From patchwork Thu Sep 28 20:30:09 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Verma, Vishal L" X-Patchwork-Id: 14691 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:cae8:0:b0:403:3b70:6f57 with SMTP id r8csp3793458vqu; Thu, 28 Sep 2023 22:20:10 -0700 (PDT) X-Google-Smtp-Source: AGHT+IH7/1EdHwSPt7b9ygIjjdou9ocIP59BbTqBoQEErcKIJZ6epIDEsi0v47GCy8s2wtwaZBLP X-Received: by 2002:a67:ec15:0:b0:452:7748:4700 with SMTP id d21-20020a67ec15000000b0045277484700mr3178563vso.2.1695964810470; Thu, 28 Sep 2023 22:20:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695964810; cv=none; d=google.com; s=arc-20160816; b=JdIKHb+xfAc9kTHQhA12QB4JCb3o4SxFM57exS3vZzirVzBwiQyA5AvVdDF5HMwNRV /E/6oid4xVIQ92Aj/I7YdKbc34IXd/pVtjGzI7F2/Nj7kZGohoM1RZEE2Y40fcAVTKfs nD8Ts0qNeH1e1B6BKRgtdUjIJ/pfDKX+T69PG5NHMTRbbGIb7VkiWYNpAaUIJaIH6Mt/ 1aX9snc8V6oHr2bBW5+yqzk3t0wa8gnLQex2MnCylEUbqiC1ePHqAyp00HtL3VANsqIr ARZXFHl2e4UZEZpRK4Pup4lymZcil6yPXmIN91I4h0U55MJgy7tDqJy1WXTogR8ivKnK QDMw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:content-transfer-encoding:mime-version :message-id:date:subject:from:dkim-signature; bh=URFJSCzHqGjld6XzhBENM6XjTnSoWNgLaIEhDPhsTpM=; fh=K6XmanfW69WIGlI+l+O18lb+dFEsDiql6DFppOVA05M=; b=u9ZI3uRd+5Mkx1PGoPkhGtjvEBiPFny/2o1XLNgkv0YiWoYvhRll4qnEATzr/kA8Lt wVBt6tEdPAXLvKWvblNnEw+gbN61r7CSTwFbFIAPGiMJ3nWuoGefwdIqGVRNNFy/89vb KMdobKJhR519ev+3LikoO90pnfYsbUQ27gJ/ux1UkixJClTuq02tXoOVRLP19iEdhPIf teBKAlxdkQJjScCBj+t2xyUe4qT73CWu6pTaUsupeGdzUAhZQour2wdLaL7LTr9XDrIC qU4ocR5wwtzF5+RsbhVbz62A3iEZHtBztkHGWTU1I2I9YaX3MKd40HpHj6OzaGWk6Qsg AJYQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=QMUsHl73; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id t23-20020a656097000000b0053074c54c3fsi9173707pgu.868.2023.09.28.22.20.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 28 Sep 2023 22:20:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=QMUsHl73; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 7789780D1EF9; Thu, 28 Sep 2023 13:31:00 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231904AbjI1Uax (ORCPT + 21 others); Thu, 28 Sep 2023 16:30:53 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48338 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230251AbjI1Uav (ORCPT ); Thu, 28 Sep 2023 16:30:51 -0400 Received: from mgamail.intel.com (mgamail.intel.com [134.134.136.126]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B77DC193; Thu, 28 Sep 2023 13:30:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1695933049; x=1727469049; h=from:subject:date:message-id:mime-version: content-transfer-encoding:to:cc; bh=cAy0mCyyU34BrYjzihAk6QBEdSFRsmrEsY5ivGjaggs=; b=QMUsHl739ekDWK7c9cHUlvPYZ75/TBKEaB6hmJnsyObFqlf2PEqT41hb gWTTEblkJsDrncd0jvNLu+7GT54Y4RglIt9VL3Me892dN/8nDtYpc8Lq2 OPnHAGRnF2o3fDmDecJuM3QFWXx+yOvdBj6BuBGm3Ps3co4iE/y4KWhse ppXp0eCSZ3qHi+2CPFeJm1uSJeUST5lqwmpD3ZQBKHv7PCcB6mtdPLU4L 2kmMLp6/a/zpGjbQEib8ArmspDctljrbvr46JbjikB1tspdUmbb4deFyt uRAlL5svvTivMIzX/YN1vX7ZTUJ8JtFRYkN2q5UgeFRI/ytM5rFEtwEuf g==; X-IronPort-AV: E=McAfee;i="6600,9927,10847"; a="367229664" X-IronPort-AV: E=Sophos;i="6.03,185,1694761200"; d="scan'208";a="367229664" Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Sep 2023 13:30:31 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10847"; a="815374351" X-IronPort-AV: E=Sophos;i="6.03,185,1694761200"; d="scan'208";a="815374351" Received: from bdsebast-mobl1.amr.corp.intel.com (HELO [192.168.1.200]) ([10.212.125.211]) by fmsmga008-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Sep 2023 13:30:30 -0700 From: Vishal Verma Subject: [PATCH v4 0/2] mm: use memmap_on_memory semantics for dax/kmem Date: Thu, 28 Sep 2023 14:30:09 -0600 Message-Id: <20230928-vv-kmem_memmap-v4-0-6ff73fec519a@intel.com> MIME-Version: 1.0 X-B4-Tracking: v=1; b=H4sIAFHiFWUC/3XNQQ7CIBAF0KsY1mIoIIIr72GMmdKpJbbUgBKN6 d0d3Wg0Lmbxf/L+3FnGFDCz9ezOEpaQwxgp6PmM+Q7iAXloKDMppBKmUrwUfhxw2NMNcOJLbZW 3jdBy5RihGjLyOkH0HbF46XsqTwnbcH192e4odyGfx3R7PS3Vs/27XyoueGsadN5AK73ZhHjGf