From patchwork Thu Jul 4 19:27:55 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13724229 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1F10AC3271F for ; Thu, 4 Jul 2024 19:28:25 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 66B4D8D0002; Thu, 4 Jul 2024 15:28:25 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 61A7D6B00BE; Thu, 4 Jul 2024 15:28:25 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 495338D0002; Thu, 4 Jul 2024 15:28:25 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 268506B00BD for ; Thu, 4 Jul 2024 15:28:25 -0400 (EDT) Received: from smtpin30.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 7F22B1C0DF2 for ; Thu, 4 Jul 2024 19:28:24 +0000 (UTC) X-FDA: 82303056528.30.A396F27 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf24.hostedemail.com (Postfix) with ESMTP id 2A43C180016 for ; Thu, 4 Jul 2024 19:28:19 +0000 (UTC) Authentication-Results: imf24.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=oySubSe8; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=BiCQVapV; arc=pass ("microsoft.com:s=arcselector9901:i=1"); spf=pass (imf24.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1720121274; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding:in-reply-to: references:dkim-signature; bh=KKXgeMnRng9wgMCiGrEhv6Rvyn0Dg4Gglw+VeGucTgM=; b=KpfVFTDlxKARZrCd8AZn+c9RVm23bLP0/31Lb5DKoc0gxOq/BZa9Jds8VrYmG9lzGtcQ/I IqPNrzb0rUnyYezQ8Yg6EtmKkFWzoCgCP0sdS0KKi2TZ7AYzC5rJxY/l17il8d3RLnsSBH tDPjKynRgFx/H8xSjhGRtM5JahlfQG0= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1720121274; a=rsa-sha256; cv=pass; b=N/ul20Y2GX4Txf6n4eKBwu/zh9R8BWFtLh+LLc1rpz4+VnK8l5l8LCcPofwX05VqBPArtk yzIcjsLDiW9FWjYgYQCI1DNHjlqhIYajZ1wcI6nMOrXP0BwIDWy2XuKv3py4ZMSETBJZgb SJoUzAnTd35aQRijklXha0QCRu1UN9s= ARC-Authentication-Results: i=2; imf24.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=oySubSe8; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=BiCQVapV; arc=pass ("microsoft.com:s=arcselector9901:i=1"); spf=pass (imf24.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 464EAli9032216; Thu, 4 Jul 2024 19:28:12 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h= from:to:cc:subject:date:message-id:content-transfer-encoding :content-type:mime-version; s=corp-2023-11-20; bh=KKXgeMnRng9wgM CiGrEhv6Rvyn0Dg4Gglw+VeGucTgM=; b=oySubSe8x1Oi6uVewVHMVk0mAgpTWl qXbRaTHtRPGO4cljiXfvGNYqWSbgeWjlNlAdDfKQ8DCy0NbefNHmsG3H8UIqca1q zaI87vROnK7TAKWrgOne+uIzKyauYvv+Es7Bba4bkg5RINij4N+8/l5Y0pCgn8Hs g0AdohMNIkMPRPmFXvbPJlJJB+GN1QAqXqWO0zI9Rpa4aaezRpA0c89yTy3PBR+3 XR4L9jex9iY8Dy5hwQUl6qrK5Onh+F3LZqtCVp9EFzJAbraFlLRQjinpoDaeSD6K vagNbHuoLA3ybbjfFGatv78SIVdy7+3mv0E/t0qUTpg59sttPgWumRlg== Received: from phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta03.appoci.oracle.com [138.1.37.129]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 402a59aggh-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 04 Jul 2024 19:28:11 +0000 (GMT) Received: from pps.filterd (phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 464IW65U024647; Thu, 4 Jul 2024 19:28:11 GMT Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2168.outbound.protection.outlook.com [104.47.57.168]) by phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 4028qb3mp6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 