From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-21.8 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI,MENTIONS_GIT_HOSTING,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 4630AC432BE for ; Mon, 30 Aug 2021 09:37:58 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id CC21561039 for ; Mon, 30 Aug 2021 09:37:57 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org CC21561039 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=cn.fujitsu.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id 518A68D0001; Mon, 30 Aug 2021 05:37:57 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 4C8BA6B0071; Mon, 30 Aug 2021 05:37:57 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3B8548D0001; Mon, 30 Aug 2021 05:37:57 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0023.hostedemail.com [216.40.44.23]) by kanga.kvack.org (Postfix) with ESMTP id 2ACE66B006C for ; Mon, 30 Aug 2021 05:37:57 -0400 (EDT) Received: from smtpin32.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id A54A8250A5 for ; Mon, 30 Aug 2021 09:37:56 +0000 (UTC) X-FDA: 78531245352.32.EDE4DE7 Received: from heian.cn.fujitsu.com (mail.cn.fujitsu.com [183.91.158.132]) by imf29.hostedemail.com (Postfix) with ESMTP id D5FA39000094 for ; Mon, 30 Aug 2021 09:37:55 +0000 (UTC) IronPort-HdrOrdr: =?us-ascii?q?A9a23=3AA0PzNKx7ks14I/NMf67UKrPwPb1zdoMgy1kn?= =?us-ascii?q?xilNoH1uE/Bw8vrE9sjzuiWE6wr5J0tQ++xoVJPsfZq+z/BICOsqXYtKNTOO0F?= =?us-ascii?q?dAR7sM0WKN+VHd8iTFh4tg6Zs=3D?= X-IronPort-AV: E=Sophos;i="5.84,363,1620662400"; d="scan'208";a="113710097" Received: from unknown (HELO cn.fujitsu.com) ([10.167.33.5]) by heian.cn.fujitsu.com with ESMTP; 30 Aug 2021 17:37:52 +0800 Received: from G08CNEXMBPEKD04.g08.fujitsu.local (unknown [10.167.33.201]) by cn.fujitsu.com (Postfix) with ESMTP id 0E9BE4D0DC65; Mon, 30 Aug 2021 17:37:49 +0800 (CST) Received: from G08CNEXCHPEKD09.g08.fujitsu.local (10.167.33.85) by G08CNEXMBPEKD04.g08.fujitsu.local (10.167.33.201) with Microsoft SMTP Server (TLS) id 15.0.1497.23; Mon, 30 Aug 2021 17:37:45 +0800 Received: from localhost.localdomain (10.167.225.141) by G08CNEXCHPEKD09.g08.fujitsu.local (10.167.33.209) with Microsoft SMTP Server id 15.0.1497.23 via Frontend Transport; Mon, 30 Aug 2021 17:37:42 +0800 From: Li Zhijian To: , , , , , CC: , , Li Zhijian , Subject: [PATCH v3] mm/hmm: bypass devmap pte when all pfn requested flags are fulfilled Date: Mon, 30 Aug 2021 17:42:32 +0800 Message-ID: <20210830094232.203029-1-lizhijian@cn.fujitsu.com> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Type: text/plain X-yoursite-MailScanner-ID: 0E9BE4D0DC65.AFF69 X-yoursite-MailScanner: Found to be clean X-yoursite-MailScanner-From: lizhijian@fujitsu.com Authentication-Results: imf29.hostedemail.com; dkim=none; spf=none (imf29.hostedemail.com: domain of lizhijian@fujitsu.com has no SPF policy when checking 183.91.158.132) smtp.mailfrom=lizhijian@fujitsu.com; dmarc=fail reason="No valid SPF, No valid DKIM" header.from=fujitsu.com (policy=none) X-Rspamd-Server: rspam02 X-Rspamd-Queue-Id: D5FA39000094 X-Stat-Signature: w9myf4gs7uou5p7amwjfsg48xg3b1bm8 X-HE-Tag: 1630316275-658110 Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Previously, we noticed the one rpma example was failed[1] since 36f30e486= d, where it will use ODP feature to do RDMA WRITE between fsdax files. After digging into the code, we found hmm_vma_handle_pte() will still return EFAULT even though all the its requesting flags has been fulfilled. That's because a DAX page will be marked as (_PAGE_SPECIAL | PAGE_DEVMAP) by pte_mkdevmap(). [1]: https://github.com/pmem/rpma/issues/1142 CC: stable@vger.kernel.org Fixes: 405506274922 ("mm/hmm: add missing call to hmm_pte_need_fault in H= MM_PFN_SPECIAL handling") Signed-off-by: Li Zhijian --- V3: adjust the checking order --- mm/hmm.c | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/mm/hmm.c b/mm/hmm.c index fad6be2bf072..842e26599238 100644 --- a/mm/hmm.c +++ b/mm/hmm.c @@ -295,10 +295,13 @@ static int hmm_vma_handle_pte(struct mm_walk *walk,= unsigned long addr, goto fault; =20 /* + * Bypass devmap pte such as DAX page when all pfn requested + * flags(pfn_req_flags) are fulfilled. * Since each architecture defines a struct page for the zero page, jus= t * fall through and treat it like a normal page. */ - if (pte_special(pte) && !is_zero_pfn(pte_pfn(pte))) { + if (pte_special(pte) && !pte_devmap(pte) && + !is_zero_pfn(pte_pfn(pte))) { if (hmm_pte_need_fault(hmm_vma_walk, pfn_req_flags, 0)) { pte_unmap(ptep); return -EFAULT; --=20 2.31.1