]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * linux/mm/memory.c | |
3 | * | |
4 | * Copyright (C) 1991, 1992, 1993, 1994 Linus Torvalds | |
5 | */ | |
6 | ||
7 | /* | |
8 | * demand-loading started 01.12.91 - seems it is high on the list of | |
9 | * things wanted, and it should be easy to implement. - Linus | |
10 | */ | |
11 | ||
12 | /* | |
13 | * Ok, demand-loading was easy, shared pages a little bit tricker. Shared | |
14 | * pages started 02.12.91, seems to work. - Linus. | |
15 | * | |
16 | * Tested sharing by executing about 30 /bin/sh: under the old kernel it | |
17 | * would have taken more than the 6M I have free, but it worked well as | |
18 | * far as I could see. | |
19 | * | |
20 | * Also corrected some "invalidate()"s - I wasn't doing enough of them. | |
21 | */ | |
22 | ||
23 | /* | |
24 | * Real VM (paging to/from disk) started 18.12.91. Much more work and | |
25 | * thought has to go into this. Oh, well.. | |
26 | * 19.12.91 - works, somewhat. Sometimes I get faults, don't know why. | |
27 | * Found it. Everything seems to work now. | |
28 | * 20.12.91 - Ok, making the swap-device changeable like the root. | |
29 | */ | |
30 | ||
31 | /* | |
32 | * 05.04.94 - Multi-page memory management added for v1.1. | |
33 | * Idea by Alex Bligh ([email protected]) | |
34 | * | |
35 | * 16.07.99 - Support of BIGMEM added by Gerhard Wichert, Siemens AG | |
36 | * ([email protected]) | |
37 | * | |
38 | * Aug/Sep 2004 Changed to four level page tables (Andi Kleen) | |
39 | */ | |
40 | ||
41 | #include <linux/kernel_stat.h> | |
42 | #include <linux/mm.h> | |
43 | #include <linux/hugetlb.h> | |
44 | #include <linux/mman.h> | |
45 | #include <linux/swap.h> | |
46 | #include <linux/highmem.h> | |
47 | #include <linux/pagemap.h> | |
9a840895 | 48 | #include <linux/ksm.h> |
1da177e4 | 49 | #include <linux/rmap.h> |
b95f1b31 | 50 | #include <linux/export.h> |
0ff92245 | 51 | #include <linux/delayacct.h> |
1da177e4 | 52 | #include <linux/init.h> |
edc79b2a | 53 | #include <linux/writeback.h> |
8a9f3ccd | 54 | #include <linux/memcontrol.h> |
cddb8a5c | 55 | #include <linux/mmu_notifier.h> |
3dc14741 HD |
56 | #include <linux/kallsyms.h> |
57 | #include <linux/swapops.h> | |
58 | #include <linux/elf.h> | |
5a0e3ad6 | 59 | #include <linux/gfp.h> |
1da177e4 | 60 | |
6952b61d | 61 | #include <asm/io.h> |
1da177e4 LT |
62 | #include <asm/pgalloc.h> |
63 | #include <asm/uaccess.h> | |
64 | #include <asm/tlb.h> | |
65 | #include <asm/tlbflush.h> | |
66 | #include <asm/pgtable.h> | |
67 | ||
42b77728 JB |
68 | #include "internal.h" |
69 | ||
d41dee36 | 70 | #ifndef CONFIG_NEED_MULTIPLE_NODES |
1da177e4 LT |
71 | /* use the per-pgdat data instead for discontigmem - mbligh */ |
72 | unsigned long max_mapnr; | |
73 | struct page *mem_map; | |
74 | ||
75 | EXPORT_SYMBOL(max_mapnr); | |
76 | EXPORT_SYMBOL(mem_map); | |
77 | #endif | |
78 | ||
79 | unsigned long num_physpages; | |
80 | /* | |
81 | * A number of key systems in x86 including ioremap() rely on the assumption | |
82 | * that high_memory defines the upper bound on direct map memory, then end | |
83 | * of ZONE_NORMAL. Under CONFIG_DISCONTIG this means that max_low_pfn and | |
84 | * highstart_pfn must be the same; there must be no gap between ZONE_NORMAL | |
85 | * and ZONE_HIGHMEM. | |
86 | */ | |
87 | void * high_memory; | |
1da177e4 LT |
88 | |
89 | EXPORT_SYMBOL(num_physpages); | |
90 | EXPORT_SYMBOL(high_memory); | |
1da177e4 | 91 | |
32a93233 IM |
92 | /* |
93 | * Randomize the address space (stacks, mmaps, brk, etc.). | |
94 | * | |
95 | * ( When CONFIG_COMPAT_BRK=y we exclude brk from randomization, | |
96 | * as ancient (libc5 based) binaries can segfault. ) | |
97 | */ | |
98 | int randomize_va_space __read_mostly = | |
99 | #ifdef CONFIG_COMPAT_BRK | |
100 | 1; | |
101 | #else | |
102 | 2; | |
103 | #endif | |
a62eaf15 AK |
104 | |
105 | static int __init disable_randmaps(char *s) | |
106 | { | |
107 | randomize_va_space = 0; | |
9b41046c | 108 | return 1; |
a62eaf15 AK |
109 | } |
110 | __setup("norandmaps", disable_randmaps); | |
111 | ||
62eede62 | 112 | unsigned long zero_pfn __read_mostly; |
03f6462a | 113 | unsigned long highest_memmap_pfn __read_mostly; |
a13ea5b7 HD |
114 | |
115 | /* | |
116 | * CONFIG_MMU architectures set up ZERO_PAGE in their paging_init() | |
117 | */ | |
118 | static int __init init_zero_pfn(void) | |
119 | { | |
120 | zero_pfn = page_to_pfn(ZERO_PAGE(0)); | |
121 | return 0; | |
122 | } | |
123 | core_initcall(init_zero_pfn); | |
a62eaf15 | 124 | |
d559db08 | 125 | |
34e55232 KH |
126 | #if defined(SPLIT_RSS_COUNTING) |
127 | ||
ea48cf78 | 128 | void sync_mm_rss(struct mm_struct *mm) |
34e55232 KH |
129 | { |
130 | int i; | |
131 | ||
132 | for (i = 0; i < NR_MM_COUNTERS; i++) { | |
05af2e10 DR |
133 | if (current->rss_stat.count[i]) { |
134 | add_mm_counter(mm, i, current->rss_stat.count[i]); | |
135 | current->rss_stat.count[i] = 0; | |
34e55232 KH |
136 | } |
137 | } | |
05af2e10 | 138 | current->rss_stat.events = 0; |
34e55232 KH |
139 | } |
140 | ||
141 | static void add_mm_counter_fast(struct mm_struct *mm, int member, int val) | |
142 | { | |
143 | struct task_struct *task = current; | |
144 | ||
145 | if (likely(task->mm == mm)) | |
146 | task->rss_stat.count[member] += val; | |
147 | else | |
148 | add_mm_counter(mm, member, val); | |
149 | } | |
150 | #define inc_mm_counter_fast(mm, member) add_mm_counter_fast(mm, member, 1) | |
151 | #define dec_mm_counter_fast(mm, member) add_mm_counter_fast(mm, member, -1) | |
152 | ||
153 | /* sync counter once per 64 page faults */ | |
154 | #define TASK_RSS_EVENTS_THRESH (64) | |
155 | static void check_sync_rss_stat(struct task_struct *task) | |
156 | { | |
157 | if (unlikely(task != current)) | |
158 | return; | |
159 | if (unlikely(task->rss_stat.events++ > TASK_RSS_EVENTS_THRESH)) | |
ea48cf78 | 160 | sync_mm_rss(task->mm); |
34e55232 | 161 | } |
9547d01b | 162 | #else /* SPLIT_RSS_COUNTING */ |
34e55232 KH |
163 | |
164 | #define inc_mm_counter_fast(mm, member) inc_mm_counter(mm, member) | |
165 | #define dec_mm_counter_fast(mm, member) dec_mm_counter(mm, member) | |
166 | ||
167 | static void check_sync_rss_stat(struct task_struct *task) | |
168 | { | |
169 | } | |
170 | ||
9547d01b PZ |
171 | #endif /* SPLIT_RSS_COUNTING */ |
172 | ||
173 | #ifdef HAVE_GENERIC_MMU_GATHER | |
174 | ||
175 | static int tlb_next_batch(struct mmu_gather *tlb) | |
176 | { | |
177 | struct mmu_gather_batch *batch; | |
178 | ||
179 | batch = tlb->active; | |
180 | if (batch->next) { | |
181 | tlb->active = batch->next; | |
182 | return 1; | |
183 | } | |
184 | ||
185 | batch = (void *)__get_free_pages(GFP_NOWAIT | __GFP_NOWARN, 0); | |
186 | if (!batch) | |
187 | return 0; | |
188 | ||
189 | batch->next = NULL; | |
190 | batch->nr = 0; | |
191 | batch->max = MAX_GATHER_BATCH; | |
192 | ||
193 | tlb->active->next = batch; | |
194 | tlb->active = batch; | |
195 | ||
196 | return 1; | |
197 | } | |
198 | ||
199 | /* tlb_gather_mmu | |
200 | * Called to initialize an (on-stack) mmu_gather structure for page-table | |
201 | * tear-down from @mm. The @fullmm argument is used when @mm is without | |
202 | * users and we're going to destroy the full address space (exit/execve). | |
203 | */ | |
204 | void tlb_gather_mmu(struct mmu_gather *tlb, struct mm_struct *mm, bool fullmm) | |
205 | { | |
206 | tlb->mm = mm; | |
207 | ||
208 | tlb->fullmm = fullmm; | |
597e1c35 AS |
209 | tlb->start = -1UL; |
210 | tlb->end = 0; | |
9547d01b PZ |
211 | tlb->need_flush = 0; |
212 | tlb->fast_mode = (num_possible_cpus() == 1); | |
213 | tlb->local.next = NULL; | |
214 | tlb->local.nr = 0; | |
215 | tlb->local.max = ARRAY_SIZE(tlb->__pages); | |
216 | tlb->active = &tlb->local; | |
217 | ||
218 | #ifdef CONFIG_HAVE_RCU_TABLE_FREE | |
219 | tlb->batch = NULL; | |
220 | #endif | |
221 | } | |
222 | ||
223 | void tlb_flush_mmu(struct mmu_gather *tlb) | |
224 | { | |
225 | struct mmu_gather_batch *batch; | |
226 | ||
227 | if (!tlb->need_flush) | |
228 | return; | |
229 | tlb->need_flush = 0; | |
230 | tlb_flush(tlb); | |
231 | #ifdef CONFIG_HAVE_RCU_TABLE_FREE | |
232 | tlb_table_flush(tlb); | |
34e55232 KH |
233 | #endif |
234 | ||
9547d01b PZ |
235 | if (tlb_fast_mode(tlb)) |
236 | return; | |
237 | ||
238 | for (batch = &tlb->local; batch; batch = batch->next) { | |
239 | free_pages_and_swap_cache(batch->pages, batch->nr); | |
240 | batch->nr = 0; | |
241 | } | |
242 | tlb->active = &tlb->local; | |
243 | } | |
244 | ||
245 | /* tlb_finish_mmu | |
246 | * Called at the end of the shootdown operation to free up any resources | |
247 | * that were required. | |
248 | */ | |
249 | void tlb_finish_mmu(struct mmu_gather *tlb, unsigned long start, unsigned long end) | |
250 | { | |
251 | struct mmu_gather_batch *batch, *next; | |
252 | ||
597e1c35 AS |
253 | tlb->start = start; |
254 | tlb->end = end; | |
9547d01b PZ |
255 | tlb_flush_mmu(tlb); |
256 | ||
257 | /* keep the page table cache within bounds */ | |
258 | check_pgt_cache(); | |
259 | ||
260 | for (batch = tlb->local.next; batch; batch = next) { | |
261 | next = batch->next; | |
262 | free_pages((unsigned long)batch, 0); | |
263 | } | |
264 | tlb->local.next = NULL; | |
265 | } | |
266 | ||
267 | /* __tlb_remove_page | |
268 | * Must perform the equivalent to __free_pte(pte_get_and_clear(ptep)), while | |
269 | * handling the additional races in SMP caused by other CPUs caching valid | |
270 | * mappings in their TLBs. Returns the number of free page slots left. | |
271 | * When out of page slots we must call tlb_flush_mmu(). | |
272 | */ | |
273 | int __tlb_remove_page(struct mmu_gather *tlb, struct page *page) | |
274 | { | |
275 | struct mmu_gather_batch *batch; | |
276 | ||
f21760b1 | 277 | VM_BUG_ON(!tlb->need_flush); |
9547d01b PZ |
278 | |
279 | if (tlb_fast_mode(tlb)) { | |
280 | free_page_and_swap_cache(page); | |
281 | return 1; /* avoid calling tlb_flush_mmu() */ | |
282 | } | |
283 | ||
284 | batch = tlb->active; | |
285 | batch->pages[batch->nr++] = page; | |
286 | if (batch->nr == batch->max) { | |
287 | if (!tlb_next_batch(tlb)) | |
288 | return 0; | |
0b43c3aa | 289 | batch = tlb->active; |
9547d01b PZ |
290 | } |
291 | VM_BUG_ON(batch->nr > batch->max); | |
292 | ||
293 | return batch->max - batch->nr; | |
294 | } | |
295 | ||
296 | #endif /* HAVE_GENERIC_MMU_GATHER */ | |
297 | ||
26723911 PZ |
298 | #ifdef CONFIG_HAVE_RCU_TABLE_FREE |
299 | ||
300 | /* | |
301 | * See the comment near struct mmu_table_batch. | |
302 | */ | |
303 | ||
304 | static void tlb_remove_table_smp_sync(void *arg) | |
305 | { | |
306 | /* Simply deliver the interrupt */ | |
307 | } | |
308 | ||
309 | static void tlb_remove_table_one(void *table) | |
310 | { | |
311 | /* | |
312 | * This isn't an RCU grace period and hence the page-tables cannot be | |
313 | * assumed to be actually RCU-freed. | |
314 | * | |
315 | * It is however sufficient for software page-table walkers that rely on | |
316 | * IRQ disabling. See the comment near struct mmu_table_batch. | |
317 | */ | |
318 | smp_call_function(tlb_remove_table_smp_sync, NULL, 1); | |
319 | __tlb_remove_table(table); | |
320 | } | |
321 | ||
322 | static void tlb_remove_table_rcu(struct rcu_head *head) | |
323 | { | |
324 | struct mmu_table_batch *batch; | |
325 | int i; | |
326 | ||
327 | batch = container_of(head, struct mmu_table_batch, rcu); | |
328 | ||
329 | for (i = 0; i < batch->nr; i++) | |
330 | __tlb_remove_table(batch->tables[i]); | |
331 | ||
332 | free_page((unsigned long)batch); | |
333 | } | |
334 | ||
335 | void tlb_table_flush(struct mmu_gather *tlb) | |
336 | { | |
337 | struct mmu_table_batch **batch = &tlb->batch; | |
338 | ||
339 | if (*batch) { | |
340 | call_rcu_sched(&(*batch)->rcu, tlb_remove_table_rcu); | |
341 | *batch = NULL; | |
342 | } | |
343 | } | |
344 | ||
345 | void tlb_remove_table(struct mmu_gather *tlb, void *table) | |
346 | { | |
347 | struct mmu_table_batch **batch = &tlb->batch; | |
348 | ||
349 | tlb->need_flush = 1; | |
350 | ||
351 | /* | |
352 | * When there's less then two users of this mm there cannot be a | |
353 | * concurrent page-table walk. | |
354 | */ | |
355 | if (atomic_read(&tlb->mm->mm_users) < 2) { | |
356 | __tlb_remove_table(table); | |
357 | return; | |
358 | } | |
359 | ||
360 | if (*batch == NULL) { | |
361 | *batch = (struct mmu_table_batch *)__get_free_page(GFP_NOWAIT | __GFP_NOWARN); | |
362 | if (*batch == NULL) { | |
363 | tlb_remove_table_one(table); | |
364 | return; | |
365 | } | |
366 | (*batch)->nr = 0; | |
367 | } | |
368 | (*batch)->tables[(*batch)->nr++] = table; | |
369 | if ((*batch)->nr == MAX_TABLE_BATCH) | |
370 | tlb_table_flush(tlb); | |
371 | } | |
372 | ||
9547d01b | 373 | #endif /* CONFIG_HAVE_RCU_TABLE_FREE */ |
26723911 | 374 | |
1da177e4 LT |
375 | /* |
376 | * If a p?d_bad entry is found while walking page tables, report | |
377 | * the error, before resetting entry to p?d_none. Usually (but | |
378 | * very seldom) called out from the p?d_none_or_clear_bad macros. | |
379 | */ | |
380 | ||
381 | void pgd_clear_bad(pgd_t *pgd) | |
382 | { | |
383 | pgd_ERROR(*pgd); | |
384 | pgd_clear(pgd); | |
385 | } | |
386 | ||
387 | void pud_clear_bad(pud_t *pud) | |
388 | { | |
389 | pud_ERROR(*pud); | |
390 | pud_clear(pud); | |
391 | } | |
392 | ||
393 | void pmd_clear_bad(pmd_t *pmd) | |
394 | { | |
395 | pmd_ERROR(*pmd); | |
396 | pmd_clear(pmd); | |
397 | } | |
398 | ||
399 | /* | |
400 | * Note: this doesn't free the actual pages themselves. That | |
401 | * has been handled earlier when unmapping all the memory regions. | |
402 | */ | |
9e1b32ca BH |
403 | static void free_pte_range(struct mmu_gather *tlb, pmd_t *pmd, |
404 | unsigned long addr) | |
1da177e4 | 405 | { |
2f569afd | 406 | pgtable_t token = pmd_pgtable(*pmd); |
e0da382c | 407 | pmd_clear(pmd); |
9e1b32ca | 408 | pte_free_tlb(tlb, token, addr); |
e0da382c | 409 | tlb->mm->nr_ptes--; |
1da177e4 LT |
410 | } |
411 | ||
e0da382c HD |
412 | static inline void free_pmd_range(struct mmu_gather *tlb, pud_t *pud, |
413 | unsigned long addr, unsigned long end, | |
414 | unsigned long floor, unsigned long ceiling) | |
1da177e4 LT |
415 | { |
416 | pmd_t *pmd; | |
417 | unsigned long next; | |
e0da382c | 418 | unsigned long start; |
1da177e4 | 419 | |
e0da382c | 420 | start = addr; |
1da177e4 | 421 | pmd = pmd_offset(pud, addr); |
1da177e4 LT |
422 | do { |
423 | next = pmd_addr_end(addr, end); | |
424 | if (pmd_none_or_clear_bad(pmd)) | |
425 | continue; | |
9e1b32ca | 426 | free_pte_range(tlb, pmd, addr); |
1da177e4 LT |
427 | } while (pmd++, addr = next, addr != end); |
428 | ||
e0da382c HD |
429 | start &= PUD_MASK; |
430 | if (start < floor) | |
431 | return; | |
432 | if (ceiling) { | |
433 | ceiling &= PUD_MASK; | |
434 | if (!ceiling) | |
435 | return; | |
1da177e4 | 436 | } |
e0da382c HD |
437 | if (end - 1 > ceiling - 1) |
438 | return; | |
439 | ||
440 | pmd = pmd_offset(pud, start); | |
441 | pud_clear(pud); | |
9e1b32ca | 442 | pmd_free_tlb(tlb, pmd, start); |
1da177e4 LT |
443 | } |
444 | ||
e0da382c HD |
445 | static inline void free_pud_range(struct mmu_gather *tlb, pgd_t *pgd, |
446 | unsigned long addr, unsigned long end, | |
447 | unsigned long floor, unsigned long ceiling) | |
1da177e4 LT |
448 | { |
449 | pud_t *pud; | |
450 | unsigned long next; | |
e0da382c | 451 | unsigned long start; |
1da177e4 | 452 | |
e0da382c | 453 | start = addr; |
1da177e4 | 454 | pud = pud_offset(pgd, addr); |
1da177e4 LT |
455 | do { |
456 | next = pud_addr_end(addr, end); | |
457 | if (pud_none_or_clear_bad(pud)) | |
458 | continue; | |
e0da382c | 459 | free_pmd_range(tlb, pud, addr, next, floor, ceiling); |
1da177e4 LT |
460 | } while (pud++, addr = next, addr != end); |
461 | ||
e0da382c HD |
462 | start &= PGDIR_MASK; |
463 | if (start < floor) | |
464 | return; | |
465 | if (ceiling) { | |
466 | ceiling &= PGDIR_MASK; | |
467 | if (!ceiling) | |
468 | return; | |
1da177e4 | 469 | } |
e0da382c HD |
470 | if (end - 1 > ceiling - 1) |
471 | return; | |
472 | ||
473 | pud = pud_offset(pgd, start); | |
474 | pgd_clear(pgd); | |
9e1b32ca | 475 | pud_free_tlb(tlb, pud, start); |
1da177e4 LT |
476 | } |
477 | ||
478 | /* | |
e0da382c HD |
479 | * This function frees user-level page tables of a process. |
480 | * | |
1da177e4 LT |
481 | * Must be called with pagetable lock held. |
482 | */ | |
42b77728 | 483 | void free_pgd_range(struct mmu_gather *tlb, |
e0da382c HD |
484 | unsigned long addr, unsigned long end, |
485 | unsigned long floor, unsigned long ceiling) | |
1da177e4 LT |
486 | { |
487 | pgd_t *pgd; | |
488 | unsigned long next; | |
e0da382c HD |
489 | |
490 | /* | |
491 | * The next few lines have given us lots of grief... | |
492 | * | |
493 | * Why are we testing PMD* at this top level? Because often | |
494 | * there will be no work to do at all, and we'd prefer not to | |
495 | * go all the way down to the bottom just to discover that. | |
496 | * | |
497 | * Why all these "- 1"s? Because 0 represents both the bottom | |
498 | * of the address space and the top of it (using -1 for the | |
499 | * top wouldn't help much: the masks would do the wrong thing). | |
500 | * The rule is that addr 0 and floor 0 refer to the bottom of | |
501 | * the address space, but end 0 and ceiling 0 refer to the top | |
502 | * Comparisons need to use "end - 1" and "ceiling - 1" (though | |
503 | * that end 0 case should be mythical). | |
504 | * | |
505 | * Wherever addr is brought up or ceiling brought down, we must | |
506 | * be careful to reject "the opposite 0" before it confuses the | |
507 | * subsequent tests. But what about where end is brought down | |
508 | * by PMD_SIZE below? no, end can't go down to 0 there. | |
509 | * | |
510 | * Whereas we round start (addr) and ceiling down, by different | |
511 | * masks at different levels, in order to test whether a table | |
512 | * now has no other vmas using it, so can be freed, we don't | |
513 | * bother to round floor or end up - the tests don't need that. | |
514 | */ | |
1da177e4 | 515 | |
e0da382c HD |
516 | addr &= PMD_MASK; |
517 | if (addr < floor) { | |
518 | addr += PMD_SIZE; | |
519 | if (!addr) | |
520 | return; | |
521 | } | |
522 | if (ceiling) { | |
523 | ceiling &= PMD_MASK; | |
524 | if (!ceiling) | |
525 | return; | |
526 | } | |
527 | if (end - 1 > ceiling - 1) | |
528 | end -= PMD_SIZE; | |
529 | if (addr > end - 1) | |
530 | return; | |
531 | ||
42b77728 | 532 | pgd = pgd_offset(tlb->mm, addr); |
1da177e4 LT |
533 | do { |
534 | next = pgd_addr_end(addr, end); | |
535 | if (pgd_none_or_clear_bad(pgd)) | |
536 | continue; | |
42b77728 | 537 | free_pud_range(tlb, pgd, addr, next, floor, ceiling); |
1da177e4 | 538 | } while (pgd++, addr = next, addr != end); |
e0da382c HD |
539 | } |
540 | ||
42b77728 | 541 | void free_pgtables(struct mmu_gather *tlb, struct vm_area_struct *vma, |
3bf5ee95 | 542 | unsigned long floor, unsigned long ceiling) |
e0da382c HD |
543 | { |
544 | while (vma) { | |
545 | struct vm_area_struct *next = vma->vm_next; | |
546 | unsigned long addr = vma->vm_start; | |
547 | ||
8f4f8c16 | 548 | /* |
25d9e2d1 NP |
549 | * Hide vma from rmap and truncate_pagecache before freeing |
550 | * pgtables | |
8f4f8c16 | 551 | */ |
5beb4930 | 552 | unlink_anon_vmas(vma); |
8f4f8c16 HD |
553 | unlink_file_vma(vma); |
554 | ||
9da61aef | 555 | if (is_vm_hugetlb_page(vma)) { |
3bf5ee95 | 556 | hugetlb_free_pgd_range(tlb, addr, vma->vm_end, |
e0da382c | 557 | floor, next? next->vm_start: ceiling); |
3bf5ee95 HD |
558 | } else { |
559 | /* | |
560 | * Optimization: gather nearby vmas into one call down | |
561 | */ | |
562 | while (next && next->vm_start <= vma->vm_end + PMD_SIZE | |
4866920b | 563 | && !is_vm_hugetlb_page(next)) { |
3bf5ee95 HD |
564 | vma = next; |
565 | next = vma->vm_next; | |
5beb4930 | 566 | unlink_anon_vmas(vma); |
8f4f8c16 | 567 | unlink_file_vma(vma); |
3bf5ee95 HD |
568 | } |
569 | free_pgd_range(tlb, addr, vma->vm_end, | |
570 | floor, next? next->vm_start: ceiling); | |
571 | } | |
e0da382c HD |
572 | vma = next; |
573 | } | |
1da177e4 LT |
574 | } |
575 | ||
8ac1f832 AA |
576 | int __pte_alloc(struct mm_struct *mm, struct vm_area_struct *vma, |
577 | pmd_t *pmd, unsigned long address) | |
1da177e4 | 578 | { |
2f569afd | 579 | pgtable_t new = pte_alloc_one(mm, address); |
8ac1f832 | 580 | int wait_split_huge_page; |
1bb3630e HD |
581 | if (!new) |
582 | return -ENOMEM; | |
583 | ||
362a61ad NP |
584 | /* |
585 | * Ensure all pte setup (eg. pte page lock and page clearing) are | |
586 | * visible before the pte is made visible to other CPUs by being | |
587 | * put into page tables. | |
588 | * | |
589 | * The other side of the story is the pointer chasing in the page | |
590 | * table walking code (when walking the page table without locking; | |
591 | * ie. most of the time). Fortunately, these data accesses consist | |
592 | * of a chain of data-dependent loads, meaning most CPUs (alpha | |
593 | * being the notable exception) will already guarantee loads are | |
594 | * seen in-order. See the alpha page table accessors for the | |
595 | * smp_read_barrier_depends() barriers in page table walking code. | |
596 | */ | |
597 | smp_wmb(); /* Could be smp_wmb__xxx(before|after)_spin_lock */ | |
598 | ||
c74df32c | 599 | spin_lock(&mm->page_table_lock); |
8ac1f832 AA |
600 | wait_split_huge_page = 0; |
601 | if (likely(pmd_none(*pmd))) { /* Has another populated it ? */ | |
1da177e4 | 602 | mm->nr_ptes++; |
1da177e4 | 603 | pmd_populate(mm, pmd, new); |
2f569afd | 604 | new = NULL; |
8ac1f832 AA |
605 | } else if (unlikely(pmd_trans_splitting(*pmd))) |
606 | wait_split_huge_page = 1; | |
c74df32c | 607 | spin_unlock(&mm->page_table_lock); |
2f569afd MS |
608 | if (new) |
609 | pte_free(mm, new); | |
8ac1f832 AA |
610 | if (wait_split_huge_page) |
611 | wait_split_huge_page(vma->anon_vma, pmd); | |
1bb3630e | 612 | return 0; |
1da177e4 LT |
613 | } |
614 | ||
1bb3630e | 615 | int __pte_alloc_kernel(pmd_t *pmd, unsigned long address) |
1da177e4 | 616 | { |
1bb3630e HD |
617 | pte_t *new = pte_alloc_one_kernel(&init_mm, address); |
618 | if (!new) | |
619 | return -ENOMEM; | |
620 | ||
362a61ad NP |
621 | smp_wmb(); /* See comment in __pte_alloc */ |
622 | ||
1bb3630e | 623 | spin_lock(&init_mm.page_table_lock); |
8ac1f832 | 624 | if (likely(pmd_none(*pmd))) { /* Has another populated it ? */ |
1bb3630e | 625 | pmd_populate_kernel(&init_mm, pmd, new); |
2f569afd | 626 | new = NULL; |
8ac1f832 AA |
627 | } else |
628 | VM_BUG_ON(pmd_trans_splitting(*pmd)); | |
1bb3630e | 629 | spin_unlock(&init_mm.page_table_lock); |
2f569afd MS |
630 | if (new) |
631 | pte_free_kernel(&init_mm, new); | |
1bb3630e | 632 | return 0; |
1da177e4 LT |
633 | } |
634 | ||
d559db08 KH |
635 | static inline void init_rss_vec(int *rss) |
636 | { | |
637 | memset(rss, 0, sizeof(int) * NR_MM_COUNTERS); | |
638 | } | |
639 | ||
640 | static inline void add_mm_rss_vec(struct mm_struct *mm, int *rss) | |
ae859762 | 641 | { |
d559db08 KH |
642 | int i; |
643 | ||
34e55232 | 644 | if (current->mm == mm) |
05af2e10 | 645 | sync_mm_rss(mm); |
d559db08 KH |
646 | for (i = 0; i < NR_MM_COUNTERS; i++) |
647 | if (rss[i]) | |
648 | add_mm_counter(mm, i, rss[i]); | |
ae859762 HD |
649 | } |
650 | ||
b5810039 | 651 | /* |
6aab341e LT |
652 | * This function is called to print an error when a bad pte |
653 | * is found. For example, we might have a PFN-mapped pte in | |
654 | * a region that doesn't allow it. | |
b5810039 NP |
655 | * |
656 | * The calling function must still handle the error. | |
657 | */ | |
3dc14741 HD |
658 | static void print_bad_pte(struct vm_area_struct *vma, unsigned long addr, |
659 | pte_t pte, struct page *page) | |
b5810039 | 660 | { |
3dc14741 HD |
661 | pgd_t *pgd = pgd_offset(vma->vm_mm, addr); |
662 | pud_t *pud = pud_offset(pgd, addr); | |
663 | pmd_t *pmd = pmd_offset(pud, addr); | |
664 | struct address_space *mapping; | |
665 | pgoff_t index; | |
d936cf9b HD |
666 | static unsigned long resume; |
667 | static unsigned long nr_shown; | |
668 | static unsigned long nr_unshown; | |
669 | ||
670 | /* | |
671 | * Allow a burst of 60 reports, then keep quiet for that minute; | |
672 | * or allow a steady drip of one report per second. | |
673 | */ | |
674 | if (nr_shown == 60) { | |
675 | if (time_before(jiffies, resume)) { | |
676 | nr_unshown++; | |
677 | return; | |
678 | } | |
679 | if (nr_unshown) { | |
1e9e6365 HD |
680 | printk(KERN_ALERT |
681 | "BUG: Bad page map: %lu messages suppressed\n", | |
d936cf9b HD |
682 | nr_unshown); |
683 | nr_unshown = 0; | |
684 | } | |
685 | nr_shown = 0; | |
686 | } | |
687 | if (nr_shown++ == 0) | |
688 | resume = jiffies + 60 * HZ; | |
3dc14741 HD |
689 | |
690 | mapping = vma->vm_file ? vma->vm_file->f_mapping : NULL; | |
691 | index = linear_page_index(vma, addr); | |
692 | ||
1e9e6365 HD |
693 | printk(KERN_ALERT |
694 | "BUG: Bad page map in process %s pte:%08llx pmd:%08llx\n", | |
3dc14741 HD |
695 | current->comm, |
696 | (long long)pte_val(pte), (long long)pmd_val(*pmd)); | |
718a3821 WF |
697 | if (page) |
698 | dump_page(page); | |
1e9e6365 | 699 | printk(KERN_ALERT |
3dc14741 HD |
700 | "addr:%p vm_flags:%08lx anon_vma:%p mapping:%p index:%lx\n", |
701 | (void *)addr, vma->vm_flags, vma->anon_vma, mapping, index); | |
702 | /* | |
703 | * Choose text because data symbols depend on CONFIG_KALLSYMS_ALL=y | |
704 | */ | |
705 | if (vma->vm_ops) | |
1e9e6365 | 706 | print_symbol(KERN_ALERT "vma->vm_ops->fault: %s\n", |
3dc14741 HD |
707 | (unsigned long)vma->vm_ops->fault); |
708 | if (vma->vm_file && vma->vm_file->f_op) | |
1e9e6365 | 709 | print_symbol(KERN_ALERT "vma->vm_file->f_op->mmap: %s\n", |
3dc14741 | 710 | (unsigned long)vma->vm_file->f_op->mmap); |
b5810039 | 711 | dump_stack(); |
3dc14741 | 712 | add_taint(TAINT_BAD_PAGE); |
b5810039 NP |
713 | } |
714 | ||
2ec74c3e | 715 | static inline bool is_cow_mapping(vm_flags_t flags) |
67121172 LT |
716 | { |
717 | return (flags & (VM_SHARED | VM_MAYWRITE)) == VM_MAYWRITE; | |
718 | } | |
719 | ||
62eede62 HD |
720 | #ifndef is_zero_pfn |
721 | static inline int is_zero_pfn(unsigned long pfn) | |
722 | { | |
723 | return pfn == zero_pfn; | |
724 | } | |
725 | #endif | |
726 | ||
727 | #ifndef my_zero_pfn | |
728 | static inline unsigned long my_zero_pfn(unsigned long addr) | |
729 | { | |
730 | return zero_pfn; | |
731 | } | |
732 | #endif | |
733 | ||
ee498ed7 | 734 | /* |
7e675137 | 735 | * vm_normal_page -- This function gets the "struct page" associated with a pte. |
6aab341e | 736 | * |
7e675137 NP |
737 | * "Special" mappings do not wish to be associated with a "struct page" (either |
738 | * it doesn't exist, or it exists but they don't want to touch it). In this | |
739 | * case, NULL is returned here. "Normal" mappings do have a struct page. | |
b379d790 | 740 | * |
7e675137 NP |
741 | * There are 2 broad cases. Firstly, an architecture may define a pte_special() |
742 | * pte bit, in which case this function is trivial. Secondly, an architecture | |
743 | * may not have a spare pte bit, which requires a more complicated scheme, | |
744 | * described below. | |
745 | * | |
746 | * A raw VM_PFNMAP mapping (ie. one that is not COWed) is always considered a | |
747 | * special mapping (even if there are underlying and valid "struct pages"). | |
748 | * COWed pages of a VM_PFNMAP are always normal. | |
6aab341e | 749 | * |
b379d790 JH |
750 | * The way we recognize COWed pages within VM_PFNMAP mappings is through the |
751 | * rules set up by "remap_pfn_range()": the vma will have the VM_PFNMAP bit | |
7e675137 NP |
752 | * set, and the vm_pgoff will point to the first PFN mapped: thus every special |
753 | * mapping will always honor the rule | |
6aab341e LT |
754 | * |
755 | * pfn_of_page == vma->vm_pgoff + ((addr - vma->vm_start) >> PAGE_SHIFT) | |
756 | * | |
7e675137 NP |
757 | * And for normal mappings this is false. |
758 | * | |
759 | * This restricts such mappings to be a linear translation from virtual address | |
760 | * to pfn. To get around this restriction, we allow arbitrary mappings so long | |
761 | * as the vma is not a COW mapping; in that case, we know that all ptes are | |
762 | * special (because none can have been COWed). | |
b379d790 | 763 | * |
b379d790 | 764 | * |
7e675137 | 765 | * In order to support COW of arbitrary special mappings, we have VM_MIXEDMAP. |
b379d790 JH |
766 | * |
767 | * VM_MIXEDMAP mappings can likewise contain memory with or without "struct | |
768 | * page" backing, however the difference is that _all_ pages with a struct | |
769 | * page (that is, those where pfn_valid is true) are refcounted and considered | |
770 | * normal pages by the VM. The disadvantage is that pages are refcounted | |
771 | * (which can be slower and simply not an option for some PFNMAP users). The | |
772 | * advantage is that we don't have to follow the strict linearity rule of | |
773 | * PFNMAP mappings in order to support COWable mappings. | |
774 | * | |
ee498ed7 | 775 | */ |
7e675137 NP |
776 | #ifdef __HAVE_ARCH_PTE_SPECIAL |
777 | # define HAVE_PTE_SPECIAL 1 | |
778 | #else | |
779 | # define HAVE_PTE_SPECIAL 0 | |
780 | #endif | |
781 | struct page *vm_normal_page(struct vm_area_struct *vma, unsigned long addr, | |
782 | pte_t pte) | |
ee498ed7 | 783 | { |
22b31eec | 784 | unsigned long pfn = pte_pfn(pte); |
7e675137 NP |
785 | |
786 | if (HAVE_PTE_SPECIAL) { | |
22b31eec HD |
787 | if (likely(!pte_special(pte))) |
788 | goto check_pfn; | |
a13ea5b7 HD |
789 | if (vma->vm_flags & (VM_PFNMAP | VM_MIXEDMAP)) |
790 | return NULL; | |
62eede62 | 791 | if (!is_zero_pfn(pfn)) |
22b31eec | 792 | print_bad_pte(vma, addr, pte, NULL); |
7e675137 NP |
793 | return NULL; |
794 | } | |
795 | ||
796 | /* !HAVE_PTE_SPECIAL case follows: */ | |
797 | ||
b379d790 JH |
798 | if (unlikely(vma->vm_flags & (VM_PFNMAP|VM_MIXEDMAP))) { |
799 | if (vma->vm_flags & VM_MIXEDMAP) { | |
800 | if (!pfn_valid(pfn)) | |
801 | return NULL; | |
802 | goto out; | |
803 | } else { | |
7e675137 NP |
804 | unsigned long off; |
805 | off = (addr - vma->vm_start) >> PAGE_SHIFT; | |
b379d790 JH |
806 | if (pfn == vma->vm_pgoff + off) |
807 | return NULL; | |
808 | if (!is_cow_mapping(vma->vm_flags)) | |
809 | return NULL; | |
810 | } | |
6aab341e LT |
811 | } |
812 | ||
62eede62 HD |
813 | if (is_zero_pfn(pfn)) |
814 | return NULL; | |
22b31eec HD |
815 | check_pfn: |
816 | if (unlikely(pfn > highest_memmap_pfn)) { | |
817 | print_bad_pte(vma, addr, pte, NULL); | |
818 | return NULL; | |
819 | } | |
6aab341e LT |
820 | |
821 | /* | |
7e675137 | 822 | * NOTE! We still have PageReserved() pages in the page tables. |
7e675137 | 823 | * eg. VDSO mappings can cause them to exist. |
6aab341e | 824 | */ |
b379d790 | 825 | out: |
6aab341e | 826 | return pfn_to_page(pfn); |
ee498ed7 HD |
827 | } |
828 | ||
1da177e4 LT |
829 | /* |
830 | * copy one vm_area from one task to the other. Assumes the page tables | |
831 | * already present in the new task to be cleared in the whole range | |
832 | * covered by this vma. | |
1da177e4 LT |
833 | */ |
834 | ||
570a335b | 835 | static inline unsigned long |
1da177e4 | 836 | copy_one_pte(struct mm_struct *dst_mm, struct mm_struct *src_mm, |
b5810039 | 837 | pte_t *dst_pte, pte_t *src_pte, struct vm_area_struct *vma, |
8c103762 | 838 | unsigned long addr, int *rss) |
1da177e4 | 839 | { |
b5810039 | 840 | unsigned long vm_flags = vma->vm_flags; |
1da177e4 LT |
841 | pte_t pte = *src_pte; |
842 | struct page *page; | |
1da177e4 LT |
843 | |
844 | /* pte contains position in swap or file, so copy. */ | |
845 | if (unlikely(!pte_present(pte))) { | |
846 | if (!pte_file(pte)) { | |
0697212a CL |
847 | swp_entry_t entry = pte_to_swp_entry(pte); |
848 | ||
570a335b HD |
849 | if (swap_duplicate(entry) < 0) |
850 | return entry.val; | |
851 | ||
1da177e4 LT |
852 | /* make sure dst_mm is on swapoff's mmlist. */ |
853 | if (unlikely(list_empty(&dst_mm->mmlist))) { | |
854 | spin_lock(&mmlist_lock); | |
f412ac08 HD |
855 | if (list_empty(&dst_mm->mmlist)) |
856 | list_add(&dst_mm->mmlist, | |
857 | &src_mm->mmlist); | |
1da177e4 LT |
858 | spin_unlock(&mmlist_lock); |
859 | } | |
b084d435 KH |
860 | if (likely(!non_swap_entry(entry))) |
861 | rss[MM_SWAPENTS]++; | |
9f9f1acd KK |
862 | else if (is_migration_entry(entry)) { |
863 | page = migration_entry_to_page(entry); | |
864 | ||
865 | if (PageAnon(page)) | |
866 | rss[MM_ANONPAGES]++; | |
867 | else | |
868 | rss[MM_FILEPAGES]++; | |
869 | ||
870 | if (is_write_migration_entry(entry) && | |
871 | is_cow_mapping(vm_flags)) { | |
872 | /* | |
873 | * COW mappings require pages in both | |
874 | * parent and child to be set to read. | |
875 | */ | |
876 | make_migration_entry_read(&entry); | |
877 | pte = swp_entry_to_pte(entry); | |
878 | set_pte_at(src_mm, addr, src_pte, pte); | |
879 | } | |
0697212a | 880 | } |
1da177e4 | 881 | } |
ae859762 | 882 | goto out_set_pte; |
1da177e4 LT |
883 | } |
884 | ||
1da177e4 LT |
885 | /* |
886 | * If it's a COW mapping, write protect it both | |
887 | * in the parent and the child | |
888 | */ | |
67121172 | 889 | if (is_cow_mapping(vm_flags)) { |
1da177e4 | 890 | ptep_set_wrprotect(src_mm, addr, src_pte); |
3dc90795 | 891 | pte = pte_wrprotect(pte); |
1da177e4 LT |
892 | } |
893 | ||
894 | /* | |
895 | * If it's a shared mapping, mark it clean in | |
896 | * the child | |
897 | */ | |
898 | if (vm_flags & VM_SHARED) | |
899 | pte = pte_mkclean(pte); | |
900 | pte = pte_mkold(pte); | |
6aab341e LT |
901 | |
902 | page = vm_normal_page(vma, addr, pte); | |
903 | if (page) { | |
904 | get_page(page); | |
21333b2b | 905 | page_dup_rmap(page); |
d559db08 KH |
906 | if (PageAnon(page)) |
907 | rss[MM_ANONPAGES]++; | |
908 | else | |
909 | rss[MM_FILEPAGES]++; | |
6aab341e | 910 | } |
ae859762 HD |
911 | |
912 | out_set_pte: | |
913 | set_pte_at(dst_mm, addr, dst_pte, pte); | |
570a335b | 914 | return 0; |
1da177e4 LT |
915 | } |
916 | ||
71e3aac0 AA |
917 | int copy_pte_range(struct mm_struct *dst_mm, struct mm_struct *src_mm, |
918 | pmd_t *dst_pmd, pmd_t *src_pmd, struct vm_area_struct *vma, | |
919 | unsigned long addr, unsigned long end) | |
1da177e4 | 920 | { |
c36987e2 | 921 | pte_t *orig_src_pte, *orig_dst_pte; |
1da177e4 | 922 | pte_t *src_pte, *dst_pte; |
c74df32c | 923 | spinlock_t *src_ptl, *dst_ptl; |
e040f218 | 924 | int progress = 0; |
d559db08 | 925 | int rss[NR_MM_COUNTERS]; |
570a335b | 926 | swp_entry_t entry = (swp_entry_t){0}; |
1da177e4 LT |
927 | |
928 | again: | |
d559db08 KH |
929 | init_rss_vec(rss); |
930 | ||
c74df32c | 931 | dst_pte = pte_alloc_map_lock(dst_mm, dst_pmd, addr, &dst_ptl); |
1da177e4 LT |
932 | if (!dst_pte) |
933 | return -ENOMEM; | |
ece0e2b6 | 934 | src_pte = pte_offset_map(src_pmd, addr); |
4c21e2f2 | 935 | src_ptl = pte_lockptr(src_mm, src_pmd); |
f20dc5f7 | 936 | spin_lock_nested(src_ptl, SINGLE_DEPTH_NESTING); |
c36987e2 DN |
937 | orig_src_pte = src_pte; |
938 | orig_dst_pte = dst_pte; | |
6606c3e0 | 939 | arch_enter_lazy_mmu_mode(); |
1da177e4 | 940 | |
1da177e4 LT |
941 | do { |
942 | /* | |
943 | * We are holding two locks at this point - either of them | |
944 | * could generate latencies in another task on another CPU. | |
945 | */ | |
e040f218 HD |
946 | if (progress >= 32) { |
947 | progress = 0; | |
948 | if (need_resched() || | |
95c354fe | 949 | spin_needbreak(src_ptl) || spin_needbreak(dst_ptl)) |
e040f218 HD |
950 | break; |
951 | } | |
1da177e4 LT |
952 | if (pte_none(*src_pte)) { |
953 | progress++; | |
954 | continue; | |
955 | } | |
570a335b HD |
956 | entry.val = copy_one_pte(dst_mm, src_mm, dst_pte, src_pte, |
957 | vma, addr, rss); | |
958 | if (entry.val) | |
959 | break; | |
1da177e4 LT |
960 | progress += 8; |
961 | } while (dst_pte++, src_pte++, addr += PAGE_SIZE, addr != end); | |
1da177e4 | 962 | |
6606c3e0 | 963 | arch_leave_lazy_mmu_mode(); |
c74df32c | 964 | spin_unlock(src_ptl); |
ece0e2b6 | 965 | pte_unmap(orig_src_pte); |
d559db08 | 966 | add_mm_rss_vec(dst_mm, rss); |
c36987e2 | 967 | pte_unmap_unlock(orig_dst_pte, dst_ptl); |
c74df32c | 968 | cond_resched(); |
570a335b HD |
969 | |
970 | if (entry.val) { | |
971 | if (add_swap_count_continuation(entry, GFP_KERNEL) < 0) | |
972 | return -ENOMEM; | |
973 | progress = 0; | |
974 | } | |
1da177e4 LT |
975 | if (addr != end) |
976 | goto again; | |
977 | return 0; | |
978 | } | |
979 | ||
980 | static inline int copy_pmd_range(struct mm_struct *dst_mm, struct mm_struct *src_mm, | |
981 | pud_t *dst_pud, pud_t *src_pud, struct vm_area_struct *vma, | |
982 | unsigned long addr, unsigned long end) | |
983 | { | |
984 | pmd_t *src_pmd, *dst_pmd; | |
985 | unsigned long next; | |
986 | ||
987 | dst_pmd = pmd_alloc(dst_mm, dst_pud, addr); | |
988 | if (!dst_pmd) | |
989 | return -ENOMEM; | |
990 | src_pmd = pmd_offset(src_pud, addr); | |
991 | do { | |
992 | next = pmd_addr_end(addr, end); | |
71e3aac0 AA |
993 | if (pmd_trans_huge(*src_pmd)) { |
994 | int err; | |
14d1a55c | 995 | VM_BUG_ON(next-addr != HPAGE_PMD_SIZE); |
71e3aac0 AA |
996 | err = copy_huge_pmd(dst_mm, src_mm, |
997 | dst_pmd, src_pmd, addr, vma); | |
998 | if (err == -ENOMEM) | |
999 | return -ENOMEM; | |
1000 | if (!err) | |
1001 | continue; | |
1002 | /* fall through */ | |
1003 | } | |
1da177e4 LT |
1004 | if (pmd_none_or_clear_bad(src_pmd)) |
1005 | continue; | |
1006 | if (copy_pte_range(dst_mm, src_mm, dst_pmd, src_pmd, | |
1007 | vma, addr, next)) | |
1008 | return -ENOMEM; | |
1009 | } while (dst_pmd++, src_pmd++, addr = next, addr != end); | |
1010 | return 0; | |
1011 | } | |
1012 | ||
1013 | static inline int copy_pud_range(struct mm_struct *dst_mm, struct mm_struct *src_mm, | |
1014 | pgd_t *dst_pgd, pgd_t *src_pgd, struct vm_area_struct *vma, | |
1015 | unsigned long addr, unsigned long end) | |
1016 | { | |
1017 | pud_t *src_pud, *dst_pud; | |
1018 | unsigned long next; | |
1019 | ||
1020 | dst_pud = pud_alloc(dst_mm, dst_pgd, addr); | |
1021 | if (!dst_pud) | |
1022 | return -ENOMEM; | |
1023 | src_pud = pud_offset(src_pgd, addr); | |
1024 | do { | |
1025 | next = pud_addr_end(addr, end); | |
1026 | if (pud_none_or_clear_bad(src_pud)) | |
1027 | continue; | |
1028 | if (copy_pmd_range(dst_mm, src_mm, dst_pud, src_pud, | |
1029 | vma, addr, next)) | |
1030 | return -ENOMEM; | |
1031 | } while (dst_pud++, src_pud++, addr = next, addr != end); | |
1032 | return 0; | |
1033 | } | |
1034 | ||
1035 | int copy_page_range(struct mm_struct *dst_mm, struct mm_struct *src_mm, | |
1036 | struct vm_area_struct *vma) | |
1037 | { | |
1038 | pgd_t *src_pgd, *dst_pgd; | |
1039 | unsigned long next; | |
1040 | unsigned long addr = vma->vm_start; | |
1041 | unsigned long end = vma->vm_end; | |
2ec74c3e SG |
1042 | unsigned long mmun_start; /* For mmu_notifiers */ |
1043 | unsigned long mmun_end; /* For mmu_notifiers */ | |
1044 | bool is_cow; | |
cddb8a5c | 1045 | int ret; |
1da177e4 | 1046 | |
d992895b NP |
1047 | /* |
1048 | * Don't copy ptes where a page fault will fill them correctly. | |
1049 | * Fork becomes much lighter when there are big shared or private | |
1050 | * readonly mappings. The tradeoff is that copy_page_range is more | |
1051 | * efficient than faulting. | |
1052 | */ | |
4b6e1e37 KK |
1053 | if (!(vma->vm_flags & (VM_HUGETLB | VM_NONLINEAR | |
1054 | VM_PFNMAP | VM_MIXEDMAP))) { | |
d992895b NP |
1055 | if (!vma->anon_vma) |
1056 | return 0; | |
1057 | } | |
1058 | ||
1da177e4 LT |
1059 | if (is_vm_hugetlb_page(vma)) |
1060 | return copy_hugetlb_page_range(dst_mm, src_mm, vma); | |
1061 | ||
b3b9c293 | 1062 | if (unlikely(vma->vm_flags & VM_PFNMAP)) { |
2ab64037 | 1063 | /* |
1064 | * We do not free on error cases below as remove_vma | |
1065 | * gets called on error from higher level routine | |
1066 | */ | |
5180da41 | 1067 | ret = track_pfn_copy(vma); |
2ab64037 | 1068 | if (ret) |
1069 | return ret; | |
1070 | } | |
1071 | ||
cddb8a5c AA |
1072 | /* |
1073 | * We need to invalidate the secondary MMU mappings only when | |
1074 | * there could be a permission downgrade on the ptes of the | |
1075 | * parent mm. And a permission downgrade will only happen if | |
1076 | * is_cow_mapping() returns true. | |
1077 | */ | |
2ec74c3e SG |
1078 | is_cow = is_cow_mapping(vma->vm_flags); |
1079 | mmun_start = addr; | |
1080 | mmun_end = end; | |
1081 | if (is_cow) | |
1082 | mmu_notifier_invalidate_range_start(src_mm, mmun_start, | |
1083 | mmun_end); | |
cddb8a5c AA |
1084 | |
1085 | ret = 0; | |
1da177e4 LT |
1086 | dst_pgd = pgd_offset(dst_mm, addr); |
1087 | src_pgd = pgd_offset(src_mm, addr); | |
1088 | do { | |
1089 | next = pgd_addr_end(addr, end); | |
1090 | if (pgd_none_or_clear_bad(src_pgd)) | |
1091 | continue; | |
cddb8a5c AA |
1092 | if (unlikely(copy_pud_range(dst_mm, src_mm, dst_pgd, src_pgd, |
1093 | vma, addr, next))) { | |
1094 | ret = -ENOMEM; | |
1095 | break; | |
1096 | } | |
1da177e4 | 1097 | } while (dst_pgd++, src_pgd++, addr = next, addr != end); |
cddb8a5c | 1098 | |
2ec74c3e SG |
1099 | if (is_cow) |
1100 | mmu_notifier_invalidate_range_end(src_mm, mmun_start, mmun_end); | |
cddb8a5c | 1101 | return ret; |
1da177e4 LT |
1102 | } |
1103 | ||
51c6f666 | 1104 | static unsigned long zap_pte_range(struct mmu_gather *tlb, |
b5810039 | 1105 | struct vm_area_struct *vma, pmd_t *pmd, |
1da177e4 | 1106 | unsigned long addr, unsigned long end, |
97a89413 | 1107 | struct zap_details *details) |
1da177e4 | 1108 | { |
b5810039 | 1109 | struct mm_struct *mm = tlb->mm; |
d16dfc55 | 1110 | int force_flush = 0; |
d559db08 | 1111 | int rss[NR_MM_COUNTERS]; |
97a89413 | 1112 | spinlock_t *ptl; |
5f1a1907 | 1113 | pte_t *start_pte; |
97a89413 | 1114 | pte_t *pte; |
d559db08 | 1115 | |
d16dfc55 | 1116 | again: |
e303297e | 1117 | init_rss_vec(rss); |
5f1a1907 SR |
1118 | start_pte = pte_offset_map_lock(mm, pmd, addr, &ptl); |
1119 | pte = start_pte; | |
6606c3e0 | 1120 | arch_enter_lazy_mmu_mode(); |
1da177e4 LT |
1121 | do { |
1122 | pte_t ptent = *pte; | |
51c6f666 | 1123 | if (pte_none(ptent)) { |
1da177e4 | 1124 | continue; |
51c6f666 | 1125 | } |
6f5e6b9e | 1126 | |
1da177e4 | 1127 | if (pte_present(ptent)) { |
ee498ed7 | 1128 | struct page *page; |
51c6f666 | 1129 | |
6aab341e | 1130 | page = vm_normal_page(vma, addr, ptent); |
