Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1021092ybt; Fri, 19 Jun 2020 21:53:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy5kOeU3DYLpzL/Hf3XyMBh6YTSADGwFCIbKkmm79ORhX2yrsDVP5Y2JeiUt2wh4j9NVFXO X-Received: by 2002:a17:906:af4d:: with SMTP id ly13mr6363730ejb.250.1592628783994; Fri, 19 Jun 2020 21:53:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592628783; cv=none; d=google.com; s=arc-20160816; b=hjrS+Tocp0iXRhnV/oTOYfLrWswy57sPfS1vmzy1GS+ImPfT0rjla6UWMBjRW5x5rp x8+oxDzq96ljpDru3IHlYQEI1BlTJBaip8vmvOLHyvdjGBORg+2Mo3YidBxVAH8NkoVN 725tKvI2si0VITqmyqxfG5onUm8zg7xAdpAUhz0q8R6sLw+77cEMVdO32SWTgs9+URJz CdvDFiBKytayumGxa+HcS2xw+vRHPcfvvWiol3+FBAs1t0J9c1qq0MpnbebqwF4v0RvO nwE5gjgqy8C+up+OK9uo5WDkPMHY3oxuUAnG46e1LoudlUjZSmQ7OVbBKLN3NWwOKCNx mvHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:dkim-signature:content-transfer-encoding :mime-version:references:in-reply-to:message-id:date:subject:cc:to :from; bh=/sU0fsdcnEwURrqlxGb1H/zsI5qpcxe39CKQwEfKf7w=; b=cb8bI8gxuj2o1wG2HjvEt7F/sZQ5IvFxCDHLavhZ/n5aiMdm9HQYf44xgTL71IeIgH /X+/aqhOre7bblVD8lQTKluHAdZjZ4vHazDlSpqRXKrhXGsPQo/zJ4RYbeDOkezpXq8L 0u0uOA7FXDNC8Mks0PfaGmtO5KIBBlK4N0WF50PYGh3WW9l5NPpSncz4rus48/7J/crc +cyMSvziK/bggjUau9O94tvbVU6d4oCADRszQUaBpdsFgiPdD/p/xRpQH0rgvi7/HDy2 y04zlhDy2qmLgjzlOUBnVOJCY5dJCwOmzxWRsKBsL3dX7myjNGalm2QTETEolslXdMgk /0zg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=I7rwRv4j; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id od24si5150940ejb.103.2020.06.19.21.52.42; Fri, 19 Jun 2020 21:53:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@nvidia.com header.s=n1 header.b=I7rwRv4j; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=nvidia.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728586AbgFSV7H (ORCPT + 99 others); Fri, 19 Jun 2020 17:59:07 -0400 Received: from hqnvemgate26.nvidia.com ([216.228.121.65]:2193 "EHLO hqnvemgate26.nvidia.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728242AbgFSV5H (ORCPT ); Fri, 19 Jun 2020 17:57:07 -0400 Received: from hqpgpgate101.nvidia.com (Not Verified[216.228.121.13]) by hqnvemgate26.nvidia.com (using TLS: TLSv1.2, DES-CBC3-SHA) id ; Fri, 19 Jun 2020 14:56:53 -0700 Received: from hqmail.nvidia.com ([172.20.161.6]) by hqpgpgate101.nvidia.com (PGP Universal service); Fri, 19 Jun 2020 14:57:06 -0700 X-PGP-Universal: processed; by hqpgpgate101.nvidia.com on Fri, 19 Jun 2020 14:57:06 -0700 Received: from HQMAIL105.nvidia.com (172.20.187.12) by HQMAIL105.nvidia.com (172.20.187.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Fri, 19 Jun 2020 21:56:59 +0000 Received: from hqnvemgw03.nvidia.com (10.124.88.68) by HQMAIL105.nvidia.com (172.20.187.12) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Fri, 19 Jun 2020 21:56:59 +0000 Received: from rcampbell-dev.nvidia.com (Not Verified[10.110.48.66]) by hqnvemgw03.nvidia.com with Trustwave SEG (v7,5,8,10121) id ; Fri, 19 Jun 2020 14:56:59 -0700 From: Ralph Campbell To: , , , , CC: Jerome Glisse , John Hubbard , Christoph Hellwig , Jason Gunthorpe , "Ben Skeggs" , Andrew Morton , Shuah Khan , Ralph Campbell Subject: [PATCH 05/16] mm/hmm/test: remove redundant page table invalidate Date: Fri, 19 Jun 2020 14:56:38 -0700 Message-ID: <20200619215649.32297-6-rcampbell@nvidia.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200619215649.32297-1-rcampbell@nvidia.com> References: <20200619215649.32297-1-rcampbell@nvidia.com> MIME-Version: 1.0 X-NVConfidentiality: public Content-Transfer-Encoding: quoted-printable Content-Type: text/plain DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1; t=1592603813; bh=/sU0fsdcnEwURrqlxGb1H/zsI5qpcxe39CKQwEfKf7w=; h=X-PGP-Universal:From:To:CC:Subject:Date:Message-ID:X-Mailer: In-Reply-To:References:MIME-Version:X-NVConfidentiality: Content-Transfer-Encoding:Content-Type; b=I7rwRv4jtx0PGmvB9STFPnybf36OQ/oYAAEEfTxoK6JTZPjO9M24eLKi1nRSwaZ5n 15aqTCY0n/5hRAi4O0IZZfy+U9KY5r/HBVKepmXUMf5o6FkYtz5XRLXd/hfXb0nvwa 4s6c9wgBjqd2tvbOEyTQyyyFRKww5AcjKlMSzAn/Q8+W99JQoCyZhOJ9QSaF8cYZp7 Dd2Ku+wjYpqSA/fHUxPD30JaFCboOViegswfhiOmnNGWr1lQFy3sMkZWXJhCGoN3jg L/l4NTUss+RttcS4JNW06KSPhAT7GmXTyzdXmxYQRmJO+wiW4vi4pvxJzedEk/BrfU mKSzmLt5kU+Ag== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When migrating pages to or from device private memory, the device's page tables will be invalidated as part of migrate_vma_setup() locking and isolating the pages. The HMM self test driver doesn't need to invalidate the page table a second time after migrating pages to system memory so remove that bit of extra code. Signed-off-by: Ralph Campbell --- lib/test_hmm.c | 14 ++++---------- 1 file changed, 4 insertions(+), 10 deletions(-) diff --git a/lib/test_hmm.c b/lib/test_hmm.c index 28528285942c..f7c2b51a7a9d 100644 --- a/lib/test_hmm.c +++ b/lib/test_hmm.c @@ -1018,15 +1018,6 @@ static vm_fault_t dmirror_devmem_fault_alloc_and_cop= y(struct migrate_vma *args, return 0; } =20 -static void dmirror_devmem_fault_finalize_and_map(struct migrate_vma *args= , - struct dmirror *dmirror) -{ - /* Invalidate the device's page table mapping. */ - mutex_lock(&dmirror->mutex); - dmirror_do_update(dmirror, args->start, args->end); - mutex_unlock(&dmirror->mutex); -} - static vm_fault_t dmirror_devmem_fault(struct vm_fault *vmf) { struct migrate_vma args; @@ -1059,7 +1050,10 @@ static vm_fault_t dmirror_devmem_fault(struct vm_fau= lt *vmf) if (ret) return ret; migrate_vma_pages(&args); - dmirror_devmem_fault_finalize_and_map(&args, dmirror); + /* + * No device finalize step is needed since migrate_vma_setup() will + * have already invalidated the device page table. + */ migrate_vma_finalize(&args); return 0; } --=20 2.20.1