Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759578AbcCDJon (ORCPT ); Fri, 4 Mar 2016 04:44:43 -0500 Received: from mail-wm0-f67.google.com ([74.125.82.67]:36719 "EHLO mail-wm0-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758913AbcCDJof (ORCPT ); Fri, 4 Mar 2016 04:44:35 -0500 Date: Fri, 4 Mar 2016 10:44:24 +0100 From: Ingo Molnar To: "Luis R. Rodriguez" Cc: Toshi Kani , Paul McKenney , Dave Airlie , Benjamin Herrenschmidt , "linux-kernel@vger.kernel.org" , linux-arch@vger.kernel.org, X86 ML , Daniel Vetter , Thomas Gleixner , "H. Peter Anvin" , Peter Zijlstra , Borislav Petkov , Linus Torvalds , Andrew Morton , Andy Lutomirski , Brian Gerst Subject: Re: Overlapping ioremap() calls, set_memory_*() semantics Message-ID: <20160304094424.GA16228@gmail.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2646 Lines: 54 * Luis R. Rodriguez wrote: > At kernel summit, during the semantics of ioremap() session, Paul > mentioned we'd write something up to help get some notes out on what > we need to do and help clarify things. I've run into an issue (just a > warning) with a user on some odd system that I suspect may be the > result of a driver using overlapping ioremap() calls on conflicting > memory regions, so I'm a bit interested to see a resolution to some of > these lingering discussions now. > > Although we spoke of quite a bit of things, I raised in particular the > 'semantics of overlapping ioremap()' calls as one item of interest we > should address across architectures. At least on x86 it seems we would > not get an error if this is done and in fact its expected behavior; > Toshi had determined we could not enable error'ing out on overlapping > ioremap() calls given we have a few users that use it intentionally, > for instance the /dev/mem setup code. I had suggested long ago then > that one possible resolution was for us to add an API that *enables* > overlapping ioremap() calls, and only use it on select locations in > the kernel. This means we only have to convert a few users to that > call to white list such semantics, and by default we'd disable > overlapping calls. To kick things off -- is this strategy agreeable > for all other architectures? So I'd say that since ioremap() in itself is fragile enough, we should work towards eliminating overlapping ranges. The thing is, the whole vmap_area logic is based around non-overlapping ranges, sorted into the vmap_area_root rbtree. Just check the logic in mm/vmalloc.c::alloc_vmap_area(): it's based on finding holes in the kernel-virtual allocations. 'Overlapping ranges' is very much not part of that logic, at least to my understanding. How are overlapping ioremap()s even possible with that logic? The allocator searches for holes, not allowing for overlaps. What am I missing? Could you outline a specific case where it's done intentionally - and the purpose behind that intention? > The problem is that without this it remains up to the developer of the driver to > avoid overlapping calls, and a user may just get sporadic errors if this > happens. As another problem case, set_memor_*() will not fail on MMIO even > though set_memor_*() is designed only for RAM. If the above strategy on avoiding > overlapping is agreeable, could the next step, or an orthogonal step be to error > out on set_memory_*() on IO memory? So how do drivers set up WC or WB MMIO areas? Does none of our upstream video drivers do that? Thanks, Ingo