Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp242536rwd; Mon, 15 May 2023 23:54:04 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ604X4Y1V/wseG1BU3sgfBs6cXd7QI/olGV9jVgeAFnfY/XxXmhhcp5tux4uA+XoF85tPyq X-Received: by 2002:a05:6a00:2303:b0:64c:ae1c:337f with SMTP id h3-20020a056a00230300b0064cae1c337fmr5825919pfh.12.1684220044515; Mon, 15 May 2023 23:54:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684220044; cv=none; d=google.com; s=arc-20160816; b=DwJ8yEuJuluHIUZfSnflblgmZZlc8/B3osBynBLieTQ7ds/iQYyuvZtuVqbYpKkHCZ VDdxoPFySJg6hOfuL1nZVwr+FvC8noL67Zfnt9TXiruMZlL9CoU/NrBJeok+O7WnVESG FKdefI/dE7jwgCYlecn7LK2Idp+8Y7LbZ2P4/1242wNqvce9bYoFkZbhwUdE9I6dmckZ deFHXnnFIAeJwMBxSse2hgvqwdirOKMDrR8u/0CexxLq520aodiTp1BhGDSHOIerU9uN 2KkBfbyJkjmPwYQEnhGrFAAqJ+EEkcDTZ1OEwJzOFrRZ6L7GBIaLj1Yyy1pm4bSma6Hr Y3Hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=7iwMQn6Dy6v3l7PCDR2WggIUGM0TRXGyXrSuhSDrksk=; b=qlLrs0Nao2ipWRrHKWEs+9R1ztIVGKj9dMiLiWczqkDd9PbVMKzrmGKn3KboHLNGkM HcV2UMpdwnSUN+pU3+P6eckxWcQlnU1D8ihIMHemCTricWJm+t426+dE/74XAKDOlhDN gPebmqnHfIeFyfUKsO0ntpG5fGRaNTeJZLBU26Ut0gGfuRzTQ5/bKeHzVvuo/rE1R+r5 lXH5k72WqCsFENxRBdCywxdz6PI3yXrLCciZtohVtqeqWNfpeVm5RHtNT9zn5L93/8+X JXneFf58BJDjQ0Fk9R6W34PP0EL35Kx7nWxSIi1dq4QFU5WZiQZSUZQN843CvH2pa+u6 XEvA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=VnB3eh+W; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id b14-20020aa78ece000000b0063b8935bcbasi18456068pfr.310.2023.05.15.23.53.52; Mon, 15 May 2023 23:54:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=VnB3eh+W; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230086AbjEPGug (ORCPT + 99 others); Tue, 16 May 2023 02:50:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56466 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229809AbjEPGud (ORCPT ); Tue, 16 May 2023 02:50:33 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6A2724C07; Mon, 15 May 2023 23:50:06 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A5C58615FB; Tue, 16 May 2023 06:50:05 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id DE2BEC433D2; Tue, 16 May 2023 06:50:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1684219805; bh=7VX2LsKv3PQ0dpUkb9e7oVnaxcn5EXXzhXtXcfTUrdo=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=VnB3eh+W1j0NQcaox7doiPd13Fc8F/IiUM4j8VdhBZm20oiEAt6LpIIe9ZXPuuy07 PpHqPmDqTNuewxCeTKCCrlt8tYZ3F4XKvzogI5hmHVwUE8nXYIMOxQ2QmaSXv4wJBP e6tE9Ek/N9ysGgCw4kg26JzP5Q8pT9eMEHEjQcknfCTO03Fy70W5Kz7Z578cqYO3JQ LursPVYyRZoQgXFWlwWDxOYsOUNxXGcBFVUuDPgcFbrtmUZ7RSFJ+DLFZHupMO/xJx xuWaXCHbvnzFewOzyOSLUPYGHKZ/AeecJHJAnBP53Eik0w6Sn6LFCSnuCJG8DulNny 9ajILl0m5k9oA== Date: Tue, 16 May 2023 09:49:57 +0300 From: Mike Rapoport To: Baoquan He Cc: linux-kernel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, arnd@arndb.de, christophe.leroy@csgroup.eu, hch@infradead.org, agordeev@linux.ibm.com, wangkefeng.wang@huawei.com, schnelle@linux.ibm.com, David.Laight@aculab.com, shorne@gmail.com, willy@infradead.org, deller@gmx.de, Jonas Bonn , Stefan Kristiansson , openrisc@lists.librecores.org Subject: Re: [PATCH v5 RESEND 09/17] openrisc: mm: Convert to GENERIC_IOREMAP Message-ID: References: <20230515090848.833045-1-bhe@redhat.com> <20230515090848.833045-10-bhe@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230515090848.833045-10-bhe@redhat.com> X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Mon, May 15, 2023 at 05:08:40PM +0800, Baoquan He wrote: > By taking GENERIC_IOREMAP method, the generic generic_ioremap_prot(), > generic_iounmap(), and their generic wrapper ioremap_prot(), ioremap() > and iounmap() are all visible and available to arch. Arch needs to > provide wrapper functions to override the generic versions if there's > arch specific handling in its ioremap_prot(), ioremap() or iounmap(). > This change will simplify