From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.7 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 09ADEFC6197 for ; Thu, 7 Nov 2019 01:57:10 +0000 (UTC) Received: from ml01.01.org (ml01.01.org [198.145.21.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id D8DE820869 for ; Thu, 7 Nov 2019 01:57:09 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D8DE820869 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=intel.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-nvdimm-bounces@lists.01.org Received: from new-ml01.vlan13.01.org (localhost [IPv6:::1]) by ml01.01.org (Postfix) with ESMTP id 078B6100DC3F7; Wed, 6 Nov 2019 17:59:40 -0800 (PST) Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=192.55.52.120; helo=mga04.intel.com; envelope-from=dan.j.williams@intel.com; receiver= Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id 8B2DF100DC3F5 for ; Wed, 6 Nov 2019 17:59:38 -0800 (PST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Nov 2019 17:57:08 -0800 X-IronPort-AV: E=Sophos;i="5.68,276,1569308400"; d="scan'208";a="196402574" Received: from dwillia2-desk3.jf.intel.com (HELO dwillia2-desk3.amr.corp.intel.com) ([10.54.39.16]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Nov 2019 17:57:07 -0800 Subject: [PATCH v8 00/12] EFI Specific Purpose Memory Support From: Dan Williams To: mingo@redhat.com Date: Wed, 06 Nov 2019 17:42:50 -0800 Message-ID: <157309097008.1579826.12818463304589384434.stgit@dwillia2-desk3.amr.corp.intel.com> User-Agent: StGit/0.18-2-gc94f MIME-Version: 1.0 Message-ID-Hash: F7WUHLDLHOR4QBZ2XJ42MQA47X6JAAZ3 X-Message-ID-Hash: F7WUHLDLHOR4QBZ2XJ42MQA47X6JAAZ3 X-MailFrom: dan.j.williams@intel.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; suspicious-header CC: Andy Shevchenko , Borislav Petkov , Keith Busch , Len Brown , Will Deacon , Catalin Marinas , Ard Biesheuvel , Darren Hart , "Rafael J. Wysocki" , Jonathan Cameron , "H. Peter Anvin" , Thomas Gleixner , kbuild test robot , Peter Zijlstra , Dave Hansen , x86@kernel.org, "Rafael J. Wysocki" , Andy Lutomirski , linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, linux-efi@vger.kernel.org X-Mailman-Version: 3.1.1 Precedence: list List-Id: "Linux-nvdimm developer list." Archived-At: List-Archive: List-Help: List-Post: List-Subscribe: List-Unsubscribe: Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Changes since v7: - This is mostly a resend to get it refreshed in Ingo's inbox for v5.5 consideration. It picks up a Reviewed-by on patch4 from Ard, has a minor cosmetic rebase on v5.4-rc6 with no other changes, it merges cleanly with tip/master, and is still passing the test case described in the final patch, but development is otherwise idle over the past 3 weeks. [1]: https://lkml.kernel.org/r/157118756627.2063440.9878062995925617180.stgit@dwillia2-desk3.amr.corp.intel.com/ --- Merge notes: Hi Ingo, This is ready to go as far as I'm concerned. Please consider merging, or acking for Rafael to take, or of course naking if something looks off. Rafael had threatened to start taking the standalone ACPI bits through his tree, but I have yet to any movement on that in his 'linux-next' or 'bleeding-edge' tree. --- The EFI 2.8 Specification [2] introduces the EFI_MEMORY_SP ("specific purpose") memory attribute. This attribute bit replaces the deprecated ACPI HMAT "reservation hint" that was introduced in ACPI 6.2 and removed in ACPI 6.3. Given the increasing diversity of memory types that might be advertised to the operating system, there is a need for platform firmware to hint which memory ranges are free for the OS to use as general purpose memory and which ranges are intended for application specific usage. For example, an application with prior knowledge of the platform may expect to be able to exclusively allocate a precious / limited pool of high bandwidth memory. Alternatively, for the general purpose case, the operating system may want to make the memory available on a best effort basis as a unique numa-node with performance properties by the new CONFIG_HMEM_REPORTING [3] facility. In support of optionally allowing either application-exclusive and core-kernel-mm managed access to differentiated memory, claim EFI_MEMORY_SP ranges for exposure as "soft reserved" and assigned to a device-dax instance by default. Such instances can be directly owned / mapped by a platform-topology-aware application. Alternatively, with the new kmem facility [4], the administrator has the option to instead designate that those memory ranges be hot-added to the core-kernel-mm as a unique memory numa-node. In short, allow for the decision about what software agent manages soft-reserved memory to be made at runtime. The patches build on the new HMAT+HMEM_REPORTING facilities merged for v5.2-rc1. The implementation is tested with qemu emulation of HMAT [5] plus the efi_fake_mem facility for applying the EFI_MEMORY_SP attribute. Specific details on reproducing the test configuration are in patch 12. [2]: https://uefi.org/sites/default/files/resources/UEFI_Spec_2_8_final.pdf [3]: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e1cf33aafb84 [4]: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c221c0b0308f [5]: http://patchwork.ozlabs.org/cover/1096737/ --- Dan Williams (12): acpi/numa: Establish a new drivers/acpi/numa/ directory efi: Enumerate EFI_MEMORY_SP x86/efi: Push EFI_MEMMAP check into leaf routines efi: Common enable/disable infrastructure for EFI soft reservation x86/efi: EFI soft reservation to E820 enumeration arm/efi: EFI soft reservation to memblock x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP lib: Uplevel the pmem "region" ida to a global allocator dax: Fix alloc_dax_region() compile warning device-dax: Add a driver for "hmem" devices acpi/numa/hmat: Register HMAT at device_initcall level acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device Documentation/admin-guide/kernel-parameters.txt | 19 +++ arch/arm64/mm/mmu.c | 2 arch/x86/boot/compressed/eboot.c | 6 + arch/x86/boot/compressed/kaslr.c | 46 +++++++- arch/x86/include/asm/e820/types.h | 8 + arch/x86/include/asm/efi.h | 17 +++ arch/x86/kernel/e820.c | 12 ++ arch/x86/kernel/setup.c | 18 +-- arch/x86/platform/efi/efi.c | 54 ++++++++- arch/x86/platform/efi/quirks.c | 3 + drivers/acpi/Kconfig | 9 -- drivers/acpi/Makefile | 3 - drivers/acpi/hmat/Makefile | 2 drivers/acpi/numa/Kconfig | 7 + drivers/acpi/numa/Makefile | 3 + drivers/acpi/numa/hmat.c | 138 +++++++++++++++++++++-- drivers/acpi/numa/srat.c | 0 drivers/dax/Kconfig | 27 ++++- drivers/dax/Makefile | 2 drivers/dax/bus.c | 2 drivers/dax/bus.h | 2 drivers/dax/dax-private.h | 2 drivers/dax/hmem.c | 56 +++++++++ drivers/firmware/efi/Kconfig | 21 ++++ drivers/firmware/efi/Makefile | 5 + drivers/firmware/efi/arm-init.c | 9 ++ drivers/firmware/efi/arm-runtime.c | 24 ++++ drivers/firmware/efi/efi.c | 13 ++ drivers/firmware/efi/esrt.c | 3 + drivers/firmware/efi/fake_mem.c | 26 ++-- drivers/firmware/efi/fake_mem.h | 10 ++ drivers/firmware/efi/libstub/arm32-stub.c | 5 + drivers/firmware/efi/libstub/efi-stub-helper.c | 19 +++ drivers/firmware/efi/libstub/random.c | 4 + drivers/firmware/efi/x86_fake_mem.c | 69 ++++++++++++ drivers/nvdimm/Kconfig | 1 drivers/nvdimm/core.c | 1 drivers/nvdimm/nd-core.h | 1 drivers/nvdimm/region_devs.c | 13 +- include/linux/efi.h | 16 +++ include/linux/ioport.h | 1 include/linux/memregion.h | 23 ++++ lib/Kconfig | 3 + lib/Makefile | 1 lib/memregion.c | 18 +++ 45 files changed, 634 insertions(+), 90 deletions(-) delete mode 100644 drivers/acpi/hmat/Makefile rename drivers/acpi/{hmat/Kconfig => numa/Kconfig} (75%) create mode 100644 drivers/acpi/numa/Makefile rename drivers/acpi/{hmat/hmat.c => numa/hmat.c} (85%) rename drivers/acpi/{numa.c => numa/srat.c} (100%) create