1da177e4 LT |
1131 | if (unlikely(details) && page) { |
1132 | /* | |
1133 | * unmap_shared_mapping_pages() wants to | |
1134 | * invalidate cache without truncating: | |
1135 | * unmap shared but keep private pages. | |
1136 | */ | |
1137 | if (details->check_mapping && | |
1138 | details->check_mapping != page->mapping) | |
1139 | continue; | |
1140 | /* | |
1141 | * Each page->index must be checked when | |
1142 | * invalidating or truncating nonlinear. | |
1143 | */ | |
1144 | if (details->nonlinear_vma && | |
1145 | (page->index < details->first_index || | |
1146 | page->index > details->last_index)) | |
1147 | continue; | |
1148 | } | |
b5810039 | 1149 | ptent = ptep_get_and_clear_full(mm, addr, pte, |
a600388d | 1150 | tlb->fullmm); |
1da177e4 LT |
1151 | tlb_remove_tlb_entry(tlb, pte, addr); |
1152 | if (unlikely(!page)) | |
1153 | continue; | |
1154 | if (unlikely(details) && details->nonlinear_vma | |
1155 | && linear_page_index(details->nonlinear_vma, | |
1156 | addr) != page->index) | |
b5810039 | 1157 | set_pte_at(mm, addr, pte, |
1da177e4 | 1158 | pgoff_to_pte(page->index)); |
1da177e4 | 1159 | if (PageAnon(page)) |
d559db08 | 1160 | rss[MM_ANONPAGES]--; |
6237bcd9 HD |
1161 | else { |
1162 | if (pte_dirty(ptent)) | |
1163 | set_page_dirty(page); | |
4917e5d0 JW |
1164 | if (pte_young(ptent) && |
1165 | likely(!VM_SequentialReadHint(vma))) | |
bf3f3bc5 | 1166 | mark_page_accessed(page); |
d559db08 | 1167 | rss[MM_FILEPAGES]--; |
6237bcd9 | 1168 | } |
edc315fd | 1169 | page_remove_rmap(page); |
3dc14741 HD |
1170 | if (unlikely(page_mapcount(page) < 0)) |
1171 | print_bad_pte(vma, addr, ptent, page); | |
d16dfc55 PZ |
1172 | force_flush = !__tlb_remove_page(tlb, page); |
1173 | if (force_flush) | |
1174 | break; | |
1da177e4 LT |
1175 | continue; |
1176 | } | |
1177 | /* | |
1178 | * If details->check_mapping, we leave swap entries; | |
1179 | * if details->nonlinear_vma, we leave file entries. | |
1180 | */ | |
1181 | if (unlikely(details)) | |
1182 | continue; | |
2509ef26 HD |
1183 | if (pte_file(ptent)) { |
1184 | if (unlikely(!(vma->vm_flags & VM_NONLINEAR))) | |
1185 | print_bad_pte(vma, addr, ptent, NULL); | |
b084d435 KH |
1186 | } else { |
1187 | swp_entry_t entry = pte_to_swp_entry(ptent); | |
1188 | ||
1189 | if (!non_swap_entry(entry)) | |
1190 | rss[MM_SWAPENTS]--; | |
9f9f1acd KK |
1191 | else if (is_migration_entry(entry)) { |
1192 | struct page *page; | |
1193 | ||
1194 | page = migration_entry_to_page(entry); | |
1195 | ||
1196 | if (PageAnon(page)) | |
1197 | rss[MM_ANONPAGES]--; | |
1198 | else | |
1199 | rss[MM_FILEPAGES]--; | |
1200 | } | |
b084d435 KH |
1201 | if (unlikely(!free_swap_and_cache(entry))) |
1202 | print_bad_pte(vma, addr, ptent, NULL); | |
1203 | } | |
9888a1ca | 1204 | pte_clear_not_present_full(mm, addr, pte, tlb->fullmm); |
97a89413 | 1205 | } while (pte++, addr += PAGE_SIZE, addr != end); |
ae859762 | 1206 | |
d559db08 | 1207 | add_mm_rss_vec(mm, rss); |
6606c3e0 | 1208 | arch_leave_lazy_mmu_mode(); |
5f1a1907 | 1209 | pte_unmap_unlock(start_pte, ptl); |
51c6f666 | 1210 | |
d16dfc55 PZ |
1211 | /* |
1212 | * mmu_gather ran out of room to batch pages, we break out of | |
1213 | * the PTE lock to avoid doing the potential expensive TLB invalidate | |
1214 | * and page-free while holding it. | |
1215 | */ | |
1216 | if (force_flush) { | |
1217 | force_flush = 0; | |
597e1c35 AS |
1218 | |
1219 | #ifdef HAVE_GENERIC_MMU_GATHER | |
1220 | tlb->start = addr; | |
1221 | tlb->end = end; | |
1222 | #endif | |
d16dfc55 PZ |
1223 | tlb_flush_mmu(tlb); |
1224 | if (addr != end) | |
1225 | goto again; | |
1226 | } | |
1227 | ||
51c6f666 | 1228 | return addr; |
1da177e4 LT |
1229 | } |
1230 | ||
51c6f666 | 1231 | static inline unsigned long zap_pmd_range(struct mmu_gather *tlb, |
b5810039 | 1232 | struct vm_area_struct *vma, pud_t *pud, |
1da177e4 | 1233 | unsigned long addr, unsigned long end, |
97a89413 | 1234 | struct zap_details *details) |
1da177e4 LT |
1235 | { |
1236 | pmd_t *pmd; | |
1237 | unsigned long next; | |
1238 | ||
1239 | pmd = pmd_offset(pud, addr); | |
1240 | do { | |
1241 | next = pmd_addr_end(addr, end); | |
71e3aac0 | 1242 | if (pmd_trans_huge(*pmd)) { |
1a5a9906 | 1243 | if (next - addr != HPAGE_PMD_SIZE) { |
e0897d75 DR |
1244 | #ifdef CONFIG_DEBUG_VM |
1245 | if (!rwsem_is_locked(&tlb->mm->mmap_sem)) { | |
1246 | pr_err("%s: mmap_sem is unlocked! addr=0x%lx end=0x%lx vma->vm_start=0x%lx vma->vm_end=0x%lx\n", | |
1247 | __func__, addr, end, | |
1248 | vma->vm_start, | |
1249 | vma->vm_end); | |
1250 | BUG(); | |
1251 | } | |
1252 | #endif | |
71e3aac0 | 1253 | split_huge_page_pmd(vma->vm_mm, pmd); |
f21760b1 | 1254 | } else if (zap_huge_pmd(tlb, vma, pmd, addr)) |
1a5a9906 | 1255 | goto next; |
71e3aac0 AA |
1256 | /* fall through */ |
1257 | } | |
1a5a9906 AA |
1258 | /* |
1259 | * Here there can be other concurrent MADV_DONTNEED or | |
1260 | * trans huge page faults running, and if the pmd is | |
1261 | * none or trans huge it can change under us. This is | |
1262 | * because MADV_DONTNEED holds the mmap_sem in read | |
1263 | * mode. | |
1264 | */ | |
1265 | if (pmd_none_or_trans_huge_or_clear_bad(pmd)) | |
1266 | goto next; | |
97a89413 | 1267 | next = zap_pte_range(tlb, vma, pmd, addr, next, details); |
1a5a9906 | 1268 | next: |
97a89413 PZ |
1269 | cond_resched(); |
1270 | } while (pmd++, addr = next, addr != end); | |
51c6f666 RH |
1271 | |
1272 | return addr; | |
1da177e4 LT |
1273 | } |
1274 | ||
51c6f666 | 1275 | static inline unsigned long zap_pud_range(struct mmu_gather *tlb, |
b5810039 | 1276 | struct vm_area_struct *vma, pgd_t *pgd, |
1da177e4 | 1277 | unsigned long addr, unsigned long end, |
97a89413 | 1278 | struct zap_details *details) |
1da177e4 LT |
1279 | { |
1280 | pud_t *pud; | |
1281 | unsigned long next; | |
1282 | ||
1283 | pud = pud_offset(pgd, addr); | |
1284 | do { | |
1285 | next = pud_addr_end(addr, end); | |
97a89413 | 1286 | if (pud_none_or_clear_bad(pud)) |
1da177e4 | 1287 | continue; |
97a89413 PZ |
1288 | next = zap_pmd_range(tlb, vma, pud, addr, next, details); |
1289 | } while (pud++, addr = next, addr != end); | |
51c6f666 RH |
1290 | |
1291 | return addr; | |
1da177e4 LT |
1292 | } |
1293 | ||
038c7aa1 AV |
1294 | static void unmap_page_range(struct mmu_gather *tlb, |
1295 | struct vm_area_struct *vma, | |
1296 | unsigned long addr, unsigned long end, | |
1297 | struct zap_details *details) | |
1da177e4 LT |
1298 | { |
1299 | pgd_t *pgd; | |
1300 | unsigned long next; | |
1301 | ||
1302 | if (details && !details->check_mapping && !details->nonlinear_vma) | |
1303 | details = NULL; | |
1304 | ||
1305 | BUG_ON(addr >= end); | |
569b846d | 1306 | mem_cgroup_uncharge_start(); |
1da177e4 LT |
1307 | tlb_start_vma(tlb, vma); |
1308 | pgd = pgd_offset(vma->vm_mm, addr); | |
1309 | do { | |
1310 | next = pgd_addr_end(addr, end); | |
97a89413 | 1311 | if (pgd_none_or_clear_bad(pgd)) |
1da177e4 | 1312 | continue; |
97a89413 PZ |
1313 | next = zap_pud_range(tlb, vma, pgd, addr, next, details); |
1314 | } while (pgd++, addr = next, addr != end); | |
1da177e4 | 1315 | tlb_end_vma(tlb, vma); |
569b846d | 1316 | mem_cgroup_uncharge_end(); |
1da177e4 | 1317 | } |
51c6f666 | 1318 | |
f5cc4eef AV |
1319 | |
1320 | static void unmap_single_vma(struct mmu_gather *tlb, | |
1321 | struct vm_area_struct *vma, unsigned long start_addr, | |
4f74d2c8 | 1322 | unsigned long end_addr, |
f5cc4eef AV |
1323 | struct zap_details *details) |
1324 | { | |
1325 | unsigned long start = max(vma->vm_start, start_addr); | |
1326 | unsigned long end; | |
1327 | ||
1328 | if (start >= vma->vm_end) | |
1329 | return; | |
1330 | end = min(vma->vm_end, end_addr); | |
1331 | if (end <= vma->vm_start) | |
1332 | return; | |
1333 | ||
cbc91f71 SD |
1334 | if (vma->vm_file) |
1335 | uprobe_munmap(vma, start, end); | |
1336 | ||
b3b9c293 | 1337 | if (unlikely(vma->vm_flags & VM_PFNMAP)) |
5180da41 | 1338 | untrack_pfn(vma, 0, 0); |
f5cc4eef AV |
1339 | |
1340 | if (start != end) { | |
1341 | if (unlikely(is_vm_hugetlb_page(vma))) { | |
1342 | /* | |
1343 | * It is undesirable to test vma->vm_file as it | |
1344 | * should be non-null for valid hugetlb area. | |
1345 | * However, vm_file will be NULL in the error | |
1346 | * cleanup path of do_mmap_pgoff. When | |
1347 | * hugetlbfs ->mmap method fails, | |
1348 | * do_mmap_pgoff() nullifies vma->vm_file | |
1349 | * before calling this function to clean up. | |
1350 | * Since no pte has actually been setup, it is | |
1351 | * safe to do nothing in this case. | |
1352 | */ | |
24669e58 AK |
1353 | if (vma->vm_file) { |
1354 | mutex_lock(&vma->vm_file->f_mapping->i_mmap_mutex); | |
d833352a | 1355 | __unmap_hugepage_range_final(tlb, vma, start, end, NULL); |
24669e58 AK |
1356 | mutex_unlock(&vma->vm_file->f_mapping->i_mmap_mutex); |
1357 | } | |
f5cc4eef AV |
1358 | } else |
1359 | unmap_page_range(tlb, vma, start, end, details); | |
1360 | } | |
1da177e4 LT |
1361 | } |
1362 | ||
1da177e4 LT |
1363 | /** |
1364 | * unmap_vmas - unmap a range of memory covered by a list of vma's | |
0164f69d | 1365 | * @tlb: address of the caller's struct mmu_gather |
1da177e4 LT |
1366 | * @vma: the starting vma |
1367 | * @start_addr: virtual address at which to start unmapping | |
1368 | * @end_addr: virtual address at which to end unmapping | |
1da177e4 | 1369 | * |
508034a3 | 1370 | * Unmap all pages in the vma list. |
1da177e4 | 1371 | * |
1da177e4 LT |
1372 | * Only addresses between `start' and `end' will be unmapped. |
1373 | * | |
1374 | * The VMA list must be sorted in ascending virtual address order. | |
1375 | * | |
1376 | * unmap_vmas() assumes that the caller will flush the whole unmapped address | |
1377 | * range after unmap_vmas() returns. So the only responsibility here is to | |
1378 | * ensure that any thus-far unmapped pages are flushed before unmap_vmas() | |
1379 | * drops the lock and schedules. | |
1380 | */ | |
6e8bb019 | 1381 | void unmap_vmas(struct mmu_gather *tlb, |
1da177e4 | 1382 | struct vm_area_struct *vma, unsigned long start_addr, |
4f74d2c8 | 1383 | unsigned long end_addr) |
1da177e4 | 1384 | { |
cddb8a5c | 1385 | struct mm_struct *mm = vma->vm_mm; |
1da177e4 | 1386 | |
cddb8a5c | 1387 | mmu_notifier_invalidate_range_start(mm, start_addr, end_addr); |
f5cc4eef | 1388 | for ( ; vma && vma->vm_start < end_addr; vma = vma->vm_next) |
4f74d2c8 | 1389 | unmap_single_vma(tlb, vma, start_addr, end_addr, NULL); |
cddb8a5c | 1390 | mmu_notifier_invalidate_range_end(mm, start_addr, end_addr); |
1da177e4 LT |
1391 | } |