04 Jul 2024 19:28:11 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SfyMwAH8+fN0igDyS3hF/K/5lsLKxE8PDGpwdmMyT1S8qMp2clF7fVQewqNnQsS2lIq41VMVKXpVfXJmzipOzA8Ri9OVGN8oPZTDJf0MWt2qadsVOtx1AjwXHhq9hIJecByrRv6chAQNuYEwSYn4MF7l7XKMszKGeEIwkLlrAe6WjXd1gx7MxToYH2VOSQjQoRpk8lyvJ3XhNPgxFGp++/iW9C9pNLtHnZlawotPeF5Ct+t+jgscVIOK79nXbBBK9BfQ9jqogVyT5qdln04GNctHf5OmNhsChF6OoksX7YAlBp83KXiaMDIHn/0fWu37U/YXp1+JIKSemEQHj3vDGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KKXgeMnRng9wgMCiGrEhv6Rvyn0Dg4Gglw+VeGucTgM=; b=blBqdMZBzVq6mBUgBtaRxkDaZkvL2On2uHmntt0RyioeH6GFgJNG0hfpfi6j9t+YPrEs7L9ON75XX749o377r9KXL6ISCOlyQbQQG5pYMNC7Q3ALuDWgSkVGx4TyZREdN38s0+Im4Fq+2rEDeHP+h2MHeYlRlvJF2LcNuLaLbQXDatrtsMRm5/U5jan8Px/TIxh21N1vUSVhvNcj90uZSW3X3cHYWUmrnfHuhAvCmX2iEFySpxvweYt8yQBCM8AYkOTVtfGXDVA4Jo43UpakGmngsQX9SUt2bx+u4ESBmxq5JEsrmZrE6YYJUWsLuBXyWehdUw7fWaNfskfpf0TQKg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KKXgeMnRng9wgMCiGrEhv6Rvyn0Dg4Gglw+VeGucTgM=; b=BiCQVapVk1WlnVCLLd8EhAnjI0hOAHyQEWceWpfUxtTVCHsr917Dx3T+lnadAmzsNfQOWLNhYFuILu2I01yXRN0mdavmIGzXCaqdK2a0/oNddRRH9OUdEj2wOj2yE55hI+qHlQNjCBKNki43kEr50QovCJozYWq1gMSYcl0NuvA= Received: from SJ0PR10MB5613.namprd10.prod.outlook.com (2603:10b6:a03:3d0::5) by DS7PR10MB7228.namprd10.prod.outlook.com (2603:10b6:8:e3::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7741.30; Thu, 4 Jul 2024 19:28:08 +0000 Received: from SJ0PR10MB5613.namprd10.prod.outlook.com ([fe80::4239:cf6f:9caa:940e]) by SJ0PR10MB5613.namprd10.prod.outlook.com ([fe80::4239:cf6f:9caa:940e%6]) with mapi id 15.20.7741.025; Thu, 4 Jul 2024 19:28:08 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, "Liam R . Howlett" , Vlastimil Babka , Matthew Wilcox , Alexander Viro , Christian Brauner , Jan Kara , Eric Biederman , Kees Cook , Suren Baghdasaryan , SeongJae Park , Shuah Khan , Brendan Higgins , David Gow , Rae Moar Subject: [PATCH v2 0/7] Make core VMA operations internal and testable Date: Thu, 4 Jul 2024 20:27:55 +0100 Message-ID: X-Mailer: git-send-email 2.45.2 X-ClientProxiedBy: LO4P302CA0045.GBRP302.PROD.OUTLOOK.COM (2603:10a6:600:317::20) To SJ0PR10MB5613.namprd10.prod.outlook.com (2603:10b6:a03:3d0::5) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ0PR10MB5613:EE_|DS7PR10MB7228:EE_ X-MS-Office365-Filtering-Correlation-Id: ff16200c-6a68-4708-4169-08dc9c5f6f20 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|366016|1800799024|7416014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:SJ0PR10MB5613.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(366016)(1800799024)(7416014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 1tlpltTI8h5JSxgbnEmd995zszB3bS2gHrZiTAzVhmrtIQ0PdndCfIaLWiEXsPpyZBCZj1gqKPrwBNaGKingt4FZVtpPZBJ0mqxIjjeFKRkw1Og0dMEGEJU08iWwGkV/5atIGXQmX+sTKpfkBgMmeBBBVewLvYrDNIe501koRTmJwym2frYXxaeINKWEMl2X5mw/cKZb1+9K2ARzheNDUo272LIBzYwKhCCeXAzhWL0ySJdPYGT7wt8eIXsNfvbMaGUwmGgyRNbxaSEa7SVD1QjMc5eL/ZJClFJiVVf4booaCOVKK5+8gVw4gxgdOQrFwDy8JXLOsRf7N2FKD3Y2WOGT6koYb2RVyGU7yVGvcu1quaLmNblgm9OHNNYyHTbPZ38VQORxr9foQeKDvTtnzVU3AHhldsr6vkGUxmr53zXSvCMfEFmF7iIhobqbe8cx2sLTfwfeXDkzGUFJYApznl290zhmUyZ6t5PRWdhRg9xFGSHENk7c/jo3wEb509OoJUxtnKaW2mCddvZJgXW6VrwCHmyvgAi9gSltf9y5/uXqPHwbKB7VCp5+6ywFqHJyJl2OA/b4/PE5f99+IcQX+t7EsXVqomNKqgxO8YZr72pwgEW/nHzxU/+U4aaayLKpF4TMHwSfXWtWvqhoucj+mWqXseZNVw3R+wzys2Kl5qXqQvclJiSAFW1HPGmYdgM09AEFIS4t0egt5M3fGk2Sn5DBS3Lt8NLONSdEUYm3vpxfF4LH5bQHv27u8qcr51KowTt5Dq3b/Hv9tfn8SjeB1Qm272hn6a64d70LG2eDGLJ1SizrHRVUAXLA9c02u3X/vs3CedfuT60jjjGrnMjvVNzZsw99hdkpy7D/3o3RLdadDu3khWalZ8mDua9B4iZ75bn4snniyd+r9YZ+NsDFZjA5c0rL3Rllr8K4hLdofZ2nP7jM/0CA5a/vTjLFTBaFRznp8CZv3kKkvHGLpHrC/VX8kF3uUTE2zzb41+/VsWsBT+9oXKJLna4FtrCGWiQIskjURugrdwl7Gdthd81d+zo3s6ehEGY22h8m2Ne5SbgYu8xrAymsuE/xssA0IKtxqyD8RqZk/OINI+Oy5biIDgp/KWk2sVm3Pdn63McnQVfGBlAgIattrHS/g2fjd2my89o1atGTizu45HoPm/0GgBGs6af2XnO6KxVFjWfDOY8y8QSHMDR4W5DC898yAoglpqnaHljyASPfWxpCXp7ZF3MFTwnPhzg6MD/Ry4dYp2q98BTnJbXz3EiTLzbFWTCHkggSS+sRXO7MLfrHAxf+EM5jTEuJ5AeE2yMc1bCVidrlzM3VjsynBxDZwDTD8YOczLT8WRezl3zcHmVTp5SCr6NYVTw+HooNwSgVVO8LYOLZM2rrX+iP2rE8FpksB3r91wsfe3EdPIG9E1HazHz96dsiAOLyYqNu1lT7upxkKq3Uq1IPofSJuUcrTxGBidGpcrNndk79Vhi23nhGNKjX6aixPeJpObBqvBP2cFiIsOfN/PVbIleWgzxBgtNr536yZV2eosEETog3439oc9d6WSpNGGFT+qMkHbuOk8qqItB0wubLUqiSFf7HhCjxVHviVrRS+F11R7oQptB0nUWvSg== X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: ff16200c-6a68-4708-4169-08dc9c5f6f20 X-MS-Exchange-CrossTenant-AuthSource: SJ0PR10MB5613.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jul 2024 19:28:08.2241 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: TKljw1ElW0AkG+7t8bDqJnWXNYB7A4qlSpH5opEaXrUYeOLBLl/GksQV8IQC/XN9czk2L8PZeqBPxmLLetp7Fr6PK/A9rjvXCCstJWjvwNQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB7228 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-07-04_15,2024-07-03_01,2024-05-17_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 mlxlogscore=999 bulkscore=0 suspectscore=0 adultscore=0 spamscore=0 malwarescore=0 mlxscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2406180000 definitions=main-2407040140 X-Proofpoint-GUID: hIdIzsBorcmd2gQQGhj0XSInxL7n_gRN X-Proofpoint-ORIG-GUID: hIdIzsBorcmd2gQQGhj0XSInxL7n_gRN X-Stat-Signature: 4t6q94rn5r1ech6kauh8drimgmumhtzj X-Rspamd-Queue-Id: 2A43C180016 X-Rspam-User: X-Rspamd-Server: rspam08 X-HE-Tag: 1720121299-47299 X-HE-Meta: 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 jI7jZoeK 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: There are a number of "core" VMA manipulation functions implemented in mm/mmap.c, notably those concerning VMA merging, splitting, modifying, expanding and shrinking, which logically don't belong there. More importantly this functionality represents an internal implementation detail of memory management and should not be exposed outside of mm/ itself. This patch series isolates core VMA manipulation functionality into its own file, mm/vma.c, and provides an API to the rest of the mm code in mm/vma.h. Importantly, it also carefully implements mm/vma_internal.h, which specifies which headers need to be imported by vma.c, leading to the very useful property that vma.c depends only on mm/vma.h and mm/vma_internal.h. This means we can then re-implement vma_internal.h in userland, adding shims for kernel mechanisms as required, allowing us to unit test internal VMA functionality. This testing is useful as opposed to an e.g. kunit implementation as this way we can avoid all external kernel side-effects while testing, run tests VERY quickly, and iterate on and debug problems quickly. Excitingly