Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1307551imm; Wed, 10 Oct 2018 12:22:28 -0700 (PDT) X-Google-Smtp-Source: ACcGV60Lyxp1BCGRq9IqeWren/O/ZcVebgMCkruVvsYTAYUP1C1v0lHERGFrkVpaWphJAuZwrxfT X-Received: by 2002:a62:1d16:: with SMTP id d22-v6mr36498510pfd.159.1539199348407; Wed, 10 Oct 2018 12:22:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539199348; cv=none; d=google.com; s=arc-20160816; b=ug5huz2mtOW0+Cy+0ZkjT6tQkh4IwSy6u5xQuT4EzZvQKlQ/18sIvbn0IKO4cKFVcw NDFDidSCZuY1Q0YKWjLNr3tGtSjDIDTUT/bFZOTGxZtVxJ+MQE55dec/kQFjvq0061yN 5Wdg89fe2x0kkgUYpTcZoWjcNrqij1CwxOb1Z/omBxJwd+b7qkEywY7U9DH0eQh93KlN 7yMFtOfoxpikjE2DZMT1F94QikxqxtlgIrN4XxAp6IwwxQnOSIE/Y55G0SgJ3GDqbM+G qNA5nNzRykMcWAhwX/70oWM/CpuTobiAUInqb179j19x62N3iguZHzfZyfOw/inm0gdR Iw5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:dkim-filter; bh=mJM93KP006rhOnrNxcep+TBt964ZEP4ES2TiYXSRFJc=; b=eROjl8KKPv6JVSPSVImbpyrD88diD38V5mbjK3y3gHsU1slMzYVot9hjz1eghK4xx3 z6+giRICRv5IEiOba9uiaDJaO+VsFXPp7XQjDa28L8B1hc9LTLUGUB3s4Fb1Ah9FnvpG ExKuLLur8Vo5fBKTj4h7BRswprwF9JTHOOsthp68AC96v5xiAIdpNPfZtiTnQgJ9N/yd tUPzoZFsW4D0AFn54D5M/rtBYPqsvh22t88RBDoNrBg8NVuOEEkk6TJNPJEchRQWf43C SYukNmhVYNpLxt+JgRfCszXnTxIxmQAq7YVOebhroFvAwFRGufZNkhehHlNloDV4hfiF 6jnA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@efficios.com header.s=default header.b=vB1mpn4E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s20-v6si21746617pgj.546.2018.10.10.12.22.13; Wed, 10 Oct 2018 12:22:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@efficios.com header.s=default header.b=vB1mpn4E; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=efficios.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727729AbeJKCnm (ORCPT + 99 others); Wed, 10 Oct 2018 22:43:42 -0400 Received: from mail.efficios.com ([167.114.142.138]:32890 "EHLO mail.efficios.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727583AbeJKCnl (ORCPT ); Wed, 10 Oct 2018 22:43:41 -0400 Received: from localhost (ip6-localhost [IPv6:::1]) by mail.efficios.com (Postfix) with ESMTP id C7C9B183B82; Wed, 10 Oct 2018 15:20:07 -0400 (EDT) Received: from mail.efficios.com ([IPv6:::1]) by localhost (mail02.efficios.com [IPv6:::1]) (amavisd-new, port 10032) with ESMTP id SvxrZ4pdMk3b; Wed, 10 Oct 2018 15:20:07 -0400 (EDT) Received: from localhost (ip6-localhost [IPv6:::1]) by mail.efficios.com (Postfix) with ESMTP id 4E2B8183B7E; Wed, 10 Oct 2018 15:20:07 -0400 (EDT) DKIM-Filter: OpenDKIM Filter v2.10.3 mail.efficios.com 4E2B8183B7E DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=efficios.com; s=default; t=1539199207; bh=mJM93KP006rhOnrNxcep+TBt964ZEP4ES2TiYXSRFJc=; h=From:To:Date:Message-Id; b=vB1mpn4EEonJYNebCDGgHkcUzRttDB7rYCW7JjXgihO8AbnRz0C7Ldp1wPQGhy6qh n/AcNGCe8mglpuggIPQAp32LJ0cmkFC/NksnLJj3QWsZ1w4qf9WWYkJlmU4NVWFKN4 TEk0HjtaYp5vtzUNW7MTgOa/b7ARUSNp8Oin2Sjn3XfFJQBoh0izknnE/5I7a09KvX 5v/CrIt22F35BW4MpTy1x/VKIsqH4VaYx5XkTnbhAjKsnPIrJp5h40J89ZIR+t6cr8 0b/Ien38Biu7OZp0dNhSqiVsfDmkrSyVWnBg4q67T0mGVZsdDJ08S9viq2SesxIVtw YE6n6FP+c8vKQ== X-Virus-Scanned: amavisd-new at efficios.com Received: from mail.efficios.com ([IPv6:::1]) by localhost (mail02.efficios.com [IPv6:::1]) (amavisd-new, port 10026) with ESMTP id lVycwN8FsDQI; Wed, 10 Oct 2018 15:20:07 -0400 (EDT) Received: from thinkos.internal.efficios.com (192-222-157-41.qc.cable.ebox.net [192.222.157.41]) by mail.efficios.com (Postfix) with ESMTPSA id 295FC183B5F; Wed, 10 Oct 2018 15:20:06 -0400 (EDT) From: Mathieu Desnoyers To: Peter Zijlstra , "Paul E . McKenney" , Boqun Feng Cc: linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, Thomas Gleixner , Andy Lutomirski , Dave Watson , Paul Turner , Andrew Morton , Russell King , Ingo Molnar , "H . Peter Anvin" , Andi Kleen , Chris Lameter , Ben Maurer , Steven Rostedt , Josh Triplett , Linus Torvalds , Catalin Marinas , Will Deacon , Michael Kerrisk , Joel Fernandes , Mathieu Desnoyers Subject: [RFC PATCH for 4.21 04/16] mm: Introduce vm_map_user_ram, vm_unmap_user_ram Date: Wed, 10 Oct 2018 15:19:24 -0400 Message-Id: <20181010191936.7495-5-mathieu.desnoyers@efficios.com> X-Mailer: git-send-email 2.11.0 In-Reply-To: <20181010191936.7495-1-mathieu.desnoyers@efficios.com> References: <20181010191936.7495-1-mathieu.desnoyers@efficios.