1392 | ||
1393 | /** | |
1394 | * zap_page_range - remove user pages in a given range | |
1395 | * @vma: vm_area_struct holding the applicable pages | |
eb4546bb | 1396 | * @start: starting address of pages to zap |
1da177e4 LT |
1397 | * @size: number of bytes to zap |
1398 | * @details: details of nonlinear truncation or shared cache invalidation | |
f5cc4eef AV |
1399 | * |
1400 | * Caller must protect the VMA list | |
1da177e4 | 1401 | */ |
7e027b14 | 1402 | void zap_page_range(struct vm_area_struct *vma, unsigned long start, |
1da177e4 LT |
1403 | unsigned long size, struct zap_details *details) |
1404 | { | |
1405 | struct mm_struct *mm = vma->vm_mm; | |
d16dfc55 | 1406 | struct mmu_gather tlb; |
7e027b14 | 1407 | unsigned long end = start + size; |
1da177e4 | 1408 | |
1da177e4 | 1409 | lru_add_drain(); |
d16dfc55 | 1410 | tlb_gather_mmu(&tlb, mm, 0); |
365e9c87 | 1411 | update_hiwater_rss(mm); |
7e027b14 LT |
1412 | mmu_notifier_invalidate_range_start(mm, start, end); |
1413 | for ( ; vma && vma->vm_start < end; vma = vma->vm_next) | |
4f74d2c8 | 1414 | unmap_single_vma(&tlb, vma, start, end, details); |
7e027b14 LT |
1415 | mmu_notifier_invalidate_range_end(mm, start, end); |
1416 | tlb_finish_mmu(&tlb, start, end); | |
1da177e4 LT |
1417 | } |
1418 | ||
f5cc4eef AV |
1419 | /** |
1420 | * zap_page_range_single - remove user pages in a given range | |
1421 | * @vma: vm_area_struct holding the applicable pages | |
1422 | * @address: starting address of pages to zap | |
1423 | * @size: number of bytes to zap | |
1424 | * @details: details of nonlinear truncation or shared cache invalidation | |
1425 | * | |
1426 | * The range must fit into one VMA. | |
1da177e4 | 1427 | */ |
f5cc4eef | 1428 | static void zap_page_range_single(struct vm_area_struct *vma, unsigned long address, |
1da177e4 LT |
1429 | unsigned long size, struct zap_details *details) |
1430 | { | |
1431 | struct mm_struct *mm = vma->vm_mm; | |
d16dfc55 | 1432 | struct mmu_gather tlb; |
1da177e4 | 1433 | unsigned long end = address + size; |
1da177e4 | 1434 | |
1da177e4 | 1435 | lru_add_drain(); |
d16dfc55 | 1436 | tlb_gather_mmu(&tlb, mm, 0); |
365e9c87 | 1437 | update_hiwater_rss(mm); |
f5cc4eef | 1438 | mmu_notifier_invalidate_range_start(mm, address, end); |
4f74d2c8 | 1439 | unmap_single_vma(&tlb, vma, address, end, details); |
f5cc4eef | 1440 | mmu_notifier_invalidate_range_end(mm, address, end); |
d16dfc55 | 1441 | tlb_finish_mmu(&tlb, address, end); |
1da177e4 LT |
1442 | } |
1443 | ||
c627f9cc JS |
1444 | /** |
1445 | * zap_vma_ptes - remove ptes mapping the vma | |
1446 | * @vma: vm_area_struct holding ptes to be zapped | |
1447 | * @address: starting address of pages to zap | |
1448 | * @size: number of bytes to zap | |
1449 | * | |
1450 | * This function only unmaps ptes assigned to VM_PFNMAP vmas. | |
1451 | * | |
1452 | * The entire address range must be fully contained within the vma. | |
1453 | * | |
1454 | * Returns 0 if successful. | |
1455 | */ | |
1456 | int zap_vma_ptes(struct vm_area_struct *vma, unsigned long address, | |
1457 | unsigned long size) | |
1458 | { | |
1459 | if (address < vma->vm_start || address + size > vma->vm_end || | |
1460 | !(vma->vm_flags & VM_PFNMAP)) | |
1461 | return -1; | |
f5cc4eef | 1462 | zap_page_range_single(vma, address, size, NULL); |
c627f9cc JS |
1463 | return 0; |
1464 | } | |
1465 | EXPORT_SYMBOL_GPL(zap_vma_ptes); | |
1466 | ||
142762bd JW |
1467 | /** |
1468 | * follow_page - look up a page descriptor from a user-virtual address | |
1469 | * @vma: vm_area_struct mapping @address | |
1470 | * @address: virtual address to look up | |
1471 | * @flags: flags modifying lookup behaviour | |
1472 | * | |
1473 | * @flags can have FOLL_ flags set, defined in <linux/mm.h> | |
1474 | * | |
1475 | * Returns the mapped (struct page *), %NULL if no mapping exists, or | |
1476 | * an error pointer if there is a mapping to something not represented | |
1477 | * by a page descriptor (see also vm_normal_page()). | |
1da177e4 | 1478 | */ |
6aab341e | 1479 | struct page *follow_page(struct vm_area_struct *vma, unsigned long address, |
deceb6cd | 1480 | unsigned int flags) |
1da177e4 LT |
1481 | { |
1482 | pgd_t *pgd; | |
1483 | pud_t *pud; | |
1484 | pmd_t *pmd; | |
1485 | pte_t *ptep, pte; | |
deceb6cd | 1486 | spinlock_t *ptl; |
1da177e4 | 1487 | struct page *page; |
6aab341e | 1488 | struct mm_struct *mm = vma->vm_mm; |
1da177e4 | 1489 | |
deceb6cd HD |
1490 | page = follow_huge_addr(mm, address, flags & FOLL_WRITE); |
1491 | if (!IS_ERR(page)) { | |
1492 | BUG_ON(flags & FOLL_GET); | |
1493 | goto out; | |
1494 | } | |
1da177e4 | 1495 | |
deceb6cd | 1496 | page = NULL; |
1da177e4 LT |
1497 | pgd = pgd_offset(mm, address); |
1498 | if (pgd_none(*pgd) || unlikely(pgd_bad(*pgd))) | |
deceb6cd | 1499 | goto no_page_table; |
1da177e4 LT |
1500 | |
1501 | pud = pud_offset(pgd, address); | |
ceb86879 | 1502 | if (pud_none(*pud)) |
deceb6cd | 1503 | goto no_page_table; |
8a07651e | 1504 | if (pud_huge(*pud) && vma->vm_flags & VM_HUGETLB) { |
ceb86879 AK |
1505 | BUG_ON(flags & FOLL_GET); |
1506 | page = follow_huge_pud(mm, address, pud, flags & FOLL_WRITE); | |
1507 | goto out; | |
1508 | } | |
1509 | if (unlikely(pud_bad(*pud))) | |
1510 | goto no_page_table; | |
1511 | ||
1da177e4 | 1512 | pmd = pmd_offset(pud, address); |
aeed5fce | 1513 | if (pmd_none(*pmd)) |
deceb6cd | 1514 | goto no_page_table; |
71e3aac0 | 1515 | if (pmd_huge(*pmd) && vma->vm_flags & VM_HUGETLB) { |
deceb6cd HD |
1516 | BUG_ON(flags & FOLL_GET); |
1517 | page = follow_huge_pmd(mm, address, pmd, flags & FOLL_WRITE); | |
1da177e4 | 1518 | goto out; |
deceb6cd | 1519 | } |
71e3aac0 | 1520 | if (pmd_trans_huge(*pmd)) { |
500d65d4 AA |
1521 | if (flags & FOLL_SPLIT) { |
1522 | split_huge_page_pmd(mm, pmd); | |
1523 | goto split_fallthrough; | |
1524 | } | |
71e3aac0 AA |
1525 | spin_lock(&mm->page_table_lock); |
1526 | if (likely(pmd_trans_huge(*pmd))) { | |
1527 | if (unlikely(pmd_trans_splitting(*pmd))) { | |
1528 | spin_unlock(&mm->page_table_lock); | |
1529 | wait_split_huge_page(vma->anon_vma, pmd); | |
1530 | } else { | |
b676b293 | 1531 | page = follow_trans_huge_pmd(vma, address, |
71e3aac0 AA |
1532 | pmd, flags); |
1533 | spin_unlock(&mm->page_table_lock); | |
1534 | goto out; | |
1535 | } | |
1536 | } else | |
1537 | spin_unlock(&mm->page_table_lock); | |
1538 | /* fall through */ | |
1539 | } | |
500d65d4 | 1540 | split_fallthrough: |
aeed5fce HD |
1541 | if (unlikely(pmd_bad(*pmd))) |
1542 | goto no_page_table; | |
1543 | ||
deceb6cd | 1544 | ptep = pte_offset_map_lock(mm, pmd, address, &ptl); |
1da177e4 LT |
1545 | |
1546 | pte = *ptep; | |
deceb6cd | 1547 | if (!pte_present(pte)) |
89f5b7da | 1548 | goto no_page; |
deceb6cd HD |
1549 | if ((flags & FOLL_WRITE) && !pte_write(pte)) |
1550 | goto unlock; | |
a13ea5b7 | 1551 | |
6aab341e | 1552 | page = vm_normal_page(vma, address, pte); |
a13ea5b7 HD |
1553 | if (unlikely(!page)) { |
1554 | if ((flags & FOLL_DUMP) || | |
62eede62 | 1555 | !is_zero_pfn(pte_pfn(pte))) |
a13ea5b7 HD |
1556 | goto bad_page; |
1557 | page = pte_page(pte); | |
1558 | } | |
1da177e4 | 1559 | |
deceb6cd | 1560 | if (flags & FOLL_GET) |
70b50f94 | 1561 | get_page_foll(page); |
deceb6cd HD |
1562 | if (flags & FOLL_TOUCH) { |
1563 | if ((flags & FOLL_WRITE) && | |
1564 | !pte_dirty(pte) && !PageDirty(page)) | |
1565 | set_page_dirty(page); | |
bd775c42 KM |
1566 | /* |
1567 | * pte_mkyoung() would be more correct here, but atomic care | |
1568 | * is needed to avoid losing the dirty bit: it is easier to use | |
1569 | * mark_page_accessed(). | |
1570 | */ | |
deceb6cd HD |
1571 | mark_page_accessed(page); |
1572 | } | |
a1fde08c | 1573 | if ((flags & FOLL_MLOCK) && (vma->vm_flags & VM_LOCKED)) { |
110d74a9 ML |
1574 | /* |
1575 | * The preliminary mapping check is mainly to avoid the | |
1576 | * pointless overhead of lock_page on the ZERO_PAGE | |
1577 | * which might bounce very badly if there is contention. | |
1578 | * | |
1579 | * If the page is already locked, we don't need to | |
1580 | * handle it now - vmscan will handle it later if and | |
1581 | * when it attempts to reclaim the page. | |
1582 | */ | |
1583 | if (page->mapping && trylock_page(page)) { | |
1584 | lru_add_drain(); /* push cached pages to LRU */ | |
1585 | /* | |
e6c509f8 HD |
1586 | * Because we lock page here, and migration is |
1587 | * blocked by the pte's page reference, and we | |
1588 | * know the page is still mapped, we don't even | |
1589 | * need to check for file-cache page truncation. | |
110d74a9 | 1590 | */ |
e6c509f8 | 1591 | mlock_vma_page(page); |
110d74a9 ML |
1592 | unlock_page(page); |
1593 | } | |
1594 | } | |
deceb6cd HD |
1595 | unlock: |
1596 | pte_unmap_unlock(ptep, ptl); | |
1da177e4 | 1597 | out: |
deceb6cd | 1598 | return page; |
1da177e4 | 1599 | |
89f5b7da LT |
1600 | bad_page: |
1601 | pte_unmap_unlock(ptep, ptl); | |
1602 | return ERR_PTR(-EFAULT); | |
1603 | ||
1604 | no_page: | |
1605 | pte_unmap_unlock(ptep, ptl); | |
1606 | if (!pte_none(pte)) | |
1607 | return page; | |
8e4b9a60 | 1608 | |
deceb6cd HD |
1609 | no_page_table: |
1610 | /* | |
1611 | * When core dumping an enormous anonymous area that nobody | |
8e4b9a60 HD |
1612 | * has touched so far, we don't want to allocate unnecessary pages or |
1613 | * page tables. Return error instead of NULL to skip handle_mm_fault, | |
1614 | * then get_dump_page() will return NULL to leave a hole in the dump. | |
1615 | * But we can only make this optimization where a hole would surely | |
1616 | * be zero-filled if handle_mm_fault() actually did handle it. | |
deceb6cd | 1617 | */ |
8e4b9a60 HD |
1618 | if ((flags & FOLL_DUMP) && |
1619 | (!vma->vm_ops || !vma->vm_ops->fault)) | |
1620 | return ERR_PTR(-EFAULT); | |
deceb6cd | 1621 | return page; |
1da177e4 LT |
1622 | } |
1623 | ||
95042f9e LT |
1624 | static inline int stack_guard_page(struct vm_area_struct *vma, unsigned long addr) |
1625 | { | |
a09a79f6 MP |
1626 | return stack_guard_page_start(vma, addr) || |
1627 | stack_guard_page_end(vma, addr+PAGE_SIZE); | |
95042f9e LT |
1628 | } |
1629 | ||
0014bd99 YH |
1630 | /** |
1631 | * __get_user_pages() - pin user pages in memory | |
1632 | * @tsk: task_struct of target task | |
1633 | * @mm: mm_struct of target mm | |
1634 | * @start: starting user address | |
1635 | * @nr_pages: number of pages from start to pin | |
1636 | * @gup_flags: flags modifying pin behaviour | |
1637 | * @pages: array that receives pointers to the pages pinned. | |
1638 | * Should be at least nr_pages long. Or NULL, if caller | |