mode 100644 drivers/dax/hmem.c create mode 100644 drivers/firmware/efi/fake_mem.h create mode 100644 drivers/firmware/efi/x86_fake_mem.c create mode 100644 include/linux/memregion.h create mode 100644 lib/memregion.c _______________________________________________ Linux-nvdimm mailing list -- linux-nvdimm@lists.01.org To unsubscribe send an email to linux-nvdimm-leave@lists.01.org From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-5.7 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 5BB27FC6196 for ; Thu, 7 Nov 2019 01:57:11 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 2CD9120869 for ; Thu, 7 Nov 2019 01:57:11 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728315AbfKGB5I (ORCPT ); Wed, 6 Nov 2019 20:57:08 -0500 Received: from mga01.intel.com ([192.55.52.88]:46632 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727328AbfKGB5H (ORCPT ); Wed, 6 Nov 2019 20:57:07 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Nov 2019 17:57:07 -0800 X-IronPort-AV: E=Sophos;i="5.68,276,1569308400"; d="scan'208";a="196402574" Received: from dwillia2-desk3.jf.intel.com (HELO dwillia2-desk3.amr.corp.intel.com) ([10.54.39.16]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Nov 2019 17:57:07 -0800 Subject: [PATCH v8 00/12] EFI Specific Purpose Memory Support From: Dan Williams To: mingo@redhat.com Cc: Andy Shevchenko , Borislav Petkov , Vishal Verma , Keith Busch , Len Brown , Will Deacon , Catalin Marinas , Ard Biesheuvel , Darren Hart , Dave Jiang , "Rafael J. Wysocki" , Jonathan Cameron , "H. Peter Anvin" , Thomas Gleixner , kbuild test robot , Peter Zijlstra , Dave Hansen , x86@kernel.org, "Rafael J. Wysocki" , Andy Lutomirski , x86@kernel.org, linux-acpi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-nvdimm@lists.01.org, linux-efi@vger.kernel.org Date: Wed, 06 Nov 2019 17:42:50 -0800 Message-ID: <157309097008.1579826.12818463304589384434.stgit@dwillia2-desk3.amr.corp.intel.com> User-Agent: StGit/0.18-2-gc94f MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Sender: linux-acpi-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-acpi@vger.kernel.org Changes since v7: - This is mostly a resend to get it refreshed in Ingo's inbox for v5.5 consideration. It picks up a Reviewed-by on patch4 from Ard, has a minor cosmetic rebase on v5.4-rc6 with no other changes, it merges cleanly with tip/master, and is still passing the test case described in the final patch, but development is otherwise idle over the past 3 weeks. [1]: https://lkml.kernel.org/r/157118756627.2063440.9878062995925617180.stgit@dwillia2-desk3.amr.corp.intel.com/ --- Merge notes: Hi Ingo, This is ready to go as far as I'm concerned. Please consider merging, or acking for Rafael to take, or of course naking if something looks off. Rafael had threatened to start taking the standalone ACPI bits through his tree, but I have yet to any movement on that in his 'linux-next' or 'bleeding-edge' tree. --- The EFI 2.8 Specification [2] introduces the EFI_MEMORY_SP ("specific purpose") memory attribute. This attribute bit replaces the deprecated ACPI HMAT "reservation hint" that was introduced in ACPI 6.2 and removed in ACPI 6.3. Given the increasing diversity of memory types that might be advertised to the operating system, there is a need for platform firmware to hint which memory ranges are free for the OS to use as general purpose memory and which ranges are intended for application specific usage. For example, an application with prior knowledge of the platform may expect to be able to exclusively allocate a precious / limited pool of high bandwidth memory. Alternatively, for the general purpose case, the operating system may want to make the memory available on a best effort basis as a unique numa-node with performance properties by the new CONFIG_HMEM_REPORTING [3] facility. In support of optionally allowing