From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752631AbdBAQ33 (ORCPT ); Wed, 1 Feb 2017 11:29:29 -0500 Received: from smtp.codeaurora.org ([198.145.29.96]:44372 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750936AbdBAQ31 (ORCPT ); Wed, 1 Feb 2017 11:29:27 -0500 DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 557556075B Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=cov@codeaurora.org Subject: Re: [PATCH v4 2/4] arm64: Work around Falkor erratum 1003 To: Marc Zyngier , Mark Rutland , Catalin Marinas , Will Deacon References: <20170125155232.10277-1-cov@codeaurora.org> <20170125155232.10277-2-cov@codeaurora.org> <20170131123735.GD11191@leverpostej> <36478002-4cd8-7f1c-1a25-8bfe35022a47@codeaurora.org> <3cab36fb-984a-beae-64db-6ce830ba94f6@arm.com> Cc: Paolo Bonzini , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= , Christoffer Dall , kvm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, linux-kernel@vger.kernel.org, shankerd@codeaurora.org, timur@codeaurora.org, Jonathan Corbet , linux-doc@vger.kernel.org, Jon Masters , Neil Leeder , Mark Langsdorf From: Christopher Covington Message-ID: Date: Wed, 1 Feb 2017 11:29:22 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.2 MIME-Version: 1.0 In-Reply-To: <3cab36fb-984a-beae-64db-6ce830ba94f6@arm.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/31/2017 12:56 PM, Marc Zyngier wrote: > On 31/01/17 17:48, Christopher Covington wrote: >> On 01/31/2017 07:37 AM, Mark Rutland wrote: >>> On Wed, Jan 25, 2017 at 10:52:30AM -0500, Christopher Covington wrote: >>>> The Qualcomm Datacenter Technologies Falkor v1 CPU may allocate TLB entries >>>> using an incorrect ASID when TTBRx_EL1 is being updated. When the erratum >>>> is triggered, page table entries using the new translation table base >>>> address (BADDR) will be allocated into the TLB using the old ASID. All >>>> circumstances leading to the incorrect ASID being cached in the TLB arise >>>> when software writes TTBRx_EL1[ASID] and TTBRx_EL1[BADDR], a memory >>>> operation is in the process of performing a translation using the specific >>>> TTBRx_EL1 being written, and the memory operation uses a translation table >>>> descriptor designated as non-global. EL2 and EL3 code changing the EL1&0 >>>> ASID is not subject to this erratum because hardware is prohibited from >>>> performing translations from an out-of-context translation regime. >>>> >>>> Consider the following pseudo code. >>>> >>>> write new BADDR and ASID values to TTBRx_EL1 >>>> >>>> Replacing the above sequence with the one below will ensure that no TLB >>>> entries with an incorrect ASID are used by software. >>>> >>>> write reserved value to TTBRx_EL1[ASID] >>>> ISB >>>> write new value to TTBRx_EL1[BADDR] >>>> ISB >>>> write new value to TTBRx_EL1[ASID] >>>> ISB >>>> >>>> When the above sequence is used, page table entries using the new BADDR >>>> value may still be incorrectly allocated into the TLB using the reserved >>>> ASID. Yet this will not reduce functionality, since TLB entries incorrectly >>>> tagged with the reserved ASID will never be hit by a later instruction. >>> >>> Based on my understanding that entries allocated to the reserved ASID >>> will not be used for subsequent page table walks (and so we don't have >>> asynchronous behaviour to contend with), this sounds fine to me. >>> >>> Thanks for taking the time to clarify the details on that. >>> >>>> Based on work by Shanker Donthineni >>>> >>>> Signed-off-by: Christopher Covington >>>> --- >>>> Documentation/arm64/silicon-errata.txt | 1 + >>>> arch/arm64/Kconfig | 11 +++++++++++ >>>> arch/arm64/include/asm/assembler.h | 23 +++++++++++++++++++++++ >>>> arch/arm64/include/asm/cpucaps.h | 3 ++- >>>> arch/arm64/include/asm/mmu_context.h | 8 +++++++- >>>> arch/arm64/kernel/cpu_errata.c | 7 +++++++ >>>> arch/arm64/mm/context.c | 11 +++++++++++ >>>> arch/arm64/mm/proc.S | 1 + >>>> 8 files changed, 63 insertions(+), 2 deletions(-) >>> >>> Don't we need to use pre_ttbr0_update_workaround in >>> for CONFIG_ARM64_SW_TTBR0_PAN? We implicitly switch to the reserved ASID >>> for the empty table in __uaccess_ttbr0_disable. >>> >>> That also means we have to invalidate the reserved ASID so as to not >>> accidentally hit while uaccess is disabled. >> >> The CPU in question (Falkor v1) has hardware PAN support. Do we need >> to worry about including the workaround in the SW PAN code in that case? > > Given that all ARMv8 CPUs can support SW_PAN, it is more likely to be > enabled than the ARMv8.1 PAN. I'd vote for supporting the workaround in > that case too, and hope that people do enable the HW version. Okay, I'll do my best to add support for the SW PAN case. I rebased and submitted v6 of the E1009 patch [1] so that it no longer depends on this patch landing first, if you all are inclined to pick it up while work on this E1003 patch continues. 