Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp7990542ybi; Tue, 9 Jul 2019 07:24:32 -0700 (PDT) X-Google-Smtp-Source: APXvYqxHruUzhSfRZgcd+ObFlOjPfBOSkhiNRPI7YTBfulrS8ilpUIkqWT6/vaN1/hYz1czY3IL7 X-Received: by 2002:a17:902:bc83:: with SMTP id bb3mr33321474plb.56.1562682272242; Tue, 09 Jul 2019 07:24:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1562682272; cv=none; d=google.com; s=arc-20160816; b=cMDRqVwHGY9HcZDsbZEkdnQvnaFTHeNuTgbtu7n84Xo+Tc7oETNSE4hqxq3P/tMwau R2134z4ypAznILaKIglEnnkoZgdbTzdV3LlrhHJNUQb/2nz8nXjDFVz2p826fuo5k9fg aH9K9kL1U2MGr9z8s5gwMf1YT2B/bjBU+Yc0OsSsrxCX0lTU85RlIMAWUECweZotwBnn mrkuRhJSLpbxnxgzzMYa06ip3SM1Zl2gcj8YAEzcfejrCkwBgFK4gik8C7Rx15mGM1f4 TWFk2oilL+sbuF95uuXyfQCYkSSISZvtQAQZdmo0e+wRoMfzKTqnGLotEble42/EYYHz 2+UQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:organization:autocrypt:openpgp:from:references:cc:to :subject; bh=v1IYoTFtERIvs/Ibl33AietjmQK2C5sroaJbUMJDwKU=; b=XcjUyNbMYvejqrgHAWAS9AF2xWOFm22bDmVNEuzvsPJMfS0SOtHFdsfK+EguwaWRfW fRw6PD7VNjz0fuJ2L3rYfv8dtrWLuYzyxQ72rzXIiI5KP0/Wler33IHuVwS36ddP1fvN ornQbHgDXsygBH1qa7+jTlaaOkvqSzdLSIhrTNZc3sqm5Gnz/Vdto8wqUdoonG0xyhQw Vni8PDbZzqpdLCEw68c+DJrv6hc6KHHDFZ1TbfQm26h+Ye1CSQHA2F8LGWynqQLGw/CU +A9bb2nuyZK+Oiy/zoLC4SRbLHzMm1uc/UT09W/+tW8J6JpMp2fnVP8YaZr2DqAZJkeh ciLQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z142si22831430pfc.128.2019.07.09.07.24.15; Tue, 09 Jul 2019 07:24:32 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726803AbfGIOWO (ORCPT + 99 others); Tue, 9 Jul 2019 10:22:14 -0400 Received: from foss.arm.com ([217.140.110.172]:45170 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726374AbfGIOWN (ORCPT ); Tue, 9 Jul 2019 10:22:13 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id E9D0D28; Tue, 9 Jul 2019 07:22:12 -0700 (PDT) Received: from [10.1.197.61] (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id AC83B3F738; Tue, 9 Jul 2019 07:22:11 -0700 (PDT) Subject: Re: [PATCH] arm64: Explicitly set pstate.ssbs for el0 on kernel entry To: Neeraj Upadhyay , will@kernel.org, mark.rutland@arm.com, julien.thierry@arm.com, tglx@linutronix.de Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-arm-msm@vger.kernel.org, gkohli@codeaurora.org, parthd@codeaurora.org References: <1562671333-3563-1-git-send-email-neeraju@codeaurora.org> <62c4fed5-39ac-adc9-3bc5-56eb5234a9d1@arm.com> <386316d0-f844-d88c-8b78-0ffc4ffe0aaa@codeaurora.org> From: Marc Zyngier Openpgp: preference=signencrypt Autocrypt: addr=marc.zyngier@arm.com; prefer-encrypt=mutual; keydata= mQINBE6Jf0UBEADLCxpix34Ch3kQKA9SNlVQroj9aHAEzzl0+V8jrvT9a9GkK+FjBOIQz4KE g+3p+lqgJH4NfwPm9H5I5e3wa+Scz9wAqWLTT772Rqb6hf6kx0kKd0P2jGv79qXSmwru28vJ t9NNsmIhEYwS5eTfCbsZZDCnR31J6qxozsDHpCGLHlYym/VbC199Uq/pN5gH+5JHZyhyZiNW ozUCjMqC4eNW42nYVKZQfbj/k4W9xFfudFaFEhAf/Vb1r6F05eBP1uopuzNkAN7vqS8XcgQH qXI357YC4ToCbmqLue4HK9+2mtf7MTdHZYGZ939OfTlOGuxFW+bhtPQzsHiW7eNe0ew0+LaL 3wdNzT5abPBscqXWVGsZWCAzBmrZato+Pd2bSCDPLInZV0j+rjt7MWiSxEAEowue3IcZA++7 ifTDIscQdpeKT8hcL+9eHLgoSDH62SlubO/y8bB1hV8JjLW/jQpLnae0oz25h39ij4ijcp8N t5slf5DNRi1NLz5+iaaLg4gaM3ywVK2VEKdBTg+JTg3dfrb3DH7ctTQquyKun9IVY8AsxMc6 lxl4HxrpLX7HgF10685GG5fFla7R1RUnW5svgQhz6YVU33yJjk5lIIrrxKI/wLlhn066mtu1 DoD9TEAjwOmpa6ofV6rHeBPehUwMZEsLqlKfLsl0PpsJwov8TQARAQABtCNNYXJjIFp5bmdp ZXIgPG1hcmMuenluZ2llckBhcm0uY29tPokCTwQTAQIAOQIbAwYLCQgHAwIGFQgCCQoLBBYC AwECHgECF4AWIQSf1RxT4LVjGP2VnD0j0NC60T16QwUCXR3BUgAKCRAj0NC60T16Qyd/D/9s x0puxd3lI+jdLMEY8sTsNxw/+CZfyKaHtysasZlloLK7ftYhRUc63mMW2mrvgB1GEnXYIdj3 g6Qo4csoDuN+9EBmejh7SglM/h0evOtrY2V5QmZA/e/Pqfj0P3N/Eb5BiB3R4ptLtvKCTsqr 3womxCRqQY3IrMn1s2qfpmeNLUIfCUtgh8opzPtFuFJWVBzbzvhPEApZzMe9Vs1O2P8BQaay QXpbzHaKruthoLICRzS/3UCe0N/mBZQRKHrqhPwvjZdO0KMqjSsPqfukOJ8bl5jZxYk+G/3T 66Z4JUpZ7RkcrX7CvBfZqRo19WyWFfjGz79iVMJNIEkJvJBANbTSiWUC6IkP+zT/zWYzZPXx XRlrKWSBBqJrWQKZBwKOLsL62oQG7ARvpCG9rZ6hd5CLQtPI9dasgTwOIA1OW2mWzi20jDjD cGC9ifJiyWL8L/bgwyL3F/G0R1gxAfnRUknyzqfpLy5cSgwKCYrXOrRqgHoB+12HA/XQUG+k vKW8bbdVk5XZPc5ghdFIlza/pb1946SrIg1AsjaEMZqunh0G7oQhOWHKOd6fH0qg8NssMqQl jLfFiOlgEV2mnaz6XXQe/viXPwa4NCmdXqxeBDpJmrNMtbEbq+QUbgcwwle4Xx2/07ICkyZH +7RvbmZ/dM9cpzMAU53sLxSIVQT5lj23WLkCDQROiX9FARAAz/al0tgJaZ/eu0iI/xaPk3DK NIvr9SsKFe2hf3CVjxriHcRfoTfriycglUwtvKvhvB2Y8pQuWfLtP9Hx3H+YI5a78PO2tU1C JdY5Momd3/aJBuUFP5blbx6n+dLDepQhyQrAp2mVC3NIp4T48n4YxL4Og0MORytWNSeygISv Rordw7qDmEsa7wgFsLUIlhKmmV5VVv+wAOdYXdJ9S8n+XgrxSTgHj5f3QqkDtT0yG8NMLLmY kZpOwWoMumeqn/KppPY/uTIwbYTD56q1UirDDB5kDRL626qm63nF00ByyPY+6BXH22XD8smj f2eHw2szECG/lpD4knYjxROIctdC+gLRhz+Nlf8lEHmvjHgiErfgy/lOIf+AV9lvDF3bztjW M5oP2WGeR7VJfkxcXt4JPdyDIH6GBK7jbD7bFiXf6vMiFCrFeFo/bfa39veKUk7TRlnX13go gIZxqR6IvpkG0PxOu2RGJ7Aje/SjytQFa2NwNGCDe1bH89wm9mfDW3BuZF1o2+y+eVqkPZj0 mzfChEsiNIAY6KPDMVdInILYdTUAC5H26jj9CR4itBUcjE/tMll0n2wYRZ14Y/PM+UosfAhf YfN9t2096M9JebksnTbqp20keDMEBvc3KBkboEfoQLU08NDo7ncReitdLW2xICCnlkNIUQGS WlFVPcTQ2sMAEQEAAYkCHwQYAQIACQUCTol/RQIbDAAKCRAj0NC60T16QwsFD/9T4y30O0Wn MwIgcU8T2c2WwKbvmPbaU2LDqZebHdxQDemX65EZCv/NALmKdA22MVSbAaQeqsDD5KYbmCyC czilJ1i+tpZoJY5kJALHWWloI6Uyi2s1zAwlMktAZzgGMnI55Ifn0dAOK0p8oy7/KNGHNPwJ eHKzpHSRgysQ3S1t7VwU4mTFJtXQaBFMMXg8rItP5GdygrFB7yUbG6TnrXhpGkFBrQs9p+SK