From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 74BCAD1038E for ; Fri, 25 Oct 2024 01:19:07 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id F00176B008C; Thu, 24 Oct 2024 21:19:06 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id EB0316B0092; Thu, 24 Oct 2024 21:19:06 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D77696B0093; Thu, 24 Oct 2024 21:19:06 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id B8BF46B008C for ; Thu, 24 Oct 2024 21:19:06 -0400 (EDT) Received: from smtpin25.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id CC409C02CC for ; Fri, 25 Oct 2024 01:18:45 +0000 (UTC) X-FDA: 82710365178.25.4BBB324 Received: from nyc.source.kernel.org (nyc.source.kernel.org [147.75.193.91]) by imf03.hostedemail.com (Postfix) with ESMTP id 9307920009 for ; Fri, 25 Oct 2024 01:18:55 +0000 (UTC) Authentication-Results: imf03.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=h9Y3BuEI; spf=pass (imf03.hostedemail.com: domain of sstabellini@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=sstabellini@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1729818990; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=ijJKkFWyjCKwFwEsIZQyLMMatLUb7KQsYGHescYbZMw=; b=zTdP/YaQu4ixgqP28RooKJZDPXxhLSngxnVDVdcZCNfcro0d3sV9XvolIbEeW6gb5vtmEl BJblcA0n8o10F2/p32P1dB4gIwxWwAIotslXeJszhHUEoucRhfWPulMYfN1l0NcFMsI6k6 gtj8+fsw89TpbbS9q2i3tlBw9pe0KZo= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1729818990; a=rsa-sha256; cv=none; b=RV3TP3UEFh4n+bCoLjR76aLcTbS7N5i30VcwXv9CzBcO2juQfi+gHMC1I9yA1wG2y2vAYM lFaayhwlVLnxgTSWe1nY3uUmF3Oo4Ly5tEUSvBlGs011uHhRy8gC5RI8ibpS5NV9+eSlPp ++YaJ8b9NiWmhQ4p4yM/14aG1CV2aQc= ARC-Authentication-Results: i=1; imf03.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=h9Y3BuEI; spf=pass (imf03.hostedemail.com: domain of sstabellini@kernel.org designates 147.75.193.91 as permitted sender) smtp.mailfrom=sstabellini@kernel.org; dmarc=pass (policy=quarantine) header.from=kernel.org Received: from smtp.kernel.org (transwarp.subspace.kernel.org [100.75.92.58]) by nyc.source.kernel.org (Postfix) with ESMTP id 51759A42AFB; Fri, 25 Oct 2024 01:17:06 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id C460BC4CEC7; Fri, 25 Oct 2024 01:18:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1729819142; bh=2WUpQv5xSA9L8ZAC0Pr5lb+6yWaR3j3uJ/oUJRsB1Ag=; h=Date:From:To:cc:Subject:In-Reply-To:References:From; b=h9Y3BuEI4nVw2E1L41bOtoCSSTfgH4eThsND/kUt5A53DGtmVSQx90e6fn6GWwt5s k16QNWI9fV/+Q/0n5QZl9cXCAOsFVIkelUmwWS8JmZWRNWgmhnSpBNvry5jGYjqCL+ kJp11khPimcEpfZUxjly/gy/UnS87UAeFC6b4N6MpR4dXAKpCPNbzvrKcftZvdRijf cD4wMEkVslnWLWxj4CXx9BDuG7dBTdkvWtEjtqraeC7HpliUrwoCkqdsWAdxUbgdrp gJ/lqIKoeSXV0mnoIsma+YwNrNu6cG8g5HKKaf9e4bOBvB6F6j2KR1WnUHfEpQZtQ1 Z0D3+QUL7elTA== Date: Thu, 24 Oct 2024 18:18:58 -0700 (PDT) From: Stefano Stabellini X-X-Sender: sstabellini@ubuntu-linux-20-04-desktop To: Ryan Roberts cc: Stefano Stabellini , Andrew Morton , Anshuman Khandual , Ard Biesheuvel , Catalin Marinas , David Hildenbrand , Greg Marsden , Ivan Ivanov , Kalesh Singh , Marc Zyngier , Mark Rutland , Matthias Brugger , Miroslav Benes , Will Deacon , Juergen Gross , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, xen-devel@lists.xenproject.org, julien@xen.org Subject: Re: [RFC PATCH v1 36/57] xen: Remove PAGE_SIZE compile-time constant assumption In-Reply-To: <3027c366-2cb0-4984-8ee7-aae92fb51512@arm.com> Message-ID: References: <20241014105514.3206191-1-ryan.roberts@arm.com> <20241014105912.3207374-1-ryan.roberts@arm.com> <20241014105912.3207374-36-ryan.roberts@arm.com> <829b5662-13c0-4728-894c-b2d578681b11@arm.com> <3027c366-2cb0-4984-8ee7-aae92fb51512@arm.com> User-Agent: Alpine 2.22 (DEB 394 2020-01-19) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 9307920009 X-Stat-Signature: dkopkb1dfagcsughau65bsai4jtkydpm X-HE-Tag: 1729819135-351877 X-HE-Meta: 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 ddpj+Jyq acBmUbU39QUrVoaY0b/jZ8tjw2cxBUL7SPD3jpijXeTl5QFiNEITXEH9uRy6MFgw9RYhhISzlaIoVmk1aJLY7wFSu9EcWeVHIeEpxAjOHmPAxys047H0viE2Ca7zqm2B0CDEbWw9X/6qfERwI6kwxLdjF7taUo0rgAliCOdyvgIVL62cn5mftOGTFuwpskgvo19GBBfJj9Ijc8ZJdA4gPTBY2xm3FkszC0w9IjRkQ4yymKrHZ+GbIjR9AfTqCty6v2WB9bKA41b47MKAwaUX813nx+AvwClfAQXV8u5ZZkjUNvmgY7jACt6aWN7V68DS71nkAxqwDD3nu5pBprKTBpu6JDz+3T4M6c8Bf X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Thu, 24 Oct 2024, Ryan Roberts wrote: > On 23/10/2024 02:23, Stefano Stabellini wrote: > > +Julien > > > > On Wed, 16 Oct 2024, Ryan Roberts wrote: > >> + Juergen Gross, Stefano Stabellini > >> > >> This was a rather tricky series to get the recipients correct for and my script > >> did not realize that "supporter" was a pseudonym for "maintainer" so you were > >> missed off the original post. Appologies! > >> > >> More context in cover letter: > >> https://lore.kernel.org/all/20241014105514.3206191-1-ryan.roberts@arm.com/ > >> > >> > >> On 14/10/2024 11:58, Ryan Roberts wrote: > >>> To prepare for supporting boot-time page size selection, refactor code > >>> to remove assumptions about PAGE_SIZE being compile-time constant. Code > >>> intended to be equivalent when compile-time page size is active. > >>> > >>> Allocate enough "frame_list" static storage in the balloon driver for > >>> the maximum supported page size. Although continue to use only the first > >>> PAGE_SIZE of the buffer at run-time to maintain existing behaviour. > >>> > >>> Refactor xen_biovec_phys_mergeable() to convert ifdeffery to c if/else. > >>> For compile-time page size, the compiler will choose one branch and > >>> strip the dead one. For boot-time, it can be evaluated at run time. > >>> > >>> Refactor a BUILD_BUG_ON to evaluate the limit (when the minimum > >>> supported page size is selected at boot-time). > >>> > >>> Reserve enough storage for max page size in "struct remap_data" and > >>> "struct xenbus_map_node". > >>> > >>> Signed-off-by: Ryan Roberts > >>> --- > >>> > >>> ***NOTE*** > >>> Any confused maintainers may want to read the cover note here for context: > >>> https://lore.kernel.org/all/20241014105514.3206191-1-ryan.roberts@arm.com/ > >>> > >>> drivers/xen/balloon.c | 11 ++++++----- > >>> drivers/xen/biomerge.c | 12 ++++++------ > >>> drivers/xen/privcmd.c | 2 +- > >>> drivers/xen/xenbus/xenbus_client.c | 5 +++-- > >>> drivers/xen/xlate_mmu.c | 6 +++--- > >>> include/xen/page.h | 2 ++ > >>> 6 files