* Re: [PATCH v8 27/28] arm64: mte: Kconfig entry
[not found] ` <20200824182758.27267-28-catalin.marinas@arm.com>
@ 2020-08-24 18:44 ` Randy Dunlap
2020-08-25 11:10 ` Catalin Marinas
0 siblings, 1 reply; 8+ messages in thread
From: Randy Dunlap @ 2020-08-24 18:44 UTC (permalink / raw)
To: Catalin Marinas, linux-arm-kernel
Cc: linux-arch, Szabolcs Nagy, Andrey Konovalov, Kevin Brodsky,
Peter Collingbourne, linux-mm, Andrew Morton, Vincenzo Frascino,
Will Deacon, Dave P Martin
Hi,
On 8/24/20 11:27 AM, Catalin Marinas wrote:
> From: Vincenzo Frascino <vincenzo.frascino@arm.com>
>
> Add Memory Tagging Extension support to the arm64 kbuild.
>
> Signed-off-by: Vincenzo Frascino <vincenzo.frascino@arm.com>
> Co-developed-by: Catalin Marinas <catalin.marinas@arm.com>
> Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
> Cc: Will Deacon <will@kernel.org>
> ---
>
> Notes:
> v7:
> - Binutils gained initial support for MTE in 2.32.0. However, a late
> architecture addition (LDGM/STGM) is only supported in the newer
> 2.32.x and 2.33 versions. Change the AS_HAS_MTE option to also check
> for stgm in addition to .arch armv8.5-a+memtag.
>
> arch/arm64/Kconfig | 31 +++++++++++++++++++++++++++++++
> 1 file changed, 31 insertions(+)
>
> diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig
> index 6d232837cbee..10cf81d70657 100644
> --- a/arch/arm64/Kconfig
> +++ b/arch/arm64/Kconfig
> @@ -1664,6 +1664,37 @@ config ARCH_RANDOM
> provides a high bandwidth, cryptographically secure
> hardware random number generator.
>
> +config ARM64_AS_HAS_MTE
> + # Binutils gained initial support for MTE in 2.32.0. However, a
> + # late architecture addition (LDGM/STGM) is only supported in
> + # the newer 2.32.x and 2.33 versions.
> + def_bool $(as-instr,.arch armv8.5-a+memtag\nstgm xzr$(comma)[x0])
Would you mind translating that for me?
Yes, I read the v7 Notes, but that only helped a little bit.
> +
> +config ARM64_MTE
> + bool "Memory Tagging Extension support"
> + default y
> + depends on ARM64_AS_HAS_MTE && ARM64_TAGGED_ADDR_ABI
> + select ARCH_USES_HIGH_VMA_FLAGS
> + help
> + Memory Tagging (part of the ARMv8.5 Extensions) provides
> + architectural support for run-time, always-on detection of
runtime,
as is used below.
> + various classes of memory error to aid with software debugging
> + to eliminate vulnerabilities arising from memory-unsafe
> + languages.
> +
> + This option enables the support for the Memory Tagging
> + Extension at EL0 (i.e. for userspace).
> +
> + Selecting this option allows the feature to be detected at
> + runtime. Any secondary CPU not implementing this feature will
> + not be allowed a late bring-up.
> +
> + Userspace binaries that want to use this feature must
> + explicitly opt in. The mechanism for the userspace is
> + described in:
> +
> + Documentation/arm64/memory-tagging-extension.rst.
> +
> endmenu
>
> config ARM64_SVE
>
thanks.
--
~Randy
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v8 03/28] arm64: mte: CPU feature detection and initial sysreg configuration
[not found] ` <20200824182758.27267-4-catalin.marinas@arm.com>
@ 2020-08-25 8:53 ` Marc Zyngier
2020-08-25 10:54 ` Catalin Marinas
0 siblings, 1 reply; 8+ messages in thread
From: Marc Zyngier @ 2020-08-25 8:53 UTC (permalink / raw)
To: Catalin Marinas, Vincenzo Frascino
Cc: linux-arch, Suzuki K Poulose, Szabolcs Nagy, Andrey Konovalov,
Kevin Brodsky, Peter Collingbourne, linux-mm, Andrew Morton,
Will Deacon, Dave P Martin, linux-arm-kernel
On 2020-08-24 19:27, Catalin Marinas wrote:
> From: Vincenzo Frascino <vincenzo.frascino@arm.com>
>
> Add the cpufeature and hwcap entries to detect the presence of MTE. Any
> secondary CPU not supporting the feature, if detected on the boot CPU,
> will be parked.
>
> Add the minimum SCTLR_EL1 and HCR_EL2 bits for enabling MTE. The Normal
> Tagged memory type is configured in MAIR_EL1 before the MMU is enabled
> in order to avoid disrupting other CPUs in the CnP domain.
