Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2485301imm; Tue, 4 Sep 2018 05:23:48 -0700 (PDT) X-Google-Smtp-Source: ANB0VdaQ2M9lz9VfYIu5w4Dee9ck/w+fr8q64Se9dmTRL4H45tRlgbbvKu/upxB1s6Ln3565AksA X-Received: by 2002:a63:4826:: with SMTP id v38-v6mr31203306pga.379.1536063828108; Tue, 04 Sep 2018 05:23:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536063828; cv=none; d=google.com; s=arc-20160816; b=QKjQdW2lbmdzy4KOS6YSdrWuwJzrqkjZtDCPXoDVhMLqv+VpKKkFP1PSQsXXgQ4kWI Z9EHo1dxnpuvPv5r8Ial2RUsKJkDbabza/SYzaUXfsB+fU04gn+khhZoFGOrZ/HXpl8b THJwdTe5Nb/och4JQrLix3tRCPLoxQZffW7szles7bK2uvFYbVi0Qs+1c5au+5NM7SVA zwpqZpuemHDXObJITXP7vPohMJzR/ky9L1X6bfNoqrZRUXiVD83jYONBO7jyTJLM0wAR 8qmMYB7YaE2RO8CYsRKGJvmbJT5W/8Ejp1upVcwHdP4wDX8yqmK94nZ497MriJMaWaWy jV0A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=A4/e9ej2K/OsdFugtH523SXMNkXjhaZvUEGQ48Qy3ug=; b=EE42tyuEW92UQ7LMQ47mWjbwJoxANrvnNJ7/hqdaQu/8GoaORTPVWnn2w1gwbvV+TA Gm+1Erzv8BWc9YIoo9yh+EgzX656Cfzl0RUlcPCv75QWSR8mb9LofYqBraca4d226tHE KSY+SsMw4ZE6vedPe2iFHNxRtpeqZim9acie499ncK/F5clFjT8b7MVT2E9L+G6vHr87 PdUNOlLjT+SN7D6N3dt/gfg8Tit/+xIa9SoAITjgqm0yePAO38UTw0uowz4YXhL/S4zX ViBLKb76XxUSU/TlkcEfLlMx5A5BrPw5/SY0UaeDXX2mOJQdwt0mRh5izXcCQAPyPEqz X4ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a9-v6si20236200pgf.380.2018.09.04.05.23.30; Tue, 04 Sep 2018 05:23:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727217AbeIDQrK (ORCPT + 99 others); Tue, 4 Sep 2018 12:47:10 -0400 Received: from Galois.linutronix.de ([146.0.238.70]:56932 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727035AbeIDQrK (ORCPT ); Tue, 4 Sep 2018 12:47:10 -0400 Received: from hsi-kbw-5-158-153-52.hsi19.kabel-badenwuerttemberg.de ([5.158.153.52] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1fxALO-0005HI-IV; Tue, 04 Sep 2018 14:22:06 +0200 Date: Tue, 4 Sep 2018 14:22:03 +0200 (CEST) From: Thomas Gleixner To: Bin Yang cc: mingo@kernel.org, hpa@zytor.com, x86@kernel.org, linux-kernel@vger.kernel.org, peterz@infradead.org, dave.hansen@intel.com, mark.gross@intel.com Subject: Re: [PATCH v3 4/5] x86/mm: optimize static_protection() by using overlap() In-Reply-To: <1534814186-37067-5-git-send-email-bin.yang@intel.com> Message-ID: References: <1534814186-37067-1-git-send-email-bin.yang@intel.com> <1534814186-37067-5-git-send-email-bin.yang@intel.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 21 Aug 2018, Bin Yang wrote: > > +static inline bool > +overlap(unsigned long start1, unsigned long end1, > + unsigned long start2, unsigned long end2) > +{ > + /* Is 'start2' within area 1? */ > + if (start1 <= start2 && end1 > start2) > + return true; > + > + /* Is 'start1' within area 2? */ > + if (start2 <= start1 && end2 > start1) > + return true; > + > + return false; > static inline unsigned long highmap_start_pfn(void) > @@ -293,7 +308,7 @@ static void cpa_flush_array(unsigned long *start, int numpages, int cache, > * checks and fixes these known static required protection bits. > */ > static inline pgprot_t static_protections(pgprot_t prot, unsigned long address, > - unsigned long pfn) > + unsigned long len, unsigned long pfn) > { > pgprot_t forbidden = __pgprot(0); > > @@ -302,7 +317,9 @@ static inline pgprot_t static_protections(pgprot_t prot, unsigned long address, > * PCI BIOS based config access (CONFIG_PCI_GOBIOS) support. > */ > #ifdef CONFIG_PCI_BIOS > - if (pcibios_enabled && within(pfn, BIOS_BEGIN >> PAGE_SHIFT, BIOS_END >> PAGE_SHIFT)) > + if (pcibios_enabled && > + overlap(pfn, pfn + PFN_DOWN(len), > + PFN_DOWN(BIOS_BEGIN), PFN_DOWN(BIOS_END))) This is completely unreadable and aside of that it is wrong. You cannot do an overlap check with the following constraints: range1_end = range1_start + size; range2_end = range2_start + size; See the definition of BIOS_END. It's 0x100000, i.e. 1MB, so the following overlap check will give you the false result: overlap(256, 258, 0x000a0000 >> 12, 0x0010000 >> 12) because 0x0010000 >> 12 = 256 ergo will overlap return true. All of your overlap checks are broken. Oh well. Thanks, tglx