Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1489107imm; Tue, 22 May 2018 05:02:56 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoDxO3LmQ4mAxkd43Xd2/vrcpWPHuU9Mb49fqmC4iEhTA+yLnVxMQqUfqZk+I+YpUfUVSk2 X-Received: by 2002:a63:b742:: with SMTP id w2-v6mr18846780pgt.343.1526990576427; Tue, 22 May 2018 05:02:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526990576; cv=none; d=google.com; s=arc-20160816; b=Ep75W/Grva9KTQjF1D/6vPVa2Vs3m6OGbm7bamb9U77az79AsPUalJOlHXqAtqWg6D cHA/y3AIfALyat/WAut18JM8szweDZB1JYFIjIkoZNzy8QtVXLaEE6slUZgAhA83WFBB QQ3E3xp4RDZ1o4my+ODxcLtyFLhLShc/64IhrJb2aopx9HDjsNGcNnZ13tKYsLTgQVUW bkIIWL5ClBhsoJdJfK+yjxJLE1JOrKROaJYif4hdFNqm+xKk6RpFFBxXALmBUL5EkjCC rPLJ0VfOGKbCYYfO+3/S4bhhMEOEazNy+izhC/vOURbC99f38nv6PnoUHWvGSWp1Iks2 bGIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:references:in-reply-to:date :subject:cc:to:from:arc-authentication-results; bh=iaJ+HffG2+BsqHYRlKhRaebW2QzeilKK6Y1lX+tSdnk=; b=YoA8wNgtQqVQPTbomtxmsZJ2Qj1aqrp+nk7jTTtZ0a/o9ZZWL5zHPbPR+jqiiQ47GI E50WsVfvzqGn97K7OJ0jVKG2+ABNVY3Zr7yu2lj6IbKqjbE7hT9TGIJZcvJA9QX3s0HI 1bd3MzRQjhpUC6hHASI2iioT0Ykuw5Glct3jqyxjAKHbuP1/7+V/hfiOojt/w0zlprMu aDtNTQGm2qMBRRWWkerteXau6QdQeXQ6+LMSDIuX77tkrB3UobL1g64wzT5rFMjZuOcg nDsxKtxqj/hp244X+OjiT/F6svOKg3h2C+eDum9jlDU7eDqay4p+AoNghj+AOMr/H0NF q6Kg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q200-v6si1158563pgq.682.2018.05.22.05.02.34; Tue, 22 May 2018 05:02:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751361AbeEVMA6 (ORCPT + 99 others); Tue, 22 May 2018 08:00:58 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:41920 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751239AbeEVMA5 (ORCPT ); Tue, 22 May 2018 08:00:57 -0400 Received: from pps.filterd (m0098416.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w4MBwnXa072673 for ; Tue, 22 May 2018 08:00:57 -0400 Received: from e06smtp14.uk.ibm.com (e06smtp14.uk.ibm.com [195.75.94.110]) by mx0b-001b2d01.pphosted.com with ESMTP id 2j4h0s4rv0-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Tue, 22 May 2018 08:00:56 -0400 Received: from localhost by e06smtp14.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 22 May 2018 13:00:54 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp14.uk.ibm.com (192.168.101.144) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Tue, 22 May 2018 13:00:45 +0100 Received: from d06av22.portsmouth.uk.ibm.com (d06av22.portsmouth.uk.ibm.com [9.149.105.58]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w4MC0jcb6226364; Tue, 22 May 2018 12:00:45 GMT Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id EB6F04C06A; Tue, 22 May 2018 12:52:26 +0100 (BST) Received: from d06av22.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 94AFD4C04E; Tue, 22 May 2018 12:52:25 +0100 (BST) Received: from nimbus.lab.toulouse-stg.fr.ibm.com (unknown [9.101.4.33]) by d06av22.portsmouth.uk.ibm.com (Postfix) with ESMTP; Tue, 22 May 2018 12:52:25 +0100 (BST) From: Laurent Dufour To: akpm@linux-foundation.org, mhocko@kernel.org, peterz@infradead.org, kirill@shutemov.name, ak@linux.intel.com, dave@stgolabs.net, jack@suse.cz, Matthew Wilcox , khandual@linux.vnet.ibm.com, aneesh.kumar@linux.vnet.ibm.com, benh@kernel.crashing.org, mpe@ellerman.id.au, paulus@samba.org, Thomas Gleixner , Ingo Molnar , hpa@zytor.com, Will Deacon , Sergey Senozhatsky , sergey.senozhatsky.work@gmail.com, Andrea Arcangeli , Alexei Starovoitov , kemi.wang@intel.com, Daniel Jordan , David Rientjes , Jerome Glisse , Ganesh Mahendran , Minchan Kim , Punit Agrawal , vinayak menon , Yang Shi , Randy Dunlap Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, haren@linux.vnet.ibm.com, npiggin@gmail.com, bsingharora@gmail.com, paulmck@linux.vnet.ibm.com, Tim Chen , linuxppc-dev@lists.ozlabs.org, x86@kernel.org Subject: [FIX PATCH v11 01/26] mm: introduce CONFIG_SPECULATIVE_PAGE_FAULT Date: Tue, 22 May 2018 14:00:43 +0200 X-Mailer: git-send-email 2.7.4 In-Reply-To: References: X-TM-AS-GCONF: 00 x-cbid: 18052212-0044-0000-0000-00000555269A X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18052212-0045-0000-0000-00002896B399 Message-Id: <1526990443-30309-1-git-send-email-ldufour@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-05-22_03:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1805220141 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This configuration variable will be used to build the code needed to handle speculative page fault. By default it is turned off, and activated depending on architecture support, ARCH_HAS_PTE_SPECIAL, SMP and MMU. The architecture support is needed since the speculative page fault handler is called from the architecture's page faulting code, and some code has to be added there to handle the speculative handler. The dependency on ARCH_HAS_PTE_SPECIAL is required because vm_normal_page() does processing that is not compatible with the speculative handling in the case ARCH_HAS_PTE_SPECIAL is not set. Suggested-by: Thomas Gleixner Suggested-by: David Rientjes Signed-off-by: Laurent Dufour --- mm/Kconfig | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) diff --git a/mm/Kconfig b/mm/Kconfig index 1d0888c5b97a..d958fd8ce73a 100644 --- a/mm/Kconfig +++ b/mm/Kconfig @@ -761,3 +761,25 @@ config GUP_BENCHMARK config ARCH_HAS_PTE_SPECIAL bool + +config ARCH_SUPPORTS_SPECULATIVE_PAGE_FAULT + def_bool n + +config SPECULATIVE_PAGE_FAULT + bool "Speculative page faults" + default y + depends on ARCH_SUPPORTS_SPECULATIVE_PAGE_FAULT + depends on ARCH_HAS_PTE_SPECIAL && MMU && SMP + help + Try to handle user space page faults without holding the mmap_sem. + + This should allow better concurrency for massively threaded processes + since the page fault handler will not wait for other thread's memory + layout change to be done, assuming that this change is done in + another part of the process's memory space. This type of page fault + is named speculative page fault. + + If the speculative page fault fails because a concurrent modification + is detected or because underlying PMD or PTE tables are not yet + allocated, the speculative page fault fails and a classic page fault + is then tried. -- 2.7.4