Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp5880313yba; Thu, 11 Apr 2019 07:40:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqyCjN6Xh5CEaVbO9ID59HkrQl2dvotUEIK24LpmcrdZoNrsI39r6e1vlpBG2B1F+i9p8D9H X-Received: by 2002:a63:5b4b:: with SMTP id l11mr17998993pgm.95.1554993641937; Thu, 11 Apr 2019 07:40:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554993641; cv=none; d=google.com; s=arc-20160816; b=Ubu5Qld42opq5Tz8m9R1O+RqURuC2PojN0FoVsodt6oct+zb+5xNkC3bJJTRMw2oXB fvJVSQ8/626HBpQavYLcpMrFnu9v6ZLWZpqqdV6r7TFw92r7iaeqIdjEsYwteWZ1lBr9 J+9g215sXZSUG7eJDI1DVsrVFsSrAUet4E790MRYX+iWZR7GEiiVTyHOOpphyCIdQn6y uUC+5A981CkOJ3/Z78Li+GzeZk90z4miIB+7zeNkaJVwwJbJsFpzuCJFXr5jBy2Lgz7x PgayXJud4kmpDQLe5HC7mXPaXkprNn7ZjXaqy2S/HVSyyfdkO+bGW8XFDUX4SNdcskc2 VYAA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=3oBVorYpbYaCOG8xuNrbAJ3SsIkrM7e1ltZ4cvCOLEQ=; b=pxYEldyn52jGBG+5VL1T8eAcwdTaPvmML9Fslv4CZEif+S4JlMVlOspbtxSFsmBpTw l7fNYCLTTfa9FHhWodrnyw2PfCViK5NxE3rACq8IR6XHlJTn6/UXoIe7NsvGnda9k5/i JYD5hQMD8eS+IhWlVy09QIxVDAsnbpmtr2FdSrJpmWdtSZkvAe8tkhyjZbyLD2W7Hjs2 UbwroC0Az6e/2PRQXuvwZkK5eapHa7G9sAgXmLmPBE+tnmhkapc9cn92ARrzw0PkcyhD e5+IB3b71zONJ3YA/o608p/tIC38qgmrMT4t4U6jRIaesGvAtODrO434722neTUXdY8T MNEw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c3si34945246pfg.109.2019.04.11.07.40.25; Thu, 11 Apr 2019 07:40:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726727AbfDKOjc (ORCPT + 99 others); Thu, 11 Apr 2019 10:39:32 -0400 Received: from mx1.redhat.com ([209.132.183.28]:43152 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726121AbfDKOjc (ORCPT ); Thu, 11 Apr 2019 10:39:32 -0400 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 773A3307B487; Thu, 11 Apr 2019 14:39:26 +0000 (UTC) Received: from redhat.com (unknown [10.20.6.236]) by smtp.corp.redhat.com (Postfix) with ESMTPS id CE2F65D9C8; Thu, 11 Apr 2019 14:39:20 +0000 (UTC) Date: Thu, 11 Apr 2019 10:39:19 -0400 From: Jerome Glisse To: Ira Weiny Cc: linux-kernel@vger.kernel.org, Andrew Morton , linux-mm@kvack.org, Christian =?iso-8859-1?Q?K=F6nig?= , Joonas Lahtinen , Jani Nikula , Rodrigo Vivi , Jan Kara , Andrea Arcangeli , Peter Xu , Felix Kuehling , Jason Gunthorpe , Ross Zwisler , Dan Williams , Paolo Bonzini , Radim =?utf-8?B?S3LEjW3DocWZ?= , Michal Hocko , Ralph Campbell , John Hubbard , kvm@vger.kernel.org, dri-devel@lists.freedesktop.org, linux-rdma@vger.kernel.org, Arnd Bergmann Subject: Re: [PATCH v6 7/8] mm/mmu_notifier: pass down vma and reasons why mmu notifier is happening v2 Message-ID: <20190411143918.GA4266@redhat.com> References: <20190326164747.24405-1-jglisse@redhat.com> <20190326164747.24405-8-jglisse@redhat.com> <20190410234124.GE22989@iweiny-DESK2.sc.