[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <86jz7jya0w.fsf@scott-ph-mail.amperecomputing.com>
Date: Wed, 16 Apr 2025 16:14:07 -0700
From: D Scott Phillips <scott@...amperecomputing.com>
To: Marc Zyngier <maz@...nel.org>
Cc: Catalin Marinas <catalin.marinas@....com>, James Clark
<james.clark@...aro.org>, James Morse <james.morse@....com>, Joey Gouly
<joey.gouly@....com>, Kevin Brodsky <kevin.brodsky@....com>, Mark Brown
<broonie@...nel.org>, Mark Rutland <mark.rutland@....com>, Oliver Upton
<oliver.upton@...ux.dev>, "Rob Herring (Arm)" <robh@...nel.org>, Shameer
Kolothum <shameerali.kolothum.thodi@...wei.com>, Shiqi Liu
<shiqiliu@...t.edu.cn>, Will Deacon <will@...nel.org>, Yicong Yang
<yangyicong@...ilicon.com>, kvmarm@...ts.linux.dev,
linux-arm-kernel@...ts.infradead.org, open list
<linux-kernel@...r.kernel.org>
Subject: Re: [PATCH 1/2] arm64: errata: Work around AmpereOne's erratum
AC03_CPU_36
Marc Zyngier <maz@...nel.org> writes:
> On Tue, 15 Apr 2025 16:47:10 +0100,
> D Scott Phillips <scott@...amperecomputing.com> wrote:
>>
>> AC03_CPU_36 can cause asynchronous exceptions to be routed to the wrong
>> exception level if an async exception coincides with an update to the
>> controls for the target exception level in HCR_EL2. On affected
>> machines, always do writes to HCR_EL2 with async exceptions blocked.
>
> From the actual errata document [1]:
>
> <quote>
> If an Asynchronous Exception to EL2 occurs, while EL2 software is
> changing the EL2 exception control bits from a configuration where
> asynchronous exceptions are routed to EL2 to a configuration where
> asynchronous exceptions are routed to EL1, the processor may exhibit
> the incorrect exception behavior of routing an interrupt taken at EL2
> to EL1. The affected system register is HCR_EL2, which contains
> control bits for routing and enabling of EL2 exceptions.
> </quote>
>
> My reading is that things can go wrong when clearing the xMO bits.
>
> I don't think we need to touch the xMO bits at all when running
> VHE. So my preference would be to:
>
> - simply leave the xMO bits set at all times (nothing bad can happen
> from that, can it?)
>
> - prevent these systems from using anything but VHE (and fail KVM init
> otherwise)
>
> This would save a lot of maintenance hassle and the extreme ugliness
> of this patch.
Yes that also matches my understanding, that having the physical IRQ
routing permanently set to EL2 would avoid the erratum case. I'll take
the approach of restricting to VHE mode in the next version, thanks very
much Marc.
Powered by blists - more mailing lists