Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp818137pxu; Wed, 2 Dec 2020 04:21:35 -0800 (PST) X-Google-Smtp-Source: ABdhPJztnour983Ajy6Uyf9VJW/smeC6X6XDWQDzRGESXK0MtOqDldxef2dDJC18rFCEu61qejIK X-Received: by 2002:a17:906:7d98:: with SMTP id v24mr2113263ejo.129.1606911694843; Wed, 02 Dec 2020 04:21:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606911694; cv=none; d=google.com; s=arc-20160816; b=obynmyfaUBLUxZeRtG5Uy4EF7zvkkKR6z6l7U/MTiSxM5EJ6h1OzVW+KsvE2THY8O5 cZTLDe4qhX/JUNse8loFf5hjVKMD9b4jlQjbDEAL74b5Lqyb1yikhlnCn1BrVPPMei4w nDIKjivXqKoSpfynvoClmnpptqEuRFtNgIgrgAJKdOQuTAelGPLf2iOTX0doCMCfiuyH B1eZWwLHuzn4i2KM1quBT9SDCNNCG9ijBfsSfyxYmvnKASRQ41FVKq/SDEaMlTf2Pn7a +MsJXMIbiYR2sswBhrijeX9KDaD8QwuPv2KiXpexB5IjSELtpAz/Zwyku9HZezxjLJUO ZAcg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=TFdKjoMSUMmsMj3Y7/R0QI9AfHF27pN/o7+BVJDEu94=; b=E37vM63M5azg+hiD908djI6AHAbUpRDigFDYA/NmTn1yo+Pne/HEZXY1kWQdYrphRn GNTJvtm+EYJPxDB1okeIAwJGWQKji/GUhwfci9OgfLjrPkjNQ8Gf+v8qKQammwc+ZfWT 0IUssHWb8Uu//4LUbE4UPvo5dFs2L+p0mFtiTgsC/rA/aSdMJPxcZyzlHISGgOVDiReV A5xUZ0uDfSLIAmqAU22/YfMWD4m1vyKi1MC8kA8r8NyYkwEw4r8s4Q7EnwEiytt2B1AO 0YMozs0H8x67cREE5BFOLDW7jptYUCrP+dlZxC/FIcj2ge2fL7CbZWJqup/1cwo/xrVW kSNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j3si912976edv.513.2020.12.02.04.21.11; Wed, 02 Dec 2020 04:21:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729883AbgLBMRz (ORCPT + 99 others); Wed, 2 Dec 2020 07:17:55 -0500 Received: from foss.arm.com ([217.140.110.172]:37870 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726578AbgLBMRz (ORCPT ); Wed, 2 Dec 2020 07:17:55 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A6641101E; Wed, 2 Dec 2020 04:17:09 -0800 (PST) Received: from [192.168.0.130] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D1D823F718; Wed, 2 Dec 2020 04:17:06 -0800 (PST) Subject: Re: [RFC V2 2/3] arm64/mm: Define arch_get_mappable_range() To: David Hildenbrand , linux-mm@kvack.org, akpm@linux-foundation.org Cc: linux-arm-kernel@lists.infradead.org, linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, Catalin Marinas , Will Deacon , Ard Biesheuvel , Mark Rutland References: <1606706992-26656-1-git-send-email-anshuman.khandual@arm.com> <1606706992-26656-3-git-send-email-anshuman.khandual@arm.com> <1861413c-fd23-f3e2-14f3-00feec6ff2fb@redhat.com> From: Anshuman Khandual Message-ID: <85975346-d5ae-d971-e50f-9c0b77649910@arm.com> Date: Wed, 2 Dec 2020 17:47:01 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <1861413c-fd23-f3e2-14f3-00feec6ff2fb@redhat.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/2/20 2:56 PM, David Hildenbrand wrote: > On 30.11.20 04:29, Anshuman Khandual wrote: >> This overrides arch_get_mappable_range() on arm64 platform which will be >> used with recently added generic framework. It drops inside_linear_region() >> and subsequent check in arch_add_memory() which are no longer required. >> >> Cc: Catalin Marinas >> Cc: Will Deacon >> Cc: Ard Biesheuvel >> Cc: Mark Rutland >> Cc: David Hildenbrand >> Cc: linux-arm-kernel@lists.infradead.org >> Cc: linux-kernel@vger.kernel.org >> Signed-off-by: Anshuman Khandual >> --- >> arch/arm64/mm/mmu.c | 14 ++++++-------- >> 1 file changed, 6 insertions(+), 8 deletions(-) >> >> diff --git a/arch/arm64/mm/mmu.c b/arch/arm64/mm/mmu.c >> index ca692a815731..49ec8f2838f2 100644 >> --- a/arch/arm64/mm/mmu.c >> +++ b/arch/arm64/mm/mmu.c >> @@ -1444,16 +1444,19 @@ static void __remove_pgd_mapping(pgd_t *pgdir, unsigned long start, u64 size) >> free_empty_tables(start, end, PAGE_OFFSET, PAGE_END); >> } >> >> -static bool inside_linear_region(u64 start, u64 size) >> +struct range arch_get_mappable_range(void) >> { >> + struct range memhp_range; >> + >> /* >> * Linear mapping region is the range [PAGE_OFFSET..(PAGE_END - 1)] >> * accommodating both its ends but excluding PAGE_END. Max physical >> * range which can be mapped inside this linear mapping range, must >> * also be derived from its end points. >> */ >> - return start >= __pa(_PAGE_OFFSET(vabits_actual)) && >> - (start + size - 1) <= __pa(PAGE_END - 1); >> + memhp_range.start = __pa(_PAGE_OFFSET(vabits_actual)); >> + memhp_range.end = __pa(PAGE_END - 1); >> + return memhp_range; >> } >> >> int arch_add_memory(int nid, u64 start, u64 size, >> @@ -1461,11 +1464,6 @@ int arch_add_memory(int nid, u64 start, u64 size, >> { >> int ret, flags = 0; >> >> - if (!inside_linear_region(start, size)) { >> - pr_err("[%llx %llx] is outside linear mapping region\n", start, start + size); >> - return -EINVAL; >> - } > As discussed, I think something like a VM_BUG_ON() here might makes > sense, indicating that we require the caller to validate upfront. Same > applies to the s390x variant. Sure, will do. > > Thanks! >