Re: another new version of pageattr caching conflict fix for 2.4

Eric W. Biederman (ebiederm@xmission.com)
16 Jun 2002 13:56:51 -0600


Andi Kleen <ak@suse.de> writes:

> On Sun, Jun 16, 2002 at 11:50:51AM -0600, Eric W. Biederman wrote:
> > Andi Kleen <ak@suse.de> writes:
> >
> > > On Sun, Jun 16, 2002 at 04:08:49AM -0600, Eric W. Biederman wrote:
> > > >
> > > > Don't allow the change_page_attr if page->count > 1 is an easy solution,
> > > > and it probably suffices. Beyond that anything mmaped can be found
> > >
> > > Erm, what should it do then? Fail the AGP map ?
> >
> > Why not. If user-space has already mapped the memory one way, turning
> > around and using it another way is a problem. If the memory is
> > dynamically allocated for AGP I don't even see how this case
> > could occur.
>
> It's a random error. AGP randomly gets some page that is already mapped
> by /dev/mem somewhere. There is nothing that it can do to avoid this.
> As /dev/mem is root only and root can already cause much damage it is
> probably not worth avoiding the particular breakage.

Sorry my confusion I thought mmapping /dev/mem increased the page count,
in which case it would be easy to detect, and avoid. I just looked
and it doesn't so there appears no trivial way to detect or handle
that case.

> Now if someone used change_page_attr as a more general call and used
> it on random memory that could be already mapped to user space in a more
> legitimate way then he or she has to do much more work anyways (avoiding
> alias etc.). Part of that more work would be to check the page count.
> I don't think it should be done by the low level routine.
>
>
> >
> > The kernel already exposes through /proc/mtrr the ability to
> > arbitrarily change the caching of pages. And since this is a case
> > of physical aliasing we need to make certain the mtrr's don't
> > conflict. So much of this is already exposed to user space already.
>
> MTRRs work on physical, not virtual memory, so they have no aliasing
> issues.

Doesn't the AGP aperture cause a physical alias? Leading to strange
the same problems if the agp aperture was marked write-back, and the
memory was marked uncacheable. My gut impression is to just make the
agp aperture write-back cacheable, and then we don't have to change
the kernel page table at all. Unfortunately I don't expect the host
bridge with the memory and agp controllers to like that mode,
especially as there are physical aliasing issues.

> > > You can already use WT. DRM does that already in fact.
> > > Newer Intel/AMD CPUs allow to set up a more general PAT table with some
> > > more modis, but to be honest I don't see the point in most of them,
> > > except perhaps WC. Unfortunately there is no 'weak ordering like
> alpha/sparc64'
>
> > > mode that could be used in the kernel :-)
> >
> > With the PAT table only write-back, write-combining, uncached interest
> > me. Given the number of BIOS's that don't set all of RAM to
> > write-back and the major performance penalty of running on uncached
> > RAM having the kernel fix it, would reduce a lot of headaches long
> > term.
>
> Fixing the MTRRs is fine, but it is really outside the scope of my patch.
> Just changing the kernel map wouldn't be enough to fix wrong MTRRs,
> because it wouldn't cover highmem.

My preferred fix is to use PAT, to override the buggy mtrrs. Which
brings up the same aliasing issues. Which makes it related but
outside the scope of the problem.

Eric

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/