vCqRS3Gw+dquQ9QR+QGWciEBHwuSad5gu7QC9taN8kJQfup+nJL8VGtAKgGr1AgRx/a/V/QA ikDbt/0oIS/kxlIdcYJ01xuMrDXf1jFhmGZdocUoNJkgLb1iFAl5daV8MQOrqciG+6tnLeZK HY4xCBoigV7E8KwEE5yUfxBS0yRreNb+pjKtX6pSr1Z/dIo+td/sHfEHffaMUIRNvJlBeqaj BX7ZveskVFafmErkH7HC+7ErIaqoM4aOh/Z0qXbMEjFsWA5yVXvCoJWSHFImL9Bo6PbMGpI0 9eBrkNa1fd6RGcktrX6KNfGZ2POECmKGLTyDC8/kb180YpDJERN48S0QBa3Rvt06ozNgFgZF Wvu5Li5PpY/t/M7AAkLiVTtlhZnJWyEJrQi9O2nXTzlG1PeqGH2ahuRxn7txA5j5PHZEZdL1 Z46HaNmN2hZS/oJ69c1DI5Rcww== Organization: ARM Ltd Message-ID: Date: Tue, 9 Jul 2019 15:22:09 +0100 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <386316d0-f844-d88c-8b78-0ffc4ffe0aaa@codeaurora.org> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/07/2019 15:18, Neeraj Upadhyay wrote: > Hi Marc, > > On 7/9/19 6:38 PM, Marc Zyngier wrote: >> Hi Neeraj, >> >> On 09/07/2019 12:22, Neeraj Upadhyay wrote: >>> For cpus which do not support pstate.ssbs feature, el0 >>> might not retain spsr.ssbs. This is problematic, if this >>> task migrates to a cpu supporting this feature, thus >>> relying on its state to be correct. On kernel entry, >>> explicitly set spsr.ssbs, so that speculation is enabled >>> for el0, when this task migrates to a cpu supporting >>> ssbs feature. Restoring state at kernel entry ensures >>> that el0 ssbs state is always consistent while we are >>> in el1. >>> >>> As alternatives are applied by boot cpu, at the end of smp >>> init, presence/absence of ssbs feature on boot cpu, is used >>> for deciding, whether the capability is uniformly provided. >> I've seen the same issue, but went for a slightly different >> approach, see below. >> >>> Signed-off-by: Neeraj Upadhyay >>> --- >>> arch/arm64/kernel/cpu_errata.c | 16 ++++++++++++++++ >>> arch/arm64/kernel/entry.S | 26 +++++++++++++++++++++++++- >>> 2 files changed, 41 insertions(+), 1 deletion(-) >>> >>> diff --git a/arch/arm64/kernel/cpu_errata.c b/arch/arm64/kernel/cpu_errata.c >>> index ca11ff7..c84a56d 100644 >>> --- a/arch/arm64/kernel/cpu_errata.c >>> +++ b/arch/arm64/kernel/cpu_errata.c >>> @@ -336,6 +336,22 @@ void __init arm64_enable_wa2_handling(struct alt_instr *alt, >>> *updptr = cpu_to_le32(aarch64_insn_gen_nop()); >>> } >>> >>> +void __init arm64_restore_ssbs_state(struct alt_instr *alt, >>> + __le32 *origptr, __le32 *updptr, >>> + int nr_inst) >>> +{ >>> + BUG_ON(nr_inst != 1); >>> + /* >>> + * Only restore EL0 SSBS state on EL1 entry if cpu does not >>> + * support the capability and capability is present for at >>> + * least one cpu and if the SSBD state allows it to >>> + * be changed. >>> + */ >>> + if (!this_cpu_has_cap(ARM64_SSBS) && cpus_have_cap(ARM64_SSBS) && >>> + arm64_get_ssbd_state() != ARM64_SSBD_FORCE_ENABLE) >>> + *updptr = cpu_to_le32(aarch64_insn_gen_nop()); >>> +} >>> + >>> void arm64_set_ssbd_mitigation(bool state) >>> { >>> if (!IS_ENABLED(CONFIG_ARM64_SSBD)) { >>> diff --git a/arch/arm64/kernel/entry.S b/arch/arm64/kernel/entry.S >>> index 9cdc459..7e79305 100644 >>> --- a/arch/arm64/kernel/entry.S >>> +++ b/arch/arm64/kernel/entry.S >>> @@ -143,6 +143,25 @@ alternative_cb_end >>> #endif >>> .endm >>> >>> + // This macro updates spsr. It also corrupts the condition >>> + // codes state. >>> + .macro restore_ssbs_state, saved_spsr, tmp >>> +#ifdef CONFIG_ARM64_SSBD >>> +alternative_cb arm64_restore_ssbs_state >>> + b .L__asm_ssbs_skip\@ >>> +alternative_cb_end >>> + ldr \tmp, [tsk, #TSK_TI_FLAGS] >>> + tbnz \tmp, #TIF_SSBD, .L__asm_ssbs_skip\@ >>> + tst \saved_spsr, #PSR_MODE32_BIT // native task? >>> + b.ne .L__asm_ssbs_compat\@ >>> + orr \saved_spsr, \saved_spsr, #PSR_SSBS_BIT >>> + b .L__asm_ssbs_skip\@ >>> +.L__asm_ssbs_compat\@: >>> + orr \saved_spsr, \saved_spsr, #PSR_AA32_SSBS_BIT >>> +.L__asm_ssbs_skip\@: >>> +#endif >>> + .endm >> Although this is in keeping with the rest of entry.S (perfectly >> unreadable ;-), I think we can do something a bit simpler, that >> doesn't rely on patching. Also, this doesn't seem to take the >> SSBD options such as ARM64_SSBD_FORCE_ENABLE into account. > > arm64_restore_ssbs_state has a check for ARM64_SSBD_FORCE_ENABLE, > > does that look wrong? No, I just focused on the rest of the asm code and missed it, apologies. > >> >>> + >>> .macro kernel_entry, el, regsize = 64 >>> .if \regsize == 32 >>> mov w0, w0 // zero upper 32 bits of x0 >>> @@ -182,8 +201,13 @@ alternative_cb_end >>> str x20, [tsk, #TSK_TI_ADDR_LIMIT] >>> /* No need to reset PSTATE.UAO, hardware's already set it to 0 for us */ >>> .endif /* \el == 0 */ >>> - mrs x22, elr_el1 >>> mrs x23, spsr_el1 >>> + >>> + .if \el == 0 >>> + restore_ssbs_state x23, x22 >>> + .endif >>> + >>> + mrs x22, elr_el1 >>> stp lr, x21, [sp, #S_LR] >>> >>> /* >>> >> How about the patch below? > > Looks good; was just going to mention PF_KTHREAD check, but Mark R. has > already > > given detailed information about it. Yup, well spotted. I'll respin it shortly and we can then work out whether that's really a better approach. Thanks, M. -- Jazz is not dead. It just smells funny...