[RFC][PATCH] arm64: efi: Obey EFI memory type in dmi_remap
Leif Lindholm
leif.lindholm at linaro.org
Mon Jan 19 04:22:57 PST 2015
On Mon, Jan 19, 2015 at 09:49:54AM +0000, Ard Biesheuvel wrote:
> On 17 January 2015 at 14:36, Leif Lindholm <leif.lindholm at linaro.org> wrote:
> > On Sat, Jan 17, 2015 at 12:43:48PM +0000, Ard Biesheuvel wrote:
> >> >> Mapping the SMBIOS tables as uncached is a bad idea, as 'uncached'
> >> >> implies MT_DEVICE_nGnRnE in the arm64 kernel, and the SMBIOS structure
> >> >> tables are not guaranteed to be aligned. So you should at least use
> >> >> MT_NORMAL_NC here.
> >> >>
> >> >> Why does it end up mapped uncached in the first place? Is it backed by
> >> >> a ROM instead of normal RAM?
> >> >
> >> > Makes no difference - the SMBIOS spec contains some not naturally
> >> > aligned fields. So regardless of the backing store, the tables must be
> >> > accessible by Normal memory accesses.
> >>
> >> It should be mapped MT_NORMAL regardless, but it would be good to
> >> understand how we ended up in this situation, and whether it is
> >> something allowed by the spec.
> >
> > It is not really a question of the spec. If the spec does not
>
> It /is/ a question of the spec: it specifies an exact mapping between
> EFI_MEMORY_xx constants and MAIR_ELx values, which is worse than just
> unhelpful if using WT cannot be supported by the architecture.
The spec can say whatever it wants. It cannot make write-through
caching a safe mapping for a device that can have side effects from
reordered, repeated or merged reads and writes. Which it also does not
claim to. The spec says that EFI_MEMORY_UC on arm64 must be Device
nGnRnE.
And the spec says that EFI_MEMORY_WT means Normal Memory Outer
Write-through non-transient Inner Write-through non-transient.
This does not guarantee either that the accesses will be treated as
cacheable or that if it is, the caches will treat them as transient.
> > explicitly ban you from doing something that the architecture you are
> > executing on _does_, then you need to follow the architecture.
> >
> > Which is not to say that the spec couldn't be more helpful in this
> > regard.
> >
> >> We currently assume that every
> >> EfiRuntimeServicesData or EfiReserved region is carved out of
> >> EfiConventionalMemory that has the EFI_MEMORY_WB attribute set, but I
> >> suspect that this is a non-RAM region.
> >
> > Which does not automatically mean it should not be mapped as either
> > uncached or non-WC. Flash that is being read/executed from _should_ be
> > mapped as not only WC, but WB. Only when you are writing to the flash
> > do you need to change the mappings to a non-WC type.
>
> Executing from device memory is not a problem at all, so let's
> disregard that for now.
Of course it's a problem - it's slow.
> As far as mapping ROM is concerned: I think it makes perfect sense to
> specify WT instead of WB in that case, as it will be more helpful in
> spotting inadvertent writes.
If the risk of that access becoming not coherency managed _and_ taking
a substantial performance penalty, then perhaps. Otherwise, no.
> >> Note that the spec defines
> >> EFI_MEMORY_UC memory as MT_DEVICE_nGnRnE on AArch64, so if this region
> >> is only UC then it is a firmware bug. If it has WT/WC set, but not WB,
> >> I think we are dealing with a compliant firmware that is not handled
> >> correctly by the kernel.
> >
> > I agree with you on the purely philosophical level, but it is the WC
> > attribute that can atually cause problems for other things than
> > software. Even WT does not provide any of the memory ordering
> > guarantees that would be required for it to become invisible. (This is
> > also trued for UC, which is why WT can usually be treated as identical
> > to Normal UC.)
>
> I don't follow, especially the 'invisble' bit ..
"Transparent" is probably a more correct word.
The only differenct between WT and WB is that WT guarantees
writeback. It may write back a line at a time, after having performed
a linefill to bring the location into cache.
> >> More specifically, we only distinguish
> >> between EFI_MEMORY_WB and !EFI_MEMORY_WB, where we treat the former as
> >> RAM and the latter as device memory. WT and WC are completely ignored.
> >
> > Ignoring the WT is not a problem. WC should not be completely ignored,
> > i.e. we need to respect its absence and never map as Normal unless it
> > is provided. _But_ WB and WT (at least on ARM) both implicitly mean
> > WC. Setting anything else in the memory map is creating an incorrect
> > memory map. And hence "fixing up" where firmware does so would hide
> > firmware issues.
>
> OK, but that is not at all what I am suggesting. Note that the bits
> mean 'this region /may/ be mapped as xxxx'
> My suspicion is (and @Laura, please confirm) that this region is
> WT|WC|UC simply because WB on a ROM is semantically dubious, and
> restricting to WT makes it easier to spot errors.
WB on a ROM is no more semantically dubious than WT on a ROM.
Both are incorrect if there is ever an intent to write. As is WC.
> > If we are, for example, talking about a flash region flagged as non-WC
> > in the memory map because some AML routine might directly write to it,
> > then it cannot simultaneously be legal for that region to contain data
> > that is expected to require unaligned accesses to read (such as SMBIOS).
>
> Agreed,
>
> >> > What might make sense would be to if(efi_enabled(EFI_CONFIG_TABLES)),
> >> > verify WT/WC are set for the location, and bail out otherwise.
> >> >
> >> > But this would effectively be a pre-emptive firmware bug workaround.
> >>
> >> As I said, I would like to understand better what the nature of the
> >> region in question is.
> >> If it is a EfiRuntimeServicesData or EfiReserved region with WT|WC set
> >> and WB|UC cleared, for instance, then we are doing the wrong thing by
> >> mapping it as device memory.
> >
> > Mmm, maybe. But, if the firmware states that a region that can be
> > accessed as WT but not WB, then at the very least it is doing
> > something very fishy. WT does not really make sense on ARM (it does
> > not support hardware coherency).
>
> This may be an issue in general, but for immutable data I don't see a
> problem here.
The problem is lower efficiency without any underlying hardware
capability effect. Which usually means someone believes there _is_ an
underlying hardware capability effect.
> > It is entirely legal for an ARM processor to treat WT regions as
> > uncached. Again - if the spec provides a distinction that is not
> > available in the architecture on which the software runs, the
> > architecture wins.
> >
> > If it is an EfiReserved region, surely we shouldn't be touching it at
> > all?
>
> We shouldn't, but we don't enforce that.
We probably should enforce that.
/
Leif
More information about the linux-arm-kernel
mailing list