Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp28026imm; Fri, 21 Sep 2018 09:08:18 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZWx/bqejEMnpUqS5C6tgwBq7D9qNNInmc57VXmg6psgTN2zK2gN/puAJZjwRvYAIvuJuUX X-Received: by 2002:a63:b95e:: with SMTP id v30-v6mr41560240pgo.221.1537546098290; Fri, 21 Sep 2018 09:08:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1537546098; cv=none; d=google.com; s=arc-20160816; b=vioEK4QiWw78ZAVX0Nuz8JLuvH1jPUoGNAebeVfyr16tY0QaGXuVKdGq2ylRC83HtM iCuAlmZGJH8ix9y1gbXnn/xOjlIWTmLRb0ul06+wQrnJIOGp+c6h/VYU2XpAW7oMWKX/ c/nwjloy6nWvowN/tPPq0MHCNlnYiI4fMkqXk8BJVDZ687Nt0F3VAwds+y9qz9PIBzsS lSrCv8xzLfbyczkzIT2mAEG/thweKs7HynIfasYMRilmdZtul3yPkOUc9T2ozafry54p rhClvolrQRoBW9BtaTTI3B2wQ8+AEe2EhVx940dZVHwWYoRd9EyJPtdQCf88eB07LT2K 2BZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:organization:user-agent :references:in-reply-to:subject:cc:to:from:message-id:date; bh=MmsogoAKqtWGaP8IIPoNm1Ofg0w4T4j0IvD1O5BjcKo=; b=lOWMM8AiEXl5w1E5hCu8wFw3XuZsXKj3K26Cghm2GhYR6IcZrB+zYkR1Gf0MJCeWcf LM4wJkESTnAAOLlsJvJaxCa7cbCr4psc7vcIkV5yEJRe7tGXgRM58oDHqoF41OKkAuwO WWxp60TLU5VSSxyVU0bIWVXzm9SP0ClOCO0J+GcBXzy+LeycHuZ44JXKnN194xrxW0UN zCeZDvKqw1iuzpciD3Dol+94zT/uggUeFh7803JixNRWpujEtdtMj/nCN1DBjzDcr3bi 4NOcCnsTllRwsK6Xs5SOksgZ3UFx4taukc9iEMa50u80wXEC826ozmU/O4aPcFcA5efH LiFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u24-v6si26736021pgk.72.2018.09.21.09.07.45; Fri, 21 Sep 2018 09:08:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390401AbeIUVzB (ORCPT + 99 others); Fri, 21 Sep 2018 17:55:01 -0400 Received: from foss.arm.com ([217.140.101.70]:38646 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728221AbeIUVzB (ORCPT ); Fri, 21 Sep 2018 17:55:01 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6373118A; Fri, 21 Sep 2018 09:05:29 -0700 (PDT) Received: from big-swifty.misterjones.org (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id EF40A3F557; Fri, 21 Sep 2018 09:05:28 -0700 (PDT) Date: Fri, 21 Sep 2018 17:05:27 +0100 Message-ID: <86fty2x2d4.wl-marc.zyngier@arm.com> From: Marc Zyngier To: Julien Thierry Cc: James Morse , Suzuki K Poulose , , , , , , , , Subject: Re: [PATCH v5 03/27] arm64: alternative: Apply alternatives early in boot process In-Reply-To: <78781d82-e5c4-c590-6c0c-e7d2db456bf9@arm.com> References: <1535471497-38854-1-git-send-email-julien.thierry@arm.com> <1535471497-38854-4-git-send-email-julien.thierry@arm.com> <3becf020-b230-beb8-b304-d8097377f234@arm.com> <78781d82-e5c4-c590-6c0c-e7d2db456bf9@arm.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL/10.8 EasyPG/1.0.0 Emacs/25.1 (aarch64-unknown-linux-gnu) MULE/6.0 (HANACHIRUSATO) Organization: ARM Ltd MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 12 Sep 2018 17:49:09 +0100, Julien Thierry wrote: > > Hi James, > > On 12/09/18 11:29, James Morse wrote: > > Hi Julien, > > > > On 28/08/18 16:51, Julien Thierry wrote: > >> From: Daniel Thompson > >> > >> Currently alternatives are applied very late in the boot process (and > >> a long time after we enable scheduling). Some alternative sequences, > >> such as those that alter the way CPU context is stored, must be applied > >> much earlier in the boot sequence. > >> > >> Introduce apply_boot_alternatives() to allow some alternatives to be > >> applied immediately after we detect the CPU features of the boot CPU. > > > > > >> diff --git a/arch/arm64/kernel/alternative.c b/arch/arm64/kernel/alternative.c > >> index b5d6039..70c2604 100644 > >> --- a/arch/arm64/kernel/alternative.c > >> +++ b/arch/arm64/kernel/alternative.c > >> @@ -145,7 +145,8 @@ static void clean_dcache_range_nopatch(u64 start, u64 end) > >> } while (cur += d_size, cur < end); > >> } > >> -static void __apply_alternatives(void *alt_region, bool > >> is_module) > >> +static void __apply_alternatives(void *alt_region, bool is_module, > >> + unsigned long feature_mask) > > > > Shouldn't feature_mask be a DECLARE_BITMAP() maybe-array