|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2] xen/arm: Add workaround for Cortex-A76/Neoverse-N1 erratum #1286807
Hi Julien,
On 17.11.2020 18:30, Julien Grall wrote:
> Hi Michal,
>
> On 16/11/2020 12:11, Michal Orzel wrote:
>> On the affected Cortex-A76/Neoverse-N1 cores (r0p0 to r3p0),
>> if a virtual address for a cacheable mapping of a location is being
>> accessed by a core while another core is remapping the virtual
>> address to a new physical page using the recommended break-before-make
>> sequence, then under very rare circumstances TLBI+DSB completes before
>> a read using the translation being invalidated has been observed by
>> other observers. The workaround repeats the TLBI+DSB operation
>> for all the TLB flush operations on purpose.
>
> Sorry for nitpicking, the commit message should contain enough information
> for future reader to understand why this was done "on purpose".
>
> So how about:
>
> "The workaround repeats the TLBI+DSB operation for all the TLB flush
> operations. While this is stricly not necessary, we don't want to take any
> risk.".
>
> I can fix it on commit.
>
Ok I agree to add this extra clarification.
Please go on and fix it on commit/etc.
Thanks,
Michal
> Reviewed-by: Julien Grall <jgrall@xxxxxxxxxx>
>
>>
>> Signed-off-by: Michal Orzel <michal.orzel@xxxxxxx>
>> ---
>> docs/misc/arm/silicon-errata.txt | 2 ++
>> xen/arch/arm/Kconfig | 23 +++++++++++++++++++++
>> xen/arch/arm/cpuerrata.c | 14 +++++++++++++
>> xen/include/asm-arm/arm64/flushtlb.h | 30 +++++++++++++++++++---------
>> xen/include/asm-arm/cpufeature.h | 3 ++-
>> 5 files changed, 62 insertions(+), 10 deletions(-)
>>
>> diff --git a/docs/misc/arm/silicon-errata.txt
>> b/docs/misc/arm/silicon-errata.txt
>> index 552c4151d3..d183ba543f 100644
>> --- a/docs/misc/arm/silicon-errata.txt
>> +++ b/docs/misc/arm/silicon-errata.txt
>> @@ -53,5 +53,7 @@ stable hypervisors.
>> | ARM | Cortex-A72 | #853709 | N/A
>> |
>> | ARM | Cortex-A73 | #858921 | ARM_ERRATUM_858921
>> |
>> | ARM | Cortex-A76 | #1165522 | N/A
>> |
>> +| ARM | Cortex-A76 | #1286807 |
>> ARM64_ERRATUM_1286807 |
>> | ARM | Neoverse-N1 | #1165522 | N/A
>> +| ARM | Neoverse-N1 | #1286807 |
>> ARM64_ERRATUM_1286807 |
>> | ARM | MMU-500 | #842869 | N/A
>> |
>> diff --git a/xen/arch/arm/Kconfig b/xen/arch/arm/Kconfig
>> index f938dd21bd..8171b8d04a 100644
>> --- a/xen/arch/arm/Kconfig
>> +++ b/xen/arch/arm/Kconfig
>> @@ -244,6 +244,29 @@ config ARM_ERRATUM_858921
>> If unsure, say Y.
>> +config ARM64_WORKAROUND_REPEAT_TLBI
>> + bool
>> +
>> +config ARM64_ERRATUM_1286807
>> + bool "Cortex-A76/Neoverse-N1: 1286807: Modification of the translation
>> table for a virtual address might lead to read-after-read ordering violation"
>> + default y
>> + select ARM64_WORKAROUND_REPEAT_TLBI
>> + depends on ARM_64
>> + help
>> + This option adds a workaround for ARM Cortex-A76/Neoverse-N1 erratum
>> 1286807.
>> +
>> + On the affected Cortex-A76/Neoverse-N1 cores (r0p0 to r3p0), if a
>> virtual
>> + address for a cacheable mapping of a location is being
>> + accessed by a core while another core is remapping the virtual
>> + address to a new physical page using the recommended
>> + break-before-make sequence, then under very rare circumstances
>> + TLBI+DSB completes before a read using the translation being
>> + invalidated has been observed by other observers. The
>> + workaround repeats the TLBI+DSB operation for all the TLB flush
>> + operations on purpose.
> If you agree with what I wrote above, I will update this section and ...
>
>> +
>> + If unsure, say Y.
>> +
>> endmenu
>> config ARM64_HARDEN_BRANCH_PREDICTOR
>> diff --git a/xen/arch/arm/cpuerrata.c b/xen/arch/arm/cpuerrata.c
>> index 567911d380..cb4795beec 100644
>> --- a/xen/arch/arm/cpuerrata.c
>> +++ b/xen/arch/arm/cpuerrata.c
>> @@ -424,6 +424,20 @@ static const struct arm_cpu_capabilities arm_errata[] =
>> {
>> (1 << MIDR_VARIANT_SHIFT) | 2),
>> },
>> #endif
>> +#ifdef CONFIG_ARM64_ERRATUM_1286807
>> + {
>> + /* Cortex-A76 r0p0 - r3p0 */
>> + .desc = "ARM erratum 1286807",
>> + .capability = ARM64_WORKAROUND_REPEAT_TLBI,
>> + MIDR_RANGE(MIDR_CORTEX_A76, 0, 3 << MIDR_VARIANT_SHIFT),
>> + },
>> + {
>> + /* Neoverse-N1 r0p0 - r3p0 */
>> + .desc = "ARM erratum 1286807",
>> + .capability = ARM64_WORKAROUND_REPEAT_TLBI,
>> + MIDR_RANGE(MIDR_NEOVERSE_N1, 0, 3 << MIDR_VARIANT_SHIFT),
>> + },
>> +#endif
>> #ifdef CONFIG_ARM64_HARDEN_BRANCH_PREDICTOR
>> {
>> .capability = ARM_HARDEN_BRANCH_PREDICTOR,
>> diff --git a/xen/include/asm-arm/arm64/flushtlb.h
>> b/xen/include/asm-arm/arm64/flushtlb.h
>> index ceec59542e..8f2abfaf1d 100644
>> --- a/xen/include/asm-arm/arm64/flushtlb.h
>> +++ b/xen/include/asm-arm/arm64/flushtlb.h
>> @@ -9,6 +9,12 @@
>> * DSB ISH // Ensure the TLB invalidation has completed
>> * ISB // See explanation below
>> *
>> + * ARM64_WORKAROUND_REPEAT_TLBI:
>> + * Modification of the translation table for a virtual address might lead to
>> + * read-after-read ordering violation.
>> + * The workaround repeats TLBI+DSB operation for all the TLB flush
>> operations
>> + * on purpose.
>
> ... this section while committing.
>
> Cheers,
>
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |