[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v3 7/7] xen/arm: Sanitize CTR_EL0 and emulate it if needed


  • To: Stefano Stabellini <sstabellini@xxxxxxxxxx>
  • From: Bertrand Marquis <Bertrand.Marquis@xxxxxxx>
  • Date: Mon, 6 Sep 2021 08:29:04 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=mIvUYbF7S8gDAZN+6fmeLMclWA1FIIhVDIW9rAoYCzI=; b=cQEXMJqmWp2d8+DuQAI77ekdflX15VhPCVZmffopdetamqW1AzflX7+oIOLkunBVVAoiRjRdjlKfmIGSXiPgYneHja4NlvEZNtLZnZpOE3K98rMXPpT6lu9SBBWFUJJ7szt3o1CDFg1s20/v78mtGqPcMZvsVyy8+9YIi7B3gZXVx29ktrn22czo46E6rjY1qN5M33pWeETWn5bdwicgD4YTcNIjKxZLu7gdLI53y0ykmoDvhCyFbbI+nPp9VRLGG55wwBKo9JUtz0zARt5mVfwSROD2wvnH2qfdH555Tf8O0APVGCXoA8YF/GvWknxYwkuACwujEwDMG0yZMc213w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mM9kUiyLvgj1Sg+xs0VuwoWaQE9IgxS1fsHVp5dlG5sXl5e03Ixn1iYuIyqlmXJxA7sK13P2NMoOUv0rDscMnepZcRoIwxl0ul46vxsLBLd/I3kl4ECtJ1L5kBIVu56O3PvGKLkdoQfyQVfmqF2cFwYzxC9xPVonN4JlFFVyMNj3DxNWr35YQZAxfLU1dLqyWxQSt6ej9mIieEY/xjYBEAboOVXJvMOIaJjkBfiW0ItJmL1mIv4pqbOyzMMI7ruU4CkkMnhnlv3lOm/rOsAH4XG7pY7A4PZ+yzV21aMJQzfu/AUqFd+fWvTKlID3gmwIwv8DlmHdJ/xKmzlPyUT/hQ==
  • Authentication-results-original: kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=none action=none header.from=arm.com;
  • Cc: Julien Grall <julien@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Mon, 06 Sep 2021 08:29:33 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHXmbPyaqNt71/0B0WMx26sIln5R6uHdm2AgAYrXACAABkoAIAAGG+AgAUlJICAA8aUAA==
  • Thread-topic: [PATCH v3 7/7] xen/arm: Sanitize CTR_EL0 and emulate it if needed

