[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] xen/arm: Add workaround for Cortex-A53 erratum #845719


  • To: Michal Orzel <Michal.Orzel@xxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Tue, 8 Dec 2020 08:59:08 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=z4dZok7Zgkqh1353jUTUNHppHiK1fvd1ufgwHyoPiv0=; b=WKAB7qXHAbdo5JnH/tueHHrwACP+8QqB97d8/F38uY7i59KhF/Rj/4vuLlB87QkrSk4OBYqVGlUvrCRko54ETMG1WklJSKe24QjZl0bARuSyKmStl6C7BxjcitHRkPUfBvKzyj83jzGon/hUPX2oZFXPpaELQwyIx+pG4CU+V3V71HYUqUtpxsQMR69ntHtPBx3c/J8FH/1cdlt+2GHdpp6sW8Py5D+hJ7hcIkFlCovauNtEbhYijgM0iVCg8gHlDRtJ4ePJ7XfDo55SNr6JGxpuPEHMFK0iKCn5whoplVO1r0FaE3s9ERSKB3vnYWlDxx46d1XFrjOAq3gcX3gjpA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=C5eDL0zz6nhdhVIrUaEEnsiZJ/gS3uhLxma5VAKP+IWKYswiKaiPT0PAc8K5GXho4+LTcUrLyVC9zcMk9ucZhPqdVcfJWVjhp/syf+FDnnqDvplQrMMkQsDZVK/gt7VtLsH52GlKkagiyRqwm5obI5h4IPkvAd7WXhl6asINOJ+mwBS2a+6HYMvSZPnGgDQYOkARSqitLvZJHhS/w/IeulotW9uF11ebCaEJ8Y5l7WKvRyuuk0RxTO36qK/HT69FhtBQONr5acKqvPm4gNS+K+mmpgNOtpCZM+/BwAA6hVyP2Htfz5DMXje3IVozKzuz4DuGtfK4FhnK4npx2MDJGw==
  • Authentication-results-original: arm.com; dkim=none (message not signed) header.d=none;arm.com; dmarc=none action=none header.from=arm.com;
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Wei Chen <Wei.Chen@xxxxxxx>
  • Delivery-date: Tue, 08 Dec 2020 08:59:50 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: arm.com; dkim=none (message not signed) header.d=none;arm.com; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHWzTMYnytbZyotvEaEgHJUGuOUO6ns5mAA
  • Thread-topic: [PATCH] xen/arm: Add workaround for Cortex-A53 erratum #845719

Hi,

> On 8 Dec 2020, at 07:23, Michal Orzel <Michal.Orzel@xxxxxxx> wrote:
> 
> When executing in aarch32 state at EL0, a load at EL0 from a
> virtual address that matches the bottom 32 bits of the virtual address
> used by a recent load at (aarch64) EL1 might return incorrect data.
> 
> The workaround is to insert a write of the contextidr_el1 register
> on exception return to an aarch32 guest.
> 
> Signed-off-by: Michal Orzel <michal.orzel@xxxxxxx>
Reviewed-by: Bertrand Marquis <bertrand.marquis@xxxxxxx>

