Message ID | 20250203-vma-v13-0-2b998268a396@google.com (mailing list archive) |
---|---|
Headers | show
Return-Path: <owner-linux-mm@kvack.org> X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id EB44BC02192 for <linux-mm@archiver.kernel.org>; Mon, 3 Feb 2025 12:15:31 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 53A8328000E; Mon, 3 Feb 2025 07:15:29 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 425D2280001; Mon, 3 Feb 2025 07:15:29 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 2C59728000E; Mon, 3 Feb 2025 07:15:29 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id 0CE11280001 for <linux-mm@kvack.org>; Mon, 3 Feb 2025 07:15:29 -0500 (EST) Received: from smtpin16.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id BF2C8B2B27 for <linux-mm@kvack.org>; Mon, 3 Feb 2025 12:15:15 +0000 (UTC) X-FDA: 83078528190.16.1D91435 Received: from mail-wm1-f73.google.com (mail-wm1-f73.google.com [209.85.128.73]) by imf05.hostedemail.com (Postfix) with ESMTP id C2A1D10000D for <linux-mm@kvack.org>; Mon, 3 Feb 2025 12:15:13 +0000 (UTC) Authentication-Results: imf05.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=eEDvJFhx; spf=pass (imf05.hostedemail.com: domain of 3ULOgZwkKCH0bmjdfszimhpphmf.dpnmjovy-nnlwbdl.psh@flex--aliceryhl.bounces.google.com designates 209.85.128.73 as permitted sender) smtp.mailfrom=3ULOgZwkKCH0bmjdfszimhpphmf.dpnmjovy-nnlwbdl.psh@flex--aliceryhl.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1738584913; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=ZW0GP4W/7qnWquUo7ioN8qOuSA8agXZe2rMFQxltuOY=; b=A3NIlITrZSvHvUueLfOyI0pAF5W3RznP/e3uZINq0VVEVLt2eu+K9ICaELRozJrO5PjTJ9 SnBjzzkZpDO/t6YFY/NCuG8F98U9IaA+Y+VkHldHYrcQbrKh1cu0NZIXa3E55g81BKt+Yn a8jsXQej4VLwI2xeFLi3pu//klldhwc= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1738584913; a=rsa-sha256; cv=none; b=qyHYzir1T4iihvVtSxLpMSXirghnM9hmfaKL7TO1KVxgiVTi1K++vwW23qro3edRxFjxAu wiQbhtnr/r+5KnBDU5FpJA+3YQ2/vh/uKTD66JyelhQAfz3T0KcWTW7XIPTa7RTKKmWqmc Co4+U2awTpOaZ6/KreLNU+p9M1jXKNc= ARC-Authentication-Results: i=1; imf05.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=eEDvJFhx; spf=pass (imf05.hostedemail.com: domain of 3ULOgZwkKCH0bmjdfszimhpphmf.dpnmjovy-nnlwbdl.psh@flex--aliceryhl.bounces.google.com designates 209.85.128.73 as permitted sender) smtp.mailfrom=3ULOgZwkKCH0bmjdfszimhpphmf.dpnmjovy-nnlwbdl.psh@flex--aliceryhl.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com Received: by mail-wm1-f73.google.com with SMTP id 5b1f17b1804b1-4361f371908so31262315e9.0 for <linux-mm@kvack.org>; Mon, 03 Feb 2025 04:15:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1738584912; x=1739189712; darn=kvack.