Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755273Ab0GSGwi (ORCPT ); Mon, 19 Jul 2010 02:52:38 -0400 Received: from wolverine01.qualcomm.com ([199.106.114.254]:28159 "EHLO wolverine01.qualcomm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752468Ab0GSGwg (ORCPT ); Mon, 19 Jul 2010 02:52:36 -0400 X-IronPort-AV: E=McAfee;i="5400,1158,6047"; a="47894678" Date: Sun, 18 Jul 2010 23:52:33 -0700 From: Zach Pfeffer To: Russell King - ARM Linux Cc: FUJITA Tomonori , ebiederm@xmission.com, linux-arch@vger.kernel.org, dwalker@codeaurora.org, mel@csn.ul.ie, linux-arm-msm@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, andi@firstfloor.org, linux-omap@vger.kernel.org, linux-arm-kernel@lists.infradead.org Subject: Re: [RFC 1/3 v3] mm: iommu: An API to unify IOMMU, CPU and device memory management Message-ID: <20100719065233.GD11054@codeaurora.org> References: <4C3C0032.5020702@codeaurora.org> <20100713150311B.fujita.tomonori@lab.ntt.co.jp> <20100713121420.GB4263@codeaurora.org> <20100714104353B.fujita.tomonori@lab.ntt.co.jp> <20100714201149.GA14008@codeaurora.org> <20100714220536.GE18138@n2100.arm.linux.org.uk> <20100715012958.GB2239@codeaurora.org> <20100715085535.GC26212@n2100.arm.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20100715085535.GC26212@n2100.arm.linux.org.uk> User-Agent: Mutt/1.5.20 (2009-06-14) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2517 Lines: 51 On Thu, Jul 15, 2010 at 09:55:35AM +0100, Russell King - ARM Linux wrote: > On Wed, Jul 14, 2010 at 06:29:58PM -0700, Zach Pfeffer wrote: > > The VCM ensures that all mappings that map a given physical buffer: > > IOMMU mappings, CPU mappings and one-to-one device mappings all map > > that buffer using the same (or compatible) attributes. At this point > > the only attribute that users can pass is CACHED. In the absence of > > CACHED all accesses go straight through to the physical memory. > > So what you're saying is that if I have a buffer in kernel space > which I already have its virtual address, I can pass this to VCM and > tell it !CACHED, and it'll setup another mapping which is not cached > for me? Not quite. The existing mapping will be represented by a reservation from the prebuilt VCM of the VM. This reservation has been marked non-cached. Another reservation on a IOMMU VCM, also marked non-cached will be backed with the same physical memory. This is legal in ARM, allowing the vcm_back call to succeed. If you instead passed cached on the second mapping, the first mapping would be non-cached and the second would be cached. If the underlying architecture supported this than the vcm_back would go through. > > You are aware that multiple V:P mappings for the same physical page > with different attributes are being outlawed with ARMv6 and ARMv7 > due to speculative prefetching. The cache can be searched even for > a mapping specified as 'normal, uncached' and you can get cache hits > because the data has been speculatively loaded through a separate > cached mapping of the same physical page. I didn't know that. Thanks for the heads up. > FYI, during the next merge window, I will be pushing a patch which makes > ioremap() of system RAM fail, which should be the last core code creator > of mappings with different memory types. This behaviour has been outlawed > (as unpredictable) in the architecture specification and does cause > problems on some CPUs. That's fair enough, but it seems like it should only be outlawed for those processors on which it breaks. > > We've also the issue of multiple mappings with differing cache attributes > which needs addressing too... The VCM has been architected to handle these things. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/