Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2886485pxb; Fri, 12 Feb 2021 04:08:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJxmdWsDp7cgARj5IBYH/ynpcmKJ46A3MbRZ5gzqHr1SuRwqdETcQy0sJGfEdgXSs0YuAV/1 X-Received: by 2002:aa7:d901:: with SMTP id a1mr2984748edr.120.1613131690439; Fri, 12 Feb 2021 04:08:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613131690; cv=none; d=google.com; s=arc-20160816; b=lPyVeyeSoytM3gcQCWtzEcmDgeqs9eMbKnLTlaQelZUr8/14qE0i7XyUTGQlZ9zHgx 4BSQWNQUVfBTbuEB6RdiPStfDo5rVvIrWpwQce6kMzy8ws2pnM1iQ1q7AT+lEhc8zNqv cBv9W9qavvs4yZwQ378Lsr7/R3D6j53OzR6KjcwK+IsyDW+QQzxFMD5GGMc89vXS6SEf IsiWO3JMgtsBrhPDkfXbYyJ2DUiMaM83Dc0JvWMLGqi6U6qU44M+hrYTCs9aJgbv98Is fJ9GIEVV6AQwoLxTtJh5pc0lZp9Rn7qglsB0lfGIdqNG5Q3DtdRoXF9Z4gxL0r9BJdGQ 9zzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=phzxsFOI+5yGNK0cA4SleoHbv9jgAqHmcgPzwcGgPwc=; b=AuS2m8oEX+w/4WiE6MK6vJbqfPdH+j1/4SC9wuLuzR7dmZSl3H1akewlCyXWA7zP0v hfRIuVGSQAi3agtjZx/5EakVNILcfUqHtCNy93TQ/MfOa61CwM6JUpQ5CWktSO4G/HXu PVEPAs9lGi3HE6OACXc95q0Y1RqOVImPgL4JUho+bj66g7mbGmYVFLKWDTh+M7hjJjBN M1VWsJCqvZ6e1Yo+rgwUw9etk6ibWP/n6a0k2jwaPoeA40wW94srIeWphUz29TUwOpxd Ygo5G3NXYQg8hAnzU02moNUfBkjKZCMg38Bc1JK4xLggzOeDV4jmYhOdBMYojV7FvAJC fwVg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q20si5470999ejb.298.2021.02.12.04.07.46; Fri, 12 Feb 2021 04:08:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230300AbhBLMDO (ORCPT + 99 others); Fri, 12 Feb 2021 07:03:14 -0500 Received: from foss.arm.com ([217.140.110.172]:35890 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229992AbhBLMBI (ORCPT ); Fri, 12 Feb 2021 07:01:08 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 48B8A113E; Fri, 12 Feb 2021 04:00:22 -0800 (PST) Received: from e121166-lin.cambridge.arm.com (e121166-lin.cambridge.arm.com [10.1.196.255]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 80EA73F719; Fri, 12 Feb 2021 04:00:20 -0800 (PST) Date: Fri, 12 Feb 2021 12:00:15 +0000 From: Lorenzo Pieralisi To: Vincenzo Frascino Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, Andrew Morton , Catalin Marinas , Will Deacon , Dmitry Vyukov , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Branislav Rankov , Andrey Konovalov Subject: Re: [PATCH v13 6/7] arm64: mte: Report async tag faults before suspend Message-ID: <20210212120015.GA18281@e121166-lin.cambridge.arm.com> References: <20210211153353.29094-1-vincenzo.frascino@arm.com> <20210211153353.29094-7-vincenzo.frascino@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210211153353.29094-7-vincenzo.frascino@arm.com> User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Feb 11, 2021 at 03:33:52PM +0000, Vincenzo Frascino wrote: > When MTE async mode is enabled TFSR_EL1 contains the accumulative > asynchronous tag check faults for EL1 and EL0. > > During the suspend/resume operations the firmware might perform some > operations that could change the state of the register resulting in > a spurious tag check fault report. > > Report asynchronous tag faults before suspend and clear the TFSR_EL1 > register after resume to prevent this to happen. > > Cc: Catalin Marinas > Cc: Will Deacon > Cc: Lorenzo Pieralisi > Signed-off-by: Vincenzo Frascino > --- > arch/arm64/include/asm/mte.h | 4 ++++ > arch/arm64/kernel/mte.c | 20 ++++++++++++++++++++ > arch/arm64/kernel/suspend.c | 3 +++ > 3 files changed, 27 insertions(+) > > diff --git a/arch/arm64/include/asm/mte.h b/arch/arm64/include/asm/mte.h > index 43169b978cd3..33e88a470357 100644 > --- a/arch/arm64/include/asm/mte.h > +++ b/arch/arm64/include/asm/mte.h > @@ -41,6 +41,7 @@ void mte_sync_tags(pte_t *ptep, pte_t pte); > void mte_copy_page_tags(void *kto, const void *kfrom); > void flush_mte_state(void); > void mte_thread_switch(struct task_struct *next); > +void mte_suspend_enter(void); > void mte_suspend_exit(void); > long set_mte_ctrl(struct task_struct *task, unsigned long arg); > long get_mte_ctrl(struct task_struct *task); > @@ -66,6 +67,9 @@ static inline void flush_mte_state(void) > static inline void mte_thread_switch(struct task_struct *next) > { > } > +static inline void mte_suspend_enter(void) > +{ > +} > static inline void mte_suspend_exit(void) > { > } > diff --git a/arch/arm64/kernel/mte.c b/arch/arm64/kernel/mte.c > index f5aa5bea6dfe..de905102245a 100644 > --- a/arch/arm64/kernel/mte.c > +++ b/arch/arm64/kernel/mte.c > @@ -258,12 +258,32 @@ void mte_thread_switch(struct task_struct *next) > mte_check_tfsr_el1(); > } > > +void mte_suspend_enter(void) > +{ > + if (!system_supports_mte()) > + return; > + > + /* > + * The barriers are required to guarantee that the indirect writes > + * to TFSR_EL1 are synchronized before we report the state. > + */ > + dsb(nsh); > + isb(); > + > + /* Report SYS_TFSR_EL1 before suspend entry */ > + mte_check_tfsr_el1(); > +} > + > void mte_suspend_exit(void) > { > if (!system_supports_mte()) > return; > > update_gcr_el1_excl(gcr_kernel_excl); > + > + /* Clear SYS_TFSR_EL1 after suspend exit */ > + write_sysreg_s(0, SYS_TFSR_EL1); AFAICS it is not needed, it is done already in __cpu_setup() (that is called by cpu_resume on return from cpu_suspend() from firmware). However, I have a question. We are relying on context switch to set sctlr_el1_tfc0 right ? If that's the case, till the thread resuming from low power switches context we are running with SCTLR_EL1_TCF0 not reflecting the actual value. Just making sure that I understand it correctly, I need to check the resume from suspend-to-RAM path, it is something that came up with perf save/restore already in the past. Lorenzo > + > } > > long set_mte_ctrl(struct task_struct *task, unsigned long arg) > diff --git a/arch/arm64/kernel/suspend.c b/arch/arm64/kernel/suspend.c > index a67b37a7a47e..25a02926ad88 100644 > --- a/arch/arm64/kernel/suspend.c > +++ b/arch/arm64/kernel/suspend.c > @@ -91,6 +91,9 @@ int cpu_suspend(unsigned long arg, int (*fn)(unsigned long)) > unsigned long flags; > struct sleep_stack_data state; > > + /* Report any MTE async fault before going to suspend */ > + mte_suspend_enter(); > + > /* > * From this point debug exceptions are disabled to prevent > * updates to mdscr register (saved and restored along with > -- > 2.30.0 >