>
> Signed-off-by: Vincenzo Frascino <vincenzo.frascino@arm.com>
> Co-developed-by: Catalin Marinas <catalin.marinas@arm.com>
> Signed-off-by: Catalin Marinas <catalin.marinas@arm.com>
> Cc: Will Deacon <will@kernel.org>
> Cc: Marc Zyngier <maz@kernel.org>
> Cc: Suzuki K Poulose <Suzuki.Poulose@arm.com>
> ---
>
> Notes:
> v8:
> - Move the SCTLR_EL1, MAIR_EL1, GCR_EL1 and TFSR*_EL1
> initialisation to
> __cpu_setup before the MMU is enabled. While early MAIR_EL1 is
> desirable to avoid conflicting with other CPUs in a CnP domain
> the
> TFSR_EL1 and GCR_EL1 will only come in handy later when support
> for
> in-kernel MTE is added.
>
> v7:
> - Hide the MTE ID register field for guests until MTE gains support
> for KVM.
>
> arch/arm64/include/asm/cpucaps.h | 3 ++-
> arch/arm64/include/asm/cpufeature.h | 6 ++++++
> arch/arm64/include/asm/hwcap.h | 2 +-
> arch/arm64/include/asm/kvm_arm.h | 2 +-
> arch/arm64/include/asm/sysreg.h | 1 +
> arch/arm64/include/uapi/asm/hwcap.h | 2 +-
> arch/arm64/kernel/cpufeature.c | 17 +++++++++++++++++
> arch/arm64/kernel/cpuinfo.c | 2 +-
> arch/arm64/kvm/sys_regs.c | 2 ++
> arch/arm64/mm/proc.S | 24 ++++++++++++++++++++++++
> 10 files changed, 56 insertions(+), 5 deletions(-)
>
> diff --git a/arch/arm64/include/asm/cpucaps.h
> b/arch/arm64/include/asm/cpucaps.h
> index 07b643a70710..1937653b05a3 100644
> --- a/arch/arm64/include/asm/cpucaps.h
> +++ b/arch/arm64/include/asm/cpucaps.h
> @@ -64,7 +64,8 @@
> #define ARM64_BTI 54
> #define ARM64_HAS_ARMv8_4_TTL 55
> #define ARM64_HAS_TLB_RANGE 56
> +#define ARM64_MTE 57
>
> -#define ARM64_NCAPS 57
> +#define ARM64_NCAPS 58
>
> #endif /* __ASM_CPUCAPS_H */
> diff --git a/arch/arm64/include/asm/cpufeature.h
> b/arch/arm64/include/asm/cpufeature.h
> index 89b4f0142c28..680b5b36ddd5 100644
> --- a/arch/arm64/include/asm/cpufeature.h
> +++ b/arch/arm64/include/asm/cpufeature.h
> @@ -681,6 +681,12 @@ static __always_inline bool
> system_uses_irq_prio_masking(void)
> cpus_have_const_cap(ARM64_HAS_IRQ_PRIO_MASKING);
> }
>
> +static inline bool system_supports_mte(void)
> +{
> + return IS_ENABLED(CONFIG_ARM64_MTE) &&
> + cpus_have_const_cap(ARM64_MTE);
> +}
> +
> static inline bool system_has_prio_mask_debugging(void)
> {
> return IS_ENABLED(CONFIG_ARM64_DEBUG_PRIORITY_MASKING) &&
> diff --git a/arch/arm64/include/asm/hwcap.h
> b/arch/arm64/include/asm/hwcap.h
> index 22f73fe09030..0d4a6741b6a5 100644
> --- a/arch/arm64/include/asm/hwcap.h
> +++ b/arch/arm64/include/asm/hwcap.h
> @@ -95,7 +95,7 @@
> #define KERNEL_HWCAP_DGH __khwcap2_feature(DGH)
> #define KERNEL_HWCAP_RNG __khwcap2_feature(RNG)
> #define KERNEL_HWCAP_BTI __khwcap2_feature(BTI)
> -/* reserved for KERNEL_HWCAP_MTE __khwcap2_feature(MTE) */
> +#define KERNEL_HWCAP_MTE __khwcap2_feature(MTE)
>
> /*
> * This yields a mask that user programs can use to figure out what
> diff --git a/arch/arm64/include/asm/kvm_arm.h
> b/arch/arm64/include/asm/kvm_arm.h
> index 8a1cbfd544d6..6c3b2fc922bb 100644
> --- a/arch/arm64/include/asm/kvm_arm.h
> +++ b/arch/arm64/include/asm/kvm_arm.h
> @@ -78,7 +78,7 @@
> HCR_AMO | HCR_SWIO | HCR_TIDCP | HCR_RW | HCR_TLOR | \
> HCR_FMO | HCR_IMO)
> #define HCR_VIRT_EXCP_MASK (HCR_VSE | HCR_VI | HCR_VF)
> -#define HCR_HOST_NVHE_FLAGS (HCR_RW | HCR_API | HCR_APK)
> +#define HCR_HOST_NVHE_FLAGS (HCR_RW | HCR_API | HCR_APK | HCR_ATA)
> #define HCR_HOST_VHE_FLAGS (HCR_RW | HCR_TGE | HCR_E2H)
Why is HCR_ATA only set for nVHE? HCR_EL2.ATA seems to apply to both,
doesn't it?
