From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 34563C3DA61 for ; Thu, 18 Jul 2024 23:20:36 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B10EB6B0085; Thu, 18 Jul 2024 19:20:35 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id AC0656B0088; Thu, 18 Jul 2024 19:20:35 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8EC116B0089; Thu, 18 Jul 2024 19:20:35 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 6CCB36B0085 for ; Thu, 18 Jul 2024 19:20:35 -0400 (EDT) Received: from smtpin24.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 21923802D2 for ; Thu, 18 Jul 2024 23:20:35 +0000 (UTC) X-FDA: 82354444830.24.E4797B8 Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.13]) by imf07.hostedemail.com (Postfix) with ESMTP id 47D5940011 for ; Thu, 18 Jul 2024 23:20:30 +0000 (UTC) Authentication-Results: imf07.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=KNlG59dr; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); spf=pass (imf07.hostedemail.com: domain of yan.y.zhao@intel.com designates 192.198.163.13 as permitted sender) smtp.mailfrom=yan.y.zhao@intel.com; dmarc=pass (policy=none) header.from=intel.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1721344790; h=from:from:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=1VzanQ4quX2wiPndLKj88/pVDPukwMHnx7YRm4xkxJc=; b=M9TKZ1SUx9/pTCCCgw27Arg5EtZjYvTRh2bU9uT3ImxFZQ4Cqrm2jFRamU2MNyItl+WJaT W9J8lCD9rwKgCJ60HUVjF0nZ2ZdTmUY5Ioh/d0gDw94w/sXoiUxAP7H6QuoOs2RyvkzDQm FmFi0kKigS/yV4EmlxzZ4w+VpTTim6o= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1721344790; a=rsa-sha256; cv=fail; b=Tm05yGtFoQBtPkWQkQ090BVJNNEqDJ+odTwvhKPD+XPzgjaye+/99AjnD1HXrRohvXjyw5 As9ShXlEAzYusWV3iwtpbeyYRJIpBpfp3kC+R8q7k9fPHJbTwT3i35X8tGyJSuRWVgtB0A t8Whgnr7E3+Cb9jRz1YTqJ6fXDGrEQo= ARC-Authentication-Results: i=2; imf07.hostedemail.com; dkim=pass header.d=intel.com header.s=Intel header.b=KNlG59dr; arc=reject ("signature check failed: fail, {[1] = sig:microsoft.com:reject}"); spf=pass (imf07.hostedemail.com: domain of yan.y.zhao@intel.com designates 192.198.163.13 as permitted sender) smtp.mailfrom=yan.y.zhao@intel.com; dmarc=pass (policy=none) header.from=intel.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1721344831; x=1752880831; h=date:from:to:cc:subject:message-id:reply-to:references: in-reply-to:mime-version; bh=Pg9tgTk9LKnsXGpi5Rxh2oqZtQIuqRiTFCHH9qPEfZA=; b=KNlG59dr3QXsxDLnygGPxYbw65s7yLG+LyGEyHVji3+YHjrXR6LAXBSd cB+hyol2e018hRVDMqDnUPGUoKMmcltmC15eVHceMZMldbOkW9JJtjPJo duIXgStdhRrSj8XhHPq3Js0G89Ms93/MKNP9pPqos6NMmVoXZS4lnq7FZ o+12ZA3SpGXoRZwlYUMrhPC6nxXX0Zyo7q8BDs8K8vOmmOzl4TlKPtq0z b2DpLVfYIoaLoivZEoujRfIgrLNPrZ102KqT/hD/xy+Jx4Ep5CwU6v+z8 kPBGYd8IWLOh8UKg8oP1bCEvLn7nhoTzSmV7QM2d/DsRw1oPcvZNAP/NQ Q==; X-CSE-ConnectionGUID: z5Ob1Y2kSmGf8o8AcQOtfQ== X-CSE-MsgGUID: qDaR+cKASb2XEtXx2VkGUw== X-IronPort-AV: E=McAfee;i="6700,10204,11137"; a="21844354" X-IronPort-AV: E=Sophos;i="6.09,219,1716274800"; d="scan'208";a="21844354" Received: from fmviesa004.fm.intel.com ([10.60.135.144]) by fmvoesa107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 18 Jul 2024 16:20:28 -0700 X-CSE-ConnectionGUID: vETJEEfaSaGyuHyu6fuuxQ== X-CSE-MsgGUID: 3DR3KLmJRJOhPKc9kvkLMA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="6.09,219,1716274800"; d="scan'208";a="55464710" Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by fmviesa004.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 18 Jul 2024 16:20:26 -0700 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Thu, 18 Jul 2024 16:20:25 -0700 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39 via Frontend Transport; Thu, 18 Jul 2024 16:20:25 -0700 Received: from NAM02-DM3-obe.outbound.protection.outlook.com (104.47.56.41) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Thu, 18 Jul 2024 16:20:25 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=jBidnvJd1n6M6R0T4XXsZr3CV13CHlOv6xe5IIOwzn4jiNWc8RobqA5tZWxLcgBqtv4Rh8G7t1n8/2GtFtV8D7OQuozNGh4S6S1NhN/Gfds1SM4sxIV69bDDviyrc9e3xtKOowuagcL7SB+9lqzHGJRtOJFomIKLcO6b7Zs1tHWvzn7dKj3ZP5aUhh2g6L1+ApzmXyW6CaphifMvQxg1+vvpCNAHkEzvN3eb3gBMh0StunbOZv/mO3TipHV1eWpe0pggSPZgVa4jyJU78YkG/mqTJ6Z+0J8s+/CH1MVfmGFIyIxFB71WRz+HXWyvJefWfjQFi9uZLuVhJuqyoqwgfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1VzanQ4quX2wiPndLKj88/pVDPukwMHnx7YRm4xkxJc=; b=vAjfWrOtTC3U0WcJySVhgaXkNr/lDN5UR1X4B+iZhJpMVZ3/yas+EiP7fpq56jyMwkqOOel5w1buPwhcSnvxdhWRxUa0e5TKcvzK09dpe9ak6jRy3/FJBz6sZ4kjJZRPpT+ebuHFVdAVUkxIiv4OcccyQSmszlnXj1cghz9u/7r7KYmcRvwsRkKZYYUrvn8FP16P4jszQyicko+Yw6+Gr86yD0EGJgZJd6WdqihtFeSHDIy6e3U+CpLhdNEXLWSVMu62rMyblpJDGKLrOpGkxY5QMi8QHM8ES1HcCrOPUxLIW0GHkkOROkGd81NFgqo7IvRLBWhGnOIhlxZRiYUxzw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none Received: from DS7PR11MB5966.namprd11.prod.outlook.com (2603:10b6:8:71::6) by SN7PR11MB6751.namprd11.prod.outlook.com (2603:10b6:806:265::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.16; Thu, 18 Jul 2024 23:20:17 +0000 Received: from DS7PR11MB5966.namprd11.prod.outlook.com ([fe80::e971:d8f4:66c4:12ca]) by DS7PR11MB5966.namprd11.prod.outlook.com ([fe80::e971:d8f4:66c4:12ca%2]) with mapi id 15.20.7784.013; Thu, 18 Jul 2024 23:20:17 +0000 Date: Fri, 19 Jul 2024 07:18:48 +0800 From: Yan Zhao To: Peter Xu CC: "linux-kernel@vger.kernel.org" , "linux-mm@kvack.org" , Andrew Morton , Alex Williamson , Jason Gunthorpe , Al Viro , "Dave Hansen" , Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "Kirill A . Shutemov" , "x86@kernel.org" , "Tian, Kevin" , Pei Li , "David Hildenbrand" , David Wang <00107082@163.com>, Bert Karwatzki , Sergey Senozhatsky Subject: Re: [PATCH] mm/x86/pat: Only untrack the pfn range if unmap region Message-ID: Reply-To: Yan Zhao References: <20240712144244.3090089-1-peterx@redhat.com> Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: X-ClientProxiedBy: SG2PR02CA0125.apcprd02.prod.outlook.com (2603:1096:4:188::13) To DS7PR11MB5966.namprd11.prod.outlook.com (2603:10b6:8:71::6) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS7PR11MB5966:EE_|SN7PR11MB6751:EE_ X-MS-Office365-Filtering-Correlation-Id: bec6ccb7-9a9f-4743-0128-08dca7802f89 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|366016|1800799024|376014|7416014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?t3z/150eBSGzkWRT7JvBP6qHxlyg8ltT9sw2iUOa0rqRAPPqZ3ygXFP9baKm?= =?us-ascii?Q?1ZL0ho7XHtdwuuDYo+afGmrmqOZsb+L7ajqgkdkBB4xSl7THtgC2k+j4lwmX?= =?us-ascii?Q?vpdhjagUAon1qHsqijErXSE2BHL3RO9BJR4J5Zxwgr4q0t1fAHm20BcJDU+d?= =?us-ascii?Q?nt0xpQXT6PKwDq5CnWO+Xyb5wMfOvhObZzMYCYg+U3cDNIF7RCxxvUpmXKV7?= =?us-ascii?Q?gNTpk+JmNx0Puf+HwG2RHL8zpoo/HNrOfpLURpQ48V50rFIqyIR3Co2U4xZw?= =?us-ascii?Q?hT8vCIGa8RxYzyS5Yty3UCrPDz49/I6RQHPHm8k2lu7QF5XrE9EZruGTL0eX?= =?us-ascii?Q?0KMRLiUDgyv42kO53Xv7WYr/SpeGtIJtltgWo/mhYrnGqqwdM7FdYYJ/EdIr?= =?us-ascii?Q?2DZY9Z4QqJL3lPoNN88sW7Lr4ioNK+C+loV3XE9YQ6YcTaD0lhHOHRkb0U05?= =?us-ascii?Q?Cmd5O1dOarGhdee7AhLGS3tRvnCLZVFL1997n1VkmfY3r5Ng/hrXppnQRZQP?= =?us-ascii?Q?bQ/Syaqb5c0PQMCN0ZYEsO9lTj9p3eJqt91aeurpb6tA2IAJlGaku10xg2WL?= =?us-ascii?Q?61NNAaYn8fHPbSxa0u2slWZZfPCAm0VVtLHGTRj/uh+5Zdb9ezY8z51tEmlb?= =?us-ascii?Q?/hoJC/xeze1vPZkvvoS/X9PPWqPy+EWhGnl7VdG4K4Uq7vEJ/siBeW7KbixB?= =?us-ascii?Q?Q0UREa3RqnwtT6niKdlYZUgLmDq2ir1V4HA667Tpe516Go0lwbtzr18HGaCk?= =?us-ascii?Q?ujd95/GbaPmuY3hXozgRJ/2knjaYH2TUI4karcTqXiBE7BQStAv00XDm0l9y?= =?us-ascii?Q?3mtoPM+CZ1jDtbZ6/yDtQ/s9HPMxKBCHSFBzzKpBO1+v9Z7W3wCtzkrMsgm6?= =?us-ascii?Q?7/f83heEHCA2KKEZ1kRfL3i4ILNak27bia2OztEhmjwyL1ugXA0NvOuufQUl?= =?us-ascii?Q?r4JFOQhOaj99W67LgCYTtK26Xgbqoz+975URo9yUXnoF6jVeLWaGACRXI9bf?= =?us-ascii?Q?A8Fr8pWb4ktZI+UQz6hbh6BTZPUVgGBeXVOu7YoDDcTJXjiAWbNpKGOkO0xW?= =?us-ascii?Q?BrZeZPqhJPmsTvpB5t2nwBHMTW/9rrntS6jdqUKY+1SEpTHybEGsNQy9A+ml?= =?us-ascii?Q?yh5DcdGqpNafngYXXd/zJawxhTrfu0t/qz3LdvxAluw6ui5zFGX1iVJXCj5D?= =?us-ascii?Q?3S0Qp2UJfHfTJvEjKGYI/lTvee5FgYL1s9LUgM4xZrO/vmhkrFRGgxZYEh98?