From patchwork Fri Oct 25 12:26:23 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13850602 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 41AD8D0C603 for ; Fri, 25 Oct 2024 12:27:04 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id ADD186B008A; Fri, 25 Oct 2024 08:27:03 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A8BB96B008C; Fri, 25 Oct 2024 08:27:03 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 890966B0092; Fri, 25 Oct 2024 08:27:03 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 5CA7C6B008A for ; Fri, 25 Oct 2024 08:27:03 -0400 (EDT) Received: from smtpin29.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 6CF0DAB6C8 for ; Fri, 25 Oct 2024 12:26:24 +0000 (UTC) X-FDA: 82712048916.29.DA2E951 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf04.hostedemail.com (Postfix) with ESMTP id 9C77940013 for ; Fri, 25 Oct 2024 12:26:34 +0000 (UTC) Authentication-Results: imf04.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=jk2sLPvx; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=sge1IFQ6; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf04.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1729859094; a=rsa-sha256; cv=pass; b=LjC9ujfS4zDyi/5yEf+VbzOhtO8igzt1aDPSxeGHDboWZtf8jLs5G/lPyZ4pUDIGPsAULw fu7iN9/GdOLfe2mUEf4cwzbs3/jKKdljUF3DxCPRyQ8rMu/JGrqYFu1G0ZjwRMoS/WiuHb nb5Xt1zH20D8MCYXQeS+x9F/shNvsrY= ARC-Authentication-Results: i=2; imf04.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=jk2sLPvx; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=sge1IFQ6; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf04.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1729859094; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=1RKAonmcILha8U/5gzL1MZCRAiyipTUTBI1zBY8/ua8=; b=gjUGkKjwfnaMUa/vd8Lk2QirDUtPYRbvFXN/1iSpyidT7vsKDWxehiYU5al08fnVSWfCDK oROnq43OGF9S7tzhYoTi9zvNcRrKSv8E2Ln2lqwfxY0KLbRo5eAbDfpRthy8ildnuHwJUA ppJRBMDjI0qRw5jAcTJOp+t3Hrm22Cw= Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 49P8Babn014732; Fri, 25 Oct 2024 12:26:57 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=1RKAonmcILha8U/5gzL1MZCRAiyipTUTBI1zBY8/ua8=; b= jk2sLPvxcBTa+qktcW34pQG1spl3NzAuprtVz+URBnaOeklhuwG6UbYsyv62Z8dt TgbsaXJ0/BlQu6TdAzRf2uYoYG7hJ6ylOdjOoSgvFgvt7pwLJRHgEvj2czzK3EtK 1o6seh2pJjEPQ8VX8nhws1E9jezvOM176pgDUGm6kfxNe9w08mCfGpan4BsNuKk/ 3WbQdHH/tIIwhRRzkxlD+ionC7XG1rUSjKkrhu6HV576ZUFjmFcG7+EZ3N5cU9WW XIo4wPkVkJlrI7QZXs02ENgEdQMuloiaj79YsM3OrrQxRDQcFoJUjJJ32bOVKh0m Ep3QkJ7iULMbTADaAx8sqg== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 42c5asmusx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 25 Oct 2024 12:26:56 +0000 (GMT) Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 49PBxpoZ016557; Fri, 25 Oct 2024 12:26:55 GMT Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2177.outbound.protection.outlook.com [104.47.57.177]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 42emhdt4s4-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 25 Oct 2024 12:26:55 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=cDcSHylas1xZc8YOYyoNeOelaWe00gN6T4J9MPhjnGQuMXcP+YUSOhFQFm6/ALMtgNxeyprYq33za1YouSwLYfBb1K/BnCsBoW4K5x5a9CyPKelBISO0dS5HxAjOYqd0dr+BUXHO7Q8WMV8BJkwWsH+SFN4mLWpa+iIFQcdqpL21PbejvgB0fyvTDnJNkcuXiPTj7uor+m8owccVC0O35YSLZzl8RyLxsjbHGMf/bAmYxVzsANiKTGYC/mJsuDC1MQ/LwfBu2N9XgpnpmhcKfvI3HJCxTArDn2bwxp8ZfNBsbv0AvaJR2WV7f4PuSmqitqTHyuPLnpYKhWADdn8CUA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1RKAonmcILha8U/5gzL1MZCRAiyipTUTBI1zBY8/ua8=; b=cvkKnk1y1ZOvX3pNWS4OKkA0zn91DqnvvrCaZ0aj/I8HbgjGzowiWLQIgLVD+g/7i19M