>
> /* TCR_EL2 Registers bits */
[...]
> diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
> index 077293b5115f..59b91f58efec 100644
> --- a/arch/arm64/kvm/sys_regs.c
> +++ b/arch/arm64/kvm/sys_regs.c
> @@ -1131,6 +1131,8 @@ static u64 read_id_reg(const struct kvm_vcpu
> *vcpu,
> if (!vcpu_has_sve(vcpu))
> val &= ~(0xfUL << ID_AA64PFR0_SVE_SHIFT);
> val &= ~(0xfUL << ID_AA64PFR0_AMU_SHIFT);
> + } else if (id == SYS_ID_AA64PFR1_EL1) {
> + val &= ~(0xfUL << ID_AA64PFR1_MTE_SHIFT);
Hiding the capability is fine, but where is the handling of trapping
instructions done? They should result in an UNDEF being injected.
Thanks,
M.
--
Jazz is not dead. It just smells funny...
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v8 03/28] arm64: mte: CPU feature detection and initial sysreg configuration
2020-08-25 8:53 ` [PATCH v8 03/28] arm64: mte: CPU feature detection and initial sysreg configuration Marc Zyngier
@ 2020-08-25 10:54 ` Catalin Marinas
2020-08-25 13:53 ` Marc Zyngier
2020-08-26 15:24 ` Catalin Marinas
0 siblings, 2 replies; 8+ messages in thread
From: Catalin Marinas @ 2020-08-25 10:54 UTC (permalink / raw)
To: Marc Zyngier
Cc: linux-arch, Suzuki K Poulose, Szabolcs Nagy, Andrey Konovalov,
Kevin Brodsky, Peter Collingbourne, linux-mm, Andrew Morton,
Vincenzo Frascino, Will Deacon, Dave P Martin, linux-arm-kernel
On Tue, Aug 25, 2020 at 09:53:16AM +0100, Marc Zyngier wrote:
> On 2020-08-24 19:27, Catalin Marinas wrote:
> > diff --git a/arch/arm64/include/asm/kvm_arm.h
> > b/arch/arm64/include/asm/kvm_arm.h
> > index 8a1cbfd544d6..6c3b2fc922bb 100644
> > --- a/arch/arm64/include/asm/kvm_arm.h
> > +++ b/arch/arm64/include/asm/kvm_arm.h
> > @@ -78,7 +78,7 @@
> > HCR_AMO | HCR_SWIO | HCR_TIDCP | HCR_RW | HCR_TLOR | \
> > HCR_FMO | HCR_IMO)
> > #define HCR_VIRT_EXCP_MASK (HCR_VSE | HCR_VI | HCR_VF)
> > -#define HCR_HOST_NVHE_FLAGS (HCR_RW | HCR_API | HCR_APK)
> > +#define HCR_HOST_NVHE_FLAGS (HCR_RW | HCR_API | HCR_APK | HCR_ATA)
> > #define HCR_HOST_VHE_FLAGS (HCR_RW | HCR_TGE | HCR_E2H)
>
> Why is HCR_ATA only set for nVHE? HCR_EL2.ATA seems to apply to both,
> doesn't it?
We need HCR_EL2.ATA to be set when !VHE so that the host kernel can use
MTE. That said, I think we need to turn it off when running a guest.
Even if we hide the ID register, the guest may still attempt to enable
tags on some memory that doesn't support it, leading to unpredictable
behaviour (well, only if we expose device memory to guests directly;
Steve's patches will deal with this but for now we just disable MTE in
guests).
With VHE, HCR_EL2.ATA only affects the guests, so it can stay off. The
host's use of tags is controlled by SCTLR_EL1/EL2.ATA (i.e. HCR_EL2.ATA
has no effect if E2H and TGE are both 1; qemu has a bug here which I
discovered yesterday).
> > diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
> > index 077293b5115f..59b91f58efec 100644
> > --- a/arch/arm64/kvm/sys_regs.c
> > +++ b/arch/arm64/kvm/sys_regs.c
> > @@ -1131,6 +1131,8 @@ static u64 read_id_reg(const struct kvm_vcpu
> > *vcpu,
> > if (!vcpu_has_sve(vcpu))
> > val &= ~(0xfUL << ID_AA64PFR0_SVE_SHIFT);
> > val &= ~(0xfUL << ID_AA64PFR0_AMU_SHIFT);
> > + } else if (id == SYS_ID_AA64PFR1_EL1) {
> > + val &= ~(0xfUL << ID_AA64PFR1_MTE_SHIFT);
>
> Hiding the capability is fine, but where is the handling of trapping
> instructions done? They should result in an UNDEF being injected.
They are a few new MTE-specific MSR/MRS which are trapped at EL2 but
since KVM doesn't understand them yet, shouldn't it already inject
undef back at EL1? That would be safer regardless of MTE support.
--
Catalin
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v8 27/28] arm64: mte: Kconfig entry
2020-08-24 18:44 ` [PATCH v8 27/28] arm64: mte: Kconfig entry Randy Dunlap
@ 2020-08-25 11:10 ` Catalin Marinas
0 siblings, 0 replies; 8+ messages in thread
From: Catalin Marinas @ 2020-08-25 11:10 UTC (permalink / raw)
To: Randy Dunlap
Cc: linux-arch, Szabolcs Nagy, Andrey Konovalov, Kevin Brodsky,
Peter Collingbourne, linux-mm, Andrew Morton, Vincenzo Frascino,
Will Deacon, Dave P Martin, linux-arm-kernel
On Mon, Aug 24, 2020 at 11:44:50AM -0700, Randy Dunlap wrote:
> On 8/24/20 11:27 AM, Catalin Marinas wrote:
> > index 6d232837cbee..10cf81d70657 100644
> > --- a/arch/arm64/Kconfig
> > +++ b/arch/arm64/Kconfig
> > @@ -1664,6 +1664,37 @@ config ARCH_RANDOM
> > provides a high bandwidth, cryptographically secure
> > hardware random number generator.
> >
> > +config ARM64_AS_HAS_MTE
> > + # Binutils gained initial support for MTE in 2.32.0. However, a
> > + # late architecture addition (LDGM/STGM) is only supported in
> > + # the newer 2.32.x and 2.33 versions.
> > + def_bool $(as-instr,.arch armv8.5-a+memtag\nstgm xzr$(comma)[x0])
>
> Would you mind translating that for me?
> Yes, I read the v7 Notes, but that only helped a little bit.
The initial MTE support in binutils 2.32.0, testable above with ".arch
armv8.5-a+memtag", was incomplete. Historically, I think it was based on
a beta version of the architecture but before the final architecture
release (ARMv8.5), MTE gained a couple of new instructions: STGM/LDGM.
Since there are binutils versions out there which don't understand STGM
even though they claim to support .arch armv8.5-a+memtag, it's better
for the above check to include the STGM instruction.
I'll see if I can make the comment above clearer.
> > + bool "Memory Tagging Extension support"
> > + default y
> > + depends on ARM64_AS_HAS_MTE && ARM64_TAGGED_ADDR_ABI
> > + select ARCH_USES_HIGH_VMA_FLAGS
> > + help
> > + Memory Tagging (part of the ARMv8.5 Extensions) provides
> > + architectural support for run-time, always-on detection of
>
> runtime,
> as is used below.
Thanks.
--
Catalin
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v8 03/28] arm64: mte: CPU feature detection and initial sysreg configuration
2020-08-25 10:54 ` Catalin Marinas
@ 2020-08-25 13:53 ` Marc Zyngier
2020-08-26 17:08 ` Catalin Marinas
2020-08-26 15:24 ` Catalin Marinas
1 sibling, 1 reply; 8+ messages in thread
From: Marc Zyngier @ 2020-08-25 13:53 UTC (permalink / raw)
To: Catalin Marinas
Cc: linux-arch, Suzuki K Poulose, Szabolcs Nagy, Andrey Konovalov,
Kevin Brodsky, Peter Collingbourne, linux-mm, Andrew Morton,
Vincenzo Frascino, Will Deacon, Dave P Martin, linux-arm-kernel
On 2020-08-25 11:54, Catalin Marinas wrote:
> On Tue, Aug 25, 2020 at 09:53:16AM +0100, Marc Zyngier wrote:
>> On 2020-08-24 19:27, Catalin Marinas wrote:
>> > diff --git a/arch/arm64/include/asm/kvm_arm.h
>> > b/arch/arm64/include/asm/kvm_arm.h
>> > index 8a1cbfd544d6..6c3b2fc922bb 100644
>> > --- a/arch/arm64/include/asm/kvm_arm.h
>> > +++ b/arch/arm64/include/asm/kvm_arm.h
>> > @@ -78,7 +78,7 @@
>> > HCR_AMO | HCR_SWIO | HCR_TIDCP | HCR_RW | HCR_TLOR | \
>> > HCR_FMO | HCR_IMO)
>> > #define HCR_VIRT_EXCP_MASK (HCR_VSE | HCR_VI | HCR_VF)
>> > -#define HCR_HOST_NVHE_FLAGS (HCR_RW | HCR_API | HCR_APK)
>> > +#define HCR_HOST_NVHE_FLAGS (HCR_RW | HCR_API | HCR_APK | HCR_ATA)
>> > #define HCR_HOST_VHE_FLAGS (HCR_RW | HCR_TGE | HCR_E2H)
>>
>> Why is HCR_ATA only set for nVHE? HCR_EL2.ATA seems to apply to both,
>> doesn't it?