= =?us-ascii?Q?nYkBLWdIlIn6/Eysgqi0/MzlnHqq3GiHW03aB02f6qHrwi03BDitTKyQ/T1g?= =?us-ascii?Q?/lBJ02CX2OARaZPUtL3i9LA6AdtxjEhgpH/KXGBc9g8zzA=3D=3D?= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:DS7PR11MB5966.namprd11.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(366016)(1800799024)(376014)(7416014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?us-ascii?Q?tlnzgDJmusIw4CHp76Pk5Ombyys0Q2wv3L3bEHrZ9+CpTJq12GnHvq/sSX3T?= =?us-ascii?Q?2kr5KD+5xUJPwnJwRaZg59E3ayYJmcQQfYH+Ku0PfIBE4dnACjWHOZ6z0Ytc?= =?us-ascii?Q?e0msmBJvpu8/f+KxAh5nH0HfwXMF6w/olsotkqCxKTw1ymq+eM+jTpkX4Dyn?= =?us-ascii?Q?qq2xIxEPyQK4T3jQ2KdCZzSFSeMIkVNHI/11w8N4C5GMPUo9ivYffb3/+xDR?= =?us-ascii?Q?shGvCioWUrorcfBpq13MH6yP2y9N+/YP5hSUwgRrFdF8tPcQxXpICbmsPHo8?= =?us-ascii?Q?BvSb4jJ0LHK2wQnV1vySczLpAMbgS0eU2eDrgUOq6NZY3lblriL0JAS2Dzfg?= =?us-ascii?Q?PeW+0nKHAix3AUXZMJnRtBOYgGozTiKqh5mcpSOryRlM4aLSC/gkBTulP9F2?= =?us-ascii?Q?bdatScd0+pjd+bViS3YTunA/xu5/cHK58uSpCHi4X9SSBHeGfT9HElnJ83KL?= =?us-ascii?Q?pQ21xjCSiaqQh0DO7b36AaRSVWfKJPEICJBYzYHqdfb18sHaIGUZflmIFhNL?= =?us-ascii?Q?bRmd1is3IPyITtHRzEKEOjYksmkDobQ+qLRU2W8cTdHOM8UP7t43bJcjYuhB?= =?us-ascii?Q?QNUiyQlQjM54g0VnTv4ksBmlw8vlElVuF1Nx0EznSJlzEYfUNx2ATbiDoX8u?= =?us-ascii?Q?SxVu4nAjj/zj6IGUes5DHIClbWwFXAEo+8fr5/dPw3ufY2tXAoGSnMimrh2x?= =?us-ascii?Q?7cVq39TZDhDQJpNd7k51CVRJzMp16+86nWJaxQAz/SyCUEf6MDJPUpiSru+l?= =?us-ascii?Q?LptxFPaQoYUMkB5mFCehUYyr9bTpv0xThxnGW9GZIOFqZRSBt2JMEI/7cv1p?= =?us-ascii?Q?gRtiIUqxPp4lyWBGDYfYFpMV0q7fj0K3T9tYuaUjzWCMjSVFkdQFr1I/IMTo?= =?us-ascii?Q?oo5d0IWEax2h0878AA0fOGzfmafcACle0EnVNiyejSffbpgO2uvRw46lgLtm?= =?us-ascii?Q?zwSD7TCM3GKzyRpHNproVBrXH7+WL65PjcoCAkwkVTfAnIgl5ImAMptUEpVC?= =?us-ascii?Q?P5YhfBA8grw3G0NdH41GSh3KBBViLnnfrDXHYd3idLhYpl+IYqqNpksa3Ph0?= =?us-ascii?Q?VXcks0MjFGWHRzunwkMWRPeW1kQvkG7BrfZUiNbq3VjI/Qwk6/yHU/ax299z?= =?us-ascii?Q?fB0tAm7ka/keWDylIiP7WMDfbuZKHrDmqVYed0kzHjF5eneXFJ8qoNYd0VyX?= =?us-ascii?Q?JREl52mIDyVFLcrBzlikgLzJyU/u7vwdQyS6WJVsnTY4Gotb+nsrz4Msl7IW?= =?us-ascii?Q?us2UP4Vm8fhdtsFKk0vEiFBpacvvZL/rsocTlaheBYp6pnBqW24ByhrNUYyF?= =?us-ascii?Q?jfNLh/mD8Wj6uvhHihu3UO5+cUoIhYRQBUkOV+b+aHd2STg4QdfoNbVtAdNA?= =?us-ascii?Q?r/eBZ+wvCoj3gTkppNWcvvPWVRFc/mJRz4DfM1SliG3RBP8SsRaQvizBdlHm?= =?us-ascii?Q?yTEumLI4XjQkqPdVEUotyqlbSczxcef9RpbcwHYmze9hWc5yWmvmNMxwrdgl?= =?us-ascii?Q?mqyA6oFcVKIYrJVrd4P1ozJb1YC8xOnVrOfCCzfHL6FcJni/s2hp+hTLa3kv?= =?us-ascii?Q?17nBBBUz5AcC3PZt1x4EQdPJ1gwB7C4/H1Qe2KRf?= X-MS-Exchange-CrossTenant-Network-Message-Id: bec6ccb7-9a9f-4743-0128-08dca7802f89 X-MS-Exchange-CrossTenant-AuthSource: DS7PR11MB5966.