Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp539283pxa; Fri, 31 Jul 2020 20:45:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/rc/EVzpY+zY2jZRU+AjBZ4avBz2itQrFe+7DWLGWTkfK1lKkWcxTEk7uxFFd1cBO0AYh X-Received: by 2002:a50:a6da:: with SMTP id f26mr6829371edc.4.1596253534846; Fri, 31 Jul 2020 20:45:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596253534; cv=none; d=google.com; s=arc-20160816; b=ez4V7O+qinSgCKfj4Kukop8WLyMNK46RBrNIpy1ZJUQMdaIpd1EcNdafZmlgoFRraG SQ1bDGwLc8FAzCrkgGgvfKSaISeAlWspU8gfLSvzPL7Txzf89lhtWNil1InSzq7m6loG KZ7TaHtgSZRn4UGoiQPjR6vuHRGW9k+ykfG/IklOP6ibJJqZ5OSV9F8hcz3NP/zbH4t8 Nd3eGqgkeN673jbUATPpG4RnmGW7PHGE27oZKXwivLfnCRPEZYI6+MjJYaDNdArQ8hHi MocOhdhye4KP2K4aHLbg+aSV/J5r3CE3I5DG+74TdQwxSBM3Q4yibEWHjDs/JyXO7oR8 /5Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:ironport-sdr:ironport-sdr; bh=gkgTl5DGsItfjYXt6++wB37HFy6+oIAYmkaQfY0bKTQ=; b=JjjhufOwaI48lMZmN83EiYUCfqzGPTOzoaIRPtCYBLIldpdD2BkVhVy9akne6ttji8 rOAdhcdp1AyojULnNn7m0HqhtrA2MBN7xDGO5oSx8kGXHB8TT9UPiu33OvkzYcCm6NSE u9ZNp9EIQxYXo6Nw5U9SrZ7sFDWCswX98pqDg/9FmP/4+86G9jYdFeE1P4yp3NVGthPT R9niFEphgEJKFBf89XejIn/PoSiXf/E64Ytm0PMpb3urs4Jyd8piDb6+rZNg6ep0ZWf+ 3oUU8sek0RhXUPijBwEZWc/XA5mPiy000vTw6mQYX+s62UQTcYuWYvPIX/8I0a+hNrVH 4egw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x24si5194267ejs.198.2020.07.31.20.45.12; Fri, 31 Jul 2020 20:45:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728934AbgHADn1 (ORCPT + 99 others); Fri, 31 Jul 2020 23:43:27 -0400 Received: from mga06.intel.com ([134.134.136.31]:44951 "EHLO mga06.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728853AbgHADn0 (ORCPT ); Fri, 31 Jul 2020 23:43:26 -0400 IronPort-SDR: kQL6HD1pNp0WW7OMWUHJDq2aPRhbvoa7u5QHgQSb13ejdBl/6DgtpJZHABmRWZ1NFMwYge/0aS pWyLlEIdn7kQ== X-IronPort-AV: E=McAfee;i="6000,8403,9699"; a="213438824" X-IronPort-AV: E=Sophos;i="5.75,420,1589266800"; d="scan'208";a="213438824" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jul 2020 20:43:25 -0700 IronPort-SDR: 3tc/gl+Ukhwb9k/89dnYCY1jX8bmF0P6xAPx5J16Wse/Ii4OkO5eOj/7spk8hjCUuDHr53hy7+ 2RDkF1VglSSg== X-IronPort-AV: E=Sophos;i="5.75,420,1589266800"; d="scan'208";a="395520056" Received: from dwillia2-desk3.jf.intel.com (HELO dwillia2-desk3.amr.corp.intel.com) ([10.54.39.16]) by fmsmga001-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jul 2020 20:43:24 -0700 Subject: [PATCH v3 23/23] device-dax: Add a range mapping allocation attribute From: Dan Williams To: akpm@linux-foundation.org Cc: Joao Martins , peterz@infradead.org, vishal.l.verma@intel.com, dave.hansen@linux.intel.com, ard.biesheuvel@linaro.org, vishal.l.verma@intel.com, linux-mm@kvack.org, linux-nvdimm@lists.01.org, joao.m.martins@oracle.com, linux-kernel@vger.kernel.org, linux-acpi@vger.kernel.org, dri-devel@lists.freedesktop.org Date: Fri, 31 Jul 2020 20:27:06 -0700 Message-ID: <159625242681.3040297.14551750051856153463.stgit@dwillia2-desk3.amr.corp.intel.com> In-Reply-To: <159625229779.3040297.11363509688097221416.stgit@dwillia2-desk3.amr.corp.intel.com> References: <159625229779.3040297.11363509688097221416.stgit@dwillia2-desk3.amr.corp.intel.com> User-Agent: StGit/0.18-3-g996c MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joao Martins Add a sysfs attribute which denotes a range from the dax region to be allocated. It's an write only @mapping sysfs attribute in the format of '-' to allocate a range. @start and @end use hexadecimal values and the @pgoff is implicitly ordered wrt to previous writes to @mapping sysfs e.g. a write of a range of length 1G the pgoff is 0..1G(-4K), a second write will use @pgoff for 1G+4K... This range mapping interface is useful for: 1) Application which want to implement its own allocation logic, and thus pick the desired ranges from dax_region. 2) For use cases like VMM fast restart[0] where after kexec we want to the same gpa<->phys mappings (as originally created before kexec). [0] https://static.sched.com/hosted_files/kvmforum2019/66/VMM-fast-restart_kvmforum2019.pdf Signed-off-by: Joao Martins Link: https://lore.kernel.org/r/20200716172913.19658-5-joao.m.martins@oracle.com Signed-off-by: Dan Williams --- drivers/dax/bus.c | 64 +++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 64 insertions(+) diff --git a/drivers/dax/bus.c b/drivers/dax/bus.c index 7a9439132573..aa67555ba183 100644 --- a/drivers/dax/bus.c +++ b/drivers/dax/bus.c @@ -1040,6 +1040,67 @@ static ssize_t size_store(struct device *dev, struct device_attribute *attr, } static DEVICE_ATTR_RW(size); +static ssize_t range_parse(const char *opt, size_t len, struct range *range) +{ + unsigned long long addr = 0; + char *start, *end, *str; + ssize_t rc = EINVAL; + + str = kstrdup(opt, GFP_KERNEL); + if (!str) + return rc; + + end = str; + start = strsep(&end, "-"); + if (!start || !end) + goto err; + + rc = kstrtoull(start, 16, &addr); + if (rc) + goto err; + range->start = addr; + + rc = kstrtoull(end, 16, &addr); + if (rc) + goto err; + range->end = addr; + +err: + kfree(str); + return rc; +} + +static ssize_t mapping_store(struct device *dev, struct device_attribute *attr, + const char *buf, size_t len) +{ + struct dev_dax *dev_dax = to_dev_dax(dev); + struct dax_region *dax_region = dev_dax->region; + size_t to_alloc; + struct range r; + ssize_t rc; + + rc = range_parse(buf, len, &r); + if (rc) + return rc; + + rc = -ENXIO; + device_lock(dax_region->dev); + if (!dax_region->dev->driver) { + device_unlock(dax_region->dev); + return rc; + } + device_lock(dev); + + to_alloc = range_len(&r); + if (alloc_is_aligned(dev_dax, to_alloc)) + rc = alloc_dev_dax_range(dev_dax, r.start, to_alloc); + device_unlock(dev); + device_unlock(dax_region->dev); + + return rc == 0 ? len : rc; +} +static DEVICE_ATTR_WO(mapping); + static ssize_t align_show(struct device *dev, struct device_attribute *attr, char *buf) { @@ -1181,6 +1242,8 @@ static umode_t dev_dax_visible(struct kobject *kobj, struct attribute *a, int n) return 0; if (a == &dev_attr_numa_node.attr && !IS_ENABLED(CONFIG_NUMA)) return 0; + if (a == &dev_attr_mapping.attr && is_static(dax_region)) + return 0; if ((a == &dev_attr_align.attr || a == &dev_attr_size.attr) && is_static(dax_region)) return 0444; @@ -1190,6 +1253,7 @@ static umode_t dev_dax_visible(struct kobject *kobj, struct attribute *a, int n) static struct attribute *dev_dax_attributes[] = { &dev_attr_modalias.attr, &dev_attr_size.attr, + &dev_attr_mapping.attr, &dev_attr_target_node.attr, &dev_attr_align.attr, &dev_attr_resource.attr,