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=ZW0GP4W/7qnWquUo7ioN8qOuSA8agXZe2rMFQxltuOY=; b=eEDvJFhxiHtwGHJ5dzYFfQzjiZ0OVFB9EupRWAf0hUGtmNNXEpECyKRpdvXIgC7AOr DS/R8E5z1owvumDMf9sXgC3+nMIAYU2t27NqM4KUVO7bazfmsGdXD9b7RXeYma5aYzAV 7zaz9GG4/XBwnsIaqrIvOPI6Gmfx9e3go6KHpVYzEd8a4UjUQEY4LFcdfJLJ8Opw4H9w 88FLBe0Zne181ID13Vp/v2ml8iQkDVlyab6iHDtGEhs3VQspZTZyJldQ2g8BPkHAmIHK tdZkDuhXv22GUJY6a/G52oYURD+a1dZI4R8jeHPo5TJZFOT3J2Z6ydSX69LDqqti5bxt lX0A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1738584912; x=1739189712; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=ZW0GP4W/7qnWquUo7ioN8qOuSA8agXZe2rMFQxltuOY=; b=qD1tZge6A1suP5aEN2iWHv1HDL42VYntRRtbz5czhh+TbBAmAQoC6PoMVgrgaPcPKM EdxEyKuEWr/4AFb207hFHtRJFGCJgzzBp50MUecDwZxIvZ3Zxhm2bR+sohNCWSBmBuvl pMteQKVZTeKM7GjWqxYLtp+HZ1gtxLrDCNWuX/UGbeeUhkkoPolz+rR7bHo6atTRGmOA jw18LZoYPO1QvpwF5TJgP9WYkmmhfpyNuoS1NCLPnJ8YyoCgkr2kdlmGqdiuBV8ATxO3 qGW4kto+p6ZlUXPWon6bXRPpeEamg7LzlxrMKYJhChbB4JmbsqNmZOTGsAs9Nl/68s1V P+jQ== X-Forwarded-Encrypted: i=1; AJvYcCVHFVm4d0YdPuQetmztJgwp6J3Teang31857vfYGtd2A47o/65LO0FiVnpgMVbXz8vDnPOi10TWRg==@kvack.org X-Gm-Message-State: AOJu0YzsN4NxxFr8l6qjcWT8on8XHfA+ZN8L/OZn7w6RuZDRAgE5GJq/ vvjwzM8IkS5u/1kd0j7MidPkZAmr9wxwwlLfeS9N2xc3YaiTl1OvdZhGTlsmXHp2SouMgK/0Xxe 3C3rEKkfayjUSqg== X-Google-Smtp-Source: AGHT+IG/TkjnL8EqB6zkiMQgN5CT4BSlrTDc0dPk9b0e/ayAkzCN4KRnO9dRcR4wqNYBGO2XmYR/QgL+1B4Y41g= X-Received: from wmbbi5.prod.google.com ([2002:a05:600c:3d85:b0:434:fc6f:e8c3]) (user=aliceryhl job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:1f10:b0:435:192:63fb with SMTP id 5b1f17b1804b1-438dc3ae816mr179894055e9.3.1738584912178; Mon, 03 Feb 2025 04:15:12 -0800 (PST) Date: Mon, 03 Feb 2025 12:14:35 +0000 Mime-Version: 1.0 X-B4-Tracking: v=1; b=H4sIACuzoGcC/2XSzWrDMAwH8FcpPs9Dkr932nuMHezYbgNrM5IRN krffWoT2hSfgk1+stBfZzGVsS+TeNudxVjmfuqHEx9QvexEd4infZF95gtBQBocKTkfo6weEEM NNSkj+M/vsdT+91bm45PPh376Gca/W9UZr7fPfkaJUlHMJnIhX8r7fhj2X+W1G47iWmCmLXILI kYxqWICudyp2CD1QNzgghSjnGyHHcSaY2iQ3iJakGYEAaN3YHzUqkFmi+yCzBVpQF/B5EKpQfa OEBAWZCXI7AOokGw1rn3JbZFekGMEWBRVbzkH0yD/QEjrS55RSQo1mRytbdsLW7QOIjBySC7VL mej25wQtiqs6XJ7UudaeRIpcloteywFEq5R8ZeZtVaDJl+7dhh4XwvDe2NWRsyUMxBCLIDueS8 ul8s/cCRSeuUCAAA= X-Developer-Key: i=aliceryhl@google.com; a=openpgp; fpr=49F6C1FAA74960F43A5B86A1EE7A392FDE96209F X-Developer-Signature: v=1; a=openpgp-sha256; l=5306; i=aliceryhl@google.com; h=from:subject:message-id; bh=5RayMwBdE8wftaAFzyzo7I2D2vIYhJNPKMb4OmTDwCM=; b=owEBbQKS/ZANAwAKAQRYvu5YxjlGAcsmYgBnoLMsb3vYypHp++2v+iwMBI0va3rR6k3M/+mfS 4dPLylQ2VyJAjMEAAEKAB0WIQSDkqKUTWQHCvFIvbIEWL7uWMY5RgUCZ6CzLAAKCRAEWL7uWMY5 RrjREACFo945VrKdNs3WhkUyYvws1JUfjXsYC17/IrN78oTs4JAJOKVq5EWgvlSz92rV1ryVfnU H6Rzd1keeCsYvrZhxJsOTTsWbOsp8Uj2Wp8eETjThBtnExSYDjXVemLY0cnu67REaAu/LFVIeoh