Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S964996AbbGVMJe (ORCPT ); Wed, 22 Jul 2015 08:09:34 -0400 Received: from mail-wi0-f181.google.com ([209.85.212.181]:38889 "EHLO mail-wi0-f181.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934126AbbGVMJc (ORCPT ); Wed, 22 Jul 2015 08:09:32 -0400 Date: Wed, 22 Jul 2015 13:09:26 +0100 From: Matt Fleming To: "Jonathan (Zhixiong) Zhang" Cc: Matt Fleming , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , x86@kernel.org, ying.huang@intel.com, fu.wei@linaro.org, al.stone@linaro.org, bp@alien8.de, rjw@rjwysocki.net, lenb@kernel.org, catalin.marinas@arm.com, will.deacon@arm.com, linux-efi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-acpi@vger.kernel.org, linaro-acpi@lists.linaro.org Subject: Re: [PATCH V6 2/4] x86: acpi: implement arch_apei_get_mem_attributes() Message-ID: <20150722120926.GD2734@codeblueprint.co.uk> References: <1437438759-3686-1-git-send-email-zjzhang@codeaurora.org> <1437438759-3686-3-git-send-email-zjzhang@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1437438759-3686-3-git-send-email-zjzhang@codeaurora.org> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3156 Lines: 91 On Mon, 20 Jul, at 05:32:37PM, Jonathan (Zhixiong) Zhang wrote: > From: "Jonathan (Zhixiong) Zhang" > > ... to allow arch specific implementation of getting page > protection type associated with a physical address. > > If the physical address has memory attributes defined by EFI > memmap as EFI_MEMORY_UC, the page protection type is > PAGE_KENERL_NOCACHE. Otherwise, the page protection type is > PAGE_KERNEL. > > Signed-off-by: Jonathan (Zhixiong) Zhang > --- > arch/x86/kernel/acpi/apei.c | 10 ++++++++++ > include/acpi/apei.h | 1 + > 2 files changed, 11 insertions(+) > > diff --git a/arch/x86/kernel/acpi/apei.c b/arch/x86/kernel/acpi/apei.c > index c280df6b2aa2..9c6b3c8d81e4 100644 > --- a/arch/x86/kernel/acpi/apei.c > +++ b/arch/x86/kernel/acpi/apei.c > @@ -14,6 +14,8 @@ > > #include > > +#include > + > #include > #include > > @@ -60,3 +62,11 @@ void arch_apei_flush_tlb_one(unsigned long addr) > { > __flush_tlb_one(addr); > } > + > +pgprot_t arch_apei_get_mem_attribute(phys_addr_t addr) > +{ > + if (efi_mem_attributes(addr) & EFI_MEMORY_UC) > + return PAGE_KERNEL_NOCACHE; > + > + return PAGE_KERNEL; > +} Like I mentioned before, this is theoretically racey because depending on when you call arch_apei_get_mem_attribute() during boot, you'll potentially return a different protection for the *same* memory region. This is because on x86 we discard the EFI memory map in efi_free_boot_services(), after which time efi_mem_attributes() will always return 0. Now, hitting that race would depend on a number of things but most importantly it would require the region of RAM containing the Hardware Error data to have EFI_MEMORY_UC set in the EFI memmap. For x86 I think it's fair to say that's extremely unlikely given our cache coherency architecture. Also, as Will noted for arm64, this really wants to be static inline. I'm still hoping the x86/ACPI folks will chime in on this patch. For x86 we don't need to perform this lookup today for GHES so I would just always return PAGE_KERNEL but include a comment explaining that doing anything else is unneeded. Something like this? --- static inline pgprot_t arch_apei_get_mem_attribute(phys_addr_t addr) { /* * We currently have no way to lookup the EFI memory map * attributes for a region in a consistent way because the memap * is discarded after efi_free_boot_services(). So if you call * efi_mem_attributes() during boot and at runtime you could * theoretically see different attributes. * * Since we've yet to see any x86 platforms that require * anything other than PAGE_KERNEL (some arm64 platforms require * the equivalent of PAGE_KERNEL_NOCACHE), return that until we * know different. */ return PAGE_KERNEL; } -- Matt Fleming, Intel Open Source Technology Center -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/