All of lore.kernel.org
 help / color / mirror / Atom feed
From: Christoffer Dall <christoffer.dall@linaro.org>
To: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: marc.zyngier@arm.com, kvmarm@lists.cs.columbia.edu,
	linux-arm-kernel@lists.infradead.org
Subject: Re: [PATCH] ARM/arm64: KVM: test properly for a PTE's uncachedness
Date: Mon, 9 Nov 2015 17:21:59 +0100	[thread overview]
Message-ID: <20151109162159.GA12968@cbox> (raw)
In-Reply-To: <1446810188-13727-1-git-send-email-ard.biesheuvel@linaro.org>

On Fri, Nov 06, 2015 at 12:43:08PM +0100, Ard Biesheuvel wrote:
> The open coded tests for checking whether a PTE maps a page as
> uncached use a flawed 'pte_val(xxx) & CONST != CONST' pattern,
> which is not guaranteed to work since the type of a mapping is an
> index into the MAIR table, not a set of mutually exclusive bits.
> 
> Considering that, on arm64, the S2 type definitions use the following
> MAIR indexes
> 
>     #define MT_S2_NORMAL            0xf
>     #define MT_S2_DEVICE_nGnRE      0x1
> 
> we have been getting lucky merely because the S2 device mappings also
> have the PTE_UXN bit set, which means that a device PTE still does not
> equal a normal PTE after masking with the former type.
> 
> Instead, implement proper checking against the MAIR indexes that are
> known to define uncached memory attributes.
> 
> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> ---
>  arch/arm/include/asm/kvm_mmu.h   | 11 +++++++++++
>  arch/arm/kvm/mmu.c               |  5 ++---
>  arch/arm64/include/asm/kvm_mmu.h | 12 ++++++++++++
>  3 files changed, 25 insertions(+), 3 deletions(-)
> 
> diff --git a/arch/arm/include/asm/kvm_mmu.h b/arch/arm/include/asm/kvm_mmu.h
> index 405aa1883307..422973835d41 100644
> --- a/arch/arm/include/asm/kvm_mmu.h
> +++ b/arch/arm/include/asm/kvm_mmu.h
> @@ -279,6 +279,17 @@ static inline void __kvm_extend_hypmap(pgd_t *boot_hyp_pgd,
>  				       pgd_t *merged_hyp_pgd,
>  				       unsigned long hyp_idmap_start) { }
>  
> +static inline bool __kvm_pte_is_uncached(pte_t pte)
> +{
> +	switch (pte_val(pte) & L_PTE_MT_MASK) {
> +	case L_PTE_MT_UNCACHED:
> +	case L_PTE_MT_BUFFERABLE:
> +	case L_PTE_MT_DEV_SHARED:
> +		return true;
> +	}

so PTEs created by setting PAGE_S2_DEVICE will end up hitting in one of
these because L_PTE_S2_MT_DEV_SHARED is the same as L_PTE_MT_BUFFERABLE
for stage-2 mappings and PAGE_HYP_DEVICE end up using
L_PTE_MT_DEV_SHARED.

Totally obvious.

> +	return false;
> +}
> +
>  #endif	/* !__ASSEMBLY__ */
>  
>  #endif /* __ARM_KVM_MMU_H__ */
> diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
> index 6984342da13d..eb9a06e3dbee 100644
> --- a/arch/arm/kvm/mmu.c
> +++ b/arch/arm/kvm/mmu.c
> @@ -213,7 +213,7 @@ static void unmap_ptes(struct kvm *kvm, pmd_t *pmd,
>  			kvm_tlb_flush_vmid_ipa(kvm, addr);
>  
>  			/* No need to invalidate the cache for device mappings */
> -			if ((pte_val(old_pte) & PAGE_S2_DEVICE) != PAGE_S2_DEVICE)
> +			if (!__kvm_pte_is_uncached(old_pte))
>  				kvm_flush_dcache_pte(old_pte);
>  
>  			put_page(virt_to_page(pte));
> @@ -305,8 +305,7 @@ static void stage2_flush_ptes(struct kvm *kvm, pmd_t *pmd,
>  
>  	pte = pte_offset_kernel(pmd, addr);
>  	do {
> -		if (!pte_none(*pte) &&
> -		    (pte_val(*pte) & PAGE_S2_DEVICE) != PAGE_S2_DEVICE)
> +		if (!pte_none(*pte) && !__kvm_pte_is_uncached(*pte))
>  			kvm_flush_dcache_pte(*pte);
>  	} while (pte++, addr += PAGE_SIZE, addr != end);
>  }
> diff --git a/arch/arm64/include/asm/kvm_mmu.h b/arch/arm64/include/asm/kvm_mmu.h
> index 61505676d085..5806f412a47a 100644
> --- a/arch/arm64/include/asm/kvm_mmu.h
> +++ b/arch/arm64/include/asm/kvm_mmu.h
> @@ -302,5 +302,17 @@ static inline void __kvm_extend_hypmap(pgd_t *boot_hyp_pgd,
>  	merged_hyp_pgd[idmap_idx] = __pgd(__pa(boot_hyp_pgd) | PMD_TYPE_TABLE);
>  }
>  
> +static inline bool __kvm_pte_is_uncached(pte_t pte)
> +{
> +	switch (pte_val(pte) & PTE_ATTRINDX_MASK) {
> +	case PTE_ATTRINDX(MT_DEVICE_nGnRnE):
> +	case PTE_ATTRINDX(MT_DEVICE_nGnRE):
> +	case PTE_ATTRINDX(MT_DEVICE_GRE):
> +	case PTE_ATTRINDX(MT_NORMAL_NC):
> +		return true;
> +	}
> +	return false;
> +}
> +
>  #endif /* __ASSEMBLY__ */
>  #endif /* __ARM64_KVM_MMU_H__ */
> -- 
> 1.9.1
> 