DTaq9wTiGIk5eAeVdZFRU/XVErrlG/AU5lm1hHJJ2v25jL3nm3xFNmyTacI/4UUAKcjzylciuZc Xts+OZAHG4F6yyylwxnFzUzMbSXTgdWfGLjS9iBCJlscW0JubJOwk2AO0XIl6Amt5CvhlIDUnwD FUkFPnQbhcaRR8AXYJoznVGSzKerioix42kpLDKQQlFxRjGj+G1N4OEOY/y3NFSXmKI9dKlvfpJ FVKy7kB2lgwCAxlaDLH0CqpN5Kl3s9ooAhyC0IuTKTxv8073bRKhO81oSlu5Uq5sGeiM6CwUgUd 4u1jR22VaMA9YH/psBzlUZ1DYsglza/1gh6MrLvmB2FHxxGfs7Oloa969x7tnQ4u++bonH+bw/B C6dnyCPCSFaNuGnHp1t68hGP4nei41RJwB9SXoZxBEFLZ9jxxjbBd9iPujOcLH9AgTEhHwUyr8a gll54rVzoVutRftEfABsYFikgx7fQWfUnpf7vDbob6A9WFFpq8GLVxhB3Z90SvlMWfZpYHs2Pfd XlDZIBjuT3i84aA== X-Mailer: b4 0.13.0 Message-ID: <20250203-vma-v13-0-2b998268a396@google.com> Subject: [PATCH v13 0/8] Rust support for mm_struct, vm_area_struct, and mmap From: Alice Ryhl <aliceryhl@google.com> To: Miguel Ojeda <ojeda@kernel.org>, Matthew Wilcox <willy@infradead.org>, Lorenzo Stoakes <lorenzo.stoakes@oracle.com>, Vlastimil Babka <vbabka@suse.cz>, John Hubbard <jhubbard@nvidia.com>, "Liam R. Howlett" <Liam.Howlett@oracle.com>, Andrew Morton <akpm@linux-foundation.org>, Greg Kroah-Hartman <gregkh@linuxfoundation.org>, Arnd Bergmann <arnd@arndb.de>, Jann Horn <jannh@google.com>, Suren Baghdasaryan <surenb@google.com> Cc: Alex Gaynor <alex.gaynor@gmail.com>, Boqun Feng <boqun.feng@gmail.com>, Gary Guo <gary@garyguo.net>, " =?utf-8?q?Bj=C3=B6rn_Roy_Baron?= " <bjorn3_gh@protonmail.com>, Benno Lossin <benno.lossin@proton.me>, Andreas Hindborg <a.hindborg@kernel.org>, Trevor Gross <tmgross@umich.edu>, linux-kernel@vger.kernel.org, linux-mm@kvack.org, rust-for-linux@vger.kernel.org, Alice Ryhl <aliceryhl@google.com>, Balbir Singh <balbirs@nvidia.com> Content-Type: text/plain; charset="utf-8" X-Stat-Signature: s6ah4tr77o8exp8gi5y31a4oirxyohzk X-Rspam-User: X-Rspamd-Queue-Id: C2A1D10000D X-Rspamd-Server: rspam03 X-HE-Tag: 1738584913-95916 X-HE-Meta: U2FsdGVkX1/+jnHoimPB+B92/fCY8Woe9idvp208tpbH/QtmWHAzzwykzhpRhuDn7Atg5cLl4otmeM0dxGKtpCKhw3k4stzF0bdo+ENnOZK3KCsEeyl3GJ0/ilbNur1BlOO0Ey+uLS/cawGTlt9ivSyzvTTBssVc61fXVvitRPwV0FlM9b7nrvb1sOal0GSR01ZW99XJVzqK6feCKqXj7wEXEy0c0DvpWelINRVFcvL+p3PpjnCogh0vmGtYxavxilumYoJp17AOHdSrNB8Jf2jWeewOVUlLHPipfH7TllxWjyLFsruwBJZNVf7llm5TlXkREWCTd6eVgphtRA757F1OiNuoZGbXldD4+TjTn/lTY5xHkS6dyqvdFW8MuFtDmWDY1QlLVCTJG1KaNTg6NMYxd/0WjstLv57CCHNz1u+mhGSc/YQOozQM0QLkbnwaaX1mPQSa+IZBFeAPwaxRRKIYlmfzE6vLDip2YjWRML5AF52MaWwNx0/yegJJoAz3Xh0n+evqjOOh48jOysT+39AQT+VOawVtqUmxYfiJKKFZQmPq8wVitOOBmGpEuu5ODQrnHUgWxzQy+PPuM90p87Mi5m57aM3kFpX0y6YeLPJAh8e87VpBbStI6dllCQDcq5CnJrIZQDaArcG7+XRs6zGTocG39uZFy1m7dvpo8M6fOj8D+9EgAYBEfYRIbaci394JJSknVsGZcBlhNyyLq+lvkTYQctyCAUvljWKPy/YXTA9DM3RpF84oH/1ewX1yPT91fPk5Qxk/HKozyBWK3VWDV1D5hC4T1nvC/nO8UWxRa0gizav9NwGKmfj3lEH77EqaOzayZTraQ7HmJQxWbqCk0o/cyZ5GLD3G+ZgW/PeWzDRn3ZkO9RG2XJeD0U1hRmHgSuesc/zWdtcdPtrZbsdNy/G/UkEFMTLKLsR2X0rwPgcwfc5Eo4lxle2iPtQlO+ZCdre+Xn4zJthZ0Oq DbA3aBIC 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.415305, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: <linux-mm.kvack.org> List-Subscribe: <mailto:majordomo@kvack.org> List-Unsubscribe: <mailto:majordomo@kvack.org> |