>
> We need HCR_EL2.ATA to be set when !VHE so that the host kernel can use
> MTE. That said, I think we need to turn it off when running a guest.
> Even if we hide the ID register, the guest may still attempt to enable
> tags on some memory that doesn't support it, leading to unpredictable
> behaviour (well, only if we expose device memory to guests directly;
> Steve's patches will deal with this but for now we just disable MTE in
> guests).
>
> With VHE, HCR_EL2.ATA only affects the guests, so it can stay off. The
> host's use of tags is controlled by SCTLR_EL1/EL2.ATA (i.e. HCR_EL2.ATA
> has no effect if E2H and TGE are both 1; qemu has a bug here which I
> discovered yesterday).
Ah, I missed that too.
>
>> > diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
>> > index 077293b5115f..59b91f58efec 100644
>> > --- a/arch/arm64/kvm/sys_regs.c
>> > +++ b/arch/arm64/kvm/sys_regs.c
>> > @@ -1131,6 +1131,8 @@ static u64 read_id_reg(const struct kvm_vcpu
>> > *vcpu,
>> > if (!vcpu_has_sve(vcpu))
>> > val &= ~(0xfUL << ID_AA64PFR0_SVE_SHIFT);
>> > val &= ~(0xfUL << ID_AA64PFR0_AMU_SHIFT);
>> > + } else if (id == SYS_ID_AA64PFR1_EL1) {
>> > + val &= ~(0xfUL << ID_AA64PFR1_MTE_SHIFT);
>>
>> Hiding the capability is fine, but where is the handling of trapping
>> instructions done? They should result in an UNDEF being injected.
>
> They are a few new MTE-specific MSR/MRS which are trapped at EL2 but
> since KVM doesn't understand them yet, shouldn't it already inject
> undef back at EL1? That would be safer regardless of MTE support.
An UNDEF will be injected, but not without spitting a nastygram in
the kernel log (look at emulate_sys_reg()).
The best course of action is to have an entry in the sysreg table
that would explicitly do the handling.
Thanks,
M.
--
Jazz is not dead. It just smells funny...
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v8 03/28] arm64: mte: CPU feature detection and initial sysreg configuration
2020-08-25 10:54 ` Catalin Marinas
2020-08-25 13:53 ` Marc Zyngier
@ 2020-08-26 15:24 ` Catalin Marinas
1 sibling, 0 replies; 8+ messages in thread
From: Catalin Marinas @ 2020-08-26 15:24 UTC (permalink / raw)
To: Marc Zyngier
Cc: linux-arch, Suzuki K Poulose, Szabolcs Nagy, Andrey Konovalov,
Kevin Brodsky, Peter Collingbourne, linux-mm, Andrew Morton,
Vincenzo Frascino, Will Deacon, Dave P Martin, linux-arm-kernel
On Tue, Aug 25, 2020 at 11:54:50AM +0100, Catalin Marinas wrote:
> On Tue, Aug 25, 2020 at 09:53:16AM +0100, Marc Zyngier wrote:
> > On 2020-08-24 19:27, Catalin Marinas wrote:
> > > diff --git a/arch/arm64/include/asm/kvm_arm.h
> > > b/arch/arm64/include/asm/kvm_arm.h
> > > index 8a1cbfd544d6..6c3b2fc922bb 100644
> > > --- a/arch/arm64/include/asm/kvm_arm.h
> > > +++ b/arch/arm64/include/asm/kvm_arm.h
> > > @@ -78,7 +78,7 @@
> > > HCR_AMO | HCR_SWIO | HCR_TIDCP | HCR_RW | HCR_TLOR | \
> > > HCR_FMO | HCR_IMO)
> > > #define HCR_VIRT_EXCP_MASK (HCR_VSE | HCR_VI | HCR_VF)
> > > -#define HCR_HOST_NVHE_FLAGS (HCR_RW | HCR_API | HCR_APK)
> > > +#define HCR_HOST_NVHE_FLAGS (HCR_RW | HCR_API | HCR_APK | HCR_ATA)
> > > #define HCR_HOST_VHE_FLAGS (HCR_RW | HCR_TGE | HCR_E2H)
> >
> > Why is HCR_ATA only set for nVHE? HCR_EL2.ATA seems to apply to both,
> > doesn't it?
