From patchwork Wed Aug 2 05:55:38 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Verma, Vishal L" X-Patchwork-Id: 13337664 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 759FBC04A94 for ; Wed, 2 Aug 2023 05:56:09 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 3AEB428012A; Wed, 2 Aug 2023 01:56:08 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 2E65B280112; Wed, 2 Aug 2023 01:56:08 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 1602C28012A; Wed, 2 Aug 2023 01:56:08 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 05EB9280112 for ; Wed, 2 Aug 2023 01:56:08 -0400 (EDT) Received: from smtpin15.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id C5690B23C5 for ; Wed, 2 Aug 2023 05:56:07 +0000 (UTC) X-FDA: 81078103974.15.5A45111 Received: from mgamail.intel.com (unknown [192.55.52.43]) by imf11.hostedemail.com (Postfix) with ESMTP id 80A6840025 for ; Wed, 2 Aug 2023 05:56:05 +0000 (UTC) Authentication-Results: imf11.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=cS7dV9D4; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf11.hostedemail.com: domain of vishal.l.verma@intel.com designates 192.55.52.43 as permitted sender) smtp.mailfrom=vishal.l.verma@intel.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1690955765; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=JLyqgt3zA6ta7qGBNnUPZYx0x4NPLMIrbIGR5L2Hu7E=; b=P9vGJZfsY6jpgxHJZiMd4J2ZlhWOIoou2Fk6NIMD/ImNeDzj1lgnEONzfpBzCnTttExREd s+vx6frYO5+f6qHKpCPk4nwselw7sYNflZUvRWZdwGIvVXyWl5rxv18YGVIvsdABHWafR2 Ss1ucJb/EoMAzNGO4iDYxW9zRsSfaHs= ARC-Authentication-Results: i=1; imf11.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=cS7dV9D4; dmarc=pass (policy=none) header.from=intel.com; spf=pass (imf11.hostedemail.com: domain of vishal.l.verma@intel.com designates 192.55.52.43 as permitted sender) smtp.mailfrom=vishal.l.verma@intel.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1690955765; a=rsa-sha256; cv=none; b=Ep6lIBNSglLMb9QtDczxAXEHyYJ9vehaMIfl556vaphvhnEcLOyBm7VVn7HBKlEAcwY00S hPyyB16mRJyZ5zV5v0RI8f0HEBCIwSjr3IhJaLoNCetUFVFCPZTZG0OpwGExF4i2/3LELr iPolodin6DPLz8Vd1i5gMVhqYOuJ4VI= DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1690955765; x=1722491765; h=from:date:subject:mime-version:content-transfer-encoding: message-id:references:in-reply-to:to:cc; bh=PQ203zHCVt3CEYS9d0oE1EzhXByb08+AR/dYJJo5JtE=; b=cS7dV9D4Ho73xflQqgh7KVtuXQgwK/UcWWtwijXhh9OYJZlLY/MG8dN/ iMGls3yHUE/Z8q5xqcuBWWQ7ZVSH01M4qa/9JWLCE8CBdPzvHfS/vpheW UJ/U8l5y1XqpP/jTCzqx8bRMKxXykBeUmmpIaUpaRyRWt2QCkqwGxPgGK rT33V+dX1DtXZcMd+OtlLbDPVEHdbk7KRpeiis0rP5SMAKVdpj+KSkmyl czZgAMakugPtaEtEnlXpMu0A+pqhl5rQm3M5uYnNzMzKzKXA/B8d6c4QF AgvfUb5N8yGi0d90S/NwFbtoFAP1djQjyOUbaDx9EEvQEDLSIsHInHa2N A==; X-IronPort-AV: E=McAfee;i="6600,9927,10789"; a="455857458" X-IronPort-AV: E=Sophos;i="6.01,248,1684825200"; d="scan'208";a="455857458" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Aug 2023 22:55:47 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10789"; a="852746663" X-IronPort-AV: E=Sophos;i="6.01,248,1684825200"; d="scan'208";a="852746663" Received: from hongrudi-mobl.amr.corp.intel.com (HELO [192.168.1.200]) ([10.209.173.200]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Aug 2023 22:55:46 -0700 From: Vishal Verma Date: Tue, 01 Aug 2023 23:55:38 -0600 Subject: [PATCH v3 2/2] dax/kmem: allow kmem to add memory with memmap_on_memory MIME-Version: 1.0 Message-Id: <20230801-vv-kmem_memmap-v3-2-406e9aaf5689@intel.com> References: <20230801-vv-kmem_memmap-v3-0-406e9aaf5689@intel.com> In-Reply-To: <20230801-vv-kmem_memmap-v3-0-406e9aaf5689@intel.com> To: Andrew Morton , David Hildenbrand , Oscar Salvador , Dan Williams , Dave Jiang Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, nvdimm@lists.linux.dev, linux-cxl@vger.kernel.org, Huang Ying , Dave Hansen , "Aneesh Kumar K.V" , Michal Hocko , Jonathan Cameron , Jeff Moyer , Vishal Verma X-Mailer: b4 0.12.3 X-Developer-Signature: v=1; a=openpgp-sha256; l=4390; i=vishal.l.verma@intel.com; h=from:subject:message-id; bh=PQ203zHCVt3CEYS9d0oE1EzhXByb08+AR/dYJJo5JtE=; b=owGbwMvMwCXGf25diOft7jLG02pJDCkn3z+4nj37ncR5uxXal6v0S2/oPH2YPFe2vKpGoFDzX nY91wzljlIWBjEuBlkxRZa/ez4yHpPbns8TmOAIM4eVCWQIAxenAEwkrJDhr4BpPvuEZLYzx69G be1YVSb5Z1rUqS0V8/NTFq+VXfGvM4qRYalrzD/JfS4qmekPJf5JbDEWn1yyqlNnTsAsTkvXh9k LeQA= X-Developer-Key: i=vishal.l.verma@intel.com; a=openpgp; fpr=F8682BE134C67A12332A2ED07AFA61BEA3B84DFF X-Rspam-User: X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: 80A6840025 X-Stat-Signature: ikcobu9dpcwizw6kjyszwzecqtj9oswr X-HE-Tag: 1690955765-955693 X-HE-Meta: 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 sAjUBVv0 0xPprxUWkJo02asrgLZ0X4seJfbS3TW94D+nRQ+PeyoCdy+GR9nwnGd0B4+EJxw+v5a7M2LS8YtprkKR/tCkLFFpjwWjOURCVD7DlAQw3d7RyQr8RGQI34NPOEqA+ci7DFcQki4dsrzE50B5BIz5QwgE+997OKutRxjO8M2zUx3T4sRb/CMYydV+SH3hWQozaA2EZUbiUCPZZNMQIf+BcbiAlL6S4FtfBlJPUT5OYrWIP7Xm32ewiShKxJRNmToMQAjohWzlC6FH60/AW0rJ4gpNKkdcayhcRfGTqH2BN5D484HAKPuFVO+uGLkQ4sSh88R7qVmkTDjhCmvbVwvBZAp6+0HKWN801rJ4Kkqut88uc4Thwc6ic9cIKrh2NfQfjvkmOmkJaQPvPm8gQLAXLvWxTOw== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Large amounts of memory managed by the kmem driver may come in via CXL, and it is often desirable to have the memmap for this memory on the new memory itself. Enroll kmem-managed memory for memmap_on_memory semantics as a default. Add a sysfs override under the dax device to opt out of this behavior. Cc: Andrew Morton Cc: David Hildenbrand Cc: Michal Hocko Cc: Oscar Salvador Cc: Dan Williams Cc: Dave Jiang Cc: Dave Hansen Cc: Huang Ying Signed-off-by: Vishal Verma Reviewed-by: Jonathan Cameron --- drivers/dax/dax-private.h | 1 + drivers/dax/bus.c | 42 ++++++++++++++++++++++++++++++++++++++++++ drivers/dax/kmem.c | 8 +++++++- 3 files changed, 50 insertions(+), 1 deletion(-) diff --git a/drivers/dax/dax-private.h b/drivers/dax/dax-private.h index 27cf2daaaa79..446617b73aea 100644 --- a/drivers/dax/dax-private.h +++ b/drivers/dax/dax-private.h @@ -70,6 +70,7 @@ struct dev_dax { struct ida ida; struct device dev; struct dev_pagemap *pgmap; + bool memmap_on_memory; int nr_range; struct dev_dax_range { unsigned long pgoff; diff --git a/drivers/dax/bus.c b/drivers/dax/bus.c index 0ee96e6fc426..e9c0349b6244 100644 --- a/drivers/dax/bus.c +++ b/drivers/dax/bus.c @@ -1269,6 +1269,40 @@ static ssize_t numa_node_show(struct device *dev, } static DEVICE_ATTR_RO(numa_node); +static ssize_t memmap_on_memory_show(struct device *dev, + struct device_attribute *attr, char *buf) +{ + struct dev_dax *dev_dax = to_dev_dax(dev); + + return sprintf(buf, "%d\n", dev_dax->memmap_on_memory); +} + +static ssize_t memmap_on_memory_store(struct device *dev, + struct device_attribute *attr, + const char *buf, size_t len) +{ + struct dev_dax *dev_dax = to_dev_dax(dev); + struct dax_region *dax_region = dev_dax->region; + ssize_t rc; + bool val; + + rc = kstrtobool(buf, &val); + if (rc) + return rc; + + device_lock(dax_region->dev); + if (!dax_region->dev->driver) { + device_unlock(dax_region->dev); + return -ENXIO; + } + + dev_dax->memmap_on_memory = val; + + device_unlock(dax_region->dev); + return rc == 0 ? len : rc; +} +static DEVICE_ATTR_RW(memmap_on_memory); + static umode_t dev_dax_visible(struct kobject *kobj, struct attribute *a, int n) { struct device *dev = container_of(kobj, struct device, kobj); @@ -1295,6 +1329,7 @@ static struct attribute *dev_dax_attributes[] = { &dev_attr_align.attr, &dev_attr_resource.attr, &dev_attr_numa_node.attr, + &dev_attr_memmap_on_memory.attr, NULL, }; @@ -1400,6 +1435,13 @@ struct dev_dax *devm_create_dev_dax(struct dev_dax_data *data) dev_dax->align = dax_region->align; ida_init(&dev_dax->ida); + /* + * If supported by memory_hotplug, allow memmap_on_memory behavior by + * default. This can be overridden via sysfs before handing the memory + * over to kmem if desired. + */ + dev_dax->memmap_on_memory = true; + inode = dax_inode(dax_dev); dev->devt = inode->i_rdev; dev->bus = &dax_bus_type; diff --git a/drivers/dax/kmem.c b/drivers/dax/kmem.c index c57acb73e3db..0aa6c45a4e5a 100644 --- a/drivers/dax/kmem.c +++ b/drivers/dax/kmem.c @@ -12,6 +12,7 @@ #include #include #include +#include #include "dax-private.h" #include "bus.h" @@ -56,6 +57,7 @@ static int dev_dax_kmem_probe(struct dev_dax *dev_dax) unsigned long total_len = 0; struct dax_kmem_data *data; int i, rc, mapped = 0; + mhp_t mhp_flags; int numa_node; /* @@ -136,12 +138,16 @@ static int dev_dax_kmem_probe(struct dev_dax *dev_dax) */ res->flags = IORESOURCE_SYSTEM_RAM; + mhp_flags = MHP_NID_IS_MGID; + if (dev_dax->memmap_on_memory) + mhp_flags |= MHP_MEMMAP_ON_MEMORY; + /* * Ensure that future kexec'd kernels will not treat * this as RAM automatically. */ rc = add_memory_driver_managed(data->mgid, range.start, - range_len(&range), kmem_name, MHP_NID_IS_MGID); + range_len(&range), kmem_name, mhp_flags); if (rc) { dev_warn(dev, "mapping%d: %#llx-%#llx memory add failed\n",