this opens the door to, in the future, recreating precise problems observed in production in userland and very quickly debugging problems that might otherwise be very difficult to reproduce. This patch series takes advantage of existing shim logic and full userland maple tree support contained in tools/testing/radix-tree/ and tools/include/linux/, separating out shared components of the radix tree implementation to provide this testing. Kernel functionality is stubbed and shimmed as needed in tools/testing/vma/ which contains a fully functional userland vma_internal.h file and which imports mm/vma.c and mm/vma.h to be directly tested from userland. A simple, skeleton testing implementation is provided in tools/testing/vma/vma.c as a proof-of-concept, asserting that simple VMA merge, modify (testing split), expand and shrink functionality work correctly. v2: * NOMMU fixup in mm/vma.h. * Fixup minor incorrect header edits and remove accidentally included empty test file, and incorrect license header. * Remove generated/autoconf.h file from tools/testing/vma/ and create directory if doesn't already exist. * Have vma binary return an error code if any tests fail. v1: * Fix test_simple_modify() to specify correct prev. * Improve vma test Makefile so it picks up dependency changes correctly. * Rename relocate_vma() to relocate_vma_down(). * Remove shift_arg_pages() and invoked relocate_vma_down() directly from setup_arg_pages(). * MAINTAINERS fixups. https://lore.kernel.org/all/cover.1720006125.git.lorenzo.stoakes@oracle.com/ RFC v2: * Reword commit messages. * Replace vma_expand() / vma_shrink() wrappers with relocate_vma(). * Make move_page_tables() internal too. * Have internal.h import vma.h. * Use header guards to more cleanly implement userland testing code. * Rename main.c to vma.c. * Update mm/vma_internal.h to have fewer superfluous comments. * Rework testing logic so we count test failures, and output test results. * Correct some SPDX license prefixes. * Make VM_xxx_ON() debug asserts forward to xxx_ON() macros. * Update VMA tests to correctly free memory, and re-enable ASAN leak detection. https://lore.kernel.org/all/cover.1719584707.git.lstoakes@gmail.com/ RFC v1: https://lore.kernel.org/all/cover.1719481836.git.lstoakes@gmail.com/ Lorenzo Stoakes (7): userfaultfd: move core VMA manipulation logic to mm/userfaultfd.c mm: move vma_modify() and helpers to internal header mm: move vma_shrink(), vma_expand() to internal header mm: move internal core VMA manipulation functions to own file MAINTAINERS: Add entry for new VMA files tools: separate out shared radix-tree components tools: add skeleton code for userland testing of VMA logic MAINTAINERS | 14 + fs/exec.c | 81 +- fs/userfaultfd.c | 160 +- include/linux/mm.h | 112 +- include/linux/userfaultfd_k.h | 19 + mm/Makefile | 2 +- mm/internal.h | 167 +- mm/mmap.c | 2069 ++--------------- mm/mmu_notifier.c | 2 + mm/userfaultfd.c | 168 ++ mm/vma.c | 1766 ++++++++++++++ mm/vma.h | 364 +++ mm/vma_internal.h | 52 + tools/testing/radix-tree/Makefile | 68 +- tools/testing/radix-tree/maple.c | 14 +- tools/testing/radix-tree/xarray.c | 9 +- tools/testing/shared/autoconf.h | 2 + tools/testing/{radix-tree => shared}/bitmap.c | 0 tools/testing/{radix-tree => shared}/linux.c | 0 .../{radix-tree => shared}/linux/bug.h | 0 .../{radix-tree => shared}/linux/cpu.h | 0 .../{radix-tree => shared}/linux/idr.h | 0 .../{radix-tree => shared}/linux/init.h | 0 .../{radix-tree => shared}/linux/kconfig.h | 0 .../{radix-tree => shared}/linux/kernel.h | 0 .../{radix-tree => shared}/linux/kmemleak.h | 0 .../{radix-tree => shared}/linux/local_lock.h | 0 .../{radix-tree => shared}/linux/lockdep.h | 0 .../{radix-tree => shared}/linux/maple_tree.h | 0 .../{radix-tree => shared}/linux/percpu.h | 0 .../{radix-tree => shared}/linux/preempt.h | 0 .../{radix-tree => shared}/linux/radix-tree.h | 0 .../{radix-tree => shared}/linux/rcupdate.h | 0 .../{radix-tree => shared}/linux/xarray.h | 0 tools/testing/shared/maple-shared.h | 9 + tools/testing/shared/maple-shim.c | 7 + tools/testing/shared/shared.h | 34 + tools/testing/shared/shared.mk | 71 + .../testing/shared/trace/events/maple_tree.h | 5 + tools/testing/shared/xarray-shared.c | 5 + tools/testing/shared/xarray-shared.h | 4 + tools/testing/vma/.gitignore | 7 + tools/testing/vma/Makefile | 16 + tools/testing/vma/linux/atomic.h | 12 + tools/testing/vma/linux/mmzone.h | 38 + tools/testing/vma/vma.c | 207 ++ tools/testing/vma/vma_internal.h | 882 +++++++ 47 files changed, 3915 insertions(+), 2451 deletions(-) create mode 100644 mm/vma.c create mode 100644 mm/vma.h create mode 100644 mm/vma_internal.h create mode 100644 tools/testing/shared/autoconf.h rename tools/testing/{radix-tree => shared}/bitmap.c (100%) rename tools/testing/{radix-tree => shared}/linux.c (100%) rename tools/testing/{radix-tree => shared}/linux/bug.h (100%) rename tools/testing/{radix-tree => shared}/linux/cpu.h (100%) rename tools/testing/{radix-tree => shared}/linux/idr.h (100%) rename tools/testing/{radix-tree => shared}/linux/init.h (100%) rename tools/testing/{radix-tree => shared}/linux/kconfig.h (100%) rename tools/testing/{radix-tree => shared}/linux/kernel.h (100%) rename tools/testing/{radix-tree => shared}/linux/kmemleak.h (100%) rename tools/testing/{radix-tree => shared}/linux/local_lock.h (100%) rename tools/testing/{radix-tree => shared}/linux/lockdep.h (100%) rename tools/testing/{radix-tree => shared}/linux/maple_tree.h (100%) rename tools/testing/{radix-tree => shared}/linux/percpu.h (100%) rename tools/testing/{radix-tree => shared}/linux/preempt.h (100%) rename tools/testing/{radix-tree => shared}/linux/radix-tree.h (100%) rename tools/testing/{radix-tree => shared}/linux/rcupdate.h (100%) rename tools/testing/{radix-tree => shared}/linux/xarray.h (100%) create mode 100644 tools/testing/shared/maple-shared.h create mode 100644 tools/testing/shared/maple-shim.c create mode 100644 tools/testing/shared/shared.h create mode 100644 tools/testing/shared/shared.mk create mode 100644 tools/testing/shared/trace/events/maple_tree.h create mode 100644 tools/testing/shared/xarray-shared.c create mode 100644 tools/testing/shared/xarray-shared.h create mode 100644 tools/testing/vma/.gitignore create mode 100644 tools/testing/vma/Makefile create mode 100644 tools/testing/vma/linux/atomic.h create mode 100644 tools/testing/vma/linux/mmzone.h create mode 100644 tools/testing/vma/vma.c create mode 100644 tools/testing/vma/vma_internal.h --- 2.45.2