From: Alexandru Elisei <alexandru.elisei@arm.com>
To: Andrew Jones <drjones@redhat.com>
Cc: kvm@vger.kernel.org, pbonzini@redhat.com, rkrcmar@redhat.com,
maz@kernel.org, andre.przywara@arm.com, vladimir.murzin@arm.com,
mark.rutland@arm.com
Subject: Re: [kvm-unit-tests PATCH v2 15/18] arm/arm64: Perform dcache clean + invalidate after turning MMU off
Date: Mon, 30 Dec 2019 09:29:13 +0000 [thread overview]
Message-ID: <721b3c1e-a843-9352-9b8c-cd49da760a1f@arm.com> (raw)
In-Reply-To: <20191213184247.2j4s3llwp6zvkeuj@kamzik.brq.redhat.com>
Hi,
On 12/13/19 6:42 PM, Andrew Jones wrote:
> On Thu, Nov 28, 2019 at 06:04:15PM +0000, Alexandru Elisei wrote:
>> When the MMU is off, data accesses are to Device nGnRnE memory on arm64 [1]
>> or to Strongly-Ordered memory on arm [2]. This means that the accesses are
>> non-cacheable.
>>
>> Perform a dcache clean to PoC so we can read the newer values from the
>> cache, instead of the stale values from memory.
>>
>> Perform an invalidation so when we re-enable the MMU, we can access the
>> data written to memory while the MMU was off, instead of potentially
>> stale values from the cache.
>>
>> Data caches are PIPT and the VAs are translated using the current
>> translation tables, or an identity mapping (what Arm calls a "flat
>> mapping") when the MMU is off [1], [2]. Do the clean + invalidate when the
>> MMU is off so we don't depend on the current translation tables and we can
>> make sure that the operation applies to the entire physical memory.
>>
>> [1] ARM DDI 0487E.a, section D5.2.9
>> [2] ARM DDI 0406C.d, section B3.2.1
>>
>> Signed-off-by: Alexandru Elisei <alexandru.elisei@arm.com>
>> ---
>>
>> Tested with the following hack:
>>
>> diff --git a/arm/selftest.c b/arm/selftest.c
>> index e9dc5c0cab28..7f29548bc468 100644
>> --- a/arm/selftest.c
>> +++ b/arm/selftest.c
>> @@ -350,10 +350,21 @@ static void cpu_report(void *data __unused)
>> report_info("CPU%3d: MPIDR=%010" PRIx64, cpu, mpidr);
>> }
>>
>> +#include <alloc_page.h>
>> +#include <asm/mmu.h>
>> int main(int argc, char **argv)
>> {
>> + int *x = alloc_page();
>> +
>> report_prefix_push("selftest");
>>
>> + *x = 0x42;
>> + mmu_disable();
>> + report("read back value written with MMU on", *x == 0x42);
>> + *x = 0x50;
>> + mmu_enable(current_thread_info()->pgtable);
>> + report("read back value written with MMU off", *x == 0x50);
>> +
>> if (argc < 2)
>> report_abort("no test specified");
> When applying this patch the above hack also gets applied, and I'm
> guessing that wasn't the intent. It can go above the ---, as it's useful
> information.
That is unfortunate, I didn't intend for the reproducer to get applied. I'll add
the diff to the commit message, as well as the explanation (below) for the
failures without this patch.
Thanks,
Alex
> Thanks,
> drew
>
>>
>> Without the fix, the first report fails, and the test usually hangs because
>> mmu_enable pushes the LR register on the stack before asm_mmu_enable, which
>> goes to memory, then pops it after asm_mmu_enable, and reads back garbage
>> from the dcache.
>>
>> With the fix, the two reports pass.