Thanks for this patch, I'll queue it.

-Christoffer

WARNING: multiple messages have this Message-ID (diff)
From: christoffer.dall@linaro.org (Christoffer Dall)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH] ARM/arm64: KVM: test properly for a PTE's uncachedness
Date: Mon, 9 Nov 2015 17:21:59 +0100	[thread overview]
Message-ID: <20151109162159.GA12968@cbox> (raw)
In-Reply-To: <1446810188-13727-1-git-send-email-ard.biesheuvel@linaro.org>

On Fri, Nov 06, 2015 at 12:43:08PM +0100, Ard Biesheuvel wrote:
> The open coded tests for checking whether a PTE maps a page as
> uncached use a flawed 'pte_val(xxx) & CONST != CONST' pattern,
> which is not guaranteed to work since the type of a mapping is an
> index into the MAIR table, not a set of mutually exclusive bits.
> 
> Considering that, on arm64, the S2 type definitions use the following
> MAIR indexes
> 
>     #define MT_S2_NORMAL            0xf
>     #define MT_S2_DEVICE_nGnRE      0x1
> 
> we have been getting lucky merely because the S2 device mappings also
> have the PTE_UXN bit set, which means that a device PTE still does not
> equal a normal PTE after masking with the former type.
> 
> Instead, implement proper checking against the MAIR indexes that are
> known to define uncached memory attributes.
> 
> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> ---
>  arch/arm/include/asm/kvm_mmu.h   | 11 +++++++++++
>  arch/arm/kvm/mmu.c               |  5 ++---
>  arch/arm64/include/asm/kvm_mmu.h | 12 ++++++++++++
>  3 files changed, 25 insertions(+), 3 deletions(-)
> 
> diff --git a/arch/arm/include/asm/kvm_mmu.h b/arch/arm/include/asm/kvm_mmu.h
> index 405aa1883307..422973835d41 100644
> --- a/arch/arm/include/asm/kvm_mmu.h
> +++ b/arch/arm/include/asm/kvm_mmu.h
> @@ -279,6 +279,17 @@ static inline void __kvm_extend_hypmap(pgd_t *boot_hyp_pgd,
>  				       pgd_t *merged_hyp_pgd,
>  				       unsigned long hyp_idmap_start) { }
>  
> +static inline bool __kvm_pte_is_uncached(pte_t pte)
> +{
> +	switch (pte_val(pte) & L_PTE_MT_MASK) {
> +	case L_PTE_MT_UNCACHED:
> +	case L_PTE_MT_BUFFERABLE:
> +	case L_PTE_MT_DEV_SHARED:
> +		return true;
> +	}

so PTEs created by setting PAGE_S2_DEVICE will end up hitting in one of
these because L_PTE_S2_MT_DEV_SHARED is the same as L_PTE_MT_BUFFERABLE
for stage-2 mappings and PAGE_HYP_DEVICE end up using
L_PTE_MT_DEV_SHARED.

Totally obvious.