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Create and destroy mappings aliased to a user-space mapping with the same cache coloring as the userspace mapping. Allow the kernel to load from and store to pages shared with user-space through its own mapping in kernel virtual addresses while ensuring cache conherency between kernel and userspace mappings for virtually aliased architectures. Signed-off-by: Mathieu Desnoyers Reviewed-by: Matthew Wilcox CC: "Paul E. McKenney" CC: Peter Zijlstra CC: Paul Turner CC: Thomas Gleixner CC: Andy Lutomirski CC: Andi Kleen CC: Dave Watson CC: Chris Lameter CC: Ingo Molnar CC: "H. Peter Anvin" CC: Ben Maurer CC: Steven Rostedt CC: Josh Triplett CC: Linus Torvalds CC: Andrew Morton CC: Russell King CC: Catalin Marinas CC: Will Deacon CC: Michael Kerrisk CC: Boqun Feng --- include/linux/vmalloc.h | 4 ++++ mm/vmalloc.c | 64 +++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 68 insertions(+) diff --git a/include/linux/vmalloc.h b/include/linux/vmalloc.h index 398e9c95cd61..899657b3d469 100644 --- a/include/linux/vmalloc.h +++ b/include/linux/vmalloc.h @@ -59,6 +59,10 @@ struct vmap_area { extern void vm_unmap_ram(const void *mem, unsigned int count); extern void *vm_map_ram(struct page **pages, unsigned int count, int node, pgprot_t prot); +extern void vm_unmap_user_ram(const void *mem, unsigned int count); +extern void *vm_map_user_ram(struct page **pages, unsigned int count, + unsigned long uaddr, int node, pgprot_t prot); + extern void vm_unmap_aliases(void); #ifdef CONFIG_MMU diff --git a/mm/vmalloc.c b/mm/vmalloc.c index a728fc492557..a86bf550b027 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -1186,6 +1186,70 @@ void *vm_map_ram(struct page **pages, unsigned int count, int node, pgprot_t pro } EXPORT_SYMBOL(vm_map_ram); +/** + * vm_unmap_user_ram - unmap linear kernel address space set up by vm_map_user_ram + * @mem: the pointer returned by vm_map_user_ram + * @count: the count passed to that vm_map_user_ram call (cannot unmap partial) + */ +void vm_unmap_user_ram(const void *mem, unsigned int count) +{ + unsigned long size = (unsigned long)count << PAGE_SHIFT; + unsigned long addr = (unsigned long)mem; + struct vmap_area *va; + + might_sleep(); + BUG_ON(!addr); + BUG_ON(addr < VMALLOC_START); + BUG_ON(addr > VMALLOC_END); + BUG_ON(!PAGE_ALIGNED(addr)); + + debug_check_no_locks_freed(mem, size); + va = find_vmap_area(addr); + BUG_ON(!va); + free_unmap_vmap_area(va); +} +EXPORT_SYMBOL(vm_unmap_user_ram); + +/** + * vm_map_user_ram - map user space pages linearly into kernel virtual address + * @pages: an array of pointers to the virtually contiguous pages to be mapped + * @count: number of pages + * @uaddr: address within the first page in the userspace mapping + * @node: prefer to allocate data structures on this node + * @prot: memory protection to use. PAGE_KERNEL for regular RAM + * + * Create a mapping aliased to a user-space mapping with the same cache + * coloring as the userspace mapping. Allow the kernel to load from and + * store to pages shared with user-space through its own mapping in kernel + * virtual addresses while ensuring cache conherency between kernel and + * userspace mappings for virtually aliased architectures. + * + * Returns: a pointer to the address that has been mapped, or %NULL on failure + */ +void *vm_map_user_ram(struct page **pages, unsigned int count, + unsigned long uaddr, int node, pgprot_t prot) +{ + unsigned long size = (unsigned long)count << PAGE_SHIFT; + unsigned long va_offset = ALIGN_DOWN(uaddr, PAGE_SIZE) & (SHMLBA - 1); + unsigned long alloc_size = ALIGN(va_offset + size, SHMLBA); + struct vmap_area *va; + unsigned long addr; + void *mem; + + va = alloc_vmap_area(alloc_size, SHMLBA, VMALLOC_START, VMALLOC_END, + node, GFP_KERNEL); + if (IS_ERR(va)) + return NULL; + addr = va->va_start + va_offset; + mem = (void *)addr; + if (vmap_page_range(addr, addr + size, prot, pages) < 0) { + vm_unmap_user_ram(mem, count); + return NULL; + } + return mem; +} +EXPORT_SYMBOL(vm_map_user_ram); + static struct vm_struct *vmlist __initdata; /** * vm_area_add_early - add vmap area early during boot -- 2.11.0