1. https://patchwork.kernel.org/patch/9547923/ Thanks, Christopher -- Qualcomm Datacenter Technologies, Inc. as an affiliate of Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project. From mboxrd@z Thu Jan 1 00:00:00 1970 From: cov@codeaurora.org (Christopher Covington) Date: Wed, 1 Feb 2017 11:29:22 -0500 Subject: [PATCH v4 2/4] arm64: Work around Falkor erratum 1003 In-Reply-To: <3cab36fb-984a-beae-64db-6ce830ba94f6@arm.com> References: <20170125155232.10277-1-cov@codeaurora.org> <20170125155232.10277-2-cov@codeaurora.org> <20170131123735.GD11191@leverpostej> <36478002-4cd8-7f1c-1a25-8bfe35022a47@codeaurora.org> <3cab36fb-984a-beae-64db-6ce830ba94f6@arm.com> Message-ID: To: linux-arm-kernel@lists.infradead.org List-Id: linux-arm-kernel.lists.infradead.org On 01/31/2017 12:56 PM, Marc Zyngier wrote: > On 31/01/17 17:48, Christopher Covington wrote: >> On 01/31/2017 07:37 AM, Mark Rutland wrote: >>> On Wed, Jan 25, 2017 at 10:52:30AM -0500, Christopher Covington wrote: >>>> The Qualcomm Datacenter Technologies Falkor v1 CPU may allocate TLB entries >>>> using an incorrect ASID when TTBRx_EL1 is being updated. When the erratum >>>> is triggered, page table entries using the new translation table base >>>> address (BADDR) will be allocated into the TLB using the old ASID. All >>>> circumstances leading to the incorrect ASID being cached in the TLB arise >>>> when software writes TTBRx_EL1[ASID] and TTBRx_EL1[BADDR], a memory >>>> operation is in the process of performing a translation using the specific >>>> TTBRx_EL1 being written, and the memory operation uses a translation table >>>> descriptor designated as non-global. EL2 and EL3 code changing the EL1&0 >>>> ASID is not subject to this erratum because hardware is prohibited from >>>> performing translations from an out-of-context translation regime. >>>> >>>> Consider the following pseudo code. >>>> >>>> write new BADDR and ASID values to TTBRx_EL1 >>>> >>>> Replacing the above sequence with the one below will ensure that no TLB >>>> entries with an incorrect ASID are used by software. >>>> >>>> write reserved value to TTBRx_EL1[ASID] >>>> ISB >>>> write new value to TTBRx_EL1[BADDR] >>>> ISB >>>> write new value to TTBRx_EL1[ASID] >>>> ISB >>>> >>>> When the above sequence is used, page table entries using the new BADDR >>>> value may still be incorrectly allocated into the TLB using the reserved >>>> ASID. Yet this will not reduce functionality, since TLB entries incorrectly >>>> tagged with the reserved ASID will never be hit by a later instruction. >>> >>> Based on my understanding that entries allocated to the reserved ASID >>> will not be used for subsequent page table walks (and so we don't have >>> asynchronous behaviour to contend with), this sounds fine to me. >>> >>> Thanks for taking the time to clarify the details on that. >>> >>>> Based on work by Shanker Donthineni >>>> >>>> Signed-off-by: Christopher Covington >>>> --- >>>> Documentation/arm64/silicon-errata.txt | 1 + >>>> arch/arm64/Kconfig | 11 +++++++++++ >>>> arch/arm64/include/asm/assembler.h | 23 +++++++++++++++++++++++ >>>> arch/arm64/include/asm/cpucaps.h | 3 ++- >>>> arch/arm64/include/asm/mmu_context.h | 8 +++++++- >>>> arch/arm64/kernel/cpu_errata.c | 7 +++++++ >>>> arch/arm64/mm/context.c | 11 +++++++++++ >>>> arch/arm64/mm/proc.S | 1 + >>>> 8 files changed, 63 insertions(+), 2 deletions(-) >>> >>> Don't we need to use pre_ttbr0_update_workaround in >>> for CONFIG_ARM64_SW_TTBR0_PAN? We implicitly switch to the reserved ASID >>> for the empty table in __uaccess_ttbr0_disable. >>> >>> That also means we have to invalidate the reserved ASID so as to not >>> accidentally hit while uaccess is disabled. >> >> The CPU in question (Falkor v1) has hardware PAN support. Do we need >> to worry about including the workaround in the SW PAN code in that case? > > Given that all ARMv8 CPUs can support SW_PAN, it is more likely to be > enabled than the ARMv8.1 PAN. I'd vote for supporting the workaround in > that case too, and hope that people do enable the HW version. Okay, I'll do my best to add support for the SW PAN case. I rebased and submitted v6 of the E1009 patch [1] so that it no longer depends on this patch landing first, if you all are inclined to pick it up while work on this E1003 patch continues. 1. https://patchwork.kernel.org/patch/9547923/ Thanks, Christopher -- Qualcomm Datacenter Technologies, Inc. as an affiliate of Qualcomm Technologies, Inc. Qualcomm Technologies, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project.