Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp947133rdb; Tue, 30 Jan 2024 03:39:00 -0800 (PST) X-Google-Smtp-Source: AGHT+IF8FKr7NAL4MohnRMr7rRFxcJ0kl5x8Uf5abxyUQ+Dij8FuHcQG/K1NrZIH3SMSCPUbbFsQ X-Received: by 2002:a17:90a:16d7:b0:290:1477:f612 with SMTP id y23-20020a17090a16d700b002901477f612mr3884435pje.14.1706614739825; Tue, 30 Jan 2024 03:38:59 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706614739; cv=pass; d=google.com; s=arc-20160816; b=kuFXfdrbjeu/seWFytK5YSdFcwHVoml6hdv8vbEq4NwCFnymD835yK44WRWLiFghUb JfHZinap8Ky3jPPVDqPAaxjmresIs3CAhsIfOyklJv2+qLmAxaD3Ro9Ol+k7nPugOm9U 5dMdj5Owbuv7Jkibm7z+6dYd0MJF6YpFAnwKSEa30D1YAKQD2Ti0sdPXdR/WgfQZ27UF XtHNy7ZK90ctVwKw8OqrAu8qbf5C4e+WisQgIs+vKOR9qdqetWZ5HefUMFghwMpo8stu NBPy4vI1eWO2t4PXENYm4sLX6E1IXTIOPCP+lbxzSdissLtsgPtSN3HSocnQQIWZH+SY /G/A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=laArSoa27Bk0QtyDXsAUVOcE5AQjx2UJpOETosffK6w=; fh=xFt5d7JLtk+mLGWhLW7gyE3YlCLccLuCYIjwMRSKTBU=; b=ymMxVCE5OErnS6+EbedXn6E7bp9IXLEfNC4JUZiH6ikrlFBJK2Ay7wRZ9T3YMGflhP XzYsY60tiET8NhFBsLnbW72VKjB5zVNZ48GKjLU9G+C6coJZXE0kL1VyzTxSLo0zfJAz xT9AgVhTy+ivBFZe3wEspiKginiadmu0rKW4IRY6IPf5AzMY+PsDU4doaPHwRxnc77Y6 aSaUcOAmOQ8gly1lRJwNVPPPREy3bXtS4WxovCDszYOz21qk1QCt4MM+oGqQXQpmZscs 2CVfC/o+UKm7mwy6h13cj7tbJHcsOYFpThOmG2r/v9W9lnHDcIzjbJlQjF/hdnLLSIKt 4ecQ== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-44521-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-44521-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id x4-20020a17090ad68400b002905aac028dsi9226842pju.185.2024.01.30.03.38.59 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 03:38:59 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-44521-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-44521-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-44521-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 4483F285DA0 for ; Tue, 30 Jan 2024 11:35:20 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id BCC2D67746; Tue, 30 Jan 2024 11:35:09 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A1F7D679E6; Tue, 30 Jan 2024 11:35:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706614509; cv=none; b=U72MQLbDiZ4SlZsWdX90epSbMVKNK+m1h7YI975QG9g8uEVL/raIKyFYeXsLV2kR+0nWRioP6w27liTpKtPP3q7FqAnwwth6fkqKlmEkjVe9M8zwKPd5JZ6pUxZSuxjiKG9CXW8HCvRs7V9L/YA+3PrOfVkYbKltvuRt8Rk6lmY= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706614509; c=relaxed/simple; bh=07SSko51loIQzP9kc9KW4dZdkNU2a4AGreSz0PL6Uc8=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=pzkiyRKCtTLTSr4HnOwY7ylqpJzpinCPj9RkSthvfc6GG5FTlKoPbEWq9j4T4O+vz7rEMmhWv9Pj01XTI+HmRdvIMGOhoTyijzZ/MPyplsdVXyahp25LKWyauiprrHR9w2grpVgxZxO8mHcXc8lQWjvkAIJj/LAPLP1LILrzg5Q= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id CB835DA7; Tue, 30 Jan 2024 03:35:48 -0800 (PST) Received: from raptor (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id ABE033F5A1; Tue, 30 Jan 2024 03:34:59 -0800 (PST) Date: Tue, 30 Jan 2024 11:34:57 +0000 From: Alexandru Elisei To: Anshuman Khandual Cc: catalin.marinas@arm.com, will@kernel.org, oliver.upton@linux.dev, maz@kernel.org, james.morse@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com, arnd@arndb.de, akpm@linux-foundation.org, mingo@redhat.com, peterz@infradead.org, juri.lelli@redhat.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, bsegall@google.com, mgorman@suse.de, bristot@redhat.com, vschneid@redhat.com, mhiramat@kernel.org, rppt@kernel.org, hughd@google.com, pcc@google.com, steven.price@arm.com, vincenzo.frascino@arm.com, david@redhat.com, eugenis@google.com, kcc@google.com, hyesoo.yu@samsung.com, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, kvmarm@lists.linux.dev, linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, linux-mm@kvack.org, linux-trace-kernel@vger.kernel.org Subject: Re: [PATCH RFC v3 11/35] mm: Allow an arch to hook into folio allocation when VMA is known Message-ID: References: <20240125164256.4147-1-alexandru.elisei@arm.com> <20240125164256.4147-12-alexandru.elisei@arm.com> <1e03aec4-705a-41b6-b258-0b8944d9dc0c@arm.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1e03aec4-705a-41b6-b258-0b8944d9dc0c@arm.com> Hi, On Tue, Jan 30, 2024 at 03:25:20PM +0530, Anshuman Khandual wrote: > > > On 1/25/24 22:12, Alexandru Elisei wrote: > > arm64 uses VM_HIGH_ARCH_0 and VM_HIGH_ARCH_1 for enabling MTE for a VMA. > > When VM_HIGH_ARCH_0, which arm64 renames to VM_MTE, is set for a VMA, and > > the gfp flag __GFP_ZERO is present, the __GFP_ZEROTAGS gfp flag also gets > > set in vma_alloc_zeroed_movable_folio(). > > > > Expand this to be more generic by adding an arch hook that modifes the gfp > > flags for an allocation when the VMA is known. > > > > Note that __GFP_ZEROTAGS is ignored by the page allocator unless __GFP_ZERO > > is also set; from that point of view, the current behaviour is unchanged, > > even though the arm64 flag is set in more places. When arm64 will have > > support to reuse the tag storage for data allocation, the uses of the > > __GFP_ZEROTAGS flag will be expanded to instruct the page allocator to try > > to reserve the corresponding tag storage for the pages being allocated. > > Right but how will pushing __GFP_ZEROTAGS addition into gfp_t flags further > down via a new arch call back i.e arch_calc_vma_gfp() while still maintaining > (vma->vm_flags & VM_MTE) conditionality improve the current scenario. Because I'm afraid I don't follow you. > the page allocator could have still analyzed alloc flags for __GFP_ZEROTAGS > for any additional stuff. > > OR this just adds some new core MM paths to get __GFP_ZEROTAGS which was not > the case earlier via this call back. Before this patch: vma_alloc_zeroed_movable_folio() sets __GFP_ZEROTAGS. After this patch: vma_alloc_folio() sets __GFP_ZEROTAGS. This patch is about adding __GFP_ZEROTAGS for more callers. Thanks, Alex > > > > > The flags returned by arch_calc_vma_gfp() are or'ed with the flags set by > > the caller; this has been done to keep an architecture from modifying the > > flags already set by the core memory management code; this is similar to > > how do_mmap() -> calc_vm_flag_bits() -> arch_calc_vm_flag_bits() has been > > implemented. This can be revisited in the future if there's a need to do > > so. > > > > Signed-off-by: Alexandru Elisei > > --- > > arch/arm64/include/asm/page.h | 5 ++--- > > arch/arm64/include/asm/pgtable.h | 3 +++ > > arch/arm64/mm/fault.c | 19 ++++++------------- > > include/linux/pgtable.h | 7 +++++++ > > mm/mempolicy.c | 1 + > > mm/shmem.c | 5 ++++- > > 6 files changed, 23 insertions(+), 17 deletions(-) > > > > diff --git a/arch/arm64/include/asm/page.h b/arch/arm64/include/asm/page.h > > index 2312e6ee595f..88bab032a493 100644 > > --- a/arch/arm64/include/asm/page.h > > +++ b/arch/arm64/include/asm/page.h > > @@ -29,9 +29,8 @@ void copy_user_highpage(struct page *to, struct page *from, > > void copy_highpage(struct page *to, struct page *from); > > #define __HAVE_ARCH_COPY_HIGHPAGE > > > > -struct folio *vma_alloc_zeroed_movable_folio(struct vm_area_struct *vma, > > - unsigned long vaddr); > > -#define vma_alloc_zeroed_movable_folio vma_alloc_zeroed_movable_folio > > +#define vma_alloc_zeroed_movable_folio(vma, vaddr) \ > > + vma_alloc_folio(GFP_HIGHUSER_MOVABLE | __GFP_ZERO, 0, vma, vaddr, false) > > > > void tag_clear_highpage(struct page *to); > > #define __HAVE_ARCH_TAG_CLEAR_HIGHPAGE > > diff --git a/arch/arm64/include/asm/pgtable.h b/arch/arm64/include/asm/pgtable.h > > index 79ce70fbb751..08f0904dbfc2 100644 > > --- a/arch/arm64/include/asm/pgtable.h > > +++ b/arch/arm64/include/asm/pgtable.h > > @@ -1071,6 +1071,9 @@ static inline void arch_swap_restore(swp_entry_t entry, struct folio *folio) > > > > #endif /* CONFIG_ARM64_MTE */ > > > > +#define __HAVE_ARCH_CALC_VMA_GFP > > +gfp_t arch_calc_vma_gfp(struct vm_area_struct *vma, gfp_t gfp); > > + > > /* > > * On AArch64, the cache coherency is handled via the set_pte_at() function. > > */ > > diff --git a/arch/arm64/mm/fault.c b/arch/arm64/mm/fault.c > > index 55f6455a8284..4d3f0a870ad8 100644 > > --- a/arch/arm64/mm/fault.c > > +++ b/arch/arm64/mm/fault.c > > @@ -937,22 +937,15 @@ void do_debug_exception(unsigned long addr_if_watchpoint, unsigned long esr, > > NOKPROBE_SYMBOL(do_debug_exception); > > > > /* > > - * Used during anonymous page fault handling. > > + * If this is called during anonymous page fault handling, and the page is > > + * mapped with PROT_MTE, initialise the tags at the point of tag zeroing as this > > + * is usually faster than separate DC ZVA and STGM. > > */ > > -struct folio *vma_alloc_zeroed_movable_folio(struct vm_area_struct *vma, > > - unsigned long vaddr) > > +gfp_t arch_calc_vma_gfp(struct vm_area_struct *vma, gfp_t gfp) > > { > > - gfp_t flags = GFP_HIGHUSER_MOVABLE | __GFP_ZERO; > > - > > - /* > > - * If the page is mapped with PROT_MTE, initialise the tags at the > > - * point of allocation and page zeroing as this is usually faster than > > - * separate DC ZVA and STGM. > > - */ > > if (vma->vm_flags & VM_MTE) > > - flags |= __GFP_ZEROTAGS; > > - > > - return vma_alloc_folio(flags, 0, vma, vaddr, false); > > + return __GFP_ZEROTAGS; > > + return 0; > > } > > > > void tag_clear_highpage(struct page *page) > > diff --git a/include/linux/pgtable.h b/include/linux/pgtable.h > > index c5ddec6b5305..98f81ca08cbe 100644 > > --- a/include/linux/pgtable.h > > +++ b/include/linux/pgtable.h > > @@ -901,6 +901,13 @@ static inline void arch_do_swap_page(struct mm_struct *mm, > > } > > #endif > > > > +#ifndef __HAVE_ARCH_CALC_VMA_GFP > > +static inline gfp_t arch_calc_vma_gfp(struct vm_area_struct *vma, gfp_t gfp) > > +{ > > + return 0; > > +} > > +#endif > > + > > #ifndef __HAVE_ARCH_FREE_PAGES_PREPARE > > static inline void arch_free_pages_prepare(struct page *page, int order) { } > > #endif > > diff --git a/mm/mempolicy.c b/mm/mempolicy.c > > index 10a590ee1c89..f7ef52760b32 100644 > > --- a/mm/mempolicy.c > > +++ b/mm/mempolicy.c > > @@ -2168,6 +2168,7 @@ struct folio *vma_alloc_folio(gfp_t gfp, int order, struct vm_area_struct *vma, > > pgoff_t ilx; > > struct page *page; > > > > + gfp |= arch_calc_vma_gfp(vma, gfp); > > pol = get_vma_policy(vma, addr, order, &ilx); > > page = alloc_pages_mpol(gfp | __GFP_COMP, order, > > pol, ilx, numa_node_id()); > > diff --git a/mm/shmem.c b/mm/shmem.c > > index d7c84ff62186..14427e9982f9 100644 > > --- a/mm/shmem.c > > +++ b/mm/shmem.c > > @@ -1585,7 +1585,7 @@ static struct folio *shmem_swapin_cluster(swp_entry_t swap, gfp_t gfp, > > */ > > static gfp_t limit_gfp_mask(gfp_t huge_gfp, gfp_t limit_gfp) > > { > > - gfp_t allowflags = __GFP_IO | __GFP_FS | __GFP_RECLAIM; > > + gfp_t allowflags = __GFP_IO | __GFP_FS | __GFP_RECLAIM | __GFP_ZEROTAGS; > > gfp_t denyflags = __GFP_NOWARN | __GFP_NORETRY; > > gfp_t zoneflags = limit_gfp & GFP_ZONEMASK; > > gfp_t result = huge_gfp & ~(allowflags | GFP_ZONEMASK); > > @@ -2038,6 +2038,7 @@ static int shmem_get_folio_gfp(struct inode *inode, pgoff_t index, > > gfp_t huge_gfp; > > > > huge_gfp = vma_thp_gfp_mask(vma); > > + huge_gfp |= arch_calc_vma_gfp(vma, huge_gfp); > > huge_gfp = limit_gfp_mask(huge_gfp, gfp); > > folio = shmem_alloc_and_add_folio(huge_gfp, > > inode, index, fault_mm, true); > > @@ -2214,6 +2215,8 @@ static vm_fault_t shmem_fault(struct vm_fault *vmf) > > vm_fault_t ret = 0; > > int err; > > > > + gfp |= arch_calc_vma_gfp(vmf->vma, gfp); > > + > > /* > > * Trinity finds that probing a hole which tmpfs is punching can > > * prevent the hole-punch from ever completing: noted in i_private.