Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp3594712pxb; Mon, 24 Jan 2022 13:05:35 -0800 (PST) X-Google-Smtp-Source: ABdhPJw7ldBEaqsiRF4Sc6s/Qk16i933jo8d1aHCq2N38qqEyT+7IEq4T/lhAdn5n1awA7JUnrro X-Received: by 2002:a17:902:8c82:b0:14a:d9f3:186e with SMTP id t2-20020a1709028c8200b0014ad9f3186emr15743012plo.27.1643058335738; Mon, 24 Jan 2022 13:05:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643058335; cv=none; d=google.com; s=arc-20160816; b=qSdyYc9ih2yM72Nw71NH/hOjpMMTwpQP042dT77GmL5OYQyvnp9yWnlosMXXqy0i+M Dl2Bu9vvyBiv+f2+c8dsUcj5eTrtUyBcRchCrHynBR7c2dkIwQ4VZI0a9ZfzaYbHC/T7 EyPifpFw46J47a9SibVgCaDY0pFokFlfmIP4fhS1AHgW851vmEfy/Fc2w6QnXDKh9JQW WiGg5BL2j9x+nTzvpNz/QTnRxa9RH476gKuvaIYjxWcw4mvogNX5K5xk4F/NE6rHpJkU hi7J/VgAHTv+AsM7NTTP/HsjAUeiQAxOnVNy7Eaohm5aYJyY2ua4Wu2Ofjj8WjBhdyyE c8Hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dIJicMr6CcS44BR3Xih1njwFRHHUyzWeW/HcAP9WPcI=; b=QfQXsZ6ej6uaCdr/kQuln24nxKy0c9g44rd3uKZVNCZ1x3Ocb0DDXr/8Tz6ASmux6A bscD+GC0NyyiTZC3JEbXTlWtI93508Fu+CurdmTX0CoPaK3ZMn8+zEWn+KTl70p2RHXh DsB6A3+pCsvDysCCkEJuJgan4XQb2n14AZArP93+8fPfQ0YZu0csoTmkVKxxq7DPSE+r Pz0a5N01RMG0pOU93ZS42/YqkhB4FposBOzKUPSfkprmHiHw210N6ioEVRX4YXJLPhIW dAAg90zutR9ZTOPS5S4xdPTSPDD3gFqLrK2DmsPOG2a30G+YuhtlZkLUwSp49uJ5gvmZ fUlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Y+Y6pZvU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 27si13850305pgl.734.2022.01.24.13.05.23; Mon, 24 Jan 2022 13:05:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Y+Y6pZvU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1384464AbiAXU3u (ORCPT + 99 others); Mon, 24 Jan 2022 15:29:50 -0500 Received: from dfw.source.kernel.org ([139.178.84.217]:36238 "EHLO dfw.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1354486AbiAXUJY (ORCPT ); Mon, 24 Jan 2022 15:09:24 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id A5E5E6091B; Mon, 24 Jan 2022 20:09:23 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1F9B7C340E5; Mon, 24 Jan 2022 20:09:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1643054963; bh=8VJ5DOh9GMO1apj0w6QDm4S3TRwOpzb1AAjkoMUZWbY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Y+Y6pZvUUF4a2IPKoLRyk3jzCbQZhXa22sfMhaCjHGB1kcHQWlZ4dC3HTNpCdtCaM vyuYJMKTnx3zUJT31RtTXq7NwQD3cOZ/Nn5Tvvue7zCq1gN33m98ZkJORUy6ds1zXK jo6IFy3KaKleXuoq4kNWzNS7PJY2BIfnjXaMi9vY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alistair Popple , Jason Gunthorpe , Jerome Glisse , John Hubbard , Zi Yan , Ralph Campbell , Felix Kuehling , Andrew Morton , Linus Torvalds Subject: [PATCH 5.10 560/563] mm/hmm.c: allow VM_MIXEDMAP to work with hmm_range_fault Date: Mon, 24 Jan 2022 19:45:25 +0100 Message-Id: <20220124184043.818421244@linuxfoundation.org> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20220124184024.407936072@linuxfoundation.org> References: <20220124184024.407936072@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alistair Popple commit 87c01d57fa23de82fff593a7d070933d08755801 upstream. hmm_range_fault() can be used instead of get_user_pages() for devices which allow faulting however unlike get_user_pages() it will return an error when used on a VM_MIXEDMAP range. To make hmm_range_fault() more closely match get_user_pages() remove this restriction. This requires dealing with the !ARCH_HAS_PTE_SPECIAL case in hmm_vma_handle_pte(). Rather than replicating the logic of vm_normal_page() call it directly and