>>
>> lib/arm/asm/processor.h | 6 ++++++
>> lib/arm64/asm/processor.h | 6 ++++++
>> lib/arm/processor.c | 10 ++++++++++
>> lib/arm/setup.c | 2 ++
>> lib/arm64/processor.c | 11 +++++++++++
>> arm/cstart.S | 22 ++++++++++++++++++++++
>> arm/cstart64.S | 23 +++++++++++++++++++++++
>> 7 files changed, 80 insertions(+)
>>
>> diff --git a/lib/arm/asm/processor.h b/lib/arm/asm/processor.h
>> index a8c4628da818..4684fb4755b3 100644
>> --- a/lib/arm/asm/processor.h
>> +++ b/lib/arm/asm/processor.h
>> @@ -9,6 +9,11 @@
>> #include <asm/sysreg.h>
>> #include <asm/barrier.h>
>>
>> +#define CTR_DMINLINE_SHIFT 16
>> +#define CTR_DMINLINE_MASK (0xf << 16)
>> +#define CTR_DMINLINE(x) \
>> + (((x) & CTR_DMINLINE_MASK) >> CTR_DMINLINE_SHIFT)
>> +
>> enum vector {
>> EXCPTN_RST,
>> EXCPTN_UND,
>> @@ -25,6 +30,7 @@ typedef void (*exception_fn)(struct pt_regs *);
>> extern void install_exception_handler(enum vector v, exception_fn fn);
>>
>> extern void show_regs(struct pt_regs *regs);
>> +extern void init_dcache_line_size(void);
>>
>> static inline unsigned long current_cpsr(void)
>> {
>> diff --git a/lib/arm64/asm/processor.h b/lib/arm64/asm/processor.h
>> index 1d9223f728a5..fd508c02f30d 100644
>> --- a/lib/arm64/asm/processor.h
>> +++ b/lib/arm64/asm/processor.h
>> @@ -16,6 +16,11 @@
>> #define SCTLR_EL1_A (1 << 1)
>> #define SCTLR_EL1_M (1 << 0)
>>
>> +#define CTR_EL0_DMINLINE_SHIFT 16
>> +#define CTR_EL0_DMINLINE_MASK (0xf << 16)
>> +#define CTR_EL0_DMINLINE(x) \
>> + (((x) & CTR_EL0_DMINLINE_MASK) >> CTR_EL0_DMINLINE_SHIFT)
>> +
>> #ifndef __ASSEMBLY__
>> #include <asm/ptrace.h>
>> #include <asm/esr.h>
>> @@ -60,6 +65,7 @@ extern void vector_handlers_default_init(vector_fn *handlers);
>>
>> extern void show_regs(struct pt_regs *regs);
>> extern bool get_far(unsigned int esr, unsigned long *far);
>> +extern void init_dcache_line_size(void);
>>
>> static inline unsigned long current_level(void)
>> {
>> diff --git a/lib/arm/processor.c b/lib/arm/processor.c
>> index 773337e6d3b7..c57657c5ea53 100644
>> --- a/lib/arm/processor.c
>> +++ b/lib/arm/processor.c
>> @@ -25,6 +25,8 @@ static const char *vector_names[] = {
>> "rst", "und", "svc", "pabt", "dabt", "addrexcptn", "irq", "fiq"
>> };
>>
>> +unsigned int dcache_line_size;
>> +
>> void show_regs(struct pt_regs *regs)
>> {
>> unsigned long flags;
>> @@ -145,3 +147,11 @@ bool is_user(void)
>> {
>> return current_thread_info()->flags & TIF_USER_MODE;
>> }
>> +void init_dcache_line_size(void)
>> +{
>> + u32 ctr;
>> +
>> + asm volatile("mrc p15, 0, %0, c0, c0, 1" : "=r" (ctr));
>> + /* DminLine is log2 of the number of words in the smallest cache line */
>> + dcache_line_size = 1 << (CTR_DMINLINE(ctr) + 2);
>> +}
>> diff --git a/lib/arm/setup.c b/lib/arm/setup.c
>> index 4f02fca85607..54fc19a20942 100644
>> --- a/lib/arm/setup.c
>> +++ b/lib/arm/setup.c
>> @@ -20,6 +20,7 @@
>> #include <asm/thread_info.h>
>> #include <asm/setup.h>
>> #include <asm/page.h>
>> +#include <asm/processor.h>
>> #include <asm/smp.h>
>>
>> #include "io.h"
>> @@ -63,6 +64,7 @@ static void cpu_init(void)
>> ret = dt_for_each_cpu_node(cpu_set, NULL);
>> assert(ret == 0);
>> set_cpu_online(0, true);
>> + init_dcache_line_size();
>> }
>>
>> static void mem_init(phys_addr_t freemem_start)
>> diff --git a/lib/arm64/processor.c b/lib/arm64/processor.c
>> index 2a024e3f4e9d..f28066d40145 100644
>> --- a/lib/arm64/processor.c
>> +++ b/lib/arm64/processor.c
>> @@ -62,6 +62,8 @@ static const char *ec_names[EC_MAX] = {
>> [ESR_EL1_EC_BRK64] = "BRK64",
>> };
>>
>> +unsigned int dcache_line_size;
>> +
>> void show_regs(struct pt_regs *regs)
>> {
>> int i;
>> @@ -257,3 +259,12 @@ bool is_user(void)
>> {
>> return current_thread_info()->flags & TIF_USER_MODE;
>> }
>> +
>> +void init_dcache_line_size(void)
>> +{
>> + u64 ctr;
>> +
>> + ctr = read_sysreg(ctr_el0);
>> + /* DminLine is log2 of the number of words in the smallest cache line */
>> + dcache_line_size = 1 << (CTR_EL0_DMINLINE(ctr) + 2);
>> +}
>> diff --git a/arm/cstart.S b/arm/cstart.S
>> index dfef48e4dbb2..3c2a3bcde61a 100644
>> --- a/arm/cstart.S
>> +++ b/arm/cstart.S
>> @@ -188,6 +188,20 @@ asm_mmu_enable:
>>
>> mov pc, lr
>>
>> +.macro dcache_clean_inval domain, start, end, tmp1, tmp2
>> + ldr \tmp1, =dcache_line_size
>> + ldr \tmp1, [\tmp1]
>> + sub \tmp2, \tmp1, #1
>> + bic \start, \start, \tmp2
>> +9998:
>> + /* DCCIMVAC */
>> + mcr p15, 0, \start, c7, c14, 1
>> + add \start, \start, \tmp1
>> + cmp \start, \end
>> + blo 9998b
>> + dsb \domain
>> +.endm
>> +
>> .globl asm_mmu_disable