uHHgT2ninzzlRQ/XBK3tm4AaqWdU99cvbkV1Q9XxLUw6ADapbHuk0/T9ACKqImFPwEAAA== To: Andrew Morton , David Hildenbrand , Oscar Salvador , Dan Williams , Dave Jiang Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, nvdimm@lists.linux.dev, linux-cxl@vger.kernel.org, Huang Ying , Dave Hansen , "Aneesh Kumar K.V" , Michal Hocko , Jonathan Cameron , Jeff Moyer , Vishal Verma , Jonathan Cameron X-Mailer: b4 0.12.3 X-Developer-Signature: v=1; a=openpgp-sha256; l=3152; i=vishal.l.verma@intel.com; h=from:subject:message-id; bh=cAy0mCyyU34BrYjzihAk6QBEdSFRsmrEsY5ivGjaggs=; b=owGbwMvMwCXGf25diOft7jLG02pJDKmij4Itwm6bPF8XxpAX828Kx6+++ga1a8WXpk/iy1n0q 9o+Vd+po5SFQYyLQVZMkeXvno+Mx+S25/MEJjjCzGFlAhnCwMUpABOpamFk2HH85zqnqsfuZSuE s9LX79q9c3Vz0pKJW9756Ng/MWt568LI8C+Uf5KPdvLpIs+jV226St8k1mfPY7Ker2L8XCI48fN xDgA= X-Developer-Key: i=vishal.l.verma@intel.com; a=openpgp; fpr=F8682BE134C67A12332A2ED07AFA61BEA3B84DFF X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Thu, 28 Sep 2023 13:31:00 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1778347997285915084 X-GMAIL-MSGID: 1778347997285915084 The dax/kmem driver can potentially hot-add large amounts of memory originating from CXL memory expanders, or NVDIMMs, or other 'device memories'. There is a chance there isn't enough regular system memory available to fit the memmap for this new memory. It's therefore desirable, if all other conditions are met, for the kmem managed memory to place its memmap on the newly added memory itself. The main hurdle for accomplishing this for kmem is that memmap_on_memory can only be done if the memory being added is equal to the size of one memblock. To overcome this, allow the hotplug code to split an add_memory() request into memblock-sized chunks, and try_remove_memory() to also expect and handle such a scenario. Patch 1 teaches the memory_hotplug code to allow for splitting add_memory() and remove_memory() requests over memblock sized chunks. Patch 2 adds a sysfs control for the kmem driver that would allow an opt-out of using memmap_on_memory for the memory being added. Signed-off-by: Vishal Verma --- Changes in v4: - Rebase to Aneesh's PPC64 memmap_on_memory series v8 [2]. - Tweak a goto / error path in add_memory_create_devices() (Jonathan) - Retain the old behavior for dax devices, only default to memmap_on_memory for CXL (Jonathan) - Link to v3: https://lore.kernel.org/r/20230801-vv-kmem_memmap-v3-0-406e9aaf5689@intel.com [2]: https://lore.kernel.org/linux-mm/20230808091501.287660-1-aneesh.kumar@linux.ibm.com Changes in v3: - Rebase on Aneesh's patches [1] - Drop Patch 1 - it is not needed since [1] allows for dynamic setting of the memmap_on_memory param (David) - Link to v2: https://lore.kernel.org/r/20230720-vv-kmem_memmap-v2-0-88bdaab34993@intel.com [1]: https://lore.kernel.org/r/20230801044116.10674-1-aneesh.kumar@linux.ibm.com Changes in v2: - Drop the patch to create an override path for the memmap_on_memory module param (David) - Move the chunking into memory_hotplug.c so that any caller of add_memory() can request this behavior. (David) - Handle remove_memory() too. (David, Ying) - Add a sysfs control in the kmem driver for memmap_on_memory semantics (David, Jonathan) - Add a #else case to define mhp_supports_memmap_on_memory() if CONFIG_MEMORY_HOTPLUG is unset. (0day report) - Link to v1: https://lore.kernel.org/r/20230613-vv-kmem_memmap-v1-0-f6de9c6af2c6@intel.com --- Vishal Verma (2): mm/memory_hotplug: split memmap_on_memory requests across memblocks dax/kmem: allow kmem to add memory with memmap_on_memory drivers/dax/bus.h | 1 + drivers/dax/dax-private.h | 1 + drivers/dax/bus.c | 38 +++++++++++ drivers/dax/cxl.c | 1 + drivers/dax/hmem/hmem.c | 1 + drivers/dax/kmem.c | 8 ++- drivers/dax/pmem.c | 1 + mm/memory_hotplug.c | 165 ++++++++++++++++++++++++++++------------------ 8 files changed, 150 insertions(+), 66 deletions(-) --- base-commit: 25b5b1a0646c3d39e1d885e27c10be1c9e202bf2 change-id: 20230613-vv-kmem_memmap-5483c8d04279 Best regards,