Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5223170ybl; Tue, 10 Dec 2019 02:35:40 -0800 (PST) X-Google-Smtp-Source: APXvYqwJwE41wnkyKCSsDi/oDtvm5pwfoeOVfWiuEzZqqilZY435IrNW28kAMrmkAffhACtNzYiw X-Received: by 2002:a9d:7357:: with SMTP id l23mr23908780otk.10.1575974140820; Tue, 10 Dec 2019 02:35:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575974140; cv=none; d=google.com; s=arc-20160816; b=fXSkT3bG+vR/w2D2NfWjRSi04aqw+Wc6VbZKZ6yJA3RclxYITYj+71GnvnVeLn/BJe qlU0/LVG8TL2y5cL9jWA87GX/n1MVvuBE/6LCM3DWd1EJVDBEf2NIwC49uRg5yCu4SuF oValqHjafr9VD3rn8QicaHEhKSxxZ4PTznBOsbMOsy1eeHNfd7AAHVoPGTZ8vBNAhKMi K36WwSvmsTqHZqaNvbkclrbpZRBOgkcKF2krsqSbWNxmznhiD03rluQa6Xgb/Cy0s7hJ v1xkMaKJ+f/7GK7jK4sU1PH1xnNihHzfGIh32FrDNk8d6hF+DzXypXIGxhCsg3drEJJ/ mrJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=uizXfprRj8fjney4P3afQoTDUjaSaVYSy+09p97UTek=; b=0+sElLScTPblm0CfBI2WuGNm9W7k8uSzlYnLVlSfXnbwJmuJbKT/X6JmMQPpusOIXm 7KoS26UD7YPYtxbj4ymZsur8piv3JODUnzIPE3VYQtBOu04vecb9yFoQK6rx7mEHbv63 5lwXdb0eZsSRUsP8ahW4pSWyCGnz7wfxmp+hMom/4PkXRjwwJlTKAQ8czFik370kxG8e 0re6R7Y3TZTvJW0ab036jVhzZy7cXd6DhECRLK/Dn9ZrnZjPOsnSDmMGNkhRgMOteouu KKvZ1PMZ+XkBTX0OfGgo/HcVV3GFGOoMtZTm1U79npBd9pCuzlHKTMuQsMI8Doh9HPZB aGvA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f9si1598760otp.111.2019.12.10.02.35.28; Tue, 10 Dec 2019 02:35:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727329AbfLJKe4 (ORCPT + 99 others); Tue, 10 Dec 2019 05:34:56 -0500 Received: from mail-wr1-f65.google.com ([209.85.221.65]:33595 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726574AbfLJKe4 (ORCPT ); Tue, 10 Dec 2019 05:34:56 -0500 Received: by mail-wr1-f65.google.com with SMTP id b6so19445257wrq.0; Tue, 10 Dec 2019 02:34:54 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=uizXfprRj8fjney4P3afQoTDUjaSaVYSy+09p97UTek=; b=my/Q7mc4rbTpewBHvHXX8AO/p6IDNkGeuqDWd/NTX0qnvAHVR0aufADZBSnlIVFO55 +QKUNZugk4/DmrS4YjxsayaZtsf02slLhENZEMkvqVkLP9CAhpQ4gYw63Uytui6VYI4L PxRFqVbZVlcg/NS6NjACYAS2USGXfFsLeg95nMuhEGlhlSRuG+VbWQ9eUx6yOPJ9T3TO l/UpwiODsHSwXjTehfly4Cn9nwug375aVjUXgss1SIyfCm+1pQDSr8/mGvf8VPf1F2RC HADAmFKsSm0Jr9cLITS0CgqlmapbhRVpU5PdJdjj+jVBS4prQbXTyfUlTfzAbSoPSJJe f5rw== X-Gm-Message-State: APjAAAVyPVXeiT5NHRyN+SZGslx6geH/KTMwv4la8XI1dyF61KOMjhis ZVEz8CpT4OLtXoC1UV8PdCI= X-Received: by 2002:adf:8297:: with SMTP id 23mr2231156wrc.379.1575974093765; Tue, 10 Dec 2019 02:34:53 -0800 (PST) Received: from localhost (prg-ext-pat.suse.com. [213.151.95.130]) by smtp.gmail.com with ESMTPSA id t1sm2693672wma.43.2019.12.10.02.34.