|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 6/7] xen/arm: flush D-cache and I-cache when appropriate
On Thu, 15 Nov 2012, Ian Campbell wrote:
> On Tue, 2012-11-13 at 15:42 +0000, Stefano Stabellini wrote:
> > - invalidate tlb after setting WXN;
> > - flush D-cache and I-cache after relocation;
> > - flush D-cache after writing to smp_up_cpu;
> > - flush TLB before changing HTTBR;
> > - flush I-cache after changing HTTBR;
> > - flush I-cache and branch predictor after writing Xen text ptes.
>
> Since the reasoning is pretty subtle I wonder if you could say a few
> words in each case about why these flushes are necessary? Either here on
> in the comments in the code.
I'll remove the TLB flush before changing HTTBR because it isn't
actually needed.
I'll write comments in the code regarding the D-cache flush after
changing smp_up_cpu. I think that the others are self explanatory (they
are a consequence of the fact that we are modifying the code we are
running on or the mapping of it).
> > @@ -244,10 +245,17 @@ void __init setup_pagetables(unsigned long
> > boot_phys_offset, paddr_t xen_paddr)
> >
> > /* Change pagetables to the copy in the relocated Xen */
> > boot_httbr = (unsigned long) xen_pgtable + phys_offset;
> > + flush_xen_dcache_va(&boot_httbr);
> > + flush_xen_dcache_va_range((void*)dest_va, _end - _start);
> > + isb();
> > + flush_xen_text_tlb();
> > +
> > asm volatile (
> > STORE_CP64(0, HTTBR) /* Change translation base */
> > "dsb;" /* Ensure visibility of HTTBR
> > update */
> > + "isb;"
> > STORE_CP32(0, TLBIALLH) /* Flush hypervisor TLB */
> > + STORE_CP32(0, ICIALLU) /* Flush I-cache */
> > STORE_CP32(0, BPIALL) /* Flush branch predictor */
>
> This now looks exactly like flush_xen_text_tlb() -- shall we call it
> instead of open coding?
Yeah
> > "dsb;" /* Ensure completion of TLB+BP
> > flush */
> > "isb;"
> > @@ -256,6 +264,7 @@ void __init setup_pagetables(unsigned long
> > boot_phys_offset, paddr_t xen_paddr)
> > /* Undo the temporary map */
> > pte.bits = 0;
> > write_pte(xen_second + second_table_offset(dest_va), pte);
> > + isb();
> > flush_xen_text_tlb();
>
> Do any calls to flush_xen_text_tlb() not require a preceding isb? I'd
> have thought that by its nature an isb would be required every time --
> in which case it may as well go in the macro.
OK
> > /* Link in the fixmap pagetable */
> > @@ -291,11 +300,14 @@ void __init setup_pagetables(unsigned long
> > boot_phys_offset, paddr_t xen_paddr)
> > >> PAGE_SHIFT);
> > pte.pt.table = 1;
> > write_pte(xen_second + second_linear_offset(XEN_VIRT_START), pte);
> > - /* Have changed a mapping used for .text. Flush everything for safety.
> > */
> > - flush_xen_text_tlb();
> > + /* ISB is needed because we changed the text mappings */
> > + isb();
>
> Why is the text TLB flush is not also required in this case?
You are right, it is required, but we wait a bit longer and delay it
until setting the WXN bit.
In fact we can also delay the isb. I'll make that change and add a
comment.
> > /* From now on, no mapping may be both writable and executable. */
> > WRITE_CP32(READ_CP32(HSCTLR) | SCTLR_WXN, HSCTLR);
> > + isb();
> > + /* Flush everything after setting WXN bit. */
> > + flush_xen_text_tlb();
> > }
> >
> > /* MMU setup for secondary CPUS (which already have paging enabled) */
> > @@ -303,6 +315,8 @@ void __cpuinit mmu_init_secondary_cpu(void)
> > {
> > /* From now on, no mapping may be both writable and executable. */
> > WRITE_CP32(READ_CP32(HSCTLR) | SCTLR_WXN, HSCTLR);
> > + isb();
> > + flush_xen_text_tlb();
> > }
> >
> > /* Create Xen's mappings of memory.
>
> > diff --git a/xen/include/asm-arm/page.h b/xen/include/asm-arm/page.h
> > index 9511c45..1b1d556 100644
> > --- a/xen/include/asm-arm/page.h
> > +++ b/xen/include/asm-arm/page.h
> > @@ -228,27 +228,72 @@ static inline lpae_t mfn_to_p2m_entry(unsigned long
> > mfn, unsigned int mattr)
> > return e;
> > }
> >
> > -/* Write a pagetable entry */
> > +/* Write a pagetable entry.
> > + *
> > + * If the table entry is changing a text mapping, it is responsibility
> > + * of the caller to issue an ISB after write_pte.
> > + */
> > static inline void write_pte(lpae_t *p, lpae_t pte)
> > {
> > asm volatile (
> > + /* Ensure any writes have completed with the old mappings. */
> > + "dsb;"
> > /* Safely write the entry (STRD is atomic on CPUs that support
> > LPAE) */
> > "strd %0, %H0, [%1];"
> > + "dsb;"
> > /* Push this cacheline to the PoC so the rest of the system sees
> > it. */
> > STORE_CP32(1, DCCMVAC)
> > + /* Ensure that the data flush is completed before proceeding */
> > + "dsb;"
> > : : "r" (pte.bits), "r" (p) : "memory");
> > }
> >
> > +
> > +#define MIN_CACHELINE_BYTES 32
> > +extern int cacheline_bytes;
> > +
> > +/* Function for flushing medium-sized areas.
> > + * if 'range' is large enough we might want to use model-specific
> > + * full-cache flushes. */
> > +static inline void flush_xen_dcache_va_range(void *p, unsigned long size)
> > +{
> > + void *end;
> > + dsb(); /* So the CPU issues all writes to the range */
> > + for ( end = p + size; p < end; p += cacheline_bytes )
>
> Tim asked if this memory read of the cached cacheline_bytes might not be
> more expensive than hitting the (on-core) cp register every time, which
> I also suspect will be the case. Looking at Linux it seems to reread the
> register each time in v7_flush_dcache_all which suggests that reading
> the register is faster or at least preferable.
OK
> > + WRITE_CP32((uint32_t) p, DCCMVAC);
> > + dsb(); /* So we know the flushes happen before continuing */
> > +}
> > +
> > +
> > +/* Macro for flushing a single small item. The predicate is always
> > + * compile-time constant so this will compile down to 3 instructions in
> > + * the common case. Make sure to call it with the correct type of
> > + * pointer! */
>
> Do we need to worry about pointers to things which cross a cacheline
> boundary? i.e. a 4 byte thing at offset 30 in a 32-byte cache line.
>
> Or do ARMs C alignment rules ensure this can never happen? (I suspect
> the answer is yes).
I think you are right, we need to take this into consideration.
I couldn't find in the ARM C specs anything about cacheline alignment,
but reading the gcc docs it seems pretty clear that cachelines are
expected to be aligned to the cacheline size.
I think we should change the macro into:
#define flush_xen_dcache_va(p) do { \
int cacheline_bytes = READ_CP32(CCSIDR); \
typeof(p) _p = (p); \
if ( ((unsigned long)_p & ~(cacheline_bytes - 1)) != \
(((unsigned long)_p + (sizeof *_p)) & ~(cacheline_bytes - 1)) ) \
flush_xen_dcache_va_range(_p, sizeof *_p); \
else \
asm volatile ( \
"dsb;" /* Finish all earlier writes */ \
STORE_CP32(0, DCCMVAC) \
"dsb;" /* Finish flush before continuing */ \
: : "r" (_p), "m" (*_p)); \
} while (0)
> > +#define flush_xen_dcache_va(p) do { \
> > + typeof(p) _p = (p); \
> > + if ( (sizeof *_p) > MIN_CACHELINE_BYTES ) \
> > + flush_xen_dcache_va_range(_p, sizeof *_p); \
> > + else \
> > + asm volatile ( \
> > + "dsb;" /* Finish all earlier writes */ \
> > + STORE_CP32(0, DCCMVAC) \
> > + "dsb;" /* Finish flush before continuing */ \
> > + : : "r" (_p), "m" (*_p)); \
> > +} while (0)
> > +
> > +
> > /*
> > * Flush all hypervisor mappings from the TLB and branch predictor.
> > - * This is needed after changing Xen code mappings.
> > + * This is needed after changing Xen code mappings.
> > + *
> > + * The caller needs to issue the necessary barriers before this functions.
>
> Worth commenting on what those are and when they are needed?
Given that we are moving isb inside flush_xen_text_tlb, it is only DSB
and D-cache flushes. I'll write that down.
> > */
> > static inline void flush_xen_text_tlb(void)
> > {
> > register unsigned long r0 asm ("r0");
> > asm volatile (
> > - "dsb;" /* Ensure visibility of PTE writes */
> > STORE_CP32(0, TLBIALLH) /* Flush hypervisor TLB */
> > + STORE_CP32(0, ICIALLU) /* Flush I-cache */
> > STORE_CP32(0, BPIALL) /* Flush branch predictor */
> > "dsb;" /* Ensure completion of TLB+BP flush
> > */
> > "isb;"
>
>
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |