Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp2749110pxb; Mon, 31 Jan 2022 03:32:53 -0800 (PST) X-Google-Smtp-Source: ABdhPJwU1+uXcfYfBXIRX7+Qobt3fQL8fOnpcvlh1LGqRvLFQhazqupLIbwWjz92LhQXRO3/iS/g X-Received: by 2002:a17:90b:1009:: with SMTP id gm9mr23569959pjb.223.1643628773661; Mon, 31 Jan 2022 03:32:53 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1643628773; cv=pass; d=google.com; s=arc-20160816; b=XMFfcRBRFU2dyTcrC7kxlkTOV0LntBatBt2QgRft+PaHbRRboQIAT4L5UiqomhiYq9 JGMDnFYCm35GKM04rR4kbyDcClH3O76Q0qN9iRO9snMPQa699VOTNMTDBMi799LqO8NX VOiJS0jcGVHR7KdNFcss+bIvKyU+P0L+OOg3TfHKiz8uDdiZduRpOCMoGajJOLV4ioOF KnE2E23zWnmjlJwulj8iB8/TsWwoueG4XkmACv1sflVmUvn6SGv6Rg/7QPWmHMZiT9mI q36OccruZkwIltWrEt5WvYYX3TWsB/fb9Dpu1IXOEJ+SUeDljUaEuf4JivANOWncNzm3 qb+A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=jRkbjGv/hJkmKw0RHzcKl0piYQtGn53r2WDSrGJzVH0=; b=ZzBIpmBerVR8AXaXx2AYPmEMhUQUhD1POOhUAtL+/zwrmSao9vY8h2BpTQmwgHRuME 92Wt/3W2fxHlsZmpOyNeJmPty6Gau3qk3kT5c+wP/Ny+wL2K0j11HBcc0EPYe5w77QE3 F4mXwSkSbq9c542cdPxlEl9IqA7rAhIS5XGY00XOntHZTZqoLZE2XrvQnUAPnNZUjRrh ngMKcxvxJKq7MpHfXz3GPFhN1WAvYEA/KlJTSmlhlPHEYxxmqMyZo/r3acJ11Xjto8MJ PORoH167T8m0MeEHOi61j6DC/31jk6f8KmHEgXJO4X7GZZd7zDmt9BCQDxsBoyLtqEWa woPA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=Yq7a40e9; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s185si2119081pgs.184.2022.01.31.03.32.39; Mon, 31 Jan 2022 03:32:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@amd.com header.s=selector1 header.b=Yq7a40e9; arc=pass (i=1 spf=pass spfdomain=amd.com dmarc=pass fromdomain=amd.com); spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amd.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236700AbiA1UIz (ORCPT + 99 others); Fri, 28 Jan 2022 15:08:55 -0500 Received: from mail-dm6nam11on2067.outbound.protection.outlook.com ([40.107.223.67]:47392 "EHLO NAM11-DM6-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1351120AbiA1UIy (ORCPT ); Fri, 28 Jan 2022 15:08:54 -0500 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jBbIu1axi3dqGAkxUzE5IZtE6z3zBKJvku2yFk2gjuDD7eZHmR494FWP4r2mklWVgIEAvSeZ0yoZM+W9QFe1j+lI0qsGeKI3Ce2BDh+rz8dD93ovmVwB6L/MZRqlDw0fAoqi06rFsC3+Y0rPQtPvEvgSdFrjZv2BeNCDfNvyQYNMKnrUeyiiDPvEwnAFXGPHVR95tGQgW4q7SczwVqhSVoc5g5WYCmV9xcjOqS9pjIPpoNo26frqCXGj50S0esAr1Q7SEGx9LF5ooc6y34LaPZ2p+QsKsHDMTYFfxIkNp2fo0EyevcGFdjkZMhw2ZfxNs+Rdph8O6UqXGY1yO3e3sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jRkbjGv/hJkmKw0RHzcKl0piYQtGn53r2WDSrGJzVH0=; b=JHUWkiepT1/Nof8Ppxss2vLYFVHQ0unRGGwwyG/Q8/JqSOzZ0k/7hJKSRrCqVTYQwBeDtrcVsFK18oCxyU8GHjqjE/dP28fXrDYByaXaqkABBc+ZoPZkvuhHOhEc0KoqQNNhY5RBGb/oWDMZAlvoMNbYctukJ/MHg3Ch27bpRHoOdFX81B7P2tRB4HUxPMHpxG/pSySermhDEm2RKO19sauOl58pYVub0C64DoZ97GVq7DM3yX7ksToN4mMn2HkgGblU/+P3UzM1QvfxJAJjm31RLfSH+DxSudgexjJXPAngEt2zCeK+91PD/brUgbZ2OV5V+DXyOx2kBGULx3PF4Q== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=linux-foundation.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jRkbjGv/hJkmKw0RHzcKl0piYQtGn53r2WDSrGJzVH0=; b=Yq7a40e9ZXLeS9D7gbdSn48qHxZbZ7xe3PhkqNVkO2tUtZRxnd7A1Ub2GHHcBrnih2zI2mbPeGQY87vHdP0KoGLWbxxloWnCz6HIzADjMyrKwoSi83yf+yRc+cYw89L4f6Xug7r2Qbkyqdm10XB+ArBVkfn6vTgNabXmo2xr6No= Received: from MWHPR19CA0049.namprd19.prod.outlook.com (2603:10b6:300:94::11) by MN2PR12MB3806.namprd12.prod.outlook.com (2603:10b6:208:169::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.17; Fri, 28 Jan 2022 20:08:52 +0000 Received: from CO1NAM11FT022.eop-nam11.prod.protection.outlook.com (2603:10b6:300:94:cafe::13) by MWHPR19CA0049.outlook.office365.com (2603:10b6:300:94::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.17 via Frontend Transport; Fri, 28 Jan 2022 20:08:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; Received: from SATLEXMB04.amd.com (165.204.84.17) by CO1NAM11FT022.mail.protection.outlook.com (10.13.175.199) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.4930.15 via Frontend Transport; Fri, 28 Jan 2022 20:08:50 +0000 Received: from alex-MS-7B09.amd.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.18; Fri, 28 Jan 2022 14:08:49 -0600 From: Alex Sierra To: , , , , , CC: , , , , , , Subject: [PATCH v5 00/10] Add MEMORY_DEVICE_COHERENT for coherent device memory mapping Date: Fri, 28 Jan 2022 14:08:15 -0600 Message-ID: <20220128200825.8623-1-alex.sierra@amd.com> X-Mailer: git-send-email 2.32.0 MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: SATLEXMB04.amd.com (10.181.40.145) To SATLEXMB04.amd.com (10.181.40.145) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: eacefe74-2bd3-49ee-818d-08d9e29a0089 X-MS-TrafficTypeDiagnostic: MN2PR12MB3806:EE_ X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:CAL;SFV:NSPM;H:SATLEXMB04.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230001)(4636009)(46966006)(36840700001)(40470700004)(1076003)(26005)(16526019)(186003)(316002)(2906002)(36756003)(8936002)(336012)(426003)(7416002)(8676002)(81166007)(356005)(70586007)(70206006)(44832011)(5660300002)(110136005)(4326008)(2616005)(508600001)(54906003)(40460700003)(6666004)(7696005)(36860700001)(47076005)(82310400004)(86362001)(83380400001)(36900700001)(20210929001);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 28 Jan 2022 20:08:50.9613 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: eacefe74-2bd3-49ee-818d-08d9e29a0089 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CO1NAM11FT022.eop-nam11.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR12MB3806 Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org This patch series introduces MEMORY_DEVICE_COHERENT, a type of memory owned by a device that can be mapped into CPU page tables like MEMORY_DEVICE_GENERIC and can also be migrated like MEMORY_DEVICE_PRIVATE. Christoph, the suggestion to incorporate Ralph Campbell’s refcount cleanup patch into our hardware page migration patchset originally came from you, but it proved impractical to do things in that order because the refcount cleanup introduced a bug with wide ranging structural implications. Instead, we amended Ralph’s patch so that it could be applied after merging the migration work. As we saw from the recent discussion, merging the refcount work is going to take some time and cooperation between multiple development groups, while the migration work is ready now and is needed now. So we propose to merge this patchset first and continue to work with Ralph and others to merge the refcount cleanup separately, when it is ready. This patch series is mostly self-contained except for a few places where it needs to update other subsystems to handle the new memory type. System stability and performance are not affected according to our ongoing testing, including xfstests. How it works: The system BIOS advertises the GPU device memory (aka VRAM) as SPM (special purpose memory) in the UEFI system address map. The amdgpu driver registers the memory with devmap as MEMORY_DEVICE_COHERENT using devm_memremap_pages. The initial user for this hardware page migration capability is the Frontier supercomputer project. This functionality is not AMD-specific. We expect other GPU vendors to find this functionality useful, and possibly other hardware types in the future. Our test nodes in the lab are similar to the Frontier configuration, with .5 TB of system memory plus 256 GB of device memory split across 4 GPUs, all in a single coherent address space. Page migration is expected to improve application efficiency significantly. We will report empirical results as they become available. We extended hmm_test to cover migration of MEMORY_DEVICE_COHERENT. This patch set builds on HMM and our SVM memory manager already merged in 5.15. v2: - test_hmm is now able to create private and coherent device mirror instances in the same driver probe. This adds more usability to the hmm test by not having to remove the kernel module for each device type test (private/coherent type). This is done by passing the module parameters spm_addr_dev0 & spm_addr_dev1. In this case, it will create four instances of device_mirror. The first two correspond to private device type, the last two to coherent type. Then, they can be easily accessed from user space through /dev/hmm_mirror. Usually num_device 0 and 1 are for private, and 2 and 3 for coherent types. - Coherent device type pages at gup are now migrated back to system memory if they have been long term pinned (FOLL_LONGTERM). The reason is these pages could eventually interfere with their own device memory manager. A new hmm_gup_test has been added to the hmm-test to test this functionality. It makes use of the gup_test module to long term pin user pages that have been migrate to device memory first. - Other patch corrections made by Felix, Alistair and Christoph. v3: - Based on last v2 feedback we got from Alistair, we've decided to remove migration logic for FOLL_LONGTERM coherent device type pages at gup for now. Ideally, this should be done through the kernel mm, instead of calling the device driver to do it. Currently, there's no support for migrating device pages based on pfn, mainly because migrate_pages() relies on pages being LRU pages. Alistair mentioned, he has started to work on adding this migrate device pages logic. For now, we fail on get_user_pages call with FOLL_LONGTERM for DEVICE_COHERENT pages. - Also, hmm_gup_test has been removed from hmm-test. We plan to include it again after this migration work is ready. - Addressed Liam Howlett's feedback changes. v4: - Addressed Alistair Popple's last v3 feedback. - Use the same system entry path for coherent device pages at migrate_vma_insert_page. - Add coherent device type support for try_to_migrate / try_to_migrate_one. - Include number of coherent device pages successfully migrated back to system at test_hmm. Made the proper changes to hmm-test to read/check this number. v5: - Rebase on 5.17-rc1. - Addressed Alistair Popple's last v4 feedback. Alex Sierra (10): mm: add zone device coherent type memory support mm: add device coherent vma selection for memory migration mm/gup: fail get_user_pages for LONGTERM dev coherent type drm/amdkfd: add SPM support for SVM drm/amdkfd: coherent type as sys mem on migration to ram lib: test_hmm add ioctl to get zone device type lib: test_hmm add module param for zone device type lib: add support for device coherent type in test_hmm tools: update hmm-test to support device coherent type tools: update test_hmm script to support SP config drivers/gpu/drm/amd/amdkfd/kfd_migrate.c | 34 ++- include/linux/memremap.h | 8 + include/linux/migrate.h | 1 + include/linux/mm.h | 16 + lib/test_hmm.c | 356 +++++++++++++++++------ lib/test_hmm_uapi.h | 22 +- mm/gup.c | 7 + mm/memcontrol.c | 6 +- mm/memory-failure.c | 8 +- mm/memremap.c | 14 +- mm/migrate.c | 55 ++-- mm/rmap.c | 5 +- tools/testing/selftests/vm/hmm-tests.c | 123 ++++++-- tools/testing/selftests/vm/test_hmm.sh | 24 +- 14 files changed, 519 insertions(+), 160 deletions(-) -- 2.32.0