>> asm_mmu_disable:
>> /* SCTLR */
>> @@ -195,6 +209,14 @@ asm_mmu_disable:
>> bic r0, #CR_M
>> mcr p15, 0, r0, c1, c0, 0
>> isb
>> +
>> + ldr r0, =__phys_offset
>> + ldr r0, [r0]
>> + ldr r1, =__phys_end
>> + ldr r1, [r1]
>> + dcache_clean_inval sy, r0, r1, r2, r3
>> + isb
>> +
>> mov pc, lr
>>
>> /*
>> diff --git a/arm/cstart64.S b/arm/cstart64.S
>> index c98842f11e90..f41ffa3bc6c2 100644
>> --- a/arm/cstart64.S
>> +++ b/arm/cstart64.S
>> @@ -201,12 +201,35 @@ asm_mmu_enable:
>>
>> ret
>>
>> +/* Taken with small changes from arch/arm64/incluse/asm/assembler.h */
>> +.macro dcache_by_line_op op, domain, start, end, tmp1, tmp2
>> + adrp \tmp1, dcache_line_size
>> + ldr \tmp1, [\tmp1, :lo12:dcache_line_size]
>> + sub \tmp2, \tmp1, #1
>> + bic \start, \start, \tmp2
>> +9998:
>> + dc \op , \start
>> + add \start, \start, \tmp1
>> + cmp \start, \end
>> + b.lo 9998b
>> + dsb \domain
>> +.endm
>> +
>> .globl asm_mmu_disable
>> asm_mmu_disable:
>> mrs x0, sctlr_el1
>> bic x0, x0, SCTLR_EL1_M
>> msr sctlr_el1, x0
>> isb
>> +
>> + /* Clean + invalidate the entire memory */
>> + adrp x0, __phys_offset
>> + ldr x0, [x0, :lo12:__phys_offset]
>> + adrp x1, __phys_end
>> + ldr x1, [x1, :lo12:__phys_end]
>> + dcache_by_line_op civac, sy, x0, x1, x2, x3
>> + isb
>> +
>> ret
>>
>> /*
>> --
>> 2.20.1
>>
next prev parent reply other threads:[~2019-12-30 9:29 UTC|newest]
Thread overview: 30+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-11-28 18:04 [kvm-unit-tests PATCH v2 00/18] arm/arm64: Various fixes Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 01/18] lib: arm/arm64: Remove unnecessary dcache maintenance operations Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 02/18] lib: arm64: Remove barriers before TLB operations Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 03/18] lib: Add WRITE_ONCE and READ_ONCE implementations in compiler.h Alexandru Elisei
2019-12-09 14:21 ` Thomas Huth
2019-12-16 10:15 ` Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 04/18] lib: arm/arm64: Use WRITE_ONCE to update the translation tables Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 05/18] lib: arm/arm64: Remove unused CPU_OFF parameter Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 06/18] arm/arm64: psci: Don't run C code without stack or vectors Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 07/18] lib: arm/arm64: Add missing include for alloc_page.h in pgtable.h Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 08/18] lib: arm: Implement flush_tlb_all Alexandru Elisei
2019-11-28 23:24 ` André Przywara
2019-12-30 8:50 ` Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 09/18] lib: arm/arm64: Teach mmu_clear_user about block mappings Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 10/18] arm/arm64: selftest: Add prefetch abort test Alexandru Elisei
2019-12-13 18:04 ` Andrew Jones
2019-12-30 9:19 ` Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 11/18] arm64: timer: Write to ICENABLER to disable timer IRQ Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 12/18] arm64: timer: EOIR the interrupt after masking the timer Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 13/18] arm64: timer: Test behavior when timer disabled or masked Alexandru Elisei
2019-12-13 18:28 ` Andrew Jones
2019-12-30 9:21 ` Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 14/18] lib: arm/arm64: Refuse to disable the MMU with non-identity stack pointer Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 15/18] arm/arm64: Perform dcache clean + invalidate after turning MMU off Alexandru Elisei
2019-12-13 18:42 ` Andrew Jones
2019-12-30 9:29 ` Alexandru Elisei [this message]
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 16/18] arm: cstart64.S: Downgrade TLBI to non-shareable in asm_mmu_enable Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 17/18] arm/arm64: Invalidate TLB before enabling MMU Alexandru Elisei
2019-11-28 18:04 ` [kvm-unit-tests PATCH v2 18/18] arm: cstart64.S: Remove icache invalidation from asm_mmu_enable Alexandru Elisei
2019-12-13 18:51 ` [kvm-unit-tests PATCH v2 00/18] arm/arm64: Various fixes Andrew Jones
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=721b3c1e-a843-9352-9b8c-cd49da760a1f@arm.com \
--to=alexandru.elisei@arm.com \
--cc=andre.przywara@arm.com \
--cc=drjones@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=mark.rutland@arm.com \
--cc=maz@kernel.org \
--cc=pbonzini@redhat.com \
--cc=rkrcmar@redhat.com \
--cc=vladimir.murzin@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).