>
> We need HCR_EL2.ATA to be set when !VHE so that the host kernel can use
> MTE. That said, I think we need to turn it off when running a guest.
> Even if we hide the ID register, the guest may still attempt to enable
> tags on some memory that doesn't support it, leading to unpredictable
> behaviour (well, only if we expose device memory to guests directly;
> Steve's patches will deal with this but for now we just disable MTE in
> guests).
So if we want to properly disable MTE for guests when !VHE (not just the
ID reg), I came up with the diff below. However, given that Steven is
already working on KVM support, I wonder whether we could just make MTE
depend on !VHE temporarily, remove it once we get the full MTE KVM
support. It's up to you (either way, I still need to solve the undef
injection since that affects both VHE and !VHE; patch to follow).
diff --git a/arch/arm64/kvm/hyp/nvhe/tlb.c b/arch/arm64/kvm/hyp/nvhe/tlb.c
index 69eae608d670..51204ac30154 100644
--- a/arch/arm64/kvm/hyp/nvhe/tlb.c
+++ b/arch/arm64/kvm/hyp/nvhe/tlb.c
@@ -32,10 +32,23 @@ static void __tlb_switch_to_guest(struct kvm_s2_mmu *mmu,
}
__load_guest_stage2(mmu);
+
+ /* MTE is not supported in guests yet, disable access to tags */
+ if (system_supports_mte()) {
+ u64 val = read_sysreg(hcr_el2);
+ val &= ~HCR_ATA;
+ write_sysreg(val, hcr_el2);
+ }
}
static void __tlb_switch_to_host(struct tlb_inv_context *cxt)
{
+ /* Re-enable MTE for the host kernel */
+ if (system_supports_mte()) {
+ u64 val = read_sysreg(hcr_el2);
+ write_sysreg(val | HCR_ATA, hcr_el2);
+ }
+
write_sysreg(0, vttbr_el2);
if (cpus_have_final_cap(ARM64_WORKAROUND_SPECULATIVE_AT)) {
--
Catalin
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH v8 03/28] arm64: mte: CPU feature detection and initial sysreg configuration
2020-08-25 13:53 ` Marc Zyngier
@ 2020-08-26 17:08 ` Catalin Marinas
2020-09-04 10:10 ` Marc Zyngier
0 siblings, 1 reply; 8+ messages in thread
From: Catalin Marinas @ 2020-08-26 17:08 UTC (permalink / raw)
To: Marc Zyngier
Cc: linux-arch, Suzuki K Poulose, Szabolcs Nagy, Andrey Konovalov,
Kevin Brodsky, Peter Collingbourne, linux-mm, Andrew Morton,
Vincenzo Frascino, Will Deacon, Dave P Martin, linux-arm-kernel
On Tue, Aug 25, 2020 at 02:53:47PM +0100, Marc Zyngier wrote:
> On 2020-08-25 11:54, Catalin Marinas wrote:
> > On Tue, Aug 25, 2020 at 09:53:16AM +0100, Marc Zyngier wrote:
> > > On 2020-08-24 19:27, Catalin Marinas wrote:
> > > > diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
> > > > index 077293b5115f..59b91f58efec 100644
> > > > --- a/arch/arm64/kvm/sys_regs.c
> > > > +++ b/arch/arm64/kvm/sys_regs.c
> > > > @@ -1131,6 +1131,8 @@ static u64 read_id_reg(const struct kvm_vcpu
> > > > *vcpu,
> > > > if (!vcpu_has_sve(vcpu))
> > > > val &= ~(0xfUL << ID_AA64PFR0_SVE_SHIFT);
> > > > val &= ~(0xfUL << ID_AA64PFR0_AMU_SHIFT);
> > > > + } else if (id == SYS_ID_AA64PFR1_EL1) {
> > > > + val &= ~(0xfUL << ID_AA64PFR1_MTE_SHIFT);
> > >
> > > Hiding the capability is fine, but where is the handling of trapping
> > > instructions done? They should result in an UNDEF being injected.
