Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp4462444img; Tue, 26 Mar 2019 09:51:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqzDUqF6QqKH7ursyGfzGJBJW0QTkaIyYEhaThhbWTuVCNgykgOrWy992BS6yYbIhHU49dbu X-Received: by 2002:a63:525f:: with SMTP id s31mr28788693pgl.172.1553619065137; Tue, 26 Mar 2019 09:51:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553619065; cv=none; d=google.com; s=arc-20160816; b=w/bUo0WL669jRZ/DaGscnlj6H/UT4dxC+vmIr7Ari0NjocE8kbFr1yttIv4NLvRvpR kt1dgBcvNYmR+8hl/KPCTsz6wFdIhKYjOdMcS4ZEpTf2TCZTc9l6g9RiQ0NIl9HPaa0Y ZGkUh/3KeY4BmX7Ra5ZqJlxKDaskjkwQ2BD1VBfl4bp2W1+dRhXXmBdr58LBnyqRcftK Pn2cSAfIz6qPlq/0SM/CVTI9fqVqYewyfNVNOg7BXBB0dsexPioX0kAUIXgSDTvq7ia1 4dGA5L08Xxc28L6BBv/pTk5A22TqMfJTOvsdF1A1SRfQB3SYMLuLtnhS7dRCeuhD8SOX erOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=LiR7M+gjL1jwp4S7wm8Je1S/i9RmM3FIjpOd06XnOUo=; b=oE5ikdbQjFT/uZ58G/rVcDwb06we8fp+t/zufuM06ruKccPCQP8kHUFQHa40IzseNf NC7tI7zdvmWigMtbE6MYAjVNn6Y9B2+5W/iFgPyEBeU8DgNHO5HHjbdaaKzkDyyN1WJE 4YQpHd/yYuLkA4t9ztxaIYBn+HWyLxLqmYo5Hf2bDqy/fXvO1dMfZucH88mZCxoboyQB 53WhUeX5ORm0WUVG5+B0SM/CZKIj5FcHRc7sJeKz1VoAO41HDMZMpxS6Xzz4RX9rwbx5 4MHWC7UnytjeodFnkEZCUJq1jM48ItKtkhX5c98MHCrIpX8KzWyk9+hbmcJ6DOeP7oR8 9Frw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b9si10777085pgn.457.2019.03.26.09.50.49; Tue, 26 Mar 2019 09:51:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731718AbfCZQsC (ORCPT + 99 others); Tue, 26 Mar 2019 12:48:02 -0400 Received: from mx1.redhat.com ([209.132.183.28]:40812 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729440AbfCZQsC (ORCPT ); Tue, 26 Mar 2019 12:48:02 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 47087461D1; Tue, 26 Mar 2019 16:48:01 +0000 (UTC) Received: from localhost.localdomain.com (unknown [10.20.6.236]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6C2B88429D; Tue, 26 Mar 2019 16:47:55 +0000 (UTC) From: jglisse@redhat.com To: linux-kernel@vger.kernel.org Cc: =?UTF-8?q?J=C3=A9r=C3=B4me=20Glisse?= , Andrew Morton , linux-mm@kvack.org, =?UTF-8?q?Christian=20K=C3=B6nig?= , Joonas Lahtinen , Jani Nikula , Rodrigo Vivi , Jan Kara , Andrea Arcangeli , Peter Xu , Felix Kuehling , Jason Gunthorpe , Ross Zwisler , Dan Williams , Paolo Bonzini , Alex Deucher , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Michal Hocko , Ben Skeggs , Ralph Campbell , John Hubbard , kvm@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-rdma@vger.kernel.org, Arnd Bergmann Subject: [PATCH v6 0/8] mmu notifier provide context informations Date: Tue, 26 Mar 2019 12:47:39 -0400 Message-Id: <20190326164747.24405-1-jglisse@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.29]); Tue, 26 Mar 2019 16:48:01 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jérôme Glisse (Andrew this apply on top of my HMM patchset as otherwise you will have conflict with changes to mm/hmm.c) Changes since v5: - drop KVM bits waiting for KVM people to express interest if they do not then i will post patchset to remove change_pte_notify as without the changes in v5 change_pte_notify is just useless (it it is useless today upstream it is just wasting cpu cycles) - rebase on top of lastest Linus tree Previous cover letter with minor update: Here i am not posting users of this, they already have been posted to appropriate mailing list [6] and will be merge through the appropriate tree once this patchset is upstream. Note that this serie does not change any behavior for any existing code. It just pass down more information to mmu notifier listener. The rational for this patchset: CPU page table update can happens for many reasons, not only as a result of a syscall (munmap(), mprotect(), mremap(), madvise(), ...) but also as a result of kernel activities (memory compression, reclaim, migration, ...). This patch introduce a set of enums that can be associated with each of the events triggering a mmu notifier: - UNMAP: munmap() or mremap() - CLEAR: page table is cleared (migration, compaction, reclaim, ...) - PROTECTION_VMA: change in access protections for the range - PROTECTION_PAGE: change in access protections for page in the range - SOFT_DIRTY: soft dirtyness tracking Being able to identify munmap() and mremap() from other reasons why the page table is cleared is important to allow user of mmu notifier to update their own internal tracking structure accordingly (on munmap or mremap it is not longer needed to track range of virtual address as it becomes invalid). Without this serie, driver are force to assume that every notification is an munmap which triggers useless trashing within drivers that associate structure with range of virtual address. Each driver is force to free up its tracking structure and then restore it on next device page fault. With this serie we can also optimize device page table update [6]. More over this can also be use to optimize out some page table updates like for KVM where we can update the secondary MMU directly from the callback instead of clearing it. ACKS AMD/RADEON https://lkml.org/lkml/2019/2/1/395 ACKS RDMA https://lkml.org/lkml/2018/12/6/1473 Cheers, Jérôme [1] v1 https://lkml.org/lkml/2018/3/23/1049 [2] v2 https://lkml.org/lkml/2018/12/5/10 [3] v3 https://lkml.org/lkml/2018/12/13/620 [4] v4 https://lkml.org/lkml/2019/1/23/838 [5] v5 https://lkml.org/lkml/2019/2/19/752 [6] patches to use this: https://lkml.org/lkml/2019/1/23/833 https://lkml.org/lkml/2019/1/23/834 https://lkml.org/lkml/2019/1/23/832 https://lkml.org/lkml/2019/1/23/831 Cc: Andrew Morton Cc: linux-mm@kvack.org Cc: Christian König Cc: Joonas Lahtinen Cc: Jani Nikula Cc: Rodrigo Vivi Cc: Jan Kara Cc: Andrea Arcangeli Cc: Peter Xu Cc: Felix Kuehling Cc: Jason Gunthorpe Cc: Ross Zwisler Cc: Dan Williams Cc: Paolo Bonzini Cc: Alex Deucher Cc: Radim Krčmář Cc: Michal Hocko Cc: Christian Koenig Cc: Ben Skeggs Cc: Ralph Campbell Cc: John Hubbard Cc: kvm@vger.kernel.org Cc: dri-devel@lists.freedesktop.org Cc: linux-rdma@vger.kernel.org Cc: Arnd Bergmann Jérôme Glisse (8): mm/mmu_notifier: helper to test if a range invalidation is blockable mm/mmu_notifier: convert user range->blockable to helper function mm/mmu_notifier: convert mmu_notifier_range->blockable to a flags mm/mmu_notifier: contextual information for event enums mm/mmu_notifier: contextual information for event triggering invalidation v2 mm/mmu_notifier: use correct mmu_notifier events for each invalidation mm/mmu_notifier: pass down vma and reasons why mmu notifier is happening v2 mm/mmu_notifier: mmu_notifier_range_update_to_read_only() helper drivers/gpu/drm/amd/amdgpu/amdgpu_mn.c | 8 ++-- drivers/gpu/drm/i915/i915_gem_userptr.c | 2 +- drivers/gpu/drm/radeon/radeon_mn.c | 4 +- drivers/infiniband/core/umem_odp.c | 5 +- drivers/xen/gntdev.c | 6 +-- fs/proc/task_mmu.c | 3 +- include/linux/mmu_notifier.h | 63 +++++++++++++++++++++++-- kernel/events/uprobes.c | 3 +- mm/hmm.c | 6 +-- mm/huge_memory.c | 14 +++--- mm/hugetlb.c | 12 +++-- mm/khugepaged.c | 3 +- mm/ksm.c | 6 ++- mm/madvise.c | 3 +- mm/memory.c | 25 ++++++---- mm/migrate.c | 5 +- mm/mmu_notifier.c | 12 ++++- mm/mprotect.c | 4 +- mm/mremap.c | 3 +- mm/oom_kill.c | 3 +- mm/rmap.c | 6 ++- virt/kvm/kvm_main.c | 3 +- 22 files changed, 147 insertions(+), 52 deletions(-) -- 2.20.1