Series |
Rust support for mm_struct, vm_area_struct, and mmap
|
expand
|
This updates the vm_area_struct support to use the approach we discussed at LPC where there are several different Rust wrappers for vm_area_struct depending on the kind of access you have to the vma. Each case allows a different set of operations on the vma. Signed-off-by: Alice Ryhl <aliceryhl@google.com> --- Changes in v13: - Rebase on v6.14-rc1. - Remove casts that are now unnecessary due to improved Rust/C integer type mappings. - Link to v12: https://lore.kernel.org/r/20250115-vma-v12-0-375099ae017a@google.com Changes in v12: - Add additional documentation to modules at the top of mm.rs and virt.rs. - Explain why the name Mm is used in commit message of patch 1. - Expand zap_page_range_single with docs suggested by Lorenzo. - Update safety comment in vm_insert_page - Mention that VmAreaMixedMap is identical to VmAreaRef except for VM_MIXEDMAP. - Update docs for as_mixedmap_vma. - Add additional docs for VmAreaNew struct. - Rename `get_read` -> `readable` and equivalent for write/exec. - Use mut pointers for `from_raw` for VMAs. - Update safety comment for fops_mmap. - Add additional docs for MiscDevice::mmap. - Don't introduce and immediately delete mmgrab_current. - Reduce active_pid_ns comment at Andreas's suggestion and link to get_pid_ns. - Fix documentation test in rust/kernel/task.rs. - Fix warning about unused variables in lock_vma_under_rcu when CONFIG_PER_VMA_LOCK=n. - Fix minor typos. - Link to v11: https://lore.kernel.org/r/20241211-vma-v11-0-466640428fc3@google.com Changes in v11: - Add accessor for the vm_mm field of vm_area_struct. - Pass the file to MiscDevice::mmap for consistency with https://lore.kernel.org/r/20241210-miscdevice-file-param-v3-1-b2a79b666dc5@google.com - Link to v10: https://lore.kernel.org/r/20241129-vma-v10-0-4dfff05ba927@google.com Changes in v10: - Update docs for `set_io`. - Check address in `zap_page_range_single`. - Completely redo the last patch. - Link to v9: https://lore.kernel.org/r/20241122-vma-v9-0-7127bfcdd54e@google.com Changes in v9: - Be more explicit about VmAreaNew being used with f_ops->mmap(). - Point out that clearing VM_MAYWRITE is irreversible. - Use __vm_flags to set the flags. - Use as_ and into_ prefixes for conversions. - Update lock_vma_under_rcu docs and commit msg - Mention that VmAreaRef::end is