Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp5302021imm; Tue, 26 Jun 2018 09:01:31 -0700 (PDT) X-Google-Smtp-Source: ADUXVKKg6Bh8QwexDk920gXIna8lWNhFlr2jbq6Ny/w7JV3gGRb7e8qD9gH3IdsRUi3XcmXWbn56 X-Received: by 2002:a17:902:b494:: with SMTP id y20-v6mr2237456plr.136.1530028891444; Tue, 26 Jun 2018 09:01:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530028891; cv=none; d=google.com; s=arc-20160816; b=uEbjE8+EBzUUEmqHzVImjk3KDoPfyp7AEX2xeNB/5vo89IhE3yyCf6Ud2PPzCxz/JS g/h+Cb1hTHyGC8caI2E34UQ1+l0sQBu7XGJ39GJ0KebajZdhhBQQtil0Vv9DXTZzyB4K 0Uq7bgC3u1czcVvenilcmZ1Y4RR3GQVjs4apR+aI5H3O5M9YawjnF1/GSgGIFYbAoEjp NJ94GnCs6GuMqrMFZMcUkZv04wim8c00pv7vSX1imwG5nqOXbGtw61bdFbfK56+8C7fe jFf9GzpXczfqZ5f+xbMpPeh8z5zHcrefneYID79NGzTKGPKBzooNA8AqT1wcTUfh1Y+n 0w/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=8gc58Y5pHoZoFKUlmW4sHuHpuvfa05vJAG3pVjcZ5ek=; b=TkVN+8pZfDXEQSEeyRu+QP0a2eLn6CzFrkgYR2AB41lxwRoEfNa2LEIE57SR4LrYVe b6RgugkTyp6w7gkQH9aYAoCLmh8het4eGxHHFnd3YwgCmbL5OGaK4acNJ9C6HKvwmd7q xeyRO7VpQ/Ry3cFcQLPojezumE3NgyO1HYP0ySiScxDYDUF/krdxLL5sB14+pmDvrH1g wFrl741FSVtrR9O/ozy/R35EnTSezJ/CUGkBiGIPlUtMbs3n46h5V9QoK/1PmkZ+ZX1N zD8cNLvOhLdG+FAAvBxZ7AOgTvhXJgqNRRoR9Xj2jXAwOfVoyaNUBHWa/ORcJ89kNo9o SIdg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y22-v6si1750286plp.489.2018.06.26.09.01.16; Tue, 26 Jun 2018 09:01:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935813AbeFZNsB (ORCPT + 99 others); Tue, 26 Jun 2018 09:48:01 -0400 Received: from mx2.suse.de ([195.135.220.15]:43949 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933522AbeFZNsA (ORCPT ); Tue, 26 Jun 2018 09:48:00 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 53ECCAC85; Tue, 26 Jun 2018 13:47:58 +0000 (UTC) Date: Tue, 26 Jun 2018 15:47:57 +0200 From: Michal Hocko To: Dan Williams Cc: John Hubbard , Christoph Hellwig , Jason Gunthorpe , John Hubbard , Matthew Wilcox , Christopher Lameter , Jan Kara , Linux MM , LKML , linux-rdma Subject: Re: [PATCH 2/2] mm: set PG_dma_pinned on get_user_pages*() Message-ID: <20180626134757.GY28965@dhcp22.suse.cz> References: <20180617012510.20139-3-jhubbard@nvidia.com> <20180617200432.krw36wrcwidb25cj@ziepe.ca> <311eba48-60f1-b6cc-d001-5cc3ed4d76a9@nvidia.com> <20180618081258.GB16991@lst.de> <3898ef6b-2fa0-e852-a9ac-d904b47320d5@nvidia.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 18-06-18 12:21:46, Dan Williams wrote: [...] > I do think we should explore a page flag for pages that are "long > term" pinned. Michal asked for something along these lines at LSF / MM > so that the core-mm can give up on pages that the kernel has lost > lifetime control. Michal, did I capture your ask correctly? I am sorry to be late. I didn't ask for a page flag exactly. I've asked for a way to query for the pin to be temporal or permanent. How that is achieved is another question. Maybe we have some more spare room after recent struct page reorganization but I dunno, to be honest. Maybe we can have an _count offset for these longterm pins. It is not like we are using the whole ref count space, right? Another thing I was asking for is to actually account those longterm pinned pages and apply some control over those. They are basically mlock like and so their usage should better not be unbound. -- Michal Hocko SUSE Labs