Hi Stefano,

> On 3 Sep 2021, at 23:49, Stefano Stabellini <sstabellini@xxxxxxxxxx> wrote:
> 
> On Tue, 31 Aug 2021, Bertrand Marquis wrote:
>> Hi Julien,
>> 
>>> On 31 Aug 2021, at 15:47, Julien Grall <julien@xxxxxxx> wrote:
>>> 
>>> 
>>> 
>>> On 31/08/2021 14:17, Bertrand Marquis wrote:
>>>> Hi Julien,
>>> 
>>> Hi Bertrand,
>>> 
>>>>> On 27 Aug 2021, at 16:05, Julien Grall <julien@xxxxxxx> wrote:
>>>>> 
>>>>> Hi Bertrand,
>>>>> 
>>>>> On 25/08/2021 14:18, Bertrand Marquis wrote:
>>>>>> Sanitize CTR_EL0 value between cores.
>>>>>> In most cases different values will taint Xen but if different
>>>>>> i-cache policies are found, we choose the one which will be compatible
>>>>>> between all cores in terms of invalidation/data cache flushing strategy.
>>>>> 
>>>>> I understand that all the CPUs in Xen needs to agree on the cache flush 
>>>>> strategy. However...
>>>>> 
>>>>>> In this case we need to activate the TID2 bit in HCR to emulate the
>>>>>> TCR_EL0 register for guests. This patch is not activating TID2 bit all
>>>>>> the time to limit the overhead when possible.
>>>>> 
>>>>> as we discussed in an earlier version, a vCPU is unlikely (at least in 
>>>>> short/medium) to be able move across pCPU of different type. So the vCPU 
>>>>> would be pinned to a set of pCPUs. IOW, the guest would have to be 
>>>>> big.LITTLE aware and therefore would be able to do its own strategy 
>>>>> decision.
>>>>> 
>>>>> So I think we should be able to get away from trappings the registers.
>>>> I do agree that we should be able to get away from that in the long term 
>>>> once
>>>> we have cpupools properly set but right now this is the only way to have
>>>> something useable (I will not say right).
>>>> I will work on finding a way to setup properly cpupools (or something else 
>>>> as
>>>> we discussed earlier) but in the short term I think this is the best we 
>>>> can do.
>>> 
>>> My concern is you are making look like Xen will be able to deal nicely with 
>>> big.LITTLE when in fact there are a lot more potential issue by allow a 
>>> vCPU moving accross pCPU of different type (the errata is one example).
>> 
>> I agree and this is why Xen is tainted.
>> 
>>> 
>>>> An other solution would be to discard this patch from the serie for now 
>>>> until
>>>> I have worked a proper solution for this case.
>>>> Should we discard or merge or do you have an other idea ?
>>> Please correct me if I am wrong, at the moment, it doesn't look like this 
>>> patch will be part of the longer plan. If so, then I think it should be 
>>> parked for now.
>> 
>> Not sure it depends on what the final solution would be but this is highly 
>> possible I agree.
>> 
>>> 
>>> This would also have the advantage to avoid spending too much time on 
>>> resolving the emulation issue I mentioned in my previous answer.
>>> 
>>> No need to resend a new version of this series yet. You can wait until the 
>>> rest of the series get more feedback.
>> 
>> Ok, I will wait for feedback and next serie will not include this patch 
>> anymore.
> 
> Would it be worth keeping just the part that sanitizes ctr, without any
> of the emulation stuff? That way we could still detect cases where there
> is a mismatch between CPUs, print a useful message and taint Xen.

That’s a good idea, it means removing the emulation part and just keep the 
sanitization.

@Julien: would you be ok with that ?

Should I send a v4 or should we use Stefano’s patch directly instead ?

