Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2901922pxb; Fri, 12 Feb 2021 04:34:09 -0800 (PST) X-Google-Smtp-Source: ABdhPJwww3P+ezr+OkA0S+DzTmuMLJbz72xGtXkh+TXcuB3u6VVUL7wqI/cAsAO6Y5rBRrB0nEg6 X-Received: by 2002:a17:906:f4f:: with SMTP id h15mr2797185ejj.498.1613133249551; Fri, 12 Feb 2021 04:34:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613133249; cv=none; d=google.com; s=arc-20160816; b=Dzqxy8QJKngSVM6t0NQMoSV8DwWA9kajXMAQAMYvKQRX0/a4Jdm4vLO+EkzXJk0cC5 +7auL/9LieLi6bFnFHDhkPKmZ+9zBJNrSjhG5ndq3RfnHJhYlzTQDCrikKSagQqaNSw2 s25YrH5wnzrU43jxR4+PVWY+5533YDNQ0Nj99+aM6ovoYDcSTbzxYv4K8o1KEvcTWjcA Yvg9GlJ8ldK80PDvifRQHtE0cIAFYo/DF7cR3w9AfX6CaQLI5kNXQJGaz1FCcWQktMTe VWEZQopKfN/PGJ8ugpkFN+jeiGucY/gqraPbUC0Dak9+7zUMrzYHXGLUUOZdI1d0U/pD Ntag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=fY1yUqTQqsxn5ge/QyVDnjOrMNWOsUQm93/gcZGKei4=; b=WovOcuJn+eiUL+vVw4IfYrIngGkkFonwd+n7vOnoekq3iUQdVzUQHLMAOxQAewYRdb 8okg7VbY1a+ktrSeiGY8jooeGdVDo74qQJ30ccCN6kZfJLykP/EW5jFZ9iLPFisDmaXu xyS1UafJhqrZYaWmhuZkZOFKm/FUJjgzemlQuLvzOrOmQJr7HJ9wtiz+syjTPp9fIGdM f9KyHg2Ye8snl5PlqYU3Ooy37vFp3/V0m3PaFFbNhHnhOowXbf1wbMgvYURCpN6Bcevn KWP9RhXAPc+VNJVmxoPHRdK1WV2P+pwmqtTpaEs4uDdkRHijy6YwsU82PyuYeIaoDLZi GIsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e18si6308588eds.369.2021.02.12.04.33.45; Fri, 12 Feb 2021 04:34:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231345AbhBLMb1 (ORCPT + 99 others); Fri, 12 Feb 2021 07:31:27 -0500 Received: from foss.arm.com ([217.140.110.172]:36470 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230396AbhBLMbV (ORCPT ); Fri, 12 Feb 2021 07:31:21 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id CC7491063; Fri, 12 Feb 2021 04:30:35 -0800 (PST) Received: from e121166-lin.cambridge.arm.com (e121166-lin.cambridge.arm.com [10.1.196.255]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 0FD9B3F719; Fri, 12 Feb 2021 04:30:33 -0800 (PST) Date: Fri, 12 Feb 2021 12:30:29 +0000 From: Lorenzo Pieralisi To: Vincenzo Frascino Cc: Branislav Rankov , Marco Elver , Catalin Marinas , Evgenii Stepanov , linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, Alexander Potapenko , Dmitry Vyukov , Andrey Konovalov , Andrey Ryabinin , Andrew Morton , Will Deacon , linux-arm-kernel@lists.infradead.org Subject: Re: [PATCH v13 6/7] arm64: mte: Report async tag faults before suspend Message-ID: <20210212123029.GA19585@e121166-lin.cambridge.arm.com> References: <20210211153353.29094-1-vincenzo.frascino@arm.com> <20210211153353.29094-7-vincenzo.frascino@arm.com> <20210212120015.GA18281@e121166-lin.cambridge.arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210212120015.GA18281@e121166-lin.cambridge.arm.com> User-Agent: Mutt/1.9.4 (2018-02-28) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Feb 12, 2021 at 12:00:15PM +0000, Lorenzo Pieralisi wrote: > On Thu, Feb 11, 2021 at 03:33:52PM +0000, Vincenzo Frascino wrote: > > When MTE async mode is enabled TFSR_EL1 contains the accumulative > > asynchronous tag check faults for EL1 and EL0. > > > > During the suspend/resume operations the firmware might perform some > > operations that could change the state of the register resulting in > > a spurious tag check fault report. > > > > Report asynchronous tag faults before suspend and clear the TFSR_EL1 > > register after resume to prevent this to happen. > > > > Cc: Catalin Marinas > > Cc: Will Deacon > > Cc: Lorenzo Pieralisi > > Signed-off-by: Vincenzo Frascino > > --- > > arch/arm64/include/asm/mte.h | 4 ++++ > > arch/arm64/kernel/mte.c | 20 ++++++++++++++++++++ > > arch/arm64/kernel/suspend.c | 3 +++ > > 3 files changed, 27 insertions(+) > > > > diff --git a/arch/arm64/include/asm/mte.h b/arch/arm64/include/asm/mte.h > > index 43169b978cd3..33e88a470357 100644 > > --- a/arch/arm64/include/asm/mte.h > > +++ b/arch/arm64/include/asm/mte.h > > @@ -41,6 +41,7 @@ void mte_sync_tags(pte_t *ptep, pte_t pte); > > void mte_copy_page_tags(void *kto, const void *kfrom); > > void flush_mte_state(void); > > void mte_thread_switch(struct task_struct *next); > > +void mte_suspend_enter(void); > > void mte_suspend_exit(void); > > long set_mte_ctrl(struct task_struct *task, unsigned long arg); > > long get_mte_ctrl(struct task_struct *task); > > @@ -66,6 +67,9 @@ static inline void flush_mte_state(void) > > static inline void mte_thread_switch(struct task_struct *next) > > { > > } > > +static inline void mte_suspend_enter(void) > > +{ > > +} > > static inline void mte_suspend_exit(void) > > { > > } > > diff --git a/arch/arm64/kernel/mte.c b/arch/arm64/kernel/mte.c > > index f5aa5bea6dfe..de905102245a 100644 > > --- a/arch/arm64/kernel/mte.c > > +++ b/arch/arm64/kernel/mte.c > > @@ -258,12 +258,32 @@ void mte_thread_switch(struct task_struct *next) > > mte_check_tfsr_el1(); > > } > > > > +void mte_suspend_enter(void) > > +{ > > + if (!system_supports_mte()) > > + return; > > + > > + /* > > + * The barriers are required to guarantee that the indirect writes > > + * to TFSR_EL1 are synchronized before we report the state. > > + */ > > + dsb(nsh); > > + isb(); > > + > > + /* Report SYS_TFSR_EL1 before suspend entry */ > > + mte_check_tfsr_el1(); > > +} > > + > > void mte_suspend_exit(void) > > { > > if (!system_supports_mte()) > > return; > > > > update_gcr_el1_excl(gcr_kernel_excl); > > + > > + /* Clear SYS_TFSR_EL1 after suspend exit */ > > + write_sysreg_s(0, SYS_TFSR_EL1); > > AFAICS it is not needed, it is done already in __cpu_setup() (that is > called by cpu_resume on return from cpu_suspend() from firmware). > > However, I have a question. We are relying on context switch to set > sctlr_el1_tfc0 right ? If that's the case, till the thread resuming from > low power switches context we are running with SCTLR_EL1_TCF0 not > reflecting the actual value. Forget this, we obviously restore sctlr_el1 on resume (cpu_do_resume()). With the line above removed: Reviewed-by: Lorenzo Pieralisi > Just making sure that I understand it correctly, I need to check the > resume from suspend-to-RAM path, it is something that came up with perf > save/restore already in the past. > > Lorenzo > > > + > > } > > > > long set_mte_ctrl(struct task_struct *task, unsigned long arg) > > diff --git a/arch/arm64/kernel/suspend.c b/arch/arm64/kernel/suspend.c > > index a67b37a7a47e..25a02926ad88 100644 > > --- a/arch/arm64/kernel/suspend.c > > +++ b/arch/arm64/kernel/suspend.c > > @@ -91,6 +91,9 @@ int cpu_suspend(unsigned long arg, int (*fn)(unsigned long)) > > unsigned long flags; > > struct sleep_stack_data state; > > > > + /* Report any MTE async fault before going to suspend */ > > + mte_suspend_enter(); > > + > > /* > > * From this point debug exceptions are disabled to prevent > > * updates to mdscr register (saved and restored along with > > -- > > 2.30.0 > > > > _______________________________________________ > linux-arm-kernel mailing list > linux-arm-kernel@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-arm-kernel