6ArSbdH4wZ8MhtyVXyhzhUQQb3amNw+dRjBJLGH7dO2826R0wYnFyqaT8x+SwvkEi5XdDsA10zO9egyEuHMLEcslQ1bYzcLSS4t328XO8yIOBqIJSAPk5oSfqCLWwwJ0gjUzylbz6EiMRESBFn1UjdhTeiC/zne6K9P0oRPTqCd2ZATIGtTttdT+9GEU2FDte4grgWrCaYfnIMGRyYy6h04Q1DDORJ1G54TWtO3KeBgSjFqip7bd9/UackedXhvMgsyBisCgJQUOlBRPMg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1RKAonmcILha8U/5gzL1MZCRAiyipTUTBI1zBY8/ua8=; b=sge1IFQ6G1xYqSM5KxNLgBwuT0CQLmlVNVsmWWEAEecCU2fwei9zJaAdy7t4vsirwadq2QLGO1mKwNpALkL9+uZVjnHIdMMggsRs62pgtn8N/GkV0Eo0PgQrqPPH5zDczKNt8sex7kzYxqkuhzdhIAy5Cb7soW8nmFoKtAN4IH4= Received: from BYAPR10MB3366.namprd10.prod.outlook.com (2603:10b6:a03:14f::25) by CO1PR10MB4484.namprd10.prod.outlook.com (2603:10b6:303:90::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8093.23; Fri, 25 Oct 2024 12:26:51 +0000 Received: from BYAPR10MB3366.namprd10.prod.outlook.com ([fe80::baf2:dff1:d471:1c9]) by BYAPR10MB3366.namprd10.prod.outlook.com ([fe80::baf2:dff1:d471:1c9%6]) with mapi id 15.20.8093.014; Fri, 25 Oct 2024 12:26:51 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-kernel@vger.kernel.org, linux-mm@kvack.org, Linus Torvalds , Peter Xu Subject: [PATCH v3 1/5] tools: testing: add additional vma_internal.h stubs Date: Fri, 25 Oct 2024 13:26:23 +0100 Message-ID: <74b27e159e261d2ac1fe66a130edad1d61fdc176.1729858176.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.47.0 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0376.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:18e::21) To BYAPR10MB3366.namprd10.prod.outlook.com (2603:10b6:a03:14f::25) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: BYAPR10MB3366:EE_|CO1PR10MB4484:EE_ X-MS-Office365-Filtering-Correlation-Id: 2febee1c-88b2-4f95-e90f-08dcf4f04d91 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|10070799003|376014|366016|1800799024; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:BYAPR10MB3366.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(10070799003)(376014)(366016)(1800799024);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 2febee1c-88b2-4f95-e90f-08dcf4f04d91 X-MS-Exchange-CrossTenant-AuthSource: BYAPR10MB3366.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 25 Oct 2024 12:26:51.2913 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: t1NX/qyhrqjVy5I/kPLm03VvmjUAE7xCgM6HIN9qnGwGLus1YZawizZH0yhZH2KpfUhBOG+yaGvtD3qQbfOM7R+Ft/5fE+jlhOSIfJhE+z0= X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR10MB4484 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1051,Hydra:6.0.680,FMLib:17.12.62.30 definitions=2024-10-25_12,2024-10-25_02,2024-09-30_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 mlxscore=0 phishscore=0 suspectscore=0 bulkscore=0 adultscore=0 malwarescore=0 mlxlogscore=999 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2409260000 definitions=main-2410250095 X-Proofpoint-GUID: M3vftKXBPRqZs4T8LzkxgK52g6k_AsMD X-Proofpoint-ORIG-GUID: M3vftKXBPRqZs4T8LzkxgK52g6k_AsMD X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: 9C77940013 X-Stat-Signature: be1crir1qeued8p4si7m1oy6xaej6f98 X-Rspam-User: X-HE-Tag: 1729859194-883885 X-HE-Meta: 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 w76CxJAB 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Add some additional vma_internal.h stubs in preparation for __mmap_region() being moved to mm/vma.c. Without these the move would result in the tests no longer compiling. Signed-off-by: Lorenzo Stoakes --- tools/testing/vma/vma_internal.h | 115 ++++++++++++++++++++++++++++++- 1 file changed, 114 insertions(+), 1 deletion(-) diff --git