implementation by removing duplicated codes > with generic_ioremap_prot() and generic_iounmap(), and has the equivalent > functioality as before. > > Here, add wrapper function iounmap() for openrisc's special operation > when iounmap(). > > Signed-off-by: Baoquan He > Cc: Stafford Horne > Cc: Jonas Bonn > Cc: Stefan Kristiansson > Cc: openrisc@lists.librecores.org > --- > arch/openrisc/Kconfig | 1 + > arch/openrisc/include/asm/io.h | 11 +++++--- > arch/openrisc/mm/ioremap.c | 46 +--------------------------------- > 3 files changed, 9 insertions(+), 49 deletions(-) > > diff --git a/arch/openrisc/Kconfig b/arch/openrisc/Kconfig > index c7f282f60f64..fd9bb76a610b 100644 > --- a/arch/openrisc/Kconfig > +++ b/arch/openrisc/Kconfig > @@ -21,6 +21,7 @@ config OPENRISC > select GENERIC_IRQ_PROBE > select GENERIC_IRQ_SHOW > select GENERIC_PCI_IOMAP > + select GENERIC_IOREMAP > select GENERIC_CPU_DEVICES > select HAVE_PCI > select HAVE_UID16 > diff --git a/arch/openrisc/include/asm/io.h b/arch/openrisc/include/asm/io.h > index ee6043a03173..e640960c26c2 100644 > --- a/arch/openrisc/include/asm/io.h > +++ b/arch/openrisc/include/asm/io.h > @@ -15,6 +15,8 @@ > #define __ASM_OPENRISC_IO_H > > #include > +#include > +#include > > /* > * PCI: We do not use IO ports in OpenRISC > @@ -27,11 +29,12 @@ > #define PIO_OFFSET 0 > #define PIO_MASK 0 > > -#define ioremap ioremap > -void __iomem *ioremap(phys_addr_t offset, unsigned long size); > - > +/* > + * I/O memory mapping functions. > + */ > #define iounmap iounmap > -extern void iounmap(volatile void __iomem *addr); > + > +#define _PAGE_IOREMAP (pgprot_val(PAGE_KERNEL) | _PAGE_CI) > > #include > > diff --git a/arch/openrisc/mm/ioremap.c b/arch/openrisc/mm/ioremap.c > index 90b59bc53c8c..9f9941df7d4c 100644 > --- a/arch/openrisc/mm/ioremap.c > +++ b/arch/openrisc/mm/ioremap.c > @@ -22,49 +22,6 @@ > > extern int mem_init_done; > > -/* > - * Remap an arbitrary physical address space into the kernel virtual > - * address space. Needed when the kernel wants to access high addresses > - * directly. > - * > - * NOTE! We need to allow non-page-aligned mappings too: we will obviously > - * have to convert them into an offset in a page-aligned mapping, but the > - * caller shouldn't need to know that small detail. > - */ > -void __iomem *__ref ioremap(phys_addr_t addr, unsigned long size) > -{ > - phys_addr_t p; > - unsigned long v; > - unsigned long offset, last_addr; > - struct vm_struct *area = NULL; > - > - /* Don't allow wraparound or zero size */ > - last_addr = addr + size - 1; > - if (!size || last_addr < addr) > - return NULL; > - > - /* > - * Mappings have to be page-aligned > - */ > - offset = addr & ~PAGE_MASK; > - p = addr & PAGE_MASK; > - size = PAGE_ALIGN(last_addr + 1) - p; > - > - area = get_vm_area(size, VM_IOREMAP); > - if (!area) > - return NULL; > - v = (unsigned long)area->addr; > - > - if (ioremap_page_range(v, v + size, p, > - __pgprot(pgprot_val(PAGE_KERNEL) | _PAGE_CI))) { > - vfree(area->addr); > - return NULL; > - } > - > - return (void __iomem *)(offset + (char *)v); > -} > -EXPORT_SYMBOL(ioremap); > - > void iounmap(volatile void __iomem *addr) > { > /* If the page is from the fixmap pool then we just clear out The page cannot be from fixmap pool since we removed fixmap support from ioremap in an earlier patch. I believe that patch should also remove special casing of fixmap in iounmap() and then openrisc does not need to override any of ioremap methods. > @@ -88,9 +45,8 @@ void iounmap(volatile void __iomem *addr) > return; > } > > - return vfree((void *)(PAGE_MASK & (unsigned long)addr)); > + generic_iounmap(addr); > } > -EXPORT_SYMBOL(iounmap); > > /** > * OK, this one's a bit tricky... ioremap can get called before memory is > -- > 2.34.1 > > -- Sincerely yours, Mike.