> +	return false;
> +}
> +
>  #endif	/* !__ASSEMBLY__ */
>  
>  #endif /* __ARM_KVM_MMU_H__ */
> diff --git a/arch/arm/kvm/mmu.c b/arch/arm/kvm/mmu.c
> index 6984342da13d..eb9a06e3dbee 100644
> --- a/arch/arm/kvm/mmu.c
> +++ b/arch/arm/kvm/mmu.c
> @@ -213,7 +213,7 @@ static void unmap_ptes(struct kvm *kvm, pmd_t *pmd,
>  			kvm_tlb_flush_vmid_ipa(kvm, addr);
>  
>  			/* No need to invalidate the cache for device mappings */
> -			if ((pte_val(old_pte) & PAGE_S2_DEVICE) != PAGE_S2_DEVICE)
> +			if (!__kvm_pte_is_uncached(old_pte))
>  				kvm_flush_dcache_pte(old_pte);
>  
>  			put_page(virt_to_page(pte));
> @@ -305,8 +305,7 @@ static void stage2_flush_ptes(struct kvm *kvm, pmd_t *pmd,
>  
>  	pte = pte_offset_kernel(pmd, addr);
>  	do {
> -		if (!pte_none(*pte) &&
> -		    (pte_val(*pte) & PAGE_S2_DEVICE) != PAGE_S2_DEVICE)
> +		if (!pte_none(*pte) && !__kvm_pte_is_uncached(*pte))
>  			kvm_flush_dcache_pte(*pte);
>  	} while (pte++, addr += PAGE_SIZE, addr != end);
>  }
> diff --git a/arch/arm64/include/asm/kvm_mmu.h b/arch/arm64/include/asm/kvm_mmu.h
> index 61505676d085..5806f412a47a 100644
> --- a/arch/arm64/include/asm/kvm_mmu.h
> +++ b/arch/arm64/include/asm/kvm_mmu.h
> @@ -302,5 +302,17 @@ static inline void __kvm_extend_hypmap(pgd_t *boot_hyp_pgd,
>  	merged_hyp_pgd[idmap_idx] = __pgd(__pa(boot_hyp_pgd) | PMD_TYPE_TABLE);
>  }
>  
> +static inline bool __kvm_pte_is_uncached(pte_t pte)
> +{
> +	switch (pte_val(pte) & PTE_ATTRINDX_MASK) {
> +	case PTE_ATTRINDX(MT_DEVICE_nGnRnE):
> +	case PTE_ATTRINDX(MT_DEVICE_nGnRE):
> +	case PTE_ATTRINDX(MT_DEVICE_GRE):
> +	case PTE_ATTRINDX(MT_NORMAL_NC):
> +		return true;
> +	}
> +	return false;
> +}
> +
>  #endif /* __ASSEMBLY__ */
>  #endif /* __ARM64_KVM_MMU_H__ */
> -- 
> 1.9.1
> 

Thanks for this patch, I'll queue it.

-Christoffer

  parent reply	other threads:[~2015-11-09 16:21 UTC|newest]

Thread overview: 19+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-11-06 11:43 [PATCH] ARM/arm64: KVM: test properly for a PTE's uncachedness Ard Biesheuvel
2015-11-06 11:43 ` Ard Biesheuvel
2015-11-09  7:24 ` Pavel Fedin
2015-11-09  7:24   ` Pavel Fedin
2015-11-09  8:17 ` Marc Zyngier
2015-11-09  8:17   ` Marc Zyngier
2015-11-09 16:21 ` Christoffer Dall [this message]
2015-11-09 16:21   ` Christoffer Dall
2015-11-09 16:27   ` Ard Biesheuvel
2015-11-09 16:27     ` Ard Biesheuvel
2015-11-09 16:35     ` Christoffer Dall
2015-11-09 16:35       ` Christoffer Dall
2015-11-09 16:59       ` Ard Biesheuvel
2015-11-09 16:59         ` Ard Biesheuvel
     [not found]         ` <1447148737-15363-1-git-send-email-ard.biesheuvel@linaro.org>
2015-11-10  9:47           ` [PATCH v2] " Ard Biesheuvel
2015-11-10 10:27             ` Pavel Fedin
     [not found]           ` <20151110122203.GD12968@cbox>
2015-11-10 13:15             ` Ard Biesheuvel
2015-11-10 13:40               ` Christoffer Dall
2015-11-10 13:48                 ` Ard Biesheuvel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20151109162159.GA12968@cbox \
    --to=christoffer.dall@linaro.org \
    --cc=ard.biesheuvel@linaro.org \
    --cc=kvmarm@lists.cs.columbia.edu \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=marc.zyngier@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.