[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v6 08/13] xen/arm: Fold mmu_init_secondary_cpu() to head.S
- To: Henry Wang <Henry.Wang@xxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
- From: Ayan Kumar Halder <ayankuma@xxxxxxx>
- Date: Thu, 31 Aug 2023 10:12:52 +0100
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=amd.com; dmarc=pass action=none header.from=amd.com; dkim=pass header.d=amd.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2N+JXxX6EishSCtigrSRjMizHPdnv/3iqPVGZS2X2vk=; b=FljWy1qxd7C3rXZ7kt5CCt9DFnLvNZTQ72z39CKX+ra/F5xgRjOZq3vREBLV14ZdOXvPcH3lWYPkZ3JS6rw21aoBBnlhJp+/a1I/MOAqtzN8sMJ27U7mYjHUTVcWcxZjGevBshSt7683zMWK42/C2b/iBTdGvvsd5A0MMuLvpIpYDUp2cbsgN6EciSiSqgnO87VROz5OTXP6d6gDqxHL63CLIBDuYYmeZ3r//HExnOEgv7PhKa5sTMaO2kbTKu7hUeqt955BDTbPyAA2UPAbVYedvE9hnfuxFCDKbuasDae9uJNGeRq/fBdTENtIvA5Ai/4aTwFkLouhaek5Ft119Q==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SbzoJ+Fh52MATtsbSDRWw+WGcnOivGi7EU4h8u7ACw5txCiTzVdFLVsZ89at1RMPjFFpaZ0uTUrt0gAc+R9VDrxnmnYu7clWPJEdlkXme65Im6PT5WXqzjkVGJPv9i9lWWLL95tpGSePsHlhM/FTXvi2/cFwdh7tA+AzEHzwzbb6qcsakGbo2uhwvoRs6Ax/emRM4BeuNP1B+Hzi17do/wYbLRErdRkY/9qYANMh/WV/IGCEoQ2h0YfMHgkvabOVW0e3613+bDpiiajIU+P2SDpbKbx9bi5gsPBSP+Ala3ZhjYjzlQQAuroG1S1XBk7QU26TXZ1Vl1T2jcR7oe6MyA==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=amd.com;
- Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Wei Chen <wei.chen@xxxxxxx>, Penny Zheng <penny.zheng@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
- Delivery-date: Thu, 31 Aug 2023 09:13:15 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
Hi Henry,
On 28/08/2023 02:32, Henry Wang wrote:
CAUTION: This message has originated from an External Source. Please use proper
judgment and caution when opening attachments, clicking links, or responding to
this email.
Currently mmu_init_secondary_cpu() only enforces the page table
should not contain mapping that are both Writable and eXecutables
after boot. To ease the arch/arm/mm.c split work, fold this function
to head.S.
Introduce assembly macro pt_enforce_wxn for both arm32 and arm64.
For arm64, the macro is called at the end of enable_secondary_cpu_mm().
For arm32, the macro is called before secondary CPUs jumping into
the C world.
Signed-off-by: Henry Wang <Henry.Wang@xxxxxxx>
---
v6:
- New patch.
---
xen/arch/arm/arm32/head.S | 20 ++++++++++++++++++++
xen/arch/arm/arm64/mmu/head.S | 21 +++++++++++++++++++++
xen/arch/arm/include/asm/mm.h | 2 --
xen/arch/arm/mm.c | 6 ------
xen/arch/arm/smpboot.c | 2 --
5 files changed, 41 insertions(+), 10 deletions(-)
diff --git a/xen/arch/arm/arm32/head.S b/xen/arch/arm/arm32/head.S
index 33b038e7e0..39218cf15f 100644
--- a/xen/arch/arm/arm32/head.S
+++ b/xen/arch/arm/arm32/head.S
@@ -83,6 +83,25 @@
isb
.endm
+/*
+ * Enforce Xen page-tables do not contain mapping that are both
+ * Writable and eXecutables.
+ *
+ * This should be called on each secondary CPU.
+ */
+.macro pt_enforce_wxn tmp
+ mrc CP32(\tmp, HSCTLR)
+ orr \tmp, \tmp, #SCTLR_Axx_ELx_WXN
+ dsb
+ mcr CP32(\tmp, HSCTLR)
+ /*
+ * The TLBs may cache SCTLR_EL2.WXN. So ensure it is synchronized
+ * before flushing the TLBs.
+ */
+ isb
+ flush_xen_tlb_local \tmp
+.endm
+
/*
* Common register usage in this file:
* r0 -
@@ -254,6 +273,7 @@ secondary_switched:
/* Use a virtual address to access the UART. */
mov_w r11, EARLY_UART_VIRTUAL_ADDRESS
#endif
+ pt_enforce_wxn
Can you move ^^^ to before "#ifdef CONFIG_EARLY_PRINTK" so that the MMU
related functionality are bundled together?
Also AFAIU, mov_w has not effect on pt_enforce_wxn().
So that I can create a function "enable_secondary_cpu_mm()" - similar to
one you introduced for arm64
/* This will contain all the MMU related function for secondary cpu */
enable_secondary_cpu_mm:
bl create_page_tables
mov_w lr, secondary_switched
....
flush_xen_tlb_local r0
pt_enforce_wxn r0
ENDPROC(enable_secondary_cpu_mm)
- Ayan
PRINT("- Ready -\r\n")
/* Jump to C world */
mov_w r2, start_secondary
diff --git a/xen/arch/arm/arm64/mmu/head.S b/xen/arch/arm/arm64/mmu/head.S
index a5271e3880..25028bdf07 100644
--- a/xen/arch/arm/arm64/mmu/head.S
+++ b/xen/arch/arm/arm64/mmu/head.S
@@ -31,6 +31,25 @@
isb
.endm
+/*
+ * Enforce Xen page-tables do not contain mapping that are both
+ * Writable and eXecutables.
+ *
+ * This should be called on each secondary CPU.
+ */
+.macro pt_enforce_wxn tmp
+ mrs \tmp, SCTLR_EL2
+ orr \tmp, \tmp, #SCTLR_Axx_ELx_WXN
+ dsb sy
+ msr SCTLR_EL2, \tmp
+ /*
+ * The TLBs may cache SCTLR_EL2.WXN. So ensure it is synchronized
+ * before flushing the TLBs.
+ */
+ isb
+ flush_xen_tlb_local
+.endm
+
/*
* Macro to find the slot number at a given page-table level
*
@@ -308,6 +327,8 @@ ENTRY(enable_secondary_cpu_mm)
bl enable_mmu
mov lr, x5
+ pt_enforce_wxn x0
+
/* Return to the virtual address requested by the caller. */
ret
ENDPROC(enable_secondary_cpu_mm)
diff --git a/xen/arch/arm/include/asm/mm.h b/xen/arch/arm/include/asm/mm.h
index bf2fe26f9e..a66aa219b1 100644
--- a/xen/arch/arm/include/asm/mm.h
+++ b/xen/arch/arm/include/asm/mm.h
@@ -216,8 +216,6 @@ extern void remove_early_mappings(void);
/* Allocate and initialise pagetables for a secondary CPU. Sets init_ttbr to
the
* new page table */
extern int init_secondary_pagetables(int cpu);
-/* Switch secondary CPUS to its own pagetables and finalise MMU setup */
-extern void mmu_init_secondary_cpu(void);
/*
* For Arm32, set up the direct-mapped xenheap: up to 1GB of contiguous,
* always-mapped memory. Base must be 32MB aligned and size a multiple of
32MB.
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index f3ef0da0e3..3ee74542ba 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -322,12 +322,6 @@ void __init setup_pagetables(unsigned long
boot_phys_offset)
#endif
}
-/* MMU setup for secondary CPUS (which already have paging enabled) */
-void mmu_init_secondary_cpu(void)
-{
- xen_pt_enforce_wnx();
-}
-
#ifdef CONFIG_ARM_32
/*
* Set up the direct-mapped xenheap:
diff --git a/xen/arch/arm/smpboot.c b/xen/arch/arm/smpboot.c
index e107b86b7b..ade2c77cf9 100644
--- a/xen/arch/arm/smpboot.c
+++ b/xen/arch/arm/smpboot.c
@@ -359,8 +359,6 @@ void start_secondary(void)
*/
update_system_features(¤t_cpu_data);
- mmu_init_secondary_cpu();
-
gic_init_secondary_cpu();
set_current(idle_vcpu[cpuid]);
--
2.25.1
|