like cpu_hwcaps? > > This means it keeps working when NR_CAPS grows over 64, which might happen > > sooner than we think for backported errata... > > > > > >> @@ -155,6 +156,9 @@ static void __apply_alternatives(void *alt_region, bool is_module) > >> for (alt = region->begin; alt < region->end; alt++) { > >> int nr_inst; > >> + if ((BIT(alt->cpufeature) & feature_mask) == 0) > >> + continue; > >> + > >> /* Use ARM64_CB_PATCH as an unconditional patch */ > >> if (alt->cpufeature < ARM64_CB_PATCH && > >> !cpus_have_cap(alt->cpufeature)) > >> @@ -213,7 +217,7 @@ static int __apply_alternatives_multi_stop(void *unused) > >> isb(); > >> } else { > >> BUG_ON(alternatives_applied); > >> - __apply_alternatives(®ion, false); > >> + __apply_alternatives(®ion, false, ~boot_capabilities); > > > > Ah, this is tricky. There is a bitmap_complement() for the DECLARE_BITMAP() > > stuff, but we'd need a second array... > > > > We could pass the scope around, but then __apply_alternatives() would need to > > lookup the struct arm64_cpu_capabilities up every time. This is only a problem > > as we have one cap-number-space for errata/features, but separate sparse lists. > > > > Since for each alternative we know the cpufeature associated with it, > the "lookup" is really just accessing an array with the given index, > so that could be an option. > > > (I think applying the alternatives one cap at a time is a bad idea as we would > > need to walk the alternative region NR_CAPS times) > > > > > >> @@ -227,6 +231,24 @@ void __init apply_alternatives_all(void) > >> stop_machine(__apply_alternatives_multi_stop, NULL, cpu_online_mask); > >> } > >> +/* > >> + * This is called very early in the boot process (directly after we run > >> + * a feature detect on the boot CPU). No need to worry about other CPUs > >> + * here. > >> + */ > >> +void __init apply_boot_alternatives(void) > >> +{ > >> + struct alt_region region = { > >> + .begin = (struct alt_instr *)__alt_instructions, > >> + .end = (struct alt_instr *)__alt_instructions_end, > >> + }; > >> + > >> + /* If called on non-boot cpu things could go wrong */ > >> + WARN_ON(smp_processor_id() != 0); > > > > Isn't the problem if there are multiple CPUs online? > > > > Yes, that makes more sense. I'll change this. > > > > >> + __apply_alternatives(®ion, false, boot_capabilities); > >> +} > >> + > >> #ifdef CONFIG_MODULES > >> void apply_alternatives_module(void *start, size_t length) > >> { > > > >> diff --git a/arch/arm64/kernel/cpufeature.c b/arch/arm64/kernel/cpufeature.c > >> index 3bc1c8b..0d1e41e 100644 > >> --- a/arch/arm64/kernel/cpufeature.c > >> +++ b/arch/arm64/kernel/cpufeature.c > >> @@ -52,6 +52,8 @@ > >> DECLARE_BITMAP(cpu_hwcaps, ARM64_NCAPS); > >> EXPORT_SYMBOL(cpu_hwcaps); > >> +unsigned long boot_capabilities; > >> + > >> /* > >> * Flag to indicate if we have computed the system wide > >> * capabilities based on the boot time active CPUs. This > >> @@ -1375,6 +1377,9 @@ static void __update_cpu_capabilities(const struct arm64_cpu_capabilities *caps, > >> if (!cpus_have_cap(caps->capability) && caps->desc) > >> pr_info("%s %s\n", info, caps->desc); > >> cpus_set_cap(caps->capability); > > > > Hmm, the bitmap behind cpus_set_cap() is what cpus_have_cap() in > > __apply_alternatives() looks at. If you had a call to __apply_alternatives after > > update_cpu_capabilities(SCOPE_BOOT_CPU), but before any others, it would only > > apply those alternatives... > > > > (I don't think there is a problem re-applying the same alternative, but I > > haven't checked). > > > > Interesting idea. If someone can confirm that patching alternatives > twice is safe, I think it would make things simpler. It may not be safe for dynamic alternatives, where the patch code is generated at runtime and may rely on the original text (to extract a register number, for example -- see kvm_update_va_mask). Thanks, M. -- Jazz is not dead, it just smell funny.