> >
> > They are a few new MTE-specific MSR/MRS which are trapped at EL2 but
> > since KVM doesn't understand them yet, shouldn't it already inject
> > undef back at EL1? That would be safer regardless of MTE support.
>
> An UNDEF will be injected, but not without spitting a nastygram in
> the kernel log (look at emulate_sys_reg()).
>
> The best course of action is to have an entry in the sysreg table
> that would explicitly do the handling.
Something like below. I'll put them in a separate patch, to be reverted
when we get proper MTE support in KVM.
diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
index 59b91f58efec..c7d5d1bae044 100644
--- a/arch/arm64/kvm/sys_regs.c
+++ b/arch/arm64/kvm/sys_regs.c
@@ -1384,6 +1384,13 @@ static bool access_ccsidr(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
return true;
}
+static bool access_mte_regs(struct kvm_vcpu *vcpu, struct sys_reg_params *p,
+ const struct sys_reg_desc *r)
+{
+ kvm_inject_undefined(vcpu);
+ return false;
+}
+
/* sys_reg_desc initialiser for known cpufeature ID registers */
#define ID_SANITISED(name) { \
SYS_DESC(SYS_##name), \
@@ -1549,6 +1556,10 @@ static const struct sys_reg_desc sys_reg_descs[] = {
{ SYS_DESC(SYS_SCTLR_EL1), access_vm_reg, reset_val, SCTLR_EL1, 0x00C50078 },
{ SYS_DESC(SYS_ACTLR_EL1), access_actlr, reset_actlr, ACTLR_EL1 },
{ SYS_DESC(SYS_CPACR_EL1), NULL, reset_val, CPACR_EL1, 0 },
+
+ { SYS_DESC(SYS_RGSR_EL1), access_mte_regs },
+ { SYS_DESC(SYS_GCR_EL1), access_mte_regs },
+
{ SYS_DESC(SYS_ZCR_EL1), NULL, reset_val, ZCR_EL1, 0, .visibility = sve_visibility },
{ SYS_DESC(SYS_TTBR0_EL1), access_vm_reg, reset_unknown, TTBR0_EL1 },
{ SYS_DESC(SYS_TTBR1_EL1), access_vm_reg, reset_unknown, TTBR1_EL1 },
@@ -1573,6 +1584,9 @@ static const struct sys_reg_desc sys_reg_descs[] = {
{ SYS_DESC(SYS_ERXMISC0_EL1), trap_raz_wi },
{ SYS_DESC(SYS_ERXMISC1_EL1), trap_raz_wi },
+ { SYS_DESC(SYS_TFSR_EL1), access_mte_regs },
+ { SYS_DESC(SYS_TFSRE0_EL1), access_mte_regs },
+
{ SYS_DESC(SYS_FAR_EL1), access_vm_reg, reset_unknown, FAR_EL1 },
{ SYS_DESC(SYS_PAR_EL1), NULL, reset_unknown, PAR_EL1 },
(still testing, it takes ages to boot a VM inside inside FVP)
--
Catalin
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH v8 03/28] arm64: mte: CPU feature detection and initial sysreg configuration
2020-08-26 17:08 ` Catalin Marinas
@ 2020-09-04 10:10 ` Marc Zyngier
0 siblings, 0 replies; 8+ messages in thread
From: Marc Zyngier @ 2020-09-04 10:10 UTC (permalink / raw)
To: Catalin Marinas
Cc: linux-arch, Suzuki K Poulose, Szabolcs Nagy, Andrey Konovalov,
Kevin Brodsky, Peter Collingbourne, linux-mm, Andrew Morton,
Vincenzo Frascino, Will Deacon, Dave P Martin, linux-arm-kernel
On 2020-08-26 18:08, Catalin Marinas wrote:
> On Tue, Aug 25, 2020 at 02:53:47PM +0100, Marc Zyngier wrote:
>> On 2020-08-25 11:54, Catalin Marinas wrote:
>> > On Tue, Aug 25, 2020 at 09:53:16AM +0100, Marc Zyngier wrote:
>> > > On 2020-08-24 19:27, Catalin Marinas wrote:
>> > > > diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
>> > > > index 077293b5115f..59b91f58efec 100644
>> > > > --- a/arch/arm64/kvm/sys_regs.c
>> > > > +++ b/arch/arm64/kvm/sys_regs.c
>> > > > @@ -1131,6 +1131,8 @@ static u64 read_id_reg(const struct kvm_vcpu
>> > > > *vcpu,
>> > > > if (!vcpu_has_sve(vcpu))
>> > > > val &= ~(0xfUL << ID_AA64PFR0_SVE_SHIFT);
>> > > > val &= ~(0xfUL << ID_AA64PFR0_AMU_SHIFT);
>> > > > + } else if (id == SYS_ID_AA64PFR1_EL1) {
>> > > > + val &= ~(0xfUL << ID_AA64PFR1_MTE_SHIFT);
>> > >
>> > > Hiding the capability is fine, but where is the handling of trapping
>> > > instructions done? They should result in an UNDEF being injected.
