Received: by 2002:ac0:e350:0:0:0:0:0 with SMTP id g16csp1942977imn; Mon, 1 Aug 2022 05:54:04 -0700 (PDT) X-Google-Smtp-Source: AGRyM1urEJewRDeO1scgmZA14YZ9iDM5/mbI0cgjwabATF31nFdXtiLcaTdTvlDZGoxs2utBHStC X-Received: by 2002:a63:224d:0:b0:41a:e146:a8dc with SMTP id t13-20020a63224d000000b0041ae146a8dcmr13473092pgm.272.1659358443895; Mon, 01 Aug 2022 05:54:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659358443; cv=none; d=google.com; s=arc-20160816; b=OtPn2Z6QWuu7qhkb0uYHmlUs2K0yzAqhZYNE9d/Fw7kkWSqqcYzQKldraOjc+5/U/g vPrM8IPm1avUVTB+fiZVaVVm9YTDCLXBJJWxYsOCQO7GlSZWzN0g72Pt0y8gzY/BszEj 3KEaqkTSI4qAqSywmQD7YlzztR0BqTuGvscDhn87A1BXzWumTCaqx8ytEKEJ4Ql9CyvO oXXMNrWXcoLvIIBDcd+F5ugxx2rKr0P2LxSmmkYwNe3DZkbTrNTX4lcTsELpBRXRjZIu 6hmW2lL4phQ8sPvC7G87dPduXN4IauOCPA8Z2JM024AJQJL0HW/mq0ZgH9seytWkbP6g cOuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=m0NhuTIErWLP34S5xewVrL+gALgLDbdQrOC2aFIx3Do=; b=GSpuySzBkc3DEC44bFPIvqhzZ9grdjKgxUnQGBXaRhxGnbP9aBZgGHwpeGIxjN8b/w 0KSK1o3H5NYEcmIFx7hkg2d8JX4jiPrKkJZxhhbbwolI00FhoLNJpagEhp7vQuyQHf66 o6u5wRR97DE7tAIrOgXsx3BDUVkQJBqyUKX9JWGLNoDfCogspVJxbOiW5xsIJo53mQoI OZza1aTa6AHUhih92YwEoFctz8vgb7a6ECK411MDgV/RuT2H59cFypbmbtxHpLPXYC5L uFhW/GZprpZ5Wsiu/a5/tGTUJ8CLkaYQfeDSLisscNTK9VXVW3lioWDyBw8QdRYj67DA Pomw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xNg+Xj3+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q1-20020a170902dac100b0016d43e43ad2si12869013plx.378.2022.08.01.05.53.48; Mon, 01 Aug 2022 05:54:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=xNg+Xj3+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233582AbiHAMGw (ORCPT + 99 others); Mon, 1 Aug 2022 08:06:52 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43278 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233782AbiHAMGF (ORCPT ); Mon, 1 Aug 2022 08:06:05 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 43210C8; Mon, 1 Aug 2022 04:55:09 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 66533612E9; Mon, 1 Aug 2022 11:55:08 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6D682C433D6; Mon, 1 Aug 2022 11:55:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1659354907; bh=c6jwXhG8ZaugPYMKXI6+L6tNkj+voJ6779qrSNNKXZo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=xNg+Xj3+mAJdN/7kO2Sq3lMExkVVJjY/VaK5ein6htluOKiRZAR8Rwq3UYh1qKmSu TmI/f51jQFsHVExX68Q6q6xA8Z1X3EkGcwjefdPkVU31i/HE5O+TEdI3ztI73SRl4S 5cJK04MbcwnpfaKfOT8evrAjmlF7RpxuprlU4GKQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ralph Campbell , Felix Kuehling , Alistair Popple , Philip Yang , Jason Gunthorpe , Andrew Morton Subject: [PATCH 5.15 63/69] mm/hmm: fault non-owner device private entries Date: Mon, 1 Aug 2022 13:47:27 +0200 Message-Id: <20220801114137.017061618@linuxfoundation.org> X-Mailer: git-send-email 2.37.1 In-Reply-To: <20220801114134.468284027@linuxfoundation.org> References: <20220801114134.468284027@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ralph Campbell commit 8a295dbbaf7292c582a40ce469c326f472d51f66 upstream. If hmm_range_fault() is called with the HMM_PFN_REQ_FAULT flag and a device private PTE is found, the hmm_range::dev_private_owner page is used to determine if the device private page should not be faulted in. However, if the device private page is not owned by the caller, hmm_range_fault() returns an error instead of calling migrate_to_ram() to fault in the page. For example, if a page is migrated to GPU private memory and a RDMA fault capable NIC tries to read the migrated page, without this patch it will get an error. With this patch, the page will be migrated back to system memory and the NIC will be able to read the data. Link: https://lkml.kernel.org/r/20220727000837.4128709-2-rcampbell@nvidia.com Link: https://lkml.kernel.org/r/20220725183615.4118795-2-rcampbell@nvidia.com Fixes: 08ddddda667b ("mm/hmm: check the device private page owner in hmm_range_fault()") Signed-off-by: Ralph Campbell Reported-by: Felix Kuehling Reviewed-by: Alistair Popple Cc: Philip Yang Cc: Jason Gunthorpe Cc: Signed-off-by: Andrew Morton Signed-off-by: Greg Kroah-Hartman --- mm/hmm.c | 19 ++++++++----------- 1 file changed, 8 insertions(+), 11 deletions(-) --- a/mm/hmm.c +++ b/mm/hmm.c @@ -212,14 +212,6 @@ int hmm_vma_handle_pmd(struct mm_walk *w unsigned long end, unsigned long hmm_pfns[], pmd_t pmd); #endif /* CONFIG_TRANSPARENT_HUGEPAGE */ -static inline bool hmm_is_device_private_entry(struct hmm_range *range, - swp_entry_t entry) -{ - return is_device_private_entry(entry) && - pfn_swap_entry_to_page(entry)->pgmap->owner == - range->dev_private_owner; -} - static inline unsigned long pte_to_hmm_pfn_flags(struct hmm_range *range, pte_t pte) { @@ -252,10 +244,12 @@ static int hmm_vma_handle_pte(struct mm_ swp_entry_t entry = pte_to_swp_entry(pte); /* - * Never fault in device private pages, but just report - * the PFN even if not present. + * Don't fault in device private pages owned by the caller, + * just report the PFN. */ - if (hmm_is_device_private_entry(range, entry)) { + if (is_device_private_entry(entry) && + pfn_swap_entry_to_page(entry)->pgmap->owner == + range->dev_private_owner) { cpu_flags = HMM_PFN_VALID; if (is_writable_device_private_entry(entry)) cpu_flags |= HMM_PFN_WRITE; @@ -273,6 +267,9 @@ static int hmm_vma_handle_pte(struct mm_ if (!non_swap_entry(entry)) goto fault; + if (is_device_private_entry(entry)) + goto fault; + if (is_device_exclusive_entry(entry)) goto fault;