From: Leif Lindholm <leif.lindholm@linaro.org>
To: Ard Biesheuvel <ard.biesheuvel@linaro.org>
Cc: "edk2-devel@lists.01.org" <edk2-devel@lists.01.org>,
Chris Co <Christopher.Co@microsoft.com>
Subject: Re: [PATCH] ArmPkg/ArmMmuLib ARM: remove cache maintenance of block mapping contents
Date: Thu, 21 Jun 2018 11:48:21 +0100 [thread overview]
Message-ID: <20180621104821.gq3stweaokjmpre3@bivouac.eciton.net> (raw)
In-Reply-To: <CAKv+Gu-VETcDg8mZFD7oMTax59ys-OeC8AApjiQ_Q73A8QtbfA@mail.gmail.com>
Replying to this one rather than the new patches, to keep the thread going.
On Thu, Jun 21, 2018 at 08:21:22AM +0200, Ard Biesheuvel wrote:
> On 21 June 2018 at 00:05, Leif Lindholm <leif.lindholm@linaro.org> wrote:
> > On Wed, Jun 20, 2018 at 09:10:07PM +0200, Ard Biesheuvel wrote:
> >> Peculiarly enough, the current page table manipulation code takes it
> >> upon itself to write back and invalidate the memory contents covered
> >> by section mappings when their memory attributes change. It is not
> >> generally the case that data must be written back when such a change
> >> occurs, even when switching from cacheable to non-cacheable attributes,
> >> and in some cases, it is actually causing problems. (The cache
> >> maintenance is also performed on the PCIe MMIO regions as they get
> >> mapped by the PCI bus driver, and under virtualization, each cache
> >> maintenance operation on an emulated MMIO region triggers a round
> >> trip to the host and back)
> >>
> >> So let's just drop this code.
> >
> > I guess this is a remnant from pre-ARMv7 days, when translation table
> > walks weren't inner-cacheable. I think we've already determined that
> > ARMv7-A+ is required for PI compliance anyway, so I guess dropping
> > this should be fine.
>
> No, this one is different. This does not flush the page containing the
> page table entry that is modified, but it flushes the memory that the
> page table entry maps (a 1 MB section in this case)
*scratches head*
Sounds like someone was trying to be overly helpful by completely
hiding architectural complexity. Surely if someone is remapping a
region to different cacheability settings, the responsibility needs to
be on them to manually clean/invalidate?
So yeah, that needs to go.
> > But if so, don't we also want to get rid of the other two instances of
> > WriteBackInvalidateDataCacheRange() in this file?
>
> If we assume page table walks are coherent, then yes, we could remove
> some more code, but that should be a separate patch.
Hmm...
I'm starting to have second thoughts about that.
UEFI explicitly says "The binding does not mandate whether page tables
are cached or un-cached.".
Otoh, we know that we only practically support implementations that
are required to be able to do coherent page table walks. So maybe we
can nuke it and reinstate it under a Pcd (default off) if anyone
screams?
/
Leif
> >> Contributed-under: TianoCore Contribution Agreement 1.1
> >> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
> >> ---
> >> ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c | 6 ------
> >> 1 file changed, 6 deletions(-)
> >>
> >> diff --git a/ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c b/ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c
> >> index 9bf4ba03fd5b..d1bca4c601b8 100644
> >> --- a/ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c
> >> +++ b/ArmPkg/Library/ArmMmuLib/Arm/ArmMmuLibCore.c
> >> @@ -718,12 +718,6 @@ UpdateSectionEntries (
> >> if (CurrentDescriptor != Descriptor) {
> >> Mva = (VOID *)(UINTN)(((UINTN)FirstLevelIdx + i) << TT_DESCRIPTOR_SECTION_BASE_SHIFT);
> >>
> >> - // Clean/invalidate the cache for this section, but only
> >> - // if we are modifying the memory type attributes
> >> - if (((CurrentDescriptor ^ Descriptor) & TT_DESCRIPTOR_SECTION_CACHE_POLICY_MASK) != 0) {
> >> - WriteBackInvalidateDataCacheRange (Mva, SIZE_1MB);
> >> - }
> >> -
> >> // Only need to update if we are changing the descriptor
> >> FirstLevelTable[FirstLevelIdx + i] = Descriptor;
> >> ArmUpdateTranslationTableEntry ((VOID *)&FirstLevelTable[FirstLevelIdx + i], Mva);
> >> --
> >> 2.17.1
> >>
prev parent reply other threads:[~2018-06-21 10:48 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-06-20 19:10 [PATCH] ArmPkg/ArmMmuLib ARM: remove cache maintenance of block mapping contents Ard Biesheuvel
2018-06-20 22:05 ` Leif Lindholm
2018-06-21 6:21 ` Ard Biesheuvel
2018-06-21 10:48 ` Leif Lindholm [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-list from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180621104821.gq3stweaokjmpre3@bivouac.eciton.net \
--to=devel@edk2.groups.io \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox