xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Julien Grall <julien.grall@arm.com>
To: Peng Fan <peng.fan@nxp.com>, Peng Fan <van.freenix@gmail.com>,
	Stefano Stabellini <sstabellini@kernel.org>
Cc: "xen-devel@lists.xen.org" <xen-devel@lists.xen.org>
Subject: Re: [PATCH v4 0/7] unsafe big.LITTLE support
Date: Thu, 8 Mar 2018 15:13:50 +0000	[thread overview]
Message-ID: <8cf8b6a8-b08b-32c6-04f5-fd9dc270db9b@arm.com> (raw)
In-Reply-To: <DB6PR04MB3221B282FCF671F4F033C70E88DF0@DB6PR04MB3221.eurprd04.prod.outlook.com>

Hi,

On 08/03/18 12:43, Peng Fan wrote:
>>>>> I am not sure whether this issue cause DomU big/Little not work.
>>>>
>>>> Well, I would recommend to speak with NXP whether this errata affects
>>>> TLB flush for Hypervisor Page-Table or Stage-2 Page-Table.
>>>
>>> I tried the following, but no help. Not sure my patch is correct. I
>>> think it affects stage2 TLB.
>>>
>>> --- a/xen/include/asm-arm/arm64/flushtlb.h
>>> +++ b/xen/include/asm-arm/arm64/flushtlb.h
>>> @@ -6,7 +6,7 @@ static inline void flush_tlb_local(void)
>>>    {
>>>        asm volatile(
>>>            "dsb sy;"
>>> -        "tlbi vmalls12e1;"
>>> +        "tlbi alle1;"
>>>            "dsb sy;"
>>>            "isb;"
>>>            : : : "memory");
>>> @@ -17,7 +17,7 @@ static inline void flush_tlb(void)
>>>    {
>>>        asm volatile(
>>>            "dsb sy;"
>>> -        "tlbi vmalls12e1is;"
>>> +        "tlbi alle1;"
>>
>> I am not sure why you drop the innershareable here?
> Just want to invalid all the tlb, innershareable could be kept.
> This is not a formal patch, just my trying to narrow the issue.

alle1 will only flush the TLBs of the local processor. The flush will 
not get propagated to the other CPUs of the system. So you definitely 
want this to be innershareable to avoid the other processors containing 
stale TLBs.

>>
>>>            "dsb sy;"
>>>            "isb;"
>>>            : : : "memory");
>>> @@ -39,7 +39,7 @@ static inline void flush_tlb_all(void)
>>>    {
>>>        asm volatile(
>>>            "dsb sy;"
>>> -        "tlbi alle1is;"
>>> +        "tlbi alle1;"
>>
>> Ditto.
>>
>>>            "dsb sy;"
>>>            "isb;"
>>>            : : : "memory");
>>> --- a/xen/include/asm-arm/arm64/page.h
>>> +++ b/xen/include/asm-arm/arm64/page.h
>>> @@ -74,14 +74,16 @@ static inline void flush_xen_data_tlb_local(void)
>>>    /* Flush TLB of local processor for address va. */
>>>    static inline void  __flush_xen_data_tlb_one_local(vaddr_t va)
>>>    {
>>> -    asm volatile("tlbi vae2, %0;" : : "r" (va>>PAGE_SHIFT) : "memory");
>>> +       flush_xen_data_tlb_local();
>>> +    //asm volatile("tlbi vae2, %0;" : : "r" (va>>PAGE_SHIFT) :
>>> + "memory");
>>>    }
>>>
>>>    /* Flush TLB of all processors in the inner-shareable domain for
>>>     * address va. */
>>>    static inline void __flush_xen_data_tlb_one(vaddr_t va)
>>>    {
>>> -    asm volatile("tlbi vae2is, %0;" : : "r" (va>>PAGE_SHIFT) : "memory");
>>> +       flush_xen_data_tlb_local();
>>
>> Why do you replace an innershareable call to a local call? Is it part of the errata?
> 
> No. Just my trying to narrow down.

Then you should keep the innershareable. See above.

