xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Andrii Tseglytskyi <andrii.tseglytskyi@globallogic.com>
To: Julien Grall <julien.grall@linaro.org>
Cc: Tim Deegan <tim@xen.org>,
	Stefano Stabellini <stefano.stabellini@citrix.com>,
	Ian Campbell <ian.campbell@citrix.com>,
	xen-devel@lists.xen.org
Subject: Re: [PATCH] xen: arm: invalidate caches after map_domain_page done
Date: Fri, 1 Aug 2014 14:37:19 +0300	[thread overview]
Message-ID: <CAH_mUMM6sAWEXPJfXEGhcHeQYCKmuagQd9mHQ5yXH3Qz2ABJBA@mail.gmail.com> (raw)
In-Reply-To: <53DB72EA.6080704@linaro.org>

Oh, now got your point.


>>> On 01/08/14 11:01, Andrii Tseglytskyi wrote:
>>>>
>>>>
>>>> On Fri, Aug 1, 2014 at 12:23 PM, Julien Grall <julien.grall@linaro.org>
>>>> wrote:
>>>>>
>>>>>
>>>>>
>>>>> Hi Andrii,
>>>>>
>>>>>
>>>>> On 01/08/14 08:25, Andrii Tseglytskyi wrote:
>>>>>>
>>>>>>
>>>>>>
>>>>>> In some cases, memory page returned by map_domain_page() contains
>>>>>> invalid data. Issue is observed when map_domain_page() is used
>>>>>> immediately after p2m_lookup() function, when random page of
>>>>>> guest domain memory is need to be mapped to xen. Data on this
>>>>>> already memory page may be not valid. Issue is fixed when
>>>>>> caches are invalidated after mapping is done.
>>>>>>
>>>>>> Signed-off-by: Andrii Tseglytskyi <andrii.tseglytskyi@globallogic.com>
>>>>>> ---
>>>>>>     xen/arch/arm/mm.c |    2 +-
>>>>>>     1 file changed, 1 insertion(+), 1 deletion(-)
>>>>>>
>>>>>> diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
>>>>>> index 0a243b0..085780a 100644
>>>>>> --- a/xen/arch/arm/mm.c
>>>>>> +++ b/xen/arch/arm/mm.c
>>>>>> @@ -304,7 +304,7 @@ void *map_domain_page(unsigned long mfn)
>>>>>>          * We may not have flushed this specific subpage at map time,
>>>>>>          * since we only flush the 4k page not the superpage
>>>>>>          */
>>>>>> -    flush_xen_data_tlb_range_va_local(va, PAGE_SIZE);
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Why did you remove the flush TLB? It's requirement to make sure the VA
>>>>> will pointed to the right PA.
>>>>>
>>>>>> +    clean_and_invalidate_xen_dcache_va_range((void *)va, PAGE_SIZE);
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> This is not the right approach, map_domain_page is heavily used to map
>>>>> hypercall data page. Those pages must reside in normal inner-cacheable
>>>>
>>>>
>>>>
>>>> What if use map_domain_page() outside hypercall ?
>>>
>>>
>>>
>>> In general we require cache enabled for any communication with Xen. Until
>>> now, we didn't have any case where map_domain_page is used outside this
>>> scope.
>>>
>>>
>>>>> memory. So cleaning the cache is useless and time consuming.
>>>>
>>>>
>>>>
>>>> I see that without cache invalidating page contains invalid data. Let
>>>> me explain more deeply:
>>>> As far as you know - I resumed my work with remoteproc MMU driver and
>>>> I started fixing review comments. One of your comments is that
>>>> ioremap_nocache() API should not be used for mapping domain pages,
>>>> therefore I tried using map_domain_page, and this works fine for me
>>>> only in case if I invalidate caches of already mapped va.
>>>>
>>>> I compared page dumps - 1 st page was mapped with ioremap_nocache()
>>>> function, second page was mapped with map_domain_page() function, and
>>>> I got the following output:
>>>>
>>>> (XEN) SGX_L2_MMU: pte_table[0] 0x9d428019 tmp[0] 0x9d428019
>>>> (XEN) SGX_L2_MMU: pte_table[1] 0x9d429019 tmp[1] 0x9d429019
>>>> (XEN) SGX_L2_MMU: pte_table[2] 0x9d42e019 tmp[2] 0x9d42e019
>>>> (XEN) SGX_L2_MMU: pte_table[3] 0x9d42f019 tmp[3] 0x00000000  <-- data
>>>> is not valid here
>>>>
>>>> pte_table pointer is mapped using ioremap_nocache(), tmp is mapped
>>>> using map_domain_page()
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> If you want to clean and invalidate the cache, even though I don't
>>>>> think
>>>>> this right by reading the commit message, you have to introduce a new
>>>>> helper.
>>>>>
>>>>
>>>> Taking in account your previous comment - that map_domain_page() is
>>>> used for mapping of hypercall data page, looks like I can't use this
>>>> API as is. In my code I solved this by calling of
>>>> clean_and_invalidate_xen_dcache_va_range() immediately after page is
>>>> mapped. This works fine for me - no invalid data is observed.
>>>
>>>
>>>
>>> What is the attribute of this page in guest? non-cacheable?
>>>
>>
>> It is domain heap memory. I expect it should be cacheable. How can I
>> make sure with this?
>
>
> I'm lost...
>
> The page you are trying to map belongs to a guest, right? When the guest
> writes data in this page. Does it map with cacheable attribute or not? I
> suspect no.

Hard to say. This page is allocated using usual kernel API such as
kmalloc(). Then its pfn is stored in MMU 1-st level translation
pagetable.
Before storing - kernel driver flush corresponding cache ranges. After
this - remoteproc_iommu framework translates pfns to mfns.
So - I would expect that after map_domain_page() function call all
data will be valid.

>
> I think your current problem is the cache contains stall data. In this case
> you have to only invalidate the cache.
>

May work. But it looks like new helper should be introduced in this
case. I see that only clean_and_invalidate_xen_dcache_va_range API is
present, no standalone API for invalidating only.



> --
> Julien Grall



-- 

Andrii Tseglytskyi | Embedded Dev
GlobalLogic
www.globallogic.com

  reply	other threads:[~2014-08-01 11:37 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-08-01  7:25 [PATCH] xen: arm: invalidate caches after map_domain_page done Andrii Tseglytskyi
2014-08-01  9:23 ` Julien Grall
2014-08-01 10:01   ` Andrii Tseglytskyi
2014-08-01 10:28     ` Julien Grall
2014-08-01 10:50       ` Andrii Tseglytskyi
2014-08-01 10:58         ` Julien Grall
2014-08-01 11:37           ` Andrii Tseglytskyi [this message]
2014-08-01 14:01             ` Julien Grall
2014-08-01 15:06               ` Andrii Tseglytskyi
2014-08-01 17:49                 ` Julien Grall
2014-08-01 18:54                   ` Andrii Tseglytskyi
2014-08-05 14:33                     ` Ian Campbell

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAH_mUMM6sAWEXPJfXEGhcHeQYCKmuagQd9mHQ5yXH3Qz2ABJBA@mail.gmail.com \
    --to=andrii.tseglytskyi@globallogic.com \
    --cc=ian.campbell@citrix.com \
    --cc=julien.grall@linaro.org \
    --cc=stefano.stabellini@citrix.com \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).