do a check for the zero pfn similar to what get_user_pages() currently does. Also add a test to hmm selftest to verify functionality. Link: https://lkml.kernel.org/r/20211104012001.2555676-1-apopple@nvidia.com Fixes: da4c3c735ea4 ("mm/hmm/mirror: helper to snapshot CPU page table") Signed-off-by: Alistair Popple Reviewed-by: Jason Gunthorpe Cc: Jerome Glisse Cc: John Hubbard Cc: Zi Yan Cc: Ralph Campbell Cc: Felix Kuehling Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- lib/test_hmm.c | 24 ++++++++++++++++++ mm/hmm.c | 5 ++- tools/testing/selftests/vm/hmm-tests.c | 42 +++++++++++++++++++++++++++++++++ 3 files changed, 69 insertions(+), 2 deletions(-) --- a/lib/test_hmm.c +++ b/lib/test_hmm.c @@ -965,9 +965,33 @@ static long dmirror_fops_unlocked_ioctl( return 0; } +static int dmirror_fops_mmap(struct file *file, struct vm_area_struct *vma) +{ + unsigned long addr; + + for (addr = vma->vm_start; addr < vma->vm_end; addr += PAGE_SIZE) { + struct page *page; + int ret; + + page = alloc_page(GFP_KERNEL | __GFP_ZERO); + if (!page) + return -ENOMEM; + + ret = vm_insert_page(vma, addr, page); + if (ret) { + __free_page(page); + return ret; + } + put_page(page); + } + + return 0; +} + static const struct file_operations dmirror_fops = { .open = dmirror_fops_open, .release = dmirror_fops_release, + .mmap = dmirror_fops_mmap, .unlocked_ioctl = dmirror_fops_unlocked_ioctl, .llseek = default_llseek, .owner = THIS_MODULE, --- a/mm/hmm.c +++ b/mm/hmm.c @@ -296,7 +296,8 @@ static int hmm_vma_handle_pte(struct mm_ * Since each architecture defines a struct page for the zero page, just * fall through and treat it like a normal page. */ - if (pte_special(pte) && !pte_devmap(pte) && + if (!vm_normal_page(walk->vma, addr, pte) && + !pte_devmap(pte) && !is_zero_pfn(pte_pfn(pte))) { if (hmm_pte_need_fault(hmm_vma_walk, pfn_req_flags, 0)) { pte_unmap(ptep); @@ -514,7 +515,7 @@ static int hmm_vma_walk_test(unsigned lo struct hmm_range *range = hmm_vma_walk->range; struct vm_area_struct *vma = walk->vma; - if (!(vma->vm_flags & (VM_IO | VM_PFNMAP | VM_MIXEDMAP)) && + if (!(vma->vm_flags & (VM_IO | VM_PFNMAP)) && vma->vm_flags & VM_READ) return 0; --- a/tools/testing/selftests/vm/hmm-tests.c +++ b/tools/testing/selftests/vm/hmm-tests.c @@ -1245,6 +1245,48 @@ TEST_F(hmm, anon_teardown) /* * Test memory snapshot without faulting in pages accessed by the device. */ +TEST_F(hmm, mixedmap) +{ + struct hmm_buffer *buffer; + unsigned long npages; + unsigned long size; + unsigned char *m; + int ret; + + npages = 1; + size = npages << self->page_shift; + + buffer = malloc(sizeof(*buffer)); + ASSERT_NE(buffer, NULL); + + buffer->fd = -1; + buffer->size = size; + buffer->mirror = malloc(npages); + ASSERT_NE(buffer->mirror, NULL); + + + /* Reserve a range of addresses. */ + buffer->ptr = mmap(NULL, size, + PROT_READ | PROT_WRITE, + MAP_PRIVATE, + self->fd, 0); + ASSERT_NE(buffer->ptr, MAP_FAILED); + + /* Simulate a device snapshotting CPU pagetables. */ + ret = hmm_dmirror_cmd(self->fd, HMM_DMIRROR_SNAPSHOT, buffer, npages); + ASSERT_EQ(ret, 0); + ASSERT_EQ(buffer->cpages, npages); + + /* Check what the device saw. */ + m = buffer->mirror; + ASSERT_EQ(m[0], HMM_DMIRROR_PROT_READ); + + hmm_buffer_free(buffer); +} + +/* + * Test memory snapshot without faulting in pages accessed by the device. + */ TEST_F(hmm2, snapshot) { struct hmm_buffer *buffer;