exclusive. - Reword docs for zap_page_range_single. - Minor fixes to flag docs. - Add way to access current->mm without a refcount increment. - Link to v8: https://lore.kernel.org/r/20241120-vma-v8-0-eb31425da66b@google.com Changes in v8: - Split series into more commits to ease review. - Improve read locks based on Lorenzo's doc: either the mmap or vma lock can be used. - Get rid of mmap write lock because it's possible to avoid the need for it. - Do not allow invalid flag combinations on VmAreaNew. - Link to v7: https://lore.kernel.org/r/20241014-vma-v7-0-01e32f861195@google.com Changes in v7: - Make the mmap read/write lock guards respect strict owner semantics. - Link to v6: https://lore.kernel.org/r/20241010-vma-v6-0-d89039b6f573@google.com Changes in v6: - Introduce VmArea{Ref,Mut,New} distinction. - Add a second patchset for miscdevice. - Rebase on char-misc-next (currently on v6.12-rc2). - Link to v5: https://lore.kernel.org/r/20240806-vma-v5-1-04018f05de2b@google.com Changes in v5: - Rename VmArea::from_raw_vma to from_raw. - Use Pin for mutable VmArea references. - Go through `ARef::from` in `mmgrab_current`. - Link to v4: https://lore.kernel.org/r/20240802-vma-v4-1-091a87058a43@google.com Changes in v4: - Pull out ARef::into_raw into a separate patch. - Update invariants and struct documentation. - Rename from_raw_mm to from_raw. - Link to v3: https://lore.kernel.org/r/20240801-vma-v3-1-db6c1c0afda9@google.com Changes in v3: - Reorder entries in mm.rs. - Use ARef for mmput_async helper. - Clarify that VmArea requires you to hold the mmap read or write lock. - Link to v2: https://lore.kernel.org/r/20240727-vma-v2-1-ab3e5927dc3a@google.com Changes in v2: - mm.rs is redesigned from scratch making use of AsRef - Add notes about whether destructors may sleep - Rename Area to VmArea - Link to v1: https://lore.kernel.org/r/20240723-vma-v1-1-32ad5a0118ee@google.com --- Alice Ryhl (8): mm: rust: add abstraction for struct mm_struct mm: rust: add vm_area_struct methods that require read access mm: rust: add vm_insert_page mm: rust: add lock_vma_under_rcu mm: rust: add mmput_async support mm: rust: add VmAreaNew for f_ops->mmap() rust: miscdevice: add mmap support task: rust: rework how current is accessed rust/helpers/helpers.c | 1 + rust/helpers/mm.c | 50 +++++ rust/kernel/lib.rs | 1 + rust/kernel/miscdevice.rs | 44 +++++ rust/kernel/mm.rs | 339 +++++++++++++++++++++++++++++++++ rust/kernel/mm/virt.rs | 476 ++++++++++++++++++++++++++++++++++++++++++++++ rust/kernel/task.rs | 247 ++++++++++++------------ 7 files changed, 1040 insertions(+), 118 deletions(-) --- base-commit: 2014c95afecee3e76ca4a56956a936e23283f05b change-id: 20240723-vma-f80119f9fb35 Best regards,