Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp1297707imu; Wed, 23 Jan 2019 14:25:15 -0800 (PST) X-Google-Smtp-Source: ALg8bN4+goCnIpBgpIxQgclOjLdMyu+ZYTPiRu0Hp7dMeh6ItKfuMFQHVwyUmJ3D/GMfAdm61cEI X-Received: by 2002:a63:d450:: with SMTP id i16mr3630136pgj.246.1548282315676; Wed, 23 Jan 2019 14:25:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548282315; cv=none; d=google.com; s=arc-20160816; b=JwG3KhbosYiMgDa4gc7/2pi1YU6xadixS1PGBYpjfWJutgR4u8WFwk4iQkQnNaOEy1 Kngd8J3qgttosasqn9Etf+qPJmSXuMwXvHWyYfwCdgZL3SaddlTDMIhZ8PoHqQwB/fKC Nj97gN3v9ltsOp8+Ut7VkYkuEnI4ds4caxtAmd/+o5d2Eu2UD4zyP833rmMj7QubRuLK swih9CWh7aKgcHSIgILiDIZIGrNt4V9BGBPx9CknXOpIMVcYmNRl6DxrO5FUTOImmARw j08qtJ5XMZmnlnkKiMmfxpOCAwC4tev/LFbHfOjlvXtyHSHViVYEuZ2BWBnev4oqgubQ rG6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=R9Y73dA5zfcuQhRWdQd+Zs6GLcZnKQfxEq7znl2+rhM=; b=ZL3i8HpPYH3kF03H1dEeYFk5ZOahei4LMvzk6Oe3v+9JZXJBdwqz6w/KI9UXnZ9uyA cJ3vSKdJE4Qsop8YYS/h+3EDYpxVKT5EfPMuuKgqZeTSA4vlXrA6AbyIUhuQ3wvJ5LX4 jzNJBrkLm0+iXzzMoGhYKv3o9Xsm3+FrcfYgrBsmNriBrUjaPOQmYIvEr8sg3l8guVdl 2OrJmHUsSEtavDV//VpHp/u8BF4iCs5bHj7nWOclBqxNvOqroMR1g8QbrhvPKwe0G2jf xAyoD3NBlr0eCYEXaGZuX6WN+qmshRDsxP5olZA15Y3k9KwbWep+sD50tB164VcmebZs 35Hg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a19si21677691pgn.102.2019.01.23.14.25.00; Wed, 23 Jan 2019 14:25:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726994AbfAWWXa (ORCPT + 99 others); Wed, 23 Jan 2019 17:23:30 -0500 Received: from mx1.redhat.com ([209.132.183.28]:46602 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726249AbfAWWXa (ORCPT ); Wed, 23 Jan 2019 17:23:30 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 51D88C7E6F; Wed, 23 Jan 2019 22:23:29 +0000 (UTC) Received: from localhost.localdomain.com (ovpn-120-127.rdu2.redhat.com [10.10.120.127]) by smtp.corp.redhat.com (Postfix) with ESMTP id 3AE056C202; Wed, 23 Jan 2019 22:23:26 +0000 (UTC) From: jglisse@redhat.com To: linux-mm@kvack.org Cc: Andrew Morton , linux-kernel@vger.kernel.org, =?UTF-8?q?J=C3=A9r=C3=B4me=20Glisse?= , =?UTF-8?q?Christian=20K=C3=B6nig?= , Jan Kara , Felix Kuehling , Jason Gunthorpe , Matthew Wilcox , Ross Zwisler , Dan Williams , Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Michal Hocko , Ralph Campbell , John Hubbard , kvm@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-rdma@vger.kernel.org, linux-fsdevel@vger.kernel.org, Arnd Bergmann Subject: [PATCH v4 0/9] mmu notifier provide context informations Date: Wed, 23 Jan 2019 17:23:06 -0500 Message-Id: <20190123222315.1122-1-jglisse@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Wed, 23 Jan 2019 22:23:29 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jérôme Glisse Hi Andrew, i see that you still have my event patch in you queue [1]. This patchset replace that single patch and is broken down in further step so that it is easier to review and ascertain that no mistake were made during mechanical changes. Here are the step: Patch 1 - add the enum values Patch 2 - coccinelle semantic patch to convert all call site of mmu_notifier_range_init to default enum value and also to passing down the vma when it is available Patch 3 - update many call site to more accurate enum values Patch 4 - add the information to the mmu_notifier_range struct Patch 5 - helper to test if a range is updated to read only All the remaining patches are update to various driver to demonstrate how this new information get use by device driver. I build tested with make all and make all minus everything that enable mmu notifier ie