a/tools/testing/vma/vma_internal.h b/tools/testing/vma/vma_internal.h index c5b9da034511..e76ff579e1fd 100644 --- a/tools/testing/vma/vma_internal.h +++ b/tools/testing/vma/vma_internal.h @@ -44,7 +44,9 @@ #define VM_LOCKED 0x00002000 #define VM_IO 0x00004000 #define VM_DONTEXPAND 0x00040000 +#define VM_LOCKONFAULT 0x00080000 #define VM_ACCOUNT 0x00100000 +#define VM_NORESERVE 0x00200000 #define VM_MIXEDMAP 0x10000000 #define VM_STACK VM_GROWSDOWN #define VM_SHADOW_STACK VM_NONE @@ -53,6 +55,14 @@ #define VM_ACCESS_FLAGS (VM_READ | VM_WRITE | VM_EXEC) #define VM_SPECIAL (VM_IO | VM_DONTEXPAND | VM_PFNMAP | VM_MIXEDMAP) +/* This mask represents all the VMA flag bits used by mlock */ +#define VM_LOCKED_MASK (VM_LOCKED | VM_LOCKONFAULT) + +#ifdef CONFIG_64BIT +/* VM is sealed, in vm_flags */ +#define VM_SEALED _BITUL(63) +#endif + #define FIRST_USER_ADDRESS 0UL #define USER_PGTABLES_CEILING 0UL @@ -698,8 +708,9 @@ static inline void tlb_finish_mmu(struct mmu_gather *) { } -static inline void get_file(struct file *) +static inline struct file *get_file(struct file *f) { + return f; } static inline int vma_dup_policy(struct vm_area_struct *, struct vm_area_struct *) @@ -920,4 +931,106 @@ static inline bool signal_pending(void *) return false; } +static inline bool is_file_hugepages(struct file *) +{ + return false; +} + +static inline int security_vm_enough_memory_mm(struct mm_struct *, long) +{ + return true; +} + +static inline bool may_expand_vm(struct mm_struct *, vm_flags_t, unsigned long) +{ + return true; +} + +static inline void vm_flags_init(struct vm_area_struct *vma, + vm_flags_t flags) +{ + vma->__vm_flags = flags; +} + +static inline void vm_flags_set(struct vm_area_struct *vma, + vm_flags_t flags) +{ + vma_start_write(vma); + vma->__vm_flags |= flags; +} + +static inline void vm_flags_clear(struct vm_area_struct *vma, + vm_flags_t flags) +{ + vma_start_write(vma); + vma->__vm_flags &= ~flags; +} + +static inline int call_mmap(struct file *, struct vm_area_struct *) +{ + return 0; +} + +static inline int shmem_zero_setup(struct vm_area_struct *) +{ + return 0; +} + +static inline void vma_set_anonymous(struct vm_area_struct *vma) +{ + vma->vm_ops = NULL; +} + +static inline void ksm_add_vma(struct vm_area_struct *) +{ +} + +static inline void perf_event_mmap(struct vm_area_struct *) +{ +} + +static inline bool vma_is_dax(struct vm_area_struct *) +{ + return false; +} + +static inline struct vm_area_struct *get_gate_vma(struct mm_struct *) +{ + return NULL; +} + +bool vma_wants_writenotify(struct vm_area_struct *vma, pgprot_t vm_page_prot); + +/* Update vma->vm_page_prot to reflect vma->vm_flags. */ +static inline void vma_set_page_prot(struct vm_area_struct *vma) +{ + unsigned long vm_flags = vma->vm_flags; + pgprot_t vm_page_prot; + + /* testing: we inline vm_pgprot_modify() to avoid clash with vma.h. */ + vm_page_prot = pgprot_modify(vma->vm_page_prot, vm_get_page_prot(vm_flags)); + + if (vma_wants_writenotify(vma, vm_page_prot)) { + vm_flags &= ~VM_SHARED; + /* testing: we inline vm_pgprot_modify() to avoid clash with vma.h. */ + vm_page_prot = pgprot_modify(vm_page_prot, vm_get_page_prot(vm_flags)); + } + /* remove_protection_ptes reads vma->vm_page_prot without mmap_lock */ + WRITE_ONCE(vma->vm_page_prot, vm_page_prot); +} + +static inline bool arch_validate_flags(unsigned long) +{ + return true; +} + +static inline void vma_close(struct vm_area_struct *) +{ +} + +static inline int mmap_file(struct file *, struct vm_area_struct *) +{ + return 0; +} + #endif /* __MM_VMA_INTERNAL_H */