changed, 21 insertions(+), 17 deletions(-) > >>> > >>> diff --git a/drivers/xen/balloon.c b/drivers/xen/balloon.c > >>> index 528395133b4f8..0ed5f6453af0e 100644 > >>> --- a/drivers/xen/balloon.c > >>> +++ b/drivers/xen/balloon.c > >>> @@ -131,7 +131,8 @@ struct balloon_stats balloon_stats; > >>> EXPORT_SYMBOL_GPL(balloon_stats); > >>> > >>> /* We increase/decrease in batches which fit in a page */ > >>> -static xen_pfn_t frame_list[PAGE_SIZE / sizeof(xen_pfn_t)]; > >>> +static xen_pfn_t frame_list[PAGE_SIZE_MAX / sizeof(xen_pfn_t)]; > >>> +#define FRAME_LIST_NR_ENTRIES (PAGE_SIZE / sizeof(xen_pfn_t)) > >>> > >>> > >>> /* List of ballooned pages, threaded through the mem_map array. */ > >>> @@ -389,8 +390,8 @@ static enum bp_state increase_reservation(unsigned long nr_pages) > >>> unsigned long i; > >>> struct page *page; > >>> > >>> - if (nr_pages > ARRAY_SIZE(frame_list)) > >>> - nr_pages = ARRAY_SIZE(frame_list); > >>> + if (nr_pages > FRAME_LIST_NR_ENTRIES) > >>> + nr_pages = FRAME_LIST_NR_ENTRIES; > >>> > >>> page = list_first_entry_or_null(&ballooned_pages, struct page, lru); > >>> for (i = 0; i < nr_pages; i++) { > >>> @@ -434,8 +435,8 @@ static enum bp_state decrease_reservation(unsigned long nr_pages, gfp_t gfp) > >>> int ret; > >>> LIST_HEAD(pages); > >>> > >>> - if (nr_pages > ARRAY_SIZE(frame_list)) > >>> - nr_pages = ARRAY_SIZE(frame_list); > >>> + if (nr_pages > FRAME_LIST_NR_ENTRIES) > >>> + nr_pages = FRAME_LIST_NR_ENTRIES; > >>> > >>> for (i = 0; i < nr_pages; i++) { > >>> page = alloc_page(gfp); > >>> diff --git a/drivers/xen/biomerge.c b/drivers/xen/biomerge.c > >>> index 05a286d24f148..28f0887e40026 100644 > >>> --- a/drivers/xen/biomerge.c > >>> +++ b/drivers/xen/biomerge.c > >>> @@ -8,16 +8,16 @@ > >>> bool xen_biovec_phys_mergeable(const struct bio_vec *vec1, > >>> const struct page *page) > >>> { > >>> -#if XEN_PAGE_SIZE == PAGE_SIZE > >>> - unsigned long bfn1 = pfn_to_bfn(page_to_pfn(vec1->bv_page)); > >>> - unsigned long bfn2 = pfn_to_bfn(page_to_pfn(page)); > >>> + if (XEN_PAGE_SIZE == PAGE_SIZE) { > >>> + unsigned long bfn1 = pfn_to_bfn(page_to_pfn(vec1->bv_page)); > >>> + unsigned long bfn2 = pfn_to_bfn(page_to_pfn(page)); > >>> + > >>> + return bfn1 + PFN_DOWN(vec1->bv_offset + vec1->bv_len) == bfn2; > >>> + } > >>> > >>> - return bfn1 + PFN_DOWN(vec1->bv_offset + vec1->bv_len) == bfn2; > >>> -#else > >>> /* > >>> * XXX: Add support for merging bio_vec when using different page > >>> * size in Xen and Linux. > >>> */ > >>> return false; > >>> -#endif > >>> } > >>> diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c > >>> index 9563650dfbafc..847f7b806caf7 100644 > >>> --- a/drivers/xen/privcmd.c > >>> +++ b/drivers/xen/privcmd.c > >>> @@ -557,7 +557,7 @@ static long privcmd_ioctl_mmap_batch( > >>> state.global_error = 0; > >>> state.version = version; > >>> > >>> - BUILD_BUG_ON(((PAGE_SIZE / sizeof(xen_pfn_t)) % XEN_PFN_PER_PAGE) != 0); > >>> + BUILD_BUG_ON(((PAGE_SIZE_MIN / sizeof(xen_pfn_t)) % XEN_PFN_PER_PAGE_MAX) != 0); > > > > Is there any value in keep this test? And if so, what should it look > > like? I think we should turn it into a WARN_ON: > > > > WARN_ON(((PAGE_SIZE / sizeof(xen_pfn_t)) % XEN_PFN_PER_PAGE) != 0); > > > > It doesn't make much sense having a BUILD_BUG_ON on a variable that can > > change? > > I believe that as long as we assume sizeof(xen_pfn_t), PAGE_SIZE and > XEN_PAGE_SIZE are all power-of-two sizes, then this single build-time test > should cover all possible boot-time PAGE_SIZEs. > > Logic: > > If PAGE_SIZE and XEN_PAGE_SIZE are power-of-two, then XEN_PFN_PER_PAGE must also > be power-of-two. XEN_PFN_PER_PAGE_MAX is just the worst case limit. > > (PAGE_SIZE_MIN / sizeof(xen_pfn_t)) is the number of xen_pfn_t that fit on > smallest page. > > If you can get an integer multiple number of XEN_PFN_PER_PAGE_MAX on the > smallest page, then it remains an integer multiple as PAGE_SIZE gets bigger, > assuming it is restricted to power-of-two sizes. > > Perhaps there is a floor in my logic? > > I'd prefer to keep BUILD_BUG_ON where possible to avoid the additional image > size bloat and runtime costs. You are right. It would be nice to add a in-code comment to explain this. Reviewed-by: Stefano Stabellini > >>> /* mmap_batch_fn guarantees ret == 0 */ > >>> BUG_ON(traverse_pages_block(m.num, sizeof(xen_pfn_t), > >>> &pagelist, mmap_batch_fn, &state)); > >>> diff --git a/drivers/xen/xenbus/xenbus_client.c b/drivers/xen/xenbus/xenbus_client.c > >>> index 51b3124b0d56c..99bde836c10c4 100644 > >>> --- a/drivers/xen/xenbus/xenbus_client.c > >>> +++ b/drivers/xen/xenbus/xenbus_client.c > >>> @@ -49,9 +49,10 @@ > >>> > >>> #include "xenbus.h" > >>> > >>> -#define XENBUS_PAGES(_grants) (DIV_ROUND_UP(_grants, XEN_PFN_PER_PAGE)) > >>> +#define XENBUS_PAGES(_grants) (DIV_ROUND_UP(_grants, XEN_PFN_PER_PAGE)) > >>> +#define XENBUS_PAGES_MAX(_grants) (DIV_ROUND_UP(_grants, XEN_PFN_PER_PAGE_MIN)) > >>> > >>> -#define XENBUS_MAX_RING_PAGES (XENBUS_PAGES(XENBUS_MAX_RING_GRANTS)) > >>> +#define XENBUS_MAX_RING_PAGES (XENBUS_PAGES_MAX(XENBUS_MAX_RING_GRANTS)) > >>> > >>> struct xenbus_map_node { > >>> struct list_head next; > >>> diff --git a/drivers/xen/xlate_mmu.c b/drivers/xen/xlate_mmu.c > >>> index f17c4c03db30c..a757c801a7542 100644 > >>> --- a/drivers/xen/xlate_mmu.c > >>> +++ b/drivers/xen/xlate_mmu.c > >>> @@ -74,9 +74,9 @@ struct remap_data { > >>> int mapped; > >>> > >>> /* Hypercall parameters */ > >>> - int h_errs[XEN_PFN_PER_PAGE]; > >>> - xen_ulong_t h_idxs[XEN_PFN_PER_PAGE]; > >>> - xen_pfn_t h_gpfns[XEN_PFN_PER_PAGE]; > >>> + int h_errs[XEN_PFN_PER_PAGE_MAX]; > >>> + xen_ulong_t h_idxs[XEN_PFN_PER_PAGE_MAX]; > >>> + xen_pfn_t h_gpfns[XEN_PFN_PER_PAGE_MAX]; > >>> > >>> int h_iter; /* Iterator */ > >>> }; > >>> diff --git a/include/xen/page.h b/include/xen/page.h > >>> index 285677b42943a..86683a30038a3 100644 > >>> --- a/include/xen/page.h > >>> +++ b/include/xen/page.h > >>> @@ -21,6 +21,8 @@ > >>> ((page_to_pfn(page)) << (PAGE_SHIFT - XEN_PAGE_SHIFT)) > >>> > >>> #define XEN_PFN_PER_PAGE (PAGE_SIZE / XEN_PAGE_SIZE) > >>> +#define XEN_PFN_PER_PAGE_MIN (PAGE_SIZE_MIN / XEN_PAGE_SIZE) > >>> +#define XEN_PFN_PER_PAGE_MAX (PAGE_SIZE_MAX / XEN_PAGE_SIZE) > >>> > >>> #define XEN_PFN_DOWN(x) ((x) >> XEN_PAGE_SHIFT) > >>> #define XEN_PFN_UP(x) (((x) + XEN_PAGE_SIZE-1) >> XEN_PAGE_SHIFT) > >> >