lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fb3c1797-118f-500b-002b-5ecb9172af1c@arm.com>
Date:   Tue, 6 Feb 2018 11:52:18 +0000
From:   Robin Murphy <robin.murphy@....com>
To:     Vivek Gautam <vivek.gautam@...eaurora.org>, will.deacon@....com,
        joro@...tes.org, iommu@...ts.linux-foundation.org
Cc:     linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
        linux-arm-msm@...r.kernel.org
Subject: Re: [PATCH RFC 1/1] iommu/arm-smmu: Fix context fault message
 considering non-NTS

Hi Vivek,

On 06/02/18 10:16, Vivek Gautam wrote:
> SMMU_CBn_FSYNR0 definition from SMMU v2 architecture document
> says that, the S1CBNDX[23:16] field is only valid if SMMU_IDR0.NTS==1.
> So, update the fsynr in context bank fault handler, so that the
> fault message displays cbndx only when we have nested translations
> enabled.
> Otherwise, it is confusing when 'cb' gives the actual context
> bank, while the 'fsynr' gives a different value.
> 
> Example, on a sdm845 system:
> Before this patch -
> arm-smmu 15000000.apps-smmu: Unhandled context fault:
>                            fsr=0x402, iova=0x9e0fb600, fsynr=0x3c0020, cb=0
> After this patch -
> arm-smmu 15000000.apps-smmu: Unhandled context fault:
>                            fsr=0x402, iova=0x9e0aa000, fsynr=0x20, cb=0
> 
> Signed-off-by: Vivek Gautam <vivek.gautam@...eaurora.org>
> Cc: Robin Murphy <robin.murphy@....com>
> ---
> 
> Hi Robin,
> Does it make sense to mask fsynr like this?
> Would it still be confusing for CB==0?
> Tagging the patch as RFC to get your comments. If looks good,
> then i will send the patch for your ack.
> Thanks.

I would expect that anyone who knows how to decode a raw FSYNR0 value 
should also be aware of when various fields are valid or not. I have 
page 302 of IHI0062D.c open next to this email, and to me it seems 
virtually impossible to read the definition of S1CBNDX without 
inherently seeing all the conditions under which it is UNKNOWN (which 
incidentally are more than this patch would cover).

In general, I don't agree with this - we're dumping the raw state of a 
register, and it's already a cryptic hex value that you have to refer to 
the architecture spec to decode. There is perhaps some argument for 
pretty-printing faults with everything fully decoded, but given that 
they should never be seen under normal operation (especially global 
faults), I really don't think that's worth the bother either.

Robin.

>   drivers/iommu/arm-smmu.c | 3 +++
>   1 file changed, 3 insertions(+)
> 
> diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c
> index 69e7c60792a8..827659515b22 100644
> --- a/drivers/iommu/arm-smmu.c
> +++ b/drivers/iommu/arm-smmu.c
> @@ -550,6 +550,9 @@ static irqreturn_t arm_smmu_context_fault(int irq, void *dev)
>   	fsynr = readl_relaxed(cb_base + ARM_SMMU_CB_FSYNR0);
>   	iova = readq_relaxed(cb_base + ARM_SMMU_CB_FAR);
>   
> +	if (!smmu->features & ARM_SMMU_FEAT_TRANS_NESTED)
> +		fsynr &= 0xffff;
> +
>   	dev_err_ratelimited(smmu->dev,
>   	"Unhandled context fault: fsr=0x%x, iova=0x%08lx, fsynr=0x%x, cb=%d\n",
>   			    fsr, iova, fsynr, cfg->cbndx);
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