|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] xen/arm: Warn user on cpu errata 832075
Hi,
> On 21 Oct 2020, at 10:03, Julien Grall <julien@xxxxxxx> wrote:
>
> Hi,
>
> On 15/10/2020 19:05, Stefano Stabellini wrote:
>> On Thu, 15 Oct 2020, Bertrand Marquis wrote:
>>>> On 14 Oct 2020, at 22:15, Stefano Stabellini <sstabellini@xxxxxxxxxx>
>>>> wrote:
>>>>
>>>> On Wed, 14 Oct 2020, Julien Grall wrote:
>>>>> On 14/10/2020 17:03, Bertrand Marquis wrote:
>>>>>>> On 14 Oct 2020, at 12:35, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>>>>>>> wrote:
>>>>>>>
>>>>>>> On 14/10/2020 11:41, Bertrand Marquis wrote:
>>>>>>>> When a Cortex A57 processor is affected by CPU errata 832075, a guest
>>>>>>>> not implementing the workaround for it could deadlock the system.
>>>>>>>> Add a warning during boot informing the user that only trusted guests
>>>>>>>> should be executed on the system.
>>>>>>>> An equivalent warning is already given to the user by KVM on cores
>>>>>>>> affected by this errata.
>>>>>>>>
>>>>>>>> Signed-off-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>
>>>>>>>> ---
>>>>>>>> xen/arch/arm/cpuerrata.c | 21 +++++++++++++++++++++
>>>>>>>> 1 file changed, 21 insertions(+)
>>>>>>>>
>>>>>>>> diff --git a/xen/arch/arm/cpuerrata.c b/xen/arch/arm/cpuerrata.c
>>>>>>>> index 6c09017515..8f9ab6dde1 100644
>>>>>>>> --- a/xen/arch/arm/cpuerrata.c
>>>>>>>> +++ b/xen/arch/arm/cpuerrata.c
>>>>>>>> @@ -240,6 +240,26 @@ static int enable_ic_inv_hardening(void *data)
>>>>>>>>
>>>>>>>> #endif
>>>>>>>>
>>>>>>>> +#ifdef CONFIG_ARM64_ERRATUM_832075
>>>>>>>> +
>>>>>>>> +static int warn_device_load_acquire_errata(void *data)
>>>>>>>> +{
>>>>>>>> + static bool warned = false;
>>>>>>>> +
>>>>>>>> + if ( !warned )
>>>>>>>> + {
>>>>>>>> + warning_add("This CPU is affected by the errata 832075.\n"
>>>>>>>> + "Guests without required CPU erratum
>>>>>>>> workarounds\n"
>>>>>>>> + "can deadlock the system!\n"
>>>>>>>> + "Only trusted guests should be used on this
>>>>>>>> system.\n");
>>>>>>>> + warned = true;
>>>>>>>
>>>>>>> This is an antipattern, which probably wants fixing elsewhere as well.
>>>>>>>
>>>>>>> warning_add() is __init. It's not legitimate to call from a non-init
>>>>>>> function, and a less useless build system would have modpost to object.
>>>>>>>
>>>>>>> The ARM_SMCCC_ARCH_WORKAROUND_1 instance asserts based on system state,
>>>>>>> but this provides no safety at all.
>>>>>>>
>>>>>>>
>>>>>>> What warning_add() actually does is queue messages for some point near
>>>>>>> the end of boot. It's not clear that this is even a clever thing to do.
>>>>>>>
>>>>>>> I'm very tempted to suggest a blanket change to printk_once().
>>>>>>
>>>>>> If this is needed then this could be done in an other serie ?
>>>>>
>>>>> The callback ->enable() will be called when a CPU is onlined/offlined. So
>>>>> this
>>>>> is going to require if you plan to support CPU hotplugs or suspend resume.
>>>>>
>>>>>> Would be good to keep this patch as purely handling the errata.
>>>>
>>>> My preference would be to keep this patch small with just the errata,
>>>> maybe using a simple printk_once as Andrew and Julien discussed.
>>>>
>>>> There is another instance of warning_add potentially being called
>>>> outside __init in xen/arch/arm/cpuerrata.c:
>>>> enable_smccc_arch_workaround_1. So if you are up for it, it would be
>>>> good to produce a patch to fix that too.
>>>>
>>>>
>>>>> In the case of this patch, how about moving the warning_add() in
>>>>> enable_errata_workarounds()?
>>>>>
>>>>> By then we should now all the errata present on your platform. All CPUs
>>>>> onlined afterwards (i.e. runtime) should always abide to the set discover
>>>>> during boot.
>>>>
>>>> If I understand your suggestion correctly, it would work for
>>>> warn_device_load_acquire_errata, because it is just a warning, but it
>>>> would not work for enable_smccc_arch_workaround_1, because there is
>>>> actually a call to be made there.
>>>>
>>>> Maybe it would be simpler to use printk_once in both cases? I don't have
>>>> a strong preference either way.
>>>
>>> I could do the following (in a serie of 2 patches):
>>> - modify enable_smccc_arch_workaround_1 to use printk_once with a
>>> prefix/suffix “****” on each line printed (and maybe adapting print to
>>> fit a
>>> line length of 80)
>>> - modify my patch to do the print in enable_errata_workarounds using also
>>> the prefix/suffix and printk_once
>>>
>>> Please confirm that this strategy would fit everyone.
>> I think it is OK but if you are going to use printk_once in your patch
>> you might as well leave it in the .enable implementation.
>> Julien, what do you think?
>
> Bertrand reminded me today that I forgot to answer the e-mail (sorry). I am
> happy with using printk_once().
Shall i also keep the .enable implementation ?
At the end having:
if ( cpus_have_cap(ARM64_WORKAROUND_DEVICE_LOAD_ACQUIRE) )
in enable_errata_workarounds is quite clean.
>
> I am also wondering if we should also taint the hypervisor (via add_taint()).
> This would be helpful if someone reports error on a Xen running on such
> platform.
Good idea yes.
I will add that and removing the core from the security supported ones to my
patch.
Cheers
Bertrand
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |