Re: [kvm-unit-tests PATCH v3 00/27] EFI and ACPI support for arm64

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 12/08/2022 15:55, Alexandru Elisei wrote:
Hi,

On Tue, Aug 09, 2022 at 05:09:42PM +0100, Nikos Nikoleris wrote:
Hi,

On 09/08/2022 12:16, Alexandru Elisei wrote:
Hi,

Adding Sean and Zixuan, as they were involved in the initial x86 UEFI
support.

This version of the UEFI support for arm64 jumps to lib/efi.c::efi_main
after performing the relocation. I'll post an abbreviated/simplified
version of efi_main() for reference:

efi_status_t efi_main(efi_handle_t handle, efi_system_table_t *sys_tab)
{
	/* Get image, cmdline and memory map parameters from UEFI */

          efi_exit_boot_services(handle, &efi_bootinfo.mem_map);

          /* Set up arch-specific resources */
          setup_efi(&efi_bootinfo);

          /* Run the test case */
          ret = main(__argc, __argv, __environ);

          /* Shutdown the guest VM */
          efi_exit(ret);

          /* Unreachable */
          return EFI_UNSUPPORTED;
}

Note that the assumption that efi_main() makes is that setup_efi() doesn't
change the stack from the stack that the UEFI implementation allocated, in
order for setup_efi() to be able to return to efi_main().

arm64 requires explicit data cache maintenance to keep the contents of the
caches in sync with memory when writing with MMU off/reading with MMU on
and viceversa. More details of what is needed is why here [1] and here [2].
These operations must also be performed for the stack because the stack is
always used when running C code.

What this means is that if arm64 wants to be able to run C code when the
MMU is disabled and when it is enabled, then it must perform data cache
operations for the stack memory. Which is impossible if the stack has been
allocated by UEFI, as kvm-unit-tests has no way of knowing its size, as it
isn't specified in the UEFI spec*. As a result, either efi_main needs to be
changed such that setup_efi() never returns, or arm64 must implement its
own version of efi_main() (or however it will end up being called).


I think it's possible to know the size of the stack. In 22/27 "arm64: Use
code from the gnu-efi when booting with EFI", we change the top of the stack
we start executing C code. Then at any point we can get the bottom of the
stack.

For reference, I believe this is the code you are referring to (removed
some parts because they were irrelevant):

diff --git a/arm/efi/crt0-efi-aarch64.S b/arm/efi/crt0-efi-aarch64.S
index d50e78dd1faa..03d29b01cb38 100644
--- a/arm/efi/crt0-efi-aarch64.S
+++ b/arm/efi/crt0-efi-aarch64.S
@@ -111,10 +111,19 @@ section_table:

	[..]
+       /* Align sp; this is necessary due to way we store cpu0's thread_info */
         mov             x29, sp
+       and             x29, x29, #THREAD_MASK
+       mov             x30, sp
+       mov             sp, x29


It looks to me like the code doesn't do anything to detect the size and
top/bottom of the stack. What it looks me, is that the code conveniently
assumes that 1. the stack is bigger than THREAD_SIZE = THREAD_MASK + 1
(which is 16K) and 2. the stack is aligned to THREAD_SIZE. As
under-specified the stack size is, I couldn't find any mention of the stack
alignment in the spec.


The code assumes that the stack is big enough. You've pointed to manuals that support this. It doesn't assume that stack pointer is aligned, it aligns the stack pointed as per kvm-unit-tests arm64 requirements.

For the purposes of cleaning the stack, the value of sp computed by this code is top of the stack. The bottom of the used stack is the value of sp when we call asm_mmu_disable.

But it's more than about knowing the size and address of the stack. It's
about reproducibility and having as much control as possible over the
environment. Today, if the stack overflows/underflows you can detect that
by comparing the stack pointer with edata/stacktop. What happens if that
happens to the UEFI stack?  Who knows.


Can you point me to the code where we check for stack overflow/underflows? I couldn't find it.

Also, I think we can agree that it is not inconceivable that there can be a
bug with how firmware manages the stack for an app. How can that be
reproduced if the bug manifests itself only on a very particular
combination of hardware and firmware? How can that be debugged? And how can
that be fixed? Fixing it in firmware might be impossible, same as expecting
people to upgrade their firmware, which might not be possible for their
particular setups. Wouldn't it be much simpler to modify kvm-unit-tests to
use its own stack?

If we start assuming that edk2/kvm/qemu/kvmtool might be buggy in all sort of ways then it will be hard to reason about many more things.

But I am not opposed to the idea of defining our own stack. In the next revision, I will switch to a custom stack.


That's why I think that arm64 doing what x86 did and replace the UEFI stack
is a good idea.


But I doubt cleaning the stack is sufficient. What about the .data segment.
Take for example, mem_regions. We populate them with the MMU on. We then use
them to create page tables. We will need to clean them too. I won't be
surprised if there is more data we would need to clean.

I agree completely! The setup code should definitely to do dcache
maintenance.

If the UEFI setup code does dcache maintenance, I believe it would look
very strange if the normal setup code (as a kernel inside a VM) doesn't do
any by relying instead on the cache maintenance that KVM does. That's why I
think the best way forward would be to share as much of the setup code as
possible between the two.

Something like this (this is just an example off the top of my head):

- setup_efi() does whatever it's needed before disabling the MMU.
- it branches to the assembly routine that the disables the MMU and
   whatever else it needs to do (maybe exceptions_init like start does).
- it calls the C function lib/arm/setup.c::setup(), which can skip some
   steps under UEFI (like the mem_regions setup).
- setup_efi() then returns to efi_main().


Yes that a good idea, I will try to merge the two setup() functions.

Thanks,

Nikos

That way the UEFI code can reuse most of the dcache maintenance that is
proposed in this series [1], and reuse most of the existing boot code. What
do you think?

[1] https://lore.kernel.org/kvmarm/20220809091558.14379-1-alexandru.elisei@xxxxxxx/

Thanks,
Alex


Thanks,

Nikos

One way to get around this is never to run C code with the MMU off. That's
relatively easy to do in the boot code, as the translation tables can be
constructed with the MMU on, and then a fairly small assembly sequence is
required to install them.

But arm64 also has two mechanisms for disabling the MMU:

1. At compile time, the user can request a test to start with the MMU off,
by setting the flag AUXINFO_MMU_OFF. So when booting as an UEFI app,
kvm-unit-tests must disable the MMU.

2. A function called mmu_disable() which allows a test to explicitly
disable the MMU.

If we want to keep the UEFI allocated stack, then both mechanism must be
forbidden when running under UEFI. I dislike this idea, because those two
mechanisms allow kvm-unit-tests to run tests which otherwise wouldn't have
been possible with a normal operating system, which, except for the early
boot code, runs with the MMU enabled.

Any thoughts or comments about this?

*UEFI v2.8 states about the stack: "128 KiB or more of available stack
space" (page 35), but EDK2 allocates 64KiB [3]. So without any firmware
call to query the size of the stack, kvm-unit-tests cannot rely on it being
a specific size.

[1] https://lore.kernel.org/kvm/20220809091558.14379-19-alexandru.elisei@xxxxxxx/
[2] https://lore.kernel.org/kvm/20220809091558.14379-20-alexandru.elisei@xxxxxxx/
[3] https://github.com/tianocore/edk2/blob/master/ArmPlatformPkg/ArmPlatformPkg.dec#L71

Thanks,
Alex

On Thu, Jun 30, 2022 at 11:02:57AM +0100, Nikos Nikoleris wrote:
Hello,

This patch series adds initial support for building arm64 tests as EFI
tests and running them under QEMU. Much like x86_64 we import external
dependencies from gnu-efi and adapt them to work with types and other
assumptions from kvm-unit-tests. In addition, this series adds support
for enumerating parts of the system using ACPI.

The first set of patches moves the existing ACPI code to the common
lib path. Then, it extends definitions and functions to allow for more
robust discovery of ACPI tables. In arm64, we add support for setting
up the PSCI conduit, discovering the UART, timers and cpus via
ACPI. The code retains existing behavior and gives priority to
discovery through DT when one has been provided.

In the second set of patches, we add support for getting the command
line from the EFI shell. This is a requirement for many of the
existing arm64 tests.

In the third set of patches, we import code from gnu-efi, make minor
changes and add an alternative setup sequence from arm64 systems that
boot through EFI. Finally, we add support in the build system and a
run script which is used to run an EFI app.

After this set of patches one can build arm64 EFI tests:

$> ./configure --enable-efi
$> make

And use the run script to run an EFI tests:

$> ./arm/efi/run ./arm/selftest.efi -smp 2 -m 256 -append "setup smp=2 mem=256"

Or all tests:

$> ./run_tests.sh

There are a few items that this series does not address but they would
be useful to have:
   - Support for booting the system from EL2. Currently, we assume that a
     tests starts running at EL1. This the case when we run with EFI, it's
     not always the case in hardware.
   - Support for reading environment variables and populating __envp.
   - Support for discovering the PCI subsystem using ACPI.
   - Get rid of other assumptions (e.g., vmalloc area) that don't hold on real HW.

git branch: https://github.com/relokin/kvm-unit-tests/pull/new/target-efi-upstream-v3-rebased

v2: https://lore.kernel.org/kvm/20220506205605.359830-1-nikos.nikoleris@xxxxxxx/

Changes in v3:
   - Addressed feedback from Drew, Alex and Ricardo. Many thanks for the reviews!
   - Added support for discovering the GIC through ACPI
   - Added a missing header file (<elf.h>)
   - Added support for correctly parsing the outcome of tests (./run_tests)

Thanks,

Nikos

Alexandru Elisei (1):
    lib: arm: Print test exit status

Andrew Jones (3):
    arm/arm64: mmu_disable: Clean and invalidate before disabling
    arm/arm64: Rename etext to _etext
    arm64: Add a new type of memory type flag MR_F_RESERVED

Nikos Nikoleris (23):
    lib: Fix style for acpi.{c,h}
    x86: Avoid references to fields of ACPI tables
    lib: Ensure all struct definition for ACPI tables are packed
    lib: Add support for the XSDT ACPI table
    lib: Extend the definition of the ACPI table FADT
    devicetree: Check if fdt is NULL before returning that a DT is
      available
    arm/arm64: Add support for setting up the PSCI conduit through ACPI
    arm/arm64: Add support for discovering the UART through ACPI
    arm/arm64: Add support for timer initialization through ACPI
    arm/arm64: Add support for cpu initialization through ACPI
    arm/arm64: Add support for gic initialization through ACPI
    lib/printf: Support for precision modifier in printf
    lib/printf: Add support for printing wide strings
    lib/efi: Add support for getting the cmdline
    lib: Avoid ms_abi for calls related to EFI on arm64
    arm/arm64: Add a setup sequence for systems that boot through EFI
    arm64: Copy code from GNU-EFI
    arm64: Change GNU-EFI imported file to use defined types
    arm64: Use code from the gnu-efi when booting with EFI
    lib: Avoid external dependency in libelf
    x86: Move x86_64-specific EFI CFLAGS to x86_64 Makefile
    arm64: Add support for efi in Makefile
    arm64: Add an efi/run script

   scripts/runtime.bash        |  14 +-
   arm/efi/run                 |  61 +++++++
   arm/run                     |  14 +-
   configure                   |  15 +-
   Makefile                    |   4 -
   arm/Makefile.arm            |   6 +
   arm/Makefile.arm64          |  18 +-
   arm/Makefile.common         |  48 +++--
   x86/Makefile.x86_64         |   4 +
   lib/linux/efi.h             |  25 +++
   lib/arm/asm/setup.h         |   3 +
   lib/arm/asm/timer.h         |   2 +
   lib/acpi.h                  | 348 ++++++++++++++++++++++++++++--------
   lib/argv.h                  |   1 +
   lib/elf.h                   |  57 ++++++
   lib/libcflat.h              |   1 +
   lib/acpi.c                  | 129 ++++++++-----
   lib/argv.c                  |   2 +-
   lib/arm/gic.c               | 127 ++++++++++++-
   lib/arm/io.c                |  29 ++-
   lib/arm/mmu.c               |   4 +
   lib/arm/psci.c              |  25 ++-
   lib/arm/setup.c             | 247 ++++++++++++++++++++-----
   lib/arm/timer.c             |  79 ++++++++
   lib/devicetree.c            |   2 +-
   lib/efi.c                   | 102 +++++++++++
   lib/printf.c                | 194 ++++++++++++++++++--
   arm/efi/elf_aarch64_efi.lds |  63 +++++++
   arm/flat.lds                |   2 +-
   arm/cstart.S                |  29 ++-
   arm/cstart64.S              |  28 ++-
   arm/efi/crt0-efi-aarch64.S  | 143 +++++++++++++++
   arm/dummy.c                 |   4 +
   arm/efi/reloc_aarch64.c     |  93 ++++++++++
   arm/micro-bench.c           |   4 +-
   arm/timer.c                 |  10 +-
   x86/s3.c                    |  19 +-
   x86/vmexit.c                |   2 +-
   38 files changed, 1700 insertions(+), 258 deletions(-)
   create mode 100755 arm/efi/run
   create mode 100644 lib/elf.h
   create mode 100644 lib/arm/timer.c
   create mode 100644 arm/efi/elf_aarch64_efi.lds
   create mode 100644 arm/efi/crt0-efi-aarch64.S
   create mode 100644 arm/dummy.c
   create mode 100644 arm/efi/reloc_aarch64.c

--
2.25.1




[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux