public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
From: Ard Biesheuvel <ard.biesheuvel@linaro.org>
To: Laszlo Ersek <lersek@redhat.com>
Cc: "edk2-devel@lists.01.org" <edk2-devel@ml01.01.org>,
	Leif Lindholm <leif.lindholm@linaro.org>
Subject: Re: [PATCH] ArmVirtPkg: restrict mapping attributes of normal memory to EFI_MEMORY_WB
Date: Thu, 8 Sep 2016 10:38:43 +0100	[thread overview]
Message-ID: <CAKv+Gu-gGgvjtFbrwKnic5oN1yJaLFdw0+ZkZaGFYo-BGQGg7w@mail.gmail.com> (raw)
In-Reply-To: <CAKv+Gu_Xj7W=KNLDwbU9YLazS+rA-+FxWOTt9=XwTMAsRffrvg@mail.gmail.com>

On 8 September 2016 at 08:57, Ard Biesheuvel <ard.biesheuvel@linaro.org> wrote:
> On 8 September 2016 at 08:54, Laszlo Ersek <lersek@redhat.com> wrote:
>> On 09/08/16 09:50, Ard Biesheuvel wrote:
>>> In general, on an ARM system, mapping normal memory as device memory may
>>> have unintended side effects, given that unaligned accesses or loads and
>>> stores with special semantics (e.g., load/store exclusive) may fault or
>>> may not work as expected.
>>>
>>> Under KVM, the situation is even worse, since the host may not expect the
>>> guest to perform uncached accesses, and so writes to such an uncached
>>> region may get lost completely.
>>>
>>> Since the only safe mapping type under KVM is EFI_MEMORY_WB, remove all
>>> other memory type attributes.
>>>
>>> Contributed-under: TianoCore Contribution Agreement 1.0
>>> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
>>> ---
>>>  ArmVirtPkg/HighMemDxe/HighMemDxe.c                                   | 3 +--
>>>  ArmVirtPkg/Library/ArmVirtMemoryInitPeiLib/ArmVirtMemoryInitPeiLib.c | 3 ---
>>>  2 files changed, 1 insertion(+), 5 deletions(-)
>>>
>>> diff --git a/ArmVirtPkg/HighMemDxe/HighMemDxe.c b/ArmVirtPkg/HighMemDxe/HighMemDxe.c
>>> index 7fd7e8e9a539..4d56e6236b54 100644
>>> --- a/ArmVirtPkg/HighMemDxe/HighMemDxe.c
>>> +++ b/ArmVirtPkg/HighMemDxe/HighMemDxe.c
>>> @@ -78,8 +78,7 @@ InitializeHighMemDxe (
>>>            Status = gDS->AddMemorySpace (
>>>                            EfiGcdMemoryTypeSystemMemory,
>>>                            CurBase, CurSize,
>>> -                          EFI_MEMORY_WB | EFI_MEMORY_WC |
>>> -                          EFI_MEMORY_WT | EFI_MEMORY_UC);
>>> +                          EFI_MEMORY_WB);
>>>
>>>            if (EFI_ERROR (Status)) {
>>>              DEBUG ((EFI_D_ERROR,
>>> diff --git a/ArmVirtPkg/Library/ArmVirtMemoryInitPeiLib/ArmVirtMemoryInitPeiLib.c b/ArmVirtPkg/Library/ArmVirtMemoryInitPeiLib/ArmVirtMemoryInitPeiLib.c
>>> index 251e5314e61d..6f3e54b7afcb 100644
>>> --- a/ArmVirtPkg/Library/ArmVirtMemoryInitPeiLib/ArmVirtMemoryInitPeiLib.c
>>> +++ b/ArmVirtPkg/Library/ArmVirtMemoryInitPeiLib/ArmVirtMemoryInitPeiLib.c
>>> @@ -68,9 +68,6 @@ MemoryPeim (
>>>    ResourceAttributes = (
>>>        EFI_RESOURCE_ATTRIBUTE_PRESENT |
>>>        EFI_RESOURCE_ATTRIBUTE_INITIALIZED |
>>> -      EFI_RESOURCE_ATTRIBUTE_UNCACHEABLE |
>>> -      EFI_RESOURCE_ATTRIBUTE_WRITE_COMBINEABLE |
>>> -      EFI_RESOURCE_ATTRIBUTE_WRITE_THROUGH_CACHEABLE |
>>>        EFI_RESOURCE_ATTRIBUTE_WRITE_BACK_CACHEABLE |
>>>        EFI_RESOURCE_ATTRIBUTE_TESTED
>>>    );
>>>
>>
>> Reviewed-by: Laszlo Ersek <lersek@redhat.com>
>>
>> Did you encounter any specific problem with these?
>>
>
> No, but I am looking into using the new optimized BaseMemoryLibOptDxe,
> and the AARCH64 version uses DC ZVA instructions for ZeroMem() [i.e.,
> zero a cacheline, which is much faster than writing zeroes, obviously]
> That does not work on uncached memory, and so while I was removing
> /that/ attribute from ArmVirtPkg, I realized that WC and WT are not
> safe either.
>
> For bare metal platforms, we will keep WC and WT, but for ArmVirtQemu,
> they don't make sense. Not sure about Xen though ...

Pushed, thanks.


      reply	other threads:[~2016-09-08  9:38 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-09-08  7:50 [PATCH] ArmVirtPkg: restrict mapping attributes of normal memory to EFI_MEMORY_WB Ard Biesheuvel
2016-09-08  7:54 ` Laszlo Ersek
2016-09-08  7:57   ` Ard Biesheuvel
2016-09-08  9:38     ` Ard Biesheuvel [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-list from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CAKv+Gu-gGgvjtFbrwKnic5oN1yJaLFdw0+ZkZaGFYo-BGQGg7w@mail.gmail.com \
    --to=devel@edk2.groups.io \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox