Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp1044480ybb; Thu, 28 Mar 2019 18:18:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqzieFs4LIQ59haf701/65GGO6guuAwKbtBFsHtY7xciMBVXVtqLuPbmDvGhuwz2xgQxEEXj X-Received: by 2002:a63:618d:: with SMTP id v135mr43188228pgb.2.1553822339758; Thu, 28 Mar 2019 18:18:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553822339; cv=none; d=google.com; s=arc-20160816; b=BkdKjPKASsZ/w770ut+9S131gBNhbpEgcTq8fMSSsm/jPranFFaELXetgczotcCpvB /uw55OBmu1WNXI6vZYzgxsB0O/WCJioSwIhzpuK5Ic+eBdnFrjAsgIRgAJbUGH4KXUtL i06geU3nomDOBiDuyUByE8XrzzhHnfpnOgyd1FMgXeTfQseL65fWk6wEow5VA8bJNaP2 eL7T8erGVlrY/lXEl/kAixRiyF3GmiCbGCQK7WRoKfOYxBO112YTzOiqkvdrkuX6Km7b MzSnpXw8h+JxXC2havKd8hKUWWVur2LECbQFHhQyLVV/kWQifULjv22RrvVXYZY/nfS8 45aw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=vWXQHZWj5B9n9u1m4nYJc8XOzk8sgjuz0x7UCf5Np1Q=; b=J79tR/b1vWWPP34V52hALClgFtncBzEBUPaMogxoZksHY6N48rxOz1fPJf+H8h+4H1 dE+W0tjKL1EVMDcGaMi/h06KGzKWWqfW+RaHMtRauciGiVTGqWvQuTcwQzTwk5F5HaF4 Xq4WfMYrM6GbxboMSIjVTxbotuHOdGPE4+/doC2MMKeHpSQARiyvzvHppz8zZAgdFxVy M0blYkNntEYxFshI8HrtCltNk/X4v9o9y+ZJoQgVs4LefISYdW5CLK4Ujm+kT8LtFevd iIu3d1X7XjUuPXJzchp8gBzSAXM/zd1yPD12xiovEjusQ/TaO+ljsQUjWZ3xHjMbrYi7 5hug== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l68si597554plb.342.2019.03.28.18.18.31; Thu, 28 Mar 2019 18:18:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728359AbfC2BRc (ORCPT + 99 others); Thu, 28 Mar 2019 21:17:32 -0400 Received: from mx1.redhat.com ([209.132.183.28]:38046 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727815AbfC2BRb (ORCPT ); Thu, 28 Mar 2019 21:17:31 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 822D23082AED; Fri, 29 Mar 2019 01:17:31 +0000 (UTC) Received: from redhat.com (ovpn-121-118.rdu2.redhat.com [10.10.121.118]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 671EE62669; Fri, 29 Mar 2019 01:17:30 +0000 (UTC) Date: Thu, 28 Mar 2019 21:17:28 -0400 From: Jerome Glisse To: Ira Weiny Cc: John Hubbard , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Andrew Morton , Dan Williams Subject: Re: [PATCH v2 07/11] mm/hmm: add default fault flags to avoid the need to pre-fill pfns arrays. Message-ID: <20190329011727.GC16680@redhat.com> References: <20190325144011.10560-1-jglisse@redhat.com> <20190325144011.10560-8-jglisse@redhat.com> <2f790427-ea87-b41e-b386-820ccdb7dd38@nvidia.com> <20190328221203.GF13560@redhat.com> <555ad864-d1f9-f513-9666-0d3d05dbb85d@nvidia.com> <20190328223153.GG13560@redhat.com> <768f56f5-8019-06df-2c5a-b4187deaac59@nvidia.com> <20190328232125.GJ13560@redhat.com> <20190328164231.GF31324@iweiny-DESK2.sc.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190328164231.GF31324@iweiny-DESK2.sc.intel.com> User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.45]); Fri, 29 Mar 2019 01:17:31 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 28, 2019 at 09:42:31AM -0700, Ira Weiny wrote: > On Thu, Mar 28, 2019 at 04:28:47PM -0700, John Hubbard wrote: > > On 3/28/19 4:21 PM, Jerome Glisse wrote: > > > On Thu, Mar 28, 2019 at 03:40:42PM -0700, John Hubbard wrote: > > >> On 3/28/19 3:31 PM, Jerome Glisse wrote: > > >>> On Thu, Mar 28, 2019 at 03:19:06PM -0700, John Hubbard wrote: > > >>>> On 3/28/19 3:12 PM, Jerome Glisse wrote: > > >>>>> On Thu, Mar 28, 2019 at 02:59:50PM -0700, John Hubbard wrote: > > >>>>>> On 3/25/19 7:40 AM, jglisse@redhat.com wrote: > > >>>>>>> From: J?r?me Glisse > > [...] > > >> Hi Jerome, > > >> > > >> I think you're talking about flags, but I'm talking about the mask. The > > >> above link doesn't appear to use the pfn_flags_mask, and the default_flags > > >> that it uses are still in the same lower 3 bits: > > >> > > >> +static uint64_t odp_hmm_flags[HMM_PFN_FLAG_MAX] = { > > >> + ODP_READ_BIT, /* HMM_PFN_VALID */ > > >> + ODP_WRITE_BIT, /* HMM_PFN_WRITE */ > > >> + ODP_DEVICE_BIT, /* HMM_PFN_DEVICE_PRIVATE */ > > >> +}; > > >> > > >> So I still don't see why we need the flexibility of a full 0xFFFFFFFFFFFFFFFF > > >> mask, that is *also* runtime changeable. > > > > > > So the pfn array is using a device driver specific format and we have > > > no idea nor do we need to know where the valid, write, ... bit are in > > > that format. Those bits can be in the top 60 bits like 63, 62, 61, ... > > > we do not care. They are device with bit at the top and for those you > > > need a mask that allows you to mask out those bits or not depending on > > > what the user want to do. > > > > > > The mask here is against an _unknown_ (from HMM POV) format. So we can > > > not presume where the bits will be and thus we can not presume what a > > > proper mask is. > > > > > > So that's why a full unsigned long mask is use here. > > > > > > Maybe an example will help let say the device flag are: > > > VALID (1 << 63) > > > WRITE (1 << 62) > > > > > > Now let say that device wants to fault with at least read a range > > > it does set: > > > range->default_flags = (1 << 63) > > > range->pfn_flags_mask = 0; > > > > > > This will fill fault all page in the range with at least read > > > permission. > > > > > > Now let say it wants to do the same except for one page in the range > > > for which its want to have write. Now driver set: > > > range->default_flags = (1 << 63); > > > range->pfn_flags_mask = (1 << 62); > > > range->pfns[index_of_write] = (1 << 62); > > > > > > With this HMM will fault in all page with at least read (ie valid) > > > and for the address: range->start + index_of_write << PAGE_SHIFT it > > > will fault with write permission ie if the CPU pte does not have > > > write permission set then handle_mm_fault() will be call asking for > > > write permission. > > > > > > > > > Note that in the above HMM will populate the pfns array with write > > > permission for any entry that have write permission within the CPU > > > pte ie the default_flags and pfn_flags_mask is only the minimun > > > requirement but HMM always returns all the flag that are set in the > > > CPU pte. > > > > > > > > > Now let say you are an "old" driver like nouveau upstream, then it > > > means that you are setting each individual entry within range->pfns > > > with the exact flags you want for each address hence here what you > > > want is: > > > range->default_flags = 0; > > > range->pfn_flags_mask = -1UL; > > > > > > So that what we do is (for each entry): > > > (range->pfns[index] & range->pfn_flags_mask) | range->default_flags > > > and we end up with the flags that were set by the driver for each of > > > the individual range->pfns entries. > > > > > > > > > Does this help ? > > > > > > > Yes, the key point for me was that this is an entirely device driver specific > > format. OK. But then we have HMM setting it. So a comment to the effect that > > this is device-specific might be nice, but I'll leave that up to you whether > > it is useful. > > Indeed I did not realize there is an hmm "pfn" until I saw this function: > > /* > * hmm_pfn_from_pfn() - create a valid HMM pfn value from pfn > * @range: range use to encode HMM pfn value > * @pfn: pfn value for which to create the HMM pfn > * Returns: valid HMM pfn for the pfn > */ > static inline uint64_t hmm_pfn_from_pfn(const struct hmm_range *range, > unsigned long pfn) > > So should this patch contain some sort of helper like this... maybe? > > I'm assuming the "hmm_pfn" being returned above is the device pfn being > discussed here? > > I'm also thinking calling it pfn is confusing. I'm not advocating a new type > but calling the "device pfn's" "hmm_pfn" or "device_pfn" seems like it would > have shortened the discussion here. > That helper is also use today by nouveau so changing that name is not that easy it does require the multi-release dance. So i am not sure how much value there is in a name change. Cheers, J?r?me