>> >
>> > They are a few new MTE-specific MSR/MRS which are trapped at EL2 but
>> > since KVM doesn't understand them yet, shouldn't it already inject
>> > undef back at EL1? That would be safer regardless of MTE support.
>>
>> An UNDEF will be injected, but not without spitting a nastygram in
>> the kernel log (look at emulate_sys_reg()).
>>
>> The best course of action is to have an entry in the sysreg table
>> that would explicitly do the handling.
>
> Something like below. I'll put them in a separate patch, to be reverted
> when we get proper MTE support in KVM.
>
> diff --git a/arch/arm64/kvm/sys_regs.c b/arch/arm64/kvm/sys_regs.c
> index 59b91f58efec..c7d5d1bae044 100644
> --- a/arch/arm64/kvm/sys_regs.c
> +++ b/arch/arm64/kvm/sys_regs.c
> @@ -1384,6 +1384,13 @@ static bool access_ccsidr(struct kvm_vcpu
> *vcpu, struct sys_reg_params *p,
> return true;
> }
>
> +static bool access_mte_regs(struct kvm_vcpu *vcpu, struct
> sys_reg_params *p,
> + const struct sys_reg_desc *r)
> +{
> + kvm_inject_undefined(vcpu);
> + return false;
> +}
> +
> /* sys_reg_desc initialiser for known cpufeature ID registers */
> #define ID_SANITISED(name) { \
> SYS_DESC(SYS_##name), \
> @@ -1549,6 +1556,10 @@ static const struct sys_reg_desc sys_reg_descs[]
> = {
> { SYS_DESC(SYS_SCTLR_EL1), access_vm_reg, reset_val, SCTLR_EL1,
> 0x00C50078 },
> { SYS_DESC(SYS_ACTLR_EL1), access_actlr, reset_actlr, ACTLR_EL1 },
> { SYS_DESC(SYS_CPACR_EL1), NULL, reset_val, CPACR_EL1, 0 },
> +
> + { SYS_DESC(SYS_RGSR_EL1), access_mte_regs },
> + { SYS_DESC(SYS_GCR_EL1), access_mte_regs },
> +
> { SYS_DESC(SYS_ZCR_EL1), NULL, reset_val, ZCR_EL1, 0, .visibility =
> sve_visibility },
> { SYS_DESC(SYS_TTBR0_EL1), access_vm_reg, reset_unknown, TTBR0_EL1 },
> { SYS_DESC(SYS_TTBR1_EL1), access_vm_reg, reset_unknown, TTBR1_EL1 },
> @@ -1573,6 +1584,9 @@ static const struct sys_reg_desc sys_reg_descs[]
> = {
> { SYS_DESC(SYS_ERXMISC0_EL1), trap_raz_wi },
> { SYS_DESC(SYS_ERXMISC1_EL1), trap_raz_wi },
>
> + { SYS_DESC(SYS_TFSR_EL1), access_mte_regs },
> + { SYS_DESC(SYS_TFSRE0_EL1), access_mte_regs },
> +
> { SYS_DESC(SYS_FAR_EL1), access_vm_reg, reset_unknown, FAR_EL1 },
> { SYS_DESC(SYS_PAR_EL1), NULL, reset_unknown, PAR_EL1 },
Yup, looks good.
> (still testing, it takes ages to boot a VM inside inside FVP)
You aren't allowed to moan about it until you have tried that with NV!
;-)
Thanks,
M.
--
Jazz is not dead. It just smells funny...
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2020-09-04 10:12 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
[not found] <20200824182758.27267-1-catalin.marinas@arm.com>
[not found] ` <20200824182758.27267-28-catalin.marinas@arm.com>
2020-08-24 18:44 ` [PATCH v8 27/28] arm64: mte: Kconfig entry Randy Dunlap
2020-08-25 11:10 ` Catalin Marinas
[not found] ` <20200824182758.27267-4-catalin.marinas@arm.com>
2020-08-25 8:53 ` [PATCH v8 03/28] arm64: mte: CPU feature detection and initial sysreg configuration Marc Zyngier
2020-08-25 10:54 ` Catalin Marinas
2020-08-25 13:53 ` Marc Zyngier
2020-08-26 17:08 ` Catalin Marinas
2020-09-04 10:10 ` Marc Zyngier
2020-08-26 15:24 ` Catalin Marinas
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).