Received: by 10.213.65.68 with SMTP id h4csp225498imn; Fri, 16 Mar 2018 00:41:53 -0700 (PDT) X-Google-Smtp-Source: AG47ELtrQ/lgLKew4NwWpwLGrMggINqwRpB/DrqnZF00pZKivPcSU+BNsIvDUncWWMGVlYNPt9vg X-Received: by 2002:a17:902:51ee:: with SMTP id y101-v6mr1009949plh.359.1521186113934; Fri, 16 Mar 2018 00:41:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521186113; cv=none; d=google.com; s=arc-20160816; b=flc5lcINT1+6zWWe7xcK2nB0x8X5J6WoIK4XS43YkT7oCOXr/IaSiaakcfcCmMfzMh AB4lktHJsHeBtg9YYib4RFwt2MEz59aSvpGYk236Tv1IOO19Po50b4n/gVuNa+Sf5643 RjRArAdDo/Qd9/OokODdSPm5WKf5bUrICSw7TPyXqD8PYy+saWYARrqIv9XNpwmrGY32 ox6YEFglit3XsC4H1W44wm5R3I8v+HFX4VWzjDI1UedAcppoGYnOPvgcgXHhOzV1bPza XWb8CuKPnwIc+ZiKmnlBSDX4cinJDOVdHEwls62EPCKIwLYDtdTDiH9hM5Tfx7XS7vQI Ai6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dmarc-filter :dkim-signature:dkim-signature:arc-authentication-results; bh=m6GeFnXC/z0m0O9/Mx1uc12/pfGEiSkjVMAzS0bVgEU=; b=TyavbphQ8dp+IMuk8vjQ2Le71KzNeYPZ10XP5eBaf48BvaK/obW9tdJda621L1+Y3V VjT4Eu7c1a7MxwchJvlj0utph3REeDlH8gKxtuewq0SeHq0eoU89qLIjU+gbGJJTeAWJ WKatTm/0p7AtZtcRY+hNiN3EAWm1t9adSAfLfIBTwm1hD/KvvwdKLN97PWLos4m6NlU4 Tp8u+uUrdvR6LSPIXNrzZv8nh4WchZO1/fR4S/HtTqUkrcpv6+wbA8HHQPNsTNmd71cM cdr9MpvMmSjKgCWLZEsBA9P4MVyNBSKDm8U/gi8VDS+trmV3AQ6ZnTWJAdZ8C5POslIv g2Bw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=HdIq/fxk; dkim=pass header.i=@codeaurora.org header.s=default header.b=MaRRSaxW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c24-v6si5634104plo.273.2018.03.16.00.41.40; Fri, 16 Mar 2018 00:41:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=HdIq/fxk; dkim=pass header.i=@codeaurora.org header.s=default header.b=MaRRSaxW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753348AbeCPHkY (ORCPT + 99 others); Fri, 16 Mar 2018 03:40:24 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:43598 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753125AbeCPHkX (ORCPT ); Fri, 16 Mar 2018 03:40:23 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id DF64460C54; Fri, 16 Mar 2018 07:40:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1521186022; bh=GIhcoJk4edGnKVR9WsaIHH01/JnVQ5aqjNUjz//7mXM=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=HdIq/fxk6p3oRuXHouyuJiO4vmzh/6dCxiY8w3QBGFCFZi8kJU9MAByg6soVV27Vc bBbbO9O3MGRlHTJ7Bw8SIs3TDQubsFyGNQSyfO3esGL1RM7UuYe73Ec16Yve0HlvGk lf2a2pYD0CpGLHJsyCe1XlieANzjs1AQNZKxwRUo= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from [10.204.79.109] (blr-c-bdr-fw-01_globalnat_allzones-outside.qualcomm.com [103.229.19.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: cpandya@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id A620B602FC; Fri, 16 Mar 2018 07:40:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1521186021; bh=GIhcoJk4edGnKVR9WsaIHH01/JnVQ5aqjNUjz//7mXM=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=MaRRSaxWOANmmBzeVSi6IB6FK1Pk7CGJey+4qsru0CHNTvqDHvbUqHk95fuMx+NUF bcjr0K24bgLD5d+HVf9ob77zy3CFszd9oCi029r2/oD0X4trMCd8IZ1axeKzeVq2tA ZsI+yag/ohxc9L5F8p3Salxp6RxTokZmgGHnDiV4= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org A620B602FC Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=cpandya@codeaurora.org Subject: Re: [PATCH v2 2/4] ioremap: Implement TLB_INV before huge mapping To: "Kani, Toshi" , "catalin.marinas@arm.com" , "will.deacon@arm.com" , "arnd@arndb.de" Cc: "linux-kernel@vger.kernel.org" , "ard.biesheuvel@linaro.org" , "tglx@linutronix.de" , "takahiro.akashi@linaro.org" , "james.morse@arm.com" , "kristina.martsenko@arm.com" , "mark.rutland@arm.com" , "akpm@linux-foundation.org" , "gregkh@linuxfoundation.org" , "linux-arm-kernel@lists.infradead.org" , "marc.zyngier@arm.com" , "linux-arch@vger.kernel.org" References: <1521117906-20107-1-git-send-email-cpandya@codeaurora.org> <1521117906-20107-3-git-send-email-cpandya@codeaurora.org> <1521130368.2693.177.camel@hpe.com> From: Chintan Pandya Message-ID: <0cec2b79-1668-68d1-32db-531f5a8a9db2@codeaurora.org> Date: Fri, 16 Mar 2018 13:10:15 +0530 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <1521130368.2693.177.camel@hpe.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 3/15/2018 9:42 PM, Kani, Toshi wrote: > On Thu, 2018-03-15 at 18:15 +0530, Chintan Pandya wrote: >> Huge mapping changes PMD/PUD which could have >> valid previous entries. This requires proper >> TLB maintanance on some architectures, like >> ARM64. >> >> Implent BBM (break-before-make) safe TLB >> invalidation. >> >> Here, I've used flush_tlb_pgtable() instead >> of flush_kernel_range() because invalidating >> intermediate page_table entries could have >> been optimized for specific arch. That's the >> case with ARM64 at least. >> >> Signed-off-by: Chintan Pandya >> --- >> lib/ioremap.c | 25 +++++++++++++++++++------ >> 1 file changed, 19 insertions(+), 6 deletions(-) >> >> diff --git a/lib/ioremap.c b/lib/ioremap.c >> index 54e5bba..55f8648 100644 >> --- a/lib/ioremap.c >> +++ b/lib/ioremap.c >> @@ -13,6 +13,7 @@ >> #include >> #include >> #include >> +#include >> >> #ifdef CONFIG_HAVE_ARCH_HUGE_VMAP >> static int __read_mostly ioremap_p4d_capable; >> @@ -80,6 +81,7 @@ static inline int ioremap_pmd_range(pud_t *pud, unsigned long addr, >> unsigned long end, phys_addr_t phys_addr, pgprot_t prot) >> { >> pmd_t *pmd; >> + pmd_t old_pmd; >> unsigned long next; >> >> phys_addr -= addr; >> @@ -91,10 +93,15 @@ static inline int ioremap_pmd_range(pud_t *pud, unsigned long addr, >> >> if (ioremap_pmd_enabled() && >> ((next - addr) == PMD_SIZE) && >> - IS_ALIGNED(phys_addr + addr, PMD_SIZE) && >> - pmd_free_pte_page(pmd)) { >> - if (pmd_set_huge(pmd, phys_addr + addr, prot)) >> + IS_ALIGNED(phys_addr + addr, PMD_SIZE)) { >> + old_pmd = *pmd; >> + pmd_clear(pmd); > > pmd_clear() is one of the operations pmd_free_pte_page() needs to do. > See the x86 version. > >> + flush_tlb_pgtable(&init_mm, addr); > > You can call it in pmd_free_pte_page() on arm64 as well. > >> + if (pmd_set_huge(pmd, phys_addr + addr, prot)) { >> + pmd_free_pte_page(&old_pmd); >> continue; >> + } else >> + set_pmd(pmd, old_pmd); > > I do not understand why you needed to make this change. > pmd_free_pte_page() is defined as an arch-specific function so that you > can additionally perform TLB purges on arm64. Please try to make proper > arm64 implementation of this interface. And if you find any issue in > this interface, please let me know. TLB ops require VA at least. And this interface passes just the PMD/PUD. Second is, if we clear the previous table entry inside the arch specific code and then we fail in pmd/pud_set_huge, we can't fallback (x86 case). So, we can do something like this (following Mark's suggestion), if (ioremap_pmd_enabled() && ((next - addr) == PMD_SIZE) && IS_ALIGNED(phys_addr + addr, PMD_SIZE) && pmd_can_set_huge(pmd, phys_addr + addr, prot)) { /* * Clear existing table entry, * Invalidate, * Free the page table * inside this code */ pmd_free_pte_page(pmd, addr, addr + PMD_SIZE); pmd_set_huge(...) //without fail continue; } > > Same for pud. > > Thanks, > -Toshi > Chintan -- Qualcomm India Private Limited, on behalf of Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum, a Linux Foundation Collaborative Project