From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752540AbbE0OcO (ORCPT ); Wed, 27 May 2015 10:32:14 -0400 Received: from mail-qk0-f179.google.com ([209.85.220.179]:33719 "EHLO mail-qk0-f179.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751322AbbE0OcM (ORCPT ); Wed, 27 May 2015 10:32:12 -0400 Date: Wed, 27 May 2015 10:32:00 -0400 From: Jerome Glisse To: "Aneesh Kumar K.V" Cc: akpm@linux-foundation.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Linus Torvalds , joro@8bytes.org, Mel Gorman , "H. Peter Anvin" , Peter Zijlstra , Andrea Arcangeli , Johannes Weiner , Larry Woodman , Rik van Riel , Dave Airlie , Brendan Conoboy , Joe Donohue , Duncan Poole , Sherry Cheung , Subhash Gutti , John Hubbard , Mark Hairgrove , Lucien Dunning , Cameron Buschardt , Arvind Gopalakrishnan , Haggai Eran , Shachar Raindel , Liran Liss , Roland Dreier , Ben Sander , Greg Stoner , John Bridgman , Michael Mantor , Paul Blinzer , Laurent Morichetti , Alexander Deucher , Oded Gabbay , =?iso-8859-1?B?Suly9G1l?= Glisse Subject: Re: [PATCH 02/36] mmu_notifier: keep track of active invalidation ranges v3 Message-ID: <20150527143159.GA1948@gmail.com> References: <1432236705-4209-1-git-send-email-j.glisse@gmail.com> <1432236705-4209-3-git-send-email-j.glisse@gmail.com> <871ti2mwsc.fsf@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <871ti2mwsc.fsf@linux.vnet.ibm.com> User-Agent: Mutt/1.5.23 (2014-03-12) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 27, 2015 at 10:39:23AM +0530, Aneesh Kumar K.V wrote: > j.glisse@gmail.com writes: > > > From: Jérôme Glisse > > > > The mmu_notifier_invalidate_range_start() and mmu_notifier_invalidate_range_end() > > can be considered as forming an "atomic" section for the cpu page table update > > point of view. Between this two function the cpu page table content is unreliable > > for the address range being invalidated. > > > > Current user such as kvm need to know when they can trust the content of the cpu > > page table. This becomes even more important to new users of the mmu_notifier > > api (such as HMM or ODP). > > I don't see kvm using the new APIs in this patch. Also what is that HMM use this > for, to protect walking of mirror page table ?. I am sure you are > covering that in the later patches. May be you may want to mention > the details here too. KVM side is not done, i looked at KVM code long time ago and thought oh it could take advantage of this but now i do not remember exactly. I would need to check back. For HMM this is simple, no device fault can populate or walk the mirror page table on a range that is being invalidated. But concurrent fault/walk can happen outside the invalidated range. All handled in hmm_device_fault_start(). Cheers, Jérôme