigned long addr,
 
        spin_lock_irqsave(&pa_dbit_lock, flags);
        old_pte = *ptep;
-       pte_clear(mm,addr,ptep);
        purge_tlb_entries(mm, addr);
+       pte_clear(mm,addr,ptep);
        spin_unlock_irqrestore(&pa_dbit_lock, flags);
 
        return old_pte;
@@ -477,8 +477,8 @@ static inline void ptep_set_wrprotect(struct mm_struct *mm, unsigned long addr,
 {
        unsigned long flags;
        spin_lock_irqsave(&pa_dbit_lock, flags);
-       set_pte(ptep, pte_wrprotect(*ptep));
        purge_tlb_entries(mm, addr);
+       set_pte(ptep, pte_wrprotect(*ptep));
        spin_unlock_irqrestore(&pa_dbit_lock, flags);
 }