>>
>>> +    //asm volatile("tlbi vae2is, %0;" : : "r" (va>>PAGE_SHIFT) :
>>> + "memory");
>>>    }
>>>
>>>>
>>>>> So wonder has this patchset been tested on Big/Little Hardware?
>>>>
>>>> This series only adds facility to report the correct MIDR to the guest.
>>>> If your platform requires more, then it would be necessary send a patch for
>> Xen.
>>>
>>> Do you have any suggestions? Besides MIDR/ACTLR/Cacheline, are there more
>> needed?
>>
>> Having a bit more details from your side would be helpful. At the moment, I have
>> no clue what's going on.
> 
> As from the linux kernel commit:
>      on i.MX8QM TO1.0, there is an issue: the bus width between A53-CCI-A72
>      is limited to 36bits.TLB maintenance through DVM messages over AR channel,
>      some bits will be forced(truncated) to zero as the followings:
> 
>      ASID[15:12] is forced to 0
>      VA[48:45] is forced to 0
>      VA[44:41] is forced to 0
>      VA[39:36] is forced to 0
> 
>      This issue will result in the TLB aintenance across the clusters not working
>      as expected due to some VA and ASID bits get truncated and forced to be zero.
> 
>      The SW workaround is: use the vmalle1is if VA larger than 36bits or
>      ASID[15:12] is not zero, otherwise, we use original TLB maintenance path.
> 
> When doing tlb maintenance through DVM from A53 to A72, some bits are forced
> to 0, this means TLB may not be really invalidated from A72 perspective.
> 
> Currently I am trying a domu with big/little capability, but not allowing big/little vcpu
> migration.
> 
> I am not sure whether this hardware issue impacts DomU or not. Or it is software issue.
> As you could see dom0 has 6 vcpus, I did a stress test and not found issue on dom0.

There are a major difference between Dom0 and DomU in your setup. Dom0 
vCPUs are pinned to a specific pCPU, so they can't move around. For 
DomU, each vCPU are pinned to a set of pCPUs, so they can move around.

But, did you check the DomU has the workaround enabled? I am asking that 
because it looks like to me the way to detect the workaround is based on 
a device (scu) and not processor. So I am not convinced that DomU is 
actually using your workaround.

Cheers,

-- 
Julien Grall

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

  reply	other threads:[~2018-03-08 15:13 UTC|newest]

Thread overview: 26+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-03-02 19:05 [PATCH v4 0/7] unsafe big.LITTLE support Stefano Stabellini
2018-03-02 19:06 ` [PATCH v4 1/7] xen/arm: Read the dcache line size from CTR register Stefano Stabellini
2018-03-02 19:06   ` [PATCH v4 2/7] xen/arm: Park CPUs with a MIDR different from the boot CPU Stefano Stabellini
2018-03-02 19:06   ` [PATCH v4 3/7] xen/arm: make processor a per cpu variable Stefano Stabellini
2018-03-02 19:06   ` [PATCH v4 4/7] xen/arm: read ACTLR on the pcpu where the vcpu will run Stefano Stabellini
2018-03-02 19:06   ` [PATCH v4 5/7] xen/arm: set VPIDR based on the MIDR value of the underlying pCPU Stefano Stabellini
2018-03-02 19:06   ` [PATCH v4 6/7] xen/arm: update the docs about heterogeneous computing Stefano Stabellini
2018-03-02 19:06   ` [PATCH v4 7/7] xen/arm: disable CPUs with different dcache line sizes Stefano Stabellini
2018-03-06 10:59     ` Julien Grall
2018-03-06 19:41       ` Stefano Stabellini
2018-03-06 10:46   ` [PATCH v4 1/7] xen/arm: Read the dcache line size from CTR register Julien Grall
2018-03-08  6:15 ` [PATCH v4 0/7] unsafe big.LITTLE support Peng Fan
2018-03-08 11:03   ` Julien Grall
2018-03-08 12:23     ` Peng Fan
2018-03-08 12:30       ` Julien Grall
2018-03-08 12:43         ` Peng Fan
2018-03-08 15:13           ` Julien Grall [this message]
2018-03-09  9:05             ` Peng Fan
2018-03-09 10:22               ` Julien Grall
2018-03-09 13:30                 ` Peng Fan
2018-03-09 14:40                   ` Julien Grall
2018-03-10  1:09                     ` Stefano Stabellini
2018-03-12  2:57                       ` Peng Fan
2018-03-12 11:02                         ` Julien Grall
2018-03-12  2:32                     ` Peng Fan
2018-03-12 10:34                       ` Julien Grall

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8cf8b6a8-b08b-32c6-04f5-fd9dc270db9b@arm.com \
    --to=julien.grall@arm.com \
    --cc=peng.fan@nxp.com \
    --cc=sstabellini@kernel.org \
    --cc=van.freenix@gmail.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).