[PATCH] arm64: suspend: avoid potential TLB conflict

James Morse james.morse at arm.com
Tue Aug 9 09:25:37 PDT 2016


Hi Mark,

~s/suspend/hibernate/ in the subject?

On 08/08/16 11:10, Mark Rutland wrote:
> In create_safe_exec_page we install a set of global mappings in TTBR0,
> then subsequently invalidate TLBs. While TTBR0 points at the zero page,
> and the TLBs should be free of stale global entries, we may have stale
> ASID-tagged entries (e.g. from the EFI runtime services mappings) for
> the same VAs. Per the ARM ARM these ASID-tagged entries may conflict
> with newly-allocated global entries, and we must follow a
> Break-Before-Make approach to avoid issues resulting from this.
> 
> This patch reworks create_safe_exec_page to invalidate TLBs while the
> zero page is still in place, ensuring that there are no potential
> conflicts when the new TTBR0 value is installed. As a single CPU is
> online while this code executes, we do not need to perform broadcast TLB
> maintenance, and can call local_flush_tlb_all(), which also subsumes
> some barriers. The remaining assembly is converted to use write_sysreg()
> and isb().
> 
> Other than this, we safely manipulate TTBRs in the hibernate dance. The
> code we install as part of the new TTBR0 mapping (the hibernated
> kernel's swsusp_arch_suspend_exit) installs a zero page into TTBR1,
> invalidates TLBs, then installs its preferred value. Upon being restored
> to the middle of swsusp_arch_suspend, the new image will call
> __cpu_suspend_exit, which will call cpu_uninstall_idmap, installing the
> zero page in TTBR0 and invalidating all TLB entries.

> diff --git a/arch/arm64/kernel/hibernate.c b/arch/arm64/kernel/hibernate.c
> index 21ab5df..c59d3e4 100644
> --- a/arch/arm64/kernel/hibernate.c
> +++ b/arch/arm64/kernel/hibernate.c
> @@ -35,6 +35,7 @@
>  #include <asm/sections.h>
>  #include <asm/smp.h>
>  #include <asm/suspend.h>
> +#include <asm/sysreg.h>
>  #include <asm/virt.h>
>  
>  /*
> @@ -217,12 +218,16 @@ static int create_safe_exec_page(void *src_start, size_t length,
>  	set_pte(pte, __pte(virt_to_phys((void *)dst) |
>  			 pgprot_val(PAGE_KERNEL_EXEC)));
>  
> -	/* Load our new page tables */
> -	asm volatile("msr	ttbr0_el1, %0;"
> -		     "isb;"
> -		     "tlbi	vmalle1is;"
> -		     "dsb	ish;"
> -		     "isb" : : "r"(virt_to_phys(pgd)));
> +	/*
> +	 * Load our new page tables. TTBR0 currently points to the zero page,

fe12c00d21bb ("PM / hibernate: Introduce test_resume mode for hibernation") came
in with the merge window, this does a suspend followed by a resume with the user
page tables still loaded in ttbr0_el1.

So now we need to call cpu_set_reserved_ttbr0() in here to make this true/safe.


> +	 * and the TLBs should be free of global entries, but may contain stale
> +	 * ASID-tagged entries (e.g. from the EFI runtime services). A strict
> +	 * BBM approach requires that we destroy these before installing
> +	 * overlapping global mappings.
> +	 */
> +	local_flush_tlb_all();
> +	write_sysreg(virt_to_phys(pgd), ttbr0_el1);
> +	isb();
>  
>  	*phys_dst_addr = virt_to_phys((void *)dst);

and it even looks better!

If you think they're useful:
Tested-by: James Morse <james.morse at arm.com>
Acked-by: James Morse <james.morse at arm.com>


Thanks!

James




More information about the linux-arm-kernel mailing list