1639 | * only intends to ensure the pages are faulted in. | |
1640 | * @vmas: array of pointers to vmas corresponding to each page. | |
1641 | * Or NULL if the caller does not require them. | |
1642 | * @nonblocking: whether waiting for disk IO or mmap_sem contention | |
1643 | * | |
1644 | * Returns number of pages pinned. This may be fewer than the number | |
1645 | * requested. If nr_pages is 0 or negative, returns 0. If no pages | |
1646 | * were pinned, returns -errno. Each page returned must be released | |
1647 | * with a put_page() call when it is finished with. vmas will only | |
1648 | * remain valid while mmap_sem is held. | |
1649 | * | |
1650 | * Must be called with mmap_sem held for read or write. | |
1651 | * | |
1652 | * __get_user_pages walks a process's page tables and takes a reference to | |
1653 | * each struct page that each user address corresponds to at a given | |
1654 | * instant. That is, it takes the page that would be accessed if a user | |
1655 | * thread accesses the given user virtual address at that instant. | |
1656 | * | |
1657 | * This does not guarantee that the page exists in the user mappings when | |
1658 | * __get_user_pages returns, and there may even be a completely different | |
1659 | * page there in some cases (eg. if mmapped pagecache has been invalidated | |
1660 | * and subsequently re faulted). However it does guarantee that the page | |
1661 | * won't be freed completely. And mostly callers simply care that the page | |
1662 | * contains data that was valid *at some point in time*. Typically, an IO | |
1663 | * or similar operation cannot guarantee anything stronger anyway because | |
1664 | * locks can't be held over the syscall boundary. | |
1665 | * | |
1666 | * If @gup_flags & FOLL_WRITE == 0, the page must not be written to. If | |
1667 | * the page is written to, set_page_dirty (or set_page_dirty_lock, as | |
1668 | * appropriate) must be called after the page is finished with, and | |
1669 | * before put_page is called. | |
1670 | * | |
1671 | * If @nonblocking != NULL, __get_user_pages will not wait for disk IO | |
1672 | * or mmap_sem contention, and if waiting is needed to pin all pages, | |
1673 | * *@nonblocking will be set to 0. | |
1674 | * | |
1675 | * In most cases, get_user_pages or get_user_pages_fast should be used | |
1676 | * instead of __get_user_pages. __get_user_pages should be used only if | |
1677 | * you need some special @gup_flags. | |
1678 | */ | |
b291f000 | 1679 | int __get_user_pages(struct task_struct *tsk, struct mm_struct *mm, |
58fa879e | 1680 | unsigned long start, int nr_pages, unsigned int gup_flags, |
53a7706d ML |
1681 | struct page **pages, struct vm_area_struct **vmas, |
1682 | int *nonblocking) | |
1da177e4 LT |
1683 | { |
1684 | int i; | |
58fa879e | 1685 | unsigned long vm_flags; |
1da177e4 | 1686 | |
9d73777e | 1687 | if (nr_pages <= 0) |
900cf086 | 1688 | return 0; |
58fa879e HD |
1689 | |
1690 | VM_BUG_ON(!!pages != !!(gup_flags & FOLL_GET)); | |
1691 | ||
1da177e4 LT |
1692 | /* |
1693 | * Require read or write permissions. | |
58fa879e | 1694 | * If FOLL_FORCE is set, we only require the "MAY" flags. |
1da177e4 | 1695 | */ |
58fa879e HD |
1696 | vm_flags = (gup_flags & FOLL_WRITE) ? |
1697 | (VM_WRITE | VM_MAYWRITE) : (VM_READ | VM_MAYREAD); | |
1698 | vm_flags &= (gup_flags & FOLL_FORCE) ? | |
1699 | (VM_MAYREAD | VM_MAYWRITE) : (VM_READ | VM_WRITE); | |
1da177e4 LT |
1700 | i = 0; |
1701 | ||
1702 | do { | |
deceb6cd | 1703 | struct vm_area_struct *vma; |
1da177e4 LT |
1704 | |
1705 | vma = find_extend_vma(mm, start); | |
e7f22e20 | 1706 | if (!vma && in_gate_area(mm, start)) { |
1da177e4 | 1707 | unsigned long pg = start & PAGE_MASK; |
1da177e4 LT |
1708 | pgd_t *pgd; |
1709 | pud_t *pud; | |
1710 | pmd_t *pmd; | |
1711 | pte_t *pte; | |
b291f000 NP |
1712 | |
1713 | /* user gate pages are read-only */ | |
58fa879e | 1714 | if (gup_flags & FOLL_WRITE) |
1da177e4 LT |
1715 | return i ? : -EFAULT; |
1716 | if (pg > TASK_SIZE) | |
1717 | pgd = pgd_offset_k(pg); | |
1718 | else | |
1719 | pgd = pgd_offset_gate(mm, pg); | |
1720 | BUG_ON(pgd_none(*pgd)); | |
1721 | pud = pud_offset(pgd, pg); | |
1722 | BUG_ON(pud_none(*pud)); | |
1723 | pmd = pmd_offset(pud, pg); | |
690dbe1c HD |
1724 | if (pmd_none(*pmd)) |
1725 | return i ? : -EFAULT; | |
f66055ab | 1726 | VM_BUG_ON(pmd_trans_huge(*pmd)); |
1da177e4 | 1727 | pte = pte_offset_map(pmd, pg); |
690dbe1c HD |
1728 | if (pte_none(*pte)) { |
1729 | pte_unmap(pte); | |
1730 | return i ? : -EFAULT; | |
1731 | } | |
95042f9e | 1732 | vma = get_gate_vma(mm); |
1da177e4 | 1733 | if (pages) { |
de51257a HD |
1734 | struct page *page; |
1735 | ||
95042f9e | 1736 | page = vm_normal_page(vma, start, *pte); |
de51257a HD |
1737 | if (!page) { |
1738 | if (!(gup_flags & FOLL_DUMP) && | |
1739 | is_zero_pfn(pte_pfn(*pte))) | |
1740 | page = pte_page(*pte); | |
1741 | else { | |
1742 | pte_unmap(pte); | |
1743 | return i ? : -EFAULT; | |
1744 | } | |
1745 | } | |
6aab341e | 1746 | pages[i] = page; |
de51257a | 1747 | get_page(page); |
1da177e4 LT |
1748 | } |
1749 | pte_unmap(pte); | |
95042f9e | 1750 | goto next_page; |
1da177e4 LT |
1751 | } |
1752 | ||
b291f000 NP |
1753 | if (!vma || |
1754 | (vma->vm_flags & (VM_IO | VM_PFNMAP)) || | |
1c3aff1c | 1755 | !(vm_flags & vma->vm_flags)) |
1da177e4 LT |
1756 | return i ? : -EFAULT; |
1757 | ||
2a15efc9 HD |
1758 | if (is_vm_hugetlb_page(vma)) { |
1759 | i = follow_hugetlb_page(mm, vma, pages, vmas, | |
58fa879e | 1760 | &start, &nr_pages, i, gup_flags); |
2a15efc9 HD |
1761 | continue; |
1762 | } | |
deceb6cd | 1763 | |
1da177e4 | 1764 | do { |
08ef4729 | 1765 | struct page *page; |
58fa879e | 1766 | unsigned int foll_flags = gup_flags; |
1da177e4 | 1767 | |
462e00cc | 1768 | /* |
4779280d | 1769 | * If we have a pending SIGKILL, don't keep faulting |
1c3aff1c | 1770 | * pages and potentially allocating memory. |
462e00cc | 1771 | */ |
1c3aff1c | 1772 | if (unlikely(fatal_signal_pending(current))) |
4779280d | 1773 | return i ? i : -ERESTARTSYS; |
462e00cc | 1774 | |
deceb6cd | 1775 | cond_resched(); |
6aab341e | 1776 | while (!(page = follow_page(vma, start, foll_flags))) { |
deceb6cd | 1777 | int ret; |
53a7706d ML |
1778 | unsigned int fault_flags = 0; |
1779 | ||
a09a79f6 MP |
1780 | /* For mlock, just skip the stack guard page. */ |
1781 | if (foll_flags & FOLL_MLOCK) { | |
1782 | if (stack_guard_page(vma, start)) | |
1783 | goto next_page; | |
1784 | } | |
53a7706d ML |
1785 | if (foll_flags & FOLL_WRITE) |
1786 | fault_flags |= FAULT_FLAG_WRITE; | |
1787 | if (nonblocking) | |
1788 | fault_flags |= FAULT_FLAG_ALLOW_RETRY; | |
318b275f GN |
1789 | if (foll_flags & FOLL_NOWAIT) |
1790 | fault_flags |= (FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_RETRY_NOWAIT); | |
d06063cc | 1791 | |
d26ed650 | 1792 | ret = handle_mm_fault(mm, vma, start, |
53a7706d | 1793 | fault_flags); |
d26ed650 | 1794 | |
83c54070 NP |
1795 | if (ret & VM_FAULT_ERROR) { |
1796 | if (ret & VM_FAULT_OOM) | |
1797 | return i ? i : -ENOMEM; | |
69ebb83e YH |
1798 | if (ret & (VM_FAULT_HWPOISON | |
1799 | VM_FAULT_HWPOISON_LARGE)) { | |
1800 | if (i) | |
1801 | return i; | |
1802 | else if (gup_flags & FOLL_HWPOISON) | |
1803 | return -EHWPOISON; | |
1804 | else | |
1805 | return -EFAULT; | |
1806 | } | |
1807 | if (ret & VM_FAULT_SIGBUS) | |
83c54070 NP |
1808 | return i ? i : -EFAULT; |
1809 | BUG(); | |
1810 | } | |
e7f22e20 SW |
1811 | |
1812 | if (tsk) { | |
1813 | if (ret & VM_FAULT_MAJOR) | |
1814 | tsk->maj_flt++; | |
1815 | else | |
1816 | tsk->min_flt++; | |
1817 | } | |
83c54070 | 1818 | |
53a7706d | 1819 | if (ret & VM_FAULT_RETRY) { |
318b275f GN |
1820 | if (nonblocking) |
1821 | *nonblocking = 0; | |
53a7706d ML |
1822 | return i; |
1823 | } | |
1824 | ||
a68d2ebc | 1825 | /* |
83c54070 NP |
1826 | * The VM_FAULT_WRITE bit tells us that |
1827 | * do_wp_page has broken COW when necessary, | |
1828 | * even if maybe_mkwrite decided not to set | |
1829 | * pte_write. We can thus safely do subsequent | |
878b63ac HD |
1830 | * page lookups as if they were reads. But only |
1831 | * do so when looping for pte_write is futile: | |
1832 | * in some cases userspace may also be wanting | |
1833 | * to write to the gotten user page, which a | |
1834 | * read fault here might prevent (a readonly | |
1835 | * page might get reCOWed by userspace write). | |
a68d2ebc | 1836 | */ |
878b63ac HD |
1837 | if ((ret & VM_FAULT_WRITE) && |
1838 | !(vma->vm_flags & VM_WRITE)) | |
deceb6cd | 1839 | foll_flags &= ~FOLL_WRITE; |
83c54070 | 1840 | |
7f7bbbe5 | 1841 | cond_resched(); |
1da177e4 | 1842 | } |
89f5b7da LT |
1843 | if (IS_ERR(page)) |
1844 | return i ? i : PTR_ERR(page); | |
1da177e4 | 1845 | if (pages) { |
08ef4729 | 1846 | pages[i] = page; |
03beb076 | 1847 | |
a6f36be3 | 1848 | flush_anon_page(vma, page, start); |
08ef4729 | 1849 | flush_dcache_page(page); |
1da177e4 | 1850 | } |
95042f9e | 1851 | next_page: |
1da177e4 LT |
1852 | if (vmas) |
1853 | vmas[i] = vma; | |
1854 | i++; | |
1855 | start += PAGE_SIZE; | |
9d73777e PZ |
1856 | nr_pages--; |
1857 | } while (nr_pages && start < vma->vm_end); | |
1858 | } while (nr_pages); | |
1da177e4 LT |
1859 | return i; |
1860 | } | |
0014bd99 | 1861 | EXPORT_SYMBOL(__get_user_pages); |
b291f000 | 1862 | |
2efaca92 BH |
1863 | /* |
1864 | * fixup_user_fault() - manually resolve a user page fault | |
1865 | * @tsk: the task_struct to use for page fault accounting, or | |
1866 | * NULL if faults are not to be recorded. | |
1867 | * @mm: mm_struct of target mm | |
1868 | * @address: user address | |
1869 | * @fault_flags:flags to pass down to handle_mm_fault() | |
1870 | * | |
1871 | * This is meant to be called in the specific scenario where for locking reasons | |
1872 | * we try to access user memory in atomic context (within a pagefault_disable() | |
1873 | * section), this returns -EFAULT, and we want to resolve the user fault before | |
1874 | * trying again. | |
1875 | * | |
1876 | * Typically this is meant to be used by the futex code. | |
1877 | * | |
1878 | * The main difference with get_user_pages() is that this function will | |
1879 | * unconditionally call handle_mm_fault() which will in turn perform all the | |
1880 | * necessary SW fixup of the dirty and young bits in the PTE, while | |
1881 | * handle_mm_fault() only guarantees to update these in the struct page. | |
1882 | * | |
1883 | * This is important for some architectures where those bits also gate the | |