building with MMU_NOTIFIER=no. Also tested with some radeon,amd gpu and intel gpu. If they are no objections i believe best plan would be to merge the the first 5 patches (all mm changes) through your queue for 5.1 and then to delay driver update to each individual driver tree for 5.2. This will allow each individual device driver maintainer time to more thouroughly test this more then my own testing. Note that i also intend to use this feature further in nouveau and HMM down the road. I also expect that other user like KVM might be interested into leveraging this new information to optimize some of there secondary page table invalidation. Here is an explaination on the rational for this patchset: CPU page table update can happens for many reasons, not only as a result of a syscall (munmap(), mprotect(), mremap(), madvise(), ...) but also as a result of kernel activities (memory compression, reclaim, migration, ...). This patch introduce a set of enums that can be associated with each of the events triggering a mmu notifier. Latter patches take advantages of those enum values. - UNMAP: munmap() or mremap() - CLEAR: page table is cleared (migration, compaction, reclaim, ...) - PROTECTION_VMA: change in access protections for the range - PROTECTION_PAGE: change in access protections for page in the range - SOFT_DIRTY: soft dirtyness tracking Being able to identify munmap() and mremap() from other reasons why the page table is cleared is important to allow user of mmu notifier to update their own internal tracking structure accordingly (on munmap or mremap it is not longer needed to track range of virtual address as it becomes invalid). [1] https://www.ozlabs.org/~akpm/mmotm/broken-out/mm-mmu_notifier-contextual-information-for-event-triggering-invalidation-v2.patch Cc: Christian König Cc: Jan Kara Cc: Felix Kuehling Cc: Jason Gunthorpe Cc: Andrew Morton Cc: Matthew Wilcox Cc: Ross Zwisler Cc: Dan Williams Cc: Paolo Bonzini Cc: Radim Krčmář Cc: Michal Hocko Cc: Ralph Campbell Cc: John Hubbard Cc: kvm@vger.kernel.org Cc: dri-devel@lists.freedesktop.org Cc: linux-rdma@vger.kernel.org Cc: linux-fsdevel@vger.kernel.org Cc: Arnd Bergmann Jérôme Glisse (9): mm/mmu_notifier: contextual information for event enums mm/mmu_notifier: contextual information for event triggering invalidation mm/mmu_notifier: use correct mmu_notifier events for each invalidation mm/mmu_notifier: pass down vma and reasons why mmu notifier is happening mm/mmu_notifier: mmu_notifier_range_update_to_read_only() helper gpu/drm/radeon: optimize out the case when a range is updated to read only gpu/drm/amdgpu: optimize out the case when a range is updated to read only gpu/drm/i915: optimize out the case when a range is updated to read only RDMA/umem_odp: optimize out the case when a range is updated to read only drivers/gpu/drm/amd/amdgpu/amdgpu_mn.c | 13 ++++++++ drivers/gpu/drm/i915/i915_gem_userptr.c | 16 ++++++++++ drivers/gpu/drm/radeon/radeon_mn.c | 13 ++++++++ drivers/infiniband/core/umem_odp.c | 22 +++++++++++-- fs/proc/task_mmu.c | 3 +- include/linux/mmu_notifier.h | 42 ++++++++++++++++++++++++- include/rdma/ib_umem_odp.h | 1 + kernel/events/uprobes.c | 3 +- mm/huge_memory.c | 14 +++++---- mm/hugetlb.c | 11 ++++--- mm/khugepaged.c | 3 +- mm/ksm.c | 6 ++-- mm/madvise.c | 3 +- mm/memory.c | 25 +++++++++------ mm/migrate.c | 5 ++- mm/mmu_notifier.c | 10 ++++++ mm/mprotect.c | 4 ++- mm/mremap.c | 3 +- mm/oom_kill.c | 3 +- mm/rmap.c | 6 ++-- 20 files changed, 171 insertions(+), 35 deletions(-) -- 2.17.2