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 18 Jul 2024 23:20:17.6298 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: x8MlvuWUUoB2KpPvIQH+9Rgaop9/hCLIX1betiJ75wHvqXyOoqkcOrqR1Cow0k6FehnnT00MPGlJEvONUsULcQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR11MB6751 X-OriginatorOrg: intel.com X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 47D5940011 X-Stat-Signature: azzswyustxmxs5jzq6y7gf363oe6fn5t X-HE-Tag: 1721344830-242219 X-HE-Meta: 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 zJFrcm8F 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Thu, Jul 18, 2024 at 10:03:01AM -0400, Peter Xu wrote: > On Thu, Jul 18, 2024 at 09:50:31AM +0800, Yan Zhao wrote: > > Ok. Then if we have two sets of pfns, then we can > > 1. Call remap_pfn_range() in mmap() for pfn set 1. > > I don't think this will work.. At least from the current implementation, > remap_pfn_range() will only reserve the memtype if the range covers the > whole vma. Hmm, by referring to pfn set 1 and pfn set 2, I mean that they're both covering the entire vma, but at different times. To make it more accurately: Consider this hypothetical scenario (not the same as what's implemented in vfio-pci, but seems plausible): Suppose we have a vma covering only one page, then (1) Initially, the vma is mapped to pfn1, with remap_pfn_range(). (2) Subsequently, unmap_single_vma() is invoked to unmap the entire VMA. (3) The driver then maps the entire vma to pfn2 in fault handler Given this context, my questions are: 1. How can we reserve the memory type for pfn2? Should we call track_pfn_remap() in mmap() in advance? 2. How do we untrack the memory type for pfn1 and pfn2, considering they belong to the same VMA but mutual exclusively and not concurrently? Thanks Yan > > > 2. Export track_pfn_remap() and call track_pfn_remap() in mmap() for pfn > > set 2. > > 3. Unmap and call vmf_insert_pfn() in the fault handler to map pfn set 2. > > IMO this should be the similar case of MMIO being disabled on the bar, > where we can use track_pfn_remap() to register the whole vma in mmap() > first. Then in this case if you prefer proactive injection of partial of > the pfn mappings, one can do that via vmf_insert_pfn*() in mmap() after the > memtype registered. > > > > > However, I'm not sure if we can properly untrack both pfn sets 1 and 2. > > Untrack should so far only happen per-vma, AFAIU, so "set 1+2" need to be > done together as they belong to the same vma. > > > > > By exporting untrack_pfn() too? Or, you'll leave VFIO to use ioremap/iounmap() > > (or the variants) to reserve memtype by itself? > > Thanks, > > -- > Peter Xu >