either application-exclusive and core-kernel-mm managed access to differentiated memory, claim EFI_MEMORY_SP ranges for exposure as "soft reserved" and assigned to a device-dax instance by default. Such instances can be directly owned / mapped by a platform-topology-aware application. Alternatively, with the new kmem facility [4], the administrator has the option to instead designate that those memory ranges be hot-added to the core-kernel-mm as a unique memory numa-node. In short, allow for the decision about what software agent manages soft-reserved memory to be made at runtime. The patches build on the new HMAT+HMEM_REPORTING facilities merged for v5.2-rc1. The implementation is tested with qemu emulation of HMAT [5] plus the efi_fake_mem facility for applying the EFI_MEMORY_SP attribute. Specific details on reproducing the test configuration are in patch 12. [2]: https://uefi.org/sites/default/files/resources/UEFI_Spec_2_8_final.pdf [3]: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e1cf33aafb84 [4]: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c221c0b0308f [5]: http://patchwork.ozlabs.org/cover/1096737/ --- Dan Williams (12): acpi/numa: Establish a new drivers/acpi/numa/ directory efi: Enumerate EFI_MEMORY_SP x86/efi: Push EFI_MEMMAP check into leaf routines efi: Common enable/disable infrastructure for EFI soft reservation x86/efi: EFI soft reservation to E820 enumeration arm/efi: EFI soft reservation to memblock x86/efi: Add efi_fake_mem support for EFI_MEMORY_SP lib: Uplevel the pmem "region" ida to a global allocator dax: Fix alloc_dax_region() compile warning device-dax: Add a driver for "hmem" devices acpi/numa/hmat: Register HMAT at device_initcall level acpi/numa/hmat: Register "soft reserved" memory as an "hmem" device Documentation/admin-guide/kernel-parameters.txt | 19 +++ arch/arm64/mm/mmu.c | 2 arch/x86/boot/compressed/eboot.c | 6 + arch/x86/boot/compressed/kaslr.c | 46 +++++++- arch/x86/include/asm/e820/types.h | 8 + arch/x86/include/asm/efi.h | 17 +++ arch/x86/kernel/e820.c | 12 ++ arch/x86/kernel/setup.c | 18 +-- arch/x86/platform/efi/efi.c | 54 ++++++++- arch/x86/platform/efi/quirks.c | 3 + drivers/acpi/Kconfig | 9 -- drivers/acpi/Makefile | 3 - drivers/acpi/hmat/Makefile | 2 drivers/acpi/numa/Kconfig | 7 + drivers/acpi/numa/Makefile | 3 + drivers/acpi/numa/hmat.c | 138 +++++++++++++++++++++-- drivers/acpi/numa/srat.c | 0 drivers/dax/Kconfig | 27 ++++- drivers/dax/Makefile | 2 drivers/dax/bus.c | 2 drivers/dax/bus.h | 2 drivers/dax/dax-private.h | 2 drivers/dax/hmem.c | 56 +++++++++ drivers/firmware/efi/Kconfig | 21 ++++ drivers/firmware/efi/Makefile | 5 + drivers/firmware/efi/arm-init.c | 9 ++ drivers/firmware/efi/arm-runtime.c | 24 ++++ drivers/firmware/efi/efi.c | 13 ++ drivers/firmware/efi/esrt.c | 3 + drivers/firmware/efi/fake_mem.c | 26 ++-- drivers/firmware/efi/fake_mem.h | 10 ++ drivers/firmware/efi/libstub/arm32-stub.c | 5 + drivers/firmware/efi/libstub/efi-stub-helper.c | 19 +++ drivers/firmware/efi/libstub/random.c | 4 + drivers/firmware/efi/x86_fake_mem.c | 69 ++++++++++++ drivers/nvdimm/Kconfig | 1 drivers/nvdimm/core.c | 1 drivers/nvdimm/nd-core.h | 1 drivers/nvdimm/region_devs.c | 13 +- include/linux/efi.h | 16 +++ include/linux/ioport.h | 1 include/linux/memregion.h | 23 ++++ lib/Kconfig | 3 + lib/Makefile | 1 lib/memregion.c | 18 +++ 45 files changed, 634 insertions(+), 90 deletions(-) delete mode 100644 drivers/acpi/hmat/Makefile rename drivers/acpi/{hmat/Kconfig => numa/Kconfig} (75%) create mode 100644 drivers/acpi/numa/Makefile rename drivers/acpi/{hmat/hmat.c => numa/hmat.c} (85%) rename drivers/acpi/{numa.c => numa/srat.c} (100%) create mode 100644 drivers/dax/hmem.c create mode 100644 drivers/firmware/efi/fake_mem.h create mode 100644 drivers/firmware/efi/x86_fake_mem.c create mode 100644 include/linux/memregion.h create mode 100644 lib/memregion.c