Thanks
Bertrand

> ---
> docs/misc/arm/silicon-errata.txt |  1 +
> xen/arch/arm/Kconfig             | 19 +++++++++++++++++++
> xen/arch/arm/arm64/entry.S       |  9 +++++++++
> xen/arch/arm/cpuerrata.c         |  8 ++++++++
> xen/include/asm-arm/cpufeature.h |  3 ++-
> 5 files changed, 39 insertions(+), 1 deletion(-)
> 
> diff --git a/docs/misc/arm/silicon-errata.txt 
> b/docs/misc/arm/silicon-errata.txt
> index 27bf957ebf..fa3d9af63d 100644
> --- a/docs/misc/arm/silicon-errata.txt
> +++ b/docs/misc/arm/silicon-errata.txt
> @@ -45,6 +45,7 @@ stable hypervisors.
> | ARM            | Cortex-A53      | #827319         | ARM64_ERRATUM_827319   
>  |
> | ARM            | Cortex-A53      | #824069         | ARM64_ERRATUM_824069   
>  |
> | ARM            | Cortex-A53      | #819472         | ARM64_ERRATUM_819472   
>  |
> +| ARM            | Cortex-A53      | #845719         | ARM64_ERRATUM_845719  
>   |
> | ARM            | Cortex-A55      | #1530923        | N/A                    
>  |
> | ARM            | Cortex-A57      | #852523         | N/A                    
>  |
> | ARM            | Cortex-A57      | #832075         | ARM64_ERRATUM_832075   
>  |
> diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
> index f5b1bcda03..6bea393555 100644
> --- a/xen/arch/arm/Kconfig
> +++ b/xen/arch/arm/Kconfig
> @@ -244,6 +244,25 @@ config ARM_ERRATUM_858921
> 
>         If unsure, say Y.
> 
> +config ARM64_ERRATUM_845719
> +     bool "Cortex-A53: 845719: A load might read incorrect data"
> +     default y
> +     help
> +       This option adds an alternative code sequence to work around ARM
> +       erratum 845719 on Cortex-A53 parts up to r0p4.
> +
> +       When executing in aarch32 state at EL0, a load at EL0 from a
> +       virtual address that matches the bottom 32 bits of the virtual address
> +       used by a recent load at (aarch64) EL1 might return incorrect data.
> +
> +       The workaround is to insert a write of the contextidr_el1 register
> +       on exception return to an aarch32 guest.
> +       Please note that this does not necessarily enable the workaround,
> +       as it depends on the alternative framework, which will only patch
> +       the kernel if an affected CPU is detected.
> +
> +       If unsure, say Y.
> +
> config ARM64_WORKAROUND_REPEAT_TLBI
>       bool
> 
> diff --git a/xen/arch/arm/arm64/entry.S b/xen/arch/arm/arm64/entry.S
> index 175ea2981e..ef3336f34a 100644
> --- a/xen/arch/arm/arm64/entry.S
> +++ b/xen/arch/arm/arm64/entry.S
> @@ -96,6 +96,15 @@
>         msr     SPSR_fiq, x22
>         msr     SPSR_irq, x23
> 
> +#ifdef CONFIG_ARM64_ERRATUM_845719
> +alternative_if ARM64_WORKAROUND_845719
> +        /* contextidr_el1 is not accessible from aarch32 guest so we can
> +         * write xzr to it
> +         */
> +        msr     contextidr_el1, xzr
> +alternative_else_nop_endif
> +#endif
> +
>         add     x21, sp, #UREGS_SPSR_und
>         ldp     w22, w23, [x21]
>         msr     SPSR_und, x22
> diff --git a/xen/arch/arm/cpuerrata.c b/xen/arch/arm/cpuerrata.c
> index b398d480f1..8959d4d4dc 100644
> --- a/xen/arch/arm/cpuerrata.c
> +++ b/xen/arch/arm/cpuerrata.c
> @@ -491,6 +491,14 @@ static const struct arm_cpu_capabilities arm_errata[] = {
>         .capability = ARM_WORKAROUND_858921,
>         MIDR_ALL_VERSIONS(MIDR_CORTEX_A73),
>     },
> +#endif
> +#ifdef CONFIG_ARM64_ERRATUM_845719
> +    {
> +        /* Cortex-A53 r0p[01234] */
> +        .desc = "ARM erratum 845719",
> +        .capability = ARM64_WORKAROUND_845719,
> +        MIDR_RANGE(MIDR_CORTEX_A53, 0x00, 0x04),
> +    },
> #endif
>     {
>         /* Neoverse r0p0 - r2p0 */
> diff --git a/xen/include/asm-arm/cpufeature.h 
> b/xen/include/asm-arm/cpufeature.h
> index c7b5052992..1165a1eb62 100644
> --- a/xen/include/asm-arm/cpufeature.h
> +++ b/xen/include/asm-arm/cpufeature.h
> @@ -47,8 +47,9 @@
> #define ARM64_WORKAROUND_AT_SPECULATE 9
> #define ARM_WORKAROUND_858921 10
> #define ARM64_WORKAROUND_REPEAT_TLBI 11
> +#define ARM64_WORKAROUND_845719 12
> 
> -#define ARM_NCAPS           12
> +#define ARM_NCAPS           13
> 
> #ifndef __ASSEMBLY__
> 
> -- 
> 2.28.0
> 




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.