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Dec 2019 02:34:52 -0800 (PST) Date: Tue, 10 Dec 2019 11:34:52 +0100 From: Michal Hocko To: David Hildenbrand Cc: Dan Williams , Logan Gunthorpe , Linux Kernel Mailing List , Linux ARM , linux-ia64@vger.kernel.org, linuxppc-dev , linux-s390 , Linux-sh , platform-driver-x86@vger.kernel.org, Linux MM , Christoph Hellwig , Andrew Morton , Catalin Marinas , Will Deacon , Benjamin Herrenschmidt , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , Andy Lutomirski , Peter Zijlstra Subject: Re: [PATCH 5/6] mm, memory_hotplug: Provide argument for the pgprot_t in arch_add_memory() Message-ID: <20191210103452.GF10404@dhcp22.suse.cz> References: <20191209191346.5197-1-logang@deltatee.com> <20191209191346.5197-6-logang@deltatee.com> <20191210100432.GC10404@dhcp22.suse.cz> <6da2b279-6a6d-d89c-a34c-962ed021d91d@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6da2b279-6a6d-d89c-a34c-962ed021d91d@redhat.com> User-Agent: Mutt/1.12.2 (2019-09-21) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 10-12-19 11:09:46, David Hildenbrand wrote: > On 10.12.19 11:04, Michal Hocko wrote: > > On Mon 09-12-19 12:43:40, Dan Williams wrote: > >> On Mon, Dec 9, 2019 at 12:24 PM Logan Gunthorpe wrote: > >>> > >>> > >>> > >>> On 2019-12-09 12:23 p.m., David Hildenbrand wrote: > >>>> On 09.12.19 20:13, Logan Gunthorpe wrote: > > [...] > >>>>> #ifdef CONFIG_MEMORY_HOTPLUG > >>>>> -int arch_add_memory(int nid, u64 start, u64 size, > >>>>> +int arch_add_memory(int nid, u64 start, u64 size, pgprot_t prot, > >>>>> struct mhp_restrictions *restrictions) > >>>> > >>>> Can we fiddle that into "struct mhp_restrictions" instead? > >>> > >>> Yes, if that's what people want, it's pretty trivial to do. I chose not > >>> to do it that way because it doesn't get passed down to add_pages() and > >>> it's not really a "restriction". If I don't hear any objections, I will > >>> do that for v2. > >> > >> +1 to storing this information alongside the altmap in that structure. > >> However, I agree struct mhp_restrictions, with the MHP_MEMBLOCK_API > >> flag now gone, has lost all of its "restrictions". How about dropping > >> the 'flags' property and renaming the struct to 'struct > >> mhp_modifiers'? > > > > Hmm, this email somehow didn't end up in my inbox so I have missed it > > before replying. > > > > Well, mhp_modifiers makes some sense and it would reduce the API > > proliferation but how do you expect the prot part to be handled? > > I really do not want people to think about PAGE_KERNEL or which > > protection to use because my experience tells that this will get copied > > without much thinking or simply will break with some odd usecases. > > So how exactly this would be used? > > I was thinking about exactly the same "issue". > > 1. default initialization via a function > > memhp_modifier_default_init(&modified); > > 2. a flag that unlocks the prot field (default:0). Without the flag, it > is ignored. We can keep the current initialization then. > > Other ideas? 3. a prot mask to apply on top of PAGE_KERNEL? Or would that be insufficient/clumsy? -- Michal Hocko SUSE Labs