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190410234124.GE22989@iweiny-DESK2.sc.intel.com> User-Agent: Mutt/1.11.3 (2019-02-01) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.46]); Thu, 11 Apr 2019 14:39:31 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 10, 2019 at 04:41:57PM -0700, Ira Weiny wrote: > On Tue, Mar 26, 2019 at 12:47:46PM -0400, Jerome Glisse wrote: > > From: Jérôme Glisse > > > > CPU page table update can happens for many reasons, not only as a result > > of a syscall (munmap(), mprotect(), mremap(), madvise(), ...) but also > > as a result of kernel activities (memory compression, reclaim, migration, > > ...). > > > > Users of mmu notifier API track changes to the CPU page table and take > > specific action for them. While current API only provide range of virtual > > address affected by the change, not why the changes is happening > > > > This patch is just passing down the new informations by adding it to the > > mmu_notifier_range structure. > > > > Changes since v1: > > - Initialize flags field from mmu_notifier_range_init() arguments > > > > Signed-off-by: Jérôme Glisse > > Cc: Andrew Morton > > Cc: linux-mm@kvack.org > > Cc: Christian König > > Cc: Joonas Lahtinen > > Cc: Jani Nikula > > Cc: Rodrigo Vivi > > Cc: Jan Kara > > Cc: Andrea Arcangeli > > Cc: Peter Xu > > Cc: Felix Kuehling > > Cc: Jason Gunthorpe > > Cc: Ross Zwisler > > Cc: Dan Williams > > Cc: Paolo Bonzini > > Cc: Radim Krčmář > > Cc: Michal Hocko > > Cc: Christian Koenig > > Cc: Ralph Campbell > > Cc: John Hubbard > > Cc: kvm@vger.kernel.org > > Cc: dri-devel@lists.freedesktop.org > > Cc: linux-rdma@vger.kernel.org > > Cc: Arnd Bergmann > > --- > > include/linux/mmu_notifier.h | 6 +++++- > > 1 file changed, 5 insertions(+), 1 deletion(-) > > > > diff --git a/include/linux/mmu_notifier.h b/include/linux/mmu_notifier.h > > index 62f94cd85455..0379956fff23 100644 > > --- a/include/linux/mmu_notifier.h > > +++ b/include/linux/mmu_notifier.h > > @@ -58,10 +58,12 @@ struct mmu_notifier_mm { > > #define MMU_NOTIFIER_RANGE_BLOCKABLE (1 << 0) > > > > struct mmu_notifier_range { > > + struct vm_area_struct *vma; > > struct mm_struct *mm; > > unsigned long start; > > unsigned long end; > > unsigned flags; > > + enum mmu_notifier_event event; > > }; > > > > struct mmu_notifier_ops { > > @@ -363,10 +365,12 @@ static inline void mmu_notifier_range_init(struct mmu_notifier_range *range, > > unsigned long start, > > unsigned long end) > > { > > + range->vma = vma; > > + range->event = event; > > range->mm = mm; > > range->start = start; > > range->end = end; > > - range->flags = 0; > > + range->flags = flags; > > Which of the "user patch sets" uses the new flags? > > I'm not seeing that user yet. In general I don't see anything wrong with the > series and I like the idea of telling drivers why the invalidate has fired. > > But is the flags a future feature? > I believe the link were in the cover: https://lkml.org/lkml/2019/1/23/833 https://lkml.org/lkml/2019/1/23/834 https://lkml.org/lkml/2019/1/23/832 https://lkml.org/lkml/2019/1/23/831 I have more coming for HMM but i am waiting after 5.2 once amdgpu HMM patch are merge upstream as it will change what is passed down to driver and it would conflict with non merged HMM driver (like amdgpu today). Cheers, Jérôme