Received: by 10.213.65.68 with SMTP id h4csp1219824imn; Wed, 4 Apr 2018 15:00:52 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/maKf+2Sp6dX/XjuiLuf6pe2h7/YQ6/EX50j4sutz4FJPKwC4AATTCUxaO04vpUm/WHe5E X-Received: by 10.99.109.72 with SMTP id i69mr13329067pgc.417.1522879252871; Wed, 04 Apr 2018 15:00:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1522879252; cv=none; d=google.com; s=arc-20160816; b=VSUCz2ysTnHHmfB4YMyj27koD4bPlb/dTg9ngM21eO3AdNfHzfW3vsFWc1PHJTwvNs Crm6Yd8v49Ec3Fh/8KEG8IGpA+ei1DdinhWPWdgPTJlet/tK51vFuZx6uNDK+a4XlILr 77csAlDKKZTKK/iXxiy2oV5wBWdwL7FvlJ6giYVjO9HhNgpGmYaPFjPXV2j1ujgbkzQP mTSBq3flhgJzEBi6fHZQJ/co23NZ1R4FFYfZnetz0wLg3wLvMHvjPJ7J3gXrOlwb7Mp4 7O9INq+9qmVQpLiwr0AVZXLuujYcGZqSWfIR0qc9K/G3UhT3pvfwuwT8BscPeX3ypwza FRzg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=nu3s2ny8PZ+qqD7nD79bTN8V1cUk1uX9jvlImM65gdY=; b=etA3Gs1CLW/BFGpVehuj71QZOedCUopwVM58K7xHF6A1hr2ZBN+gUz87R8cARJEH7B aNh5o5Gq8hZYZpxfmt5gxsGGMI2O+ZUoC+lHSkfaZdazpippb9QNnX4KF2CaAJKDEMcm o+MUrnLacMhJXRfU5MZJn1HKhTGhVkznR28YWfNkS7T6nblnZS1fd9Zf7S4NYZjvMomr 79VtTkLoTaIXyh9PkogDsPa5gO85PlE3sA4ho4jsX5Us0Rx/pjVOhjUBmdPK/bWgSPqW 2sWmgINNWxPtytX7HzT5SRhOi8D8c84K2TBNV70xcharvX1lNnsoBnD93EY+50ZvbF+t vaJQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x190si4404639pgx.159.2018.04.04.15.00.38; Wed, 04 Apr 2018 15:00:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752488AbeDDV70 (ORCPT + 99 others); Wed, 4 Apr 2018 17:59:26 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:54462 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1752458AbeDDV7Z (ORCPT ); Wed, 4 Apr 2018 17:59:25 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5283940201A5; Wed, 4 Apr 2018 21:59:24 +0000 (UTC) Received: from redhat.com (ovpn-125-89.rdu2.redhat.com [10.10.125.89]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 7E8362024CA1; Wed, 4 Apr 2018 21:59:18 +0000 (UTC) Date: Wed, 4 Apr 2018 17:59:16 -0400 From: Jerome Glisse To: Laurent Dufour Cc: paulmck@linux.vnet.ibm.com, peterz@infradead.org, akpm@linux-foundation.org, kirill@shutemov.name, ak@linux.intel.com, mhocko@kernel.org, dave@stgolabs.net, jack@suse.cz, Matthew Wilcox , benh@kernel.crashing.org, mpe@ellerman.id.au, paulus@samba.org, Thomas Gleixner , Ingo Molnar , hpa@zytor.com, Will Deacon , Sergey Senozhatsky , Andrea Arcangeli , Alexei Starovoitov , kemi.wang@intel.com, sergey.senozhatsky.work@gmail.com, Daniel Jordan , linux-kernel@vger.kernel.org, linux-mm@kvack.org, haren@linux.vnet.ibm.com, khandual@linux.vnet.ibm.com, npiggin@gmail.com, bsingharora@gmail.com, Tim Chen , linuxppc-dev@lists.ozlabs.org, x86@kernel.org Subject: Re: [PATCH v9 15/24] mm: Introduce __vm_normal_page() Message-ID: <20180404215916.GC3331@redhat.com> References: <1520963994-28477-1-git-send-email-ldufour@linux.vnet.ibm.com> <1520963994-28477-16-git-send-email-ldufour@linux.vnet.ibm.com> <20180403193927.GD5935@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.9.2 (2017-12-15) X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Wed, 04 Apr 2018 21:59:24 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Wed, 04 Apr 2018 21:59:24 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'jglisse@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 04, 2018 at 06:26:44PM +0200, Laurent Dufour wrote: > > > On 03/04/2018 21:39, Jerome Glisse wrote: > > On Tue, Mar 13, 2018 at 06:59:45PM +0100, Laurent Dufour wrote: > >> When dealing with the speculative fault path we should use the VMA's field > >> cached value stored in the vm_fault structure. > >> > >> Currently vm_normal_page() is using the pointer to the VMA to fetch the > >> vm_flags value. This patch provides a new __vm_normal_page() which is > >> receiving the vm_flags flags value as parameter. > >> > >> Note: The speculative path is turned on for architecture providing support > >> for special PTE flag. So only the first block of vm_normal_page is used > >> during the speculative path. > > > > Might be a good idea to explicitly have SPECULATIVE Kconfig option depends > > on ARCH_PTE_SPECIAL and a comment for !HAVE_PTE_SPECIAL in the function > > explaining that speculative page fault should never reach that point. > > Unfortunately there is no ARCH_PTE_SPECIAL in the config file, it is defined in > the per architecture header files. > So I can't do anything in the Kconfig file Maybe adding a new Kconfig symbol for ARCH_PTE_SPECIAL very much like others ARCH_HAS_ > > However, I can check that at build time, and doing such a check in > __vm_normal_page sounds to be a good place, like that: > > @@ -869,6 +870,14 @@ struct page *__vm_normal_page(struct vm_area_struct *vma, > unsigned long addr, > > /* !HAVE_PTE_SPECIAL case follows: */ > > +#ifdef CONFIG_SPECULATIVE_PAGE_FAULT > + /* This part should never get called when the speculative page fault > + * handler is turned on. This is mainly because we can't rely on > + * vm_start. > + */ > +#error CONFIG_SPECULATIVE_PAGE_FAULT requires HAVE_PTE_SPECIAL > +#endif > + > if (unlikely(vma_flags & (VM_PFNMAP|VM_MIXEDMAP))) { > if (vma_flags & VM_MIXEDMAP) { > if (!pfn_valid(pfn)) > I am not a fan of #if/#else/#endif in code. But that's a taste thing. I honnestly think that adding a Kconfig for special pte is the cleanest solution. Cheers, J?r?me