Cheers
Bertrand

> 
> For clarity something like the appended.
> 
> 
> diff --git a/xen/arch/arm/arm64/cpufeature.c b/xen/arch/arm/arm64/cpufeature.c
> index b1936ef1d6..d2456af2bf 100644
> --- a/xen/arch/arm/arm64/cpufeature.c
> +++ b/xen/arch/arm/arm64/cpufeature.c
> @@ -275,9 +275,6 @@ static const struct arm64_ftr_bits ftr_id_aa64mmfr2[] = {
>       ARM64_FTR_END,
> };
> 
> -#if 0
> -/* TODO: use this to sanitize the cache line size among cores */
> -
> static const struct arm64_ftr_bits ftr_ctr[] = {
>       ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_EXACT, 31, 1, 1), /* RES1 */
>       ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, CTR_DIC_SHIFT, 
> 1, 1),
> @@ -294,7 +291,6 @@ static const struct arm64_ftr_bits ftr_ctr[] = {
>       ARM64_FTR_BITS(FTR_VISIBLE, FTR_STRICT, FTR_LOWER_SAFE, 
> CTR_IMINLINE_SHIFT, 4, 0),
>       ARM64_FTR_END,
> };
> -#endif
> 
> static const struct arm64_ftr_bits ftr_id_mmfr0[] = {
>       S_ARM64_FTR_BITS(FTR_HIDDEN, FTR_STRICT, FTR_LOWER_SAFE, 
> ID_MMFR0_INNERSHR_SHIFT, 4, 0xf),
> @@ -600,6 +596,8 @@ void update_system_features(const struct cpuinfo_arm *new)
>        */
>       SANITIZE_REG(dczid, 0, dczid);
> 
> +     SANITIZE_REG(ctr, 0, ctr);
> +
>       if ( cpu_feature64_has_el0_32(&system_cpuinfo) )
>       {
>               SANITIZE_ID_REG(pfr32, 0, pfr0);
> diff --git a/xen/arch/arm/cpufeature.c b/xen/arch/arm/cpufeature.c
> index 113f20f601..6e51f530a8 100644
> --- a/xen/arch/arm/cpufeature.c
> +++ b/xen/arch/arm/cpufeature.c
> @@ -127,6 +127,8 @@ void identify_cpu(struct cpuinfo_arm *c)
> 
>     c->dczid.bits[0] = READ_SYSREG(DCZID_EL0);
> 
> +    c->ctr.bits[0] = READ_SYSREG(CTR_EL0);
> +
>     aarch32_el0 = cpu_feature64_has_el0_32(c);
> #endif
> 
> diff --git a/xen/arch/arm/setup.c b/xen/arch/arm/setup.c
> index 3798c5ade0..33b7bfb59c 100644
> --- a/xen/arch/arm/setup.c
> +++ b/xen/arch/arm/setup.c
> @@ -627,7 +627,7 @@ static void __init setup_mm(void)
>         panic("No memory bank\n");
> 
>     /* We only supports instruction caches implementing the IVIPT extension. 
> */
> -    if ( ((ctr >> CTR_L1Ip_SHIFT) & CTR_L1Ip_MASK) == CTR_L1Ip_AIVIVT )
> +    if ( ((ctr >> CTR_L1IP_SHIFT) & CTR_L1IP_MASK) == ICACHE_POLICY_AIVIVT )
>         panic("AIVIVT instruction cache not supported\n");
> 
>     init_pdx();
> diff --git a/xen/include/asm-arm/cpufeature.h 
> b/xen/include/asm-arm/cpufeature.h
> index 5219fd3bab..ca6e827fcb 100644
> --- a/xen/include/asm-arm/cpufeature.h
> +++ b/xen/include/asm-arm/cpufeature.h
> @@ -267,6 +267,14 @@ struct cpuinfo_arm {
>         register_t bits[1];
>     } dczid;
> 
> +    /*
> +     * CTR is only used to check for different cache types or policies and
> +     * taint Xen in this case
> +     */
> +    struct {
> +        register_t bits[1];
> +    } ctr;
> +
> #endif
> 
>     /*
> @@ -339,6 +347,9 @@ extern struct cpuinfo_arm system_cpuinfo;
> extern void identify_cpu(struct cpuinfo_arm *);
> 
> #ifdef CONFIG_ARM_64
> +
> +extern bool mismatched_cache_type;
> +
> extern void update_system_features(const struct cpuinfo_arm *);
> #else
> static inline void update_system_features(const struct cpuinfo_arm *cpuinfo)
> diff --git a/xen/include/asm-arm/processor.h b/xen/include/asm-arm/processor.h
> index 2577e9a244..8c9843e12b 100644
> --- a/xen/include/asm-arm/processor.h
> +++ b/xen/include/asm-arm/processor.h
> @@ -7,9 +7,21 @@
> #include <public/arch-arm.h>
> 
> /* CTR Cache Type Register */
> -#define CTR_L1Ip_MASK       0x3
> -#define CTR_L1Ip_SHIFT      14
> -#define CTR_L1Ip_AIVIVT     0x1
> +#define CTR_L1IP_MASK       0x3
> +#define CTR_L1IP_SHIFT      14
> +#define CTR_DMINLINE_SHIFT  16
> +#define CTR_IMINLINE_SHIFT  0
> +#define CTR_IMINLINE_MASK   0xf
> +#define CTR_ERG_SHIFT       20
> +#define CTR_CWG_SHIFT       24
> +#define CTR_CWG_MASK        15
> +#define CTR_IDC_SHIFT       28
> +#define CTR_DIC_SHIFT       29
> +
> +#define ICACHE_POLICY_VPIPT  0
> +#define ICACHE_POLICY_AIVIVT 1
> +#define ICACHE_POLICY_VIPT   2
> +#define ICACHE_POLICY_PIPT   3
> 
> /* MIDR Main ID Register */
> #define MIDR_REVISION_MASK      0xf


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.