1884 | * access permission to the page because they are maintained in software. On | |
1885 | * such architectures, gup() will not be enough to make a subsequent access | |
1886 | * succeed. | |
1887 | * | |
1888 | * This should be called with the mm_sem held for read. | |
1889 | */ | |
1890 | int fixup_user_fault(struct task_struct *tsk, struct mm_struct *mm, | |
1891 | unsigned long address, unsigned int fault_flags) | |
1892 | { | |
1893 | struct vm_area_struct *vma; | |
1894 | int ret; | |
1895 | ||
1896 | vma = find_extend_vma(mm, address); | |
1897 | if (!vma || address < vma->vm_start) | |
1898 | return -EFAULT; | |
1899 | ||
1900 | ret = handle_mm_fault(mm, vma, address, fault_flags); | |
1901 | if (ret & VM_FAULT_ERROR) { | |
1902 | if (ret & VM_FAULT_OOM) | |
1903 | return -ENOMEM; | |
1904 | if (ret & (VM_FAULT_HWPOISON | VM_FAULT_HWPOISON_LARGE)) | |
1905 | return -EHWPOISON; | |
1906 | if (ret & VM_FAULT_SIGBUS) | |
1907 | return -EFAULT; | |
1908 | BUG(); | |
1909 | } | |
1910 | if (tsk) { | |
1911 | if (ret & VM_FAULT_MAJOR) | |
1912 | tsk->maj_flt++; | |
1913 | else | |
1914 | tsk->min_flt++; | |
1915 | } | |
1916 | return 0; | |
1917 | } | |
1918 | ||
1919 | /* | |
d2bf6be8 | 1920 | * get_user_pages() - pin user pages in memory |
e7f22e20 SW |
1921 | * @tsk: the task_struct to use for page fault accounting, or |
1922 | * NULL if faults are not to be recorded. | |
d2bf6be8 NP |
1923 | * @mm: mm_struct of target mm |
1924 | * @start: starting user address | |
9d73777e | 1925 | * @nr_pages: number of pages from start to pin |
d2bf6be8 NP |
1926 | * @write: whether pages will be written to by the caller |
1927 | * @force: whether to force write access even if user mapping is | |
1928 | * readonly. This will result in the page being COWed even | |
1929 | * in MAP_SHARED mappings. You do not want this. | |
1930 | * @pages: array that receives pointers to the pages pinned. | |
1931 | * Should be at least nr_pages long. Or NULL, if caller | |
1932 | * only intends to ensure the pages are faulted in. | |
1933 | * @vmas: array of pointers to vmas corresponding to each page. | |
1934 | * Or NULL if the caller does not require them. | |
1935 | * | |
1936 | * Returns number of pages pinned. This may be fewer than the number | |
9d73777e | 1937 | * requested. If nr_pages is 0 or negative, returns 0. If no pages |
d2bf6be8 NP |
1938 | * were pinned, returns -errno. Each page returned must be released |
1939 | * with a put_page() call when it is finished with. vmas will only | |
1940 | * remain valid while mmap_sem is held. | |
1941 | * | |
1942 | * Must be called with mmap_sem held for read or write. | |
1943 | * | |
1944 | * get_user_pages walks a process's page tables and takes a reference to | |
1945 | * each struct page that each user address corresponds to at a given | |
1946 | * instant. That is, it takes the page that would be accessed if a user | |
1947 | * thread accesses the given user virtual address at that instant. | |
1948 | * | |
1949 | * This does not guarantee that the page exists in the user mappings when | |
1950 | * get_user_pages returns, and there may even be a completely different | |
1951 | * page there in some cases (eg. if mmapped pagecache has been invalidated | |
1952 | * and subsequently re faulted). However it does guarantee that the page | |
1953 | * won't be freed completely. And mostly callers simply care that the page | |
1954 | * contains data that was valid *at some point in time*. Typically, an IO | |
1955 | * or similar operation cannot guarantee anything stronger anyway because | |
1956 | * locks can't be held over the syscall boundary. | |
1957 | * | |
1958 | * If write=0, the page must not be written to. If the page is written to, | |
1959 | * set_page_dirty (or set_page_dirty_lock, as appropriate) must be called | |
1960 | * after the page is finished with, and before put_page is called. | |
1961 | * | |
1962 | * get_user_pages is typically used for fewer-copy IO operations, to get a | |
1963 | * handle on the memory by some means other than accesses via the user virtual | |
1964 | * addresses. The pages may be submitted for DMA to devices or accessed via | |
1965 | * their kernel linear mapping (via the kmap APIs). Care should be taken to | |
1966 | * use the correct cache flushing APIs. | |
1967 | * | |
1968 | * See also get_user_pages_fast, for performance critical applications. | |
1969 | */ | |
b291f000 | 1970 | int get_user_pages(struct task_struct *tsk, struct mm_struct *mm, |
9d73777e | 1971 | unsigned long start, int nr_pages, int write, int force, |
b291f000 NP |
1972 | struct page **pages, struct vm_area_struct **vmas) |
1973 | { | |
58fa879e | 1974 | int flags = FOLL_TOUCH; |
b291f000 | 1975 | |
58fa879e HD |
1976 | if (pages) |
1977 | flags |= FOLL_GET; | |
b291f000 | 1978 | if (write) |
58fa879e | 1979 | flags |= FOLL_WRITE; |
b291f000 | 1980 | if (force) |
58fa879e | 1981 | flags |= FOLL_FORCE; |
b291f000 | 1982 | |
53a7706d ML |
1983 | return __get_user_pages(tsk, mm, start, nr_pages, flags, pages, vmas, |
1984 | NULL); | |
b291f000 | 1985 | } |
1da177e4 LT |
1986 | EXPORT_SYMBOL(get_user_pages); |
1987 | ||
f3e8fccd HD |
1988 | /** |
1989 | * get_dump_page() - pin user page in memory while writing it to core dump | |
1990 | * @addr: user address | |
1991 | * | |
1992 | * Returns struct page pointer of user page pinned for dump, | |
1993 | * to be freed afterwards by page_cache_release() or put_page(). | |
1994 | * | |
1995 | * Returns NULL on any kind of failure - a hole must then be inserted into | |
1996 | * the corefile, to preserve alignment with its headers; and also returns | |
1997 | * NULL wherever the ZERO_PAGE, or an anonymous pte_none, has been found - | |
1998 | * allowing a hole to be left in the corefile to save diskspace. | |
1999 | * | |
2000 | * Called without mmap_sem, but after all other threads have been killed. | |
2001 | */ | |
2002 | #ifdef CONFIG_ELF_CORE | |
2003 | struct page *get_dump_page(unsigned long addr) | |
2004 | { | |
2005 | struct vm_area_struct *vma; | |
2006 | struct page *page; | |
2007 | ||
2008 | if (__get_user_pages(current, current->mm, addr, 1, | |
53a7706d ML |
2009 | FOLL_FORCE | FOLL_DUMP | FOLL_GET, &page, &vma, |
2010 | NULL) < 1) | |
f3e8fccd | 2011 | return NULL; |
f3e8fccd HD |
2012 | flush_cache_page(vma, addr, page_to_pfn(page)); |
2013 | return page; | |
2014 | } | |
2015 | #endif /* CONFIG_ELF_CORE */ | |
2016 | ||
25ca1d6c | 2017 | pte_t *__get_locked_pte(struct mm_struct *mm, unsigned long addr, |
920c7a5d | 2018 | spinlock_t **ptl) |
c9cfcddf LT |
2019 | { |
2020 | pgd_t * pgd = pgd_offset(mm, addr); | |
2021 | pud_t * pud = pud_alloc(mm, pgd, addr); | |
2022 | if (pud) { | |
49c91fb0 | 2023 | pmd_t * pmd = pmd_alloc(mm, pud, addr); |
f66055ab AA |
2024 | if (pmd) { |
2025 | VM_BUG_ON(pmd_trans_huge(*pmd)); | |
c9cfcddf | 2026 | return pte_alloc_map_lock(mm, pmd, addr, ptl); |
f66055ab | 2027 | } |
c9cfcddf LT |
2028 | } |
2029 | return NULL; | |
2030 | } | |
2031 | ||
238f58d8 LT |
2032 | /* |
2033 | * This is the old fallback for page remapping. | |
2034 | * | |
2035 | * For historical reasons, it only allows reserved pages. Only | |
2036 | * old drivers should use this, and they needed to mark their | |
2037 | * pages reserved for the old functions anyway. | |
2038 | */ | |
423bad60 NP |
2039 | static int insert_page(struct vm_area_struct *vma, unsigned long addr, |
2040 | struct page *page, pgprot_t prot) | |
238f58d8 | 2041 | { |
423bad60 | 2042 | struct mm_struct *mm = vma->vm_mm; |
238f58d8 | 2043 | int retval; |
c9cfcddf | 2044 | pte_t *pte; |
8a9f3ccd BS |
2045 | spinlock_t *ptl; |
2046 | ||
238f58d8 | 2047 | retval = -EINVAL; |
a145dd41 | 2048 | if (PageAnon(page)) |
5b4e655e | 2049 | goto out; |
238f58d8 LT |
2050 | retval = -ENOMEM; |
2051 | flush_dcache_page(page); | |
c9cfcddf | 2052 | pte = get_locked_pte(mm, addr, &ptl); |
238f58d8 | 2053 | if (!pte) |
5b4e655e | 2054 | goto out; |
238f58d8 LT |
2055 | retval = -EBUSY; |
2056 | if (!pte_none(*pte)) | |
2057 | goto out_unlock; | |
2058 | ||
2059 | /* Ok, finally just insert the thing.. */ | |
2060 | get_page(page); | |
34e55232 | 2061 | inc_mm_counter_fast(mm, MM_FILEPAGES); |
238f58d8 LT |
2062 | page_add_file_rmap(page); |
2063 | set_pte_at(mm, addr, pte, mk_pte(page, prot)); | |
2064 | ||
2065 | retval = 0; | |
8a9f3ccd BS |
2066 | pte_unmap_unlock(pte, ptl); |
2067 | return retval; | |
238f58d8 LT |
2068 | out_unlock: |
2069 | pte_unmap_unlock(pte, ptl); | |
2070 | out: | |
2071 | return retval; | |
2072 | } | |
2073 | ||
bfa5bf6d REB |
2074 | /** |
2075 | * vm_insert_page - insert single page into user vma | |
2076 | * @vma: user vma to map to | |
2077 | * @addr: target user address of this page | |
2078 | * @page: source kernel page | |
2079 | * | |
a145dd41 LT |
2080 | * This allows drivers to insert individual pages they've allocated |
2081 | * into a user vma. | |
2082 | * | |
2083 | * The page has to be a nice clean _individual_ kernel allocation. | |
2084 | * If you allocate a compound page, you need to have marked it as | |
2085 | * such (__GFP_COMP), or manually just split the page up yourself | |
8dfcc9ba | 2086 | * (see split_page()). |
a145dd41 LT |
2087 | * |
2088 | * NOTE! Traditionally this was done with "remap_pfn_range()" which | |
2089 | * took an arbitrary page protection parameter. This doesn't allow | |
2090 | * that. Your vma protection will have to be set up correctly, which | |
2091 | * means that if you want a shared writable mapping, you'd better | |
2092 | * ask for a shared writable mapping! | |
2093 | * | |
2094 | * The page does not need to be reserved. | |
4b6e1e37 KK |
2095 | * |
2096 | * Usually this function is called from f_op->mmap() handler | |
2097 | * under mm->mmap_sem write-lock, so it can change vma->vm_flags. | |
2098 | * Caller must set VM_MIXEDMAP on vma if it wants to call this | |
2099 | * function from other places, for example from page-fault handler. | |
a145dd41 | 2100 | */ |
423bad60 NP |
2101 | int vm_insert_page(struct vm_area_struct *vma, unsigned long addr, |
2102 | struct page *page) | |
a145dd41 LT |
2103 | { |
2104 | if (addr < vma->vm_start || addr >= vma->vm_end) | |
2105 | return -EFAULT; | |
2106 | if (!page_count(page)) | |
2107 | return -EINVAL; | |
4b6e1e37 KK |
2108 | if (!(vma->vm_flags & VM_MIXEDMAP)) { |
2109 | BUG_ON(down_read_trylock(&vma->vm_mm->mmap_sem)); | |
2110 | BUG_ON(vma->vm_flags & VM_PFNMAP); | |
2111 | vma->vm_flags |= VM_MIXEDMAP; | |
2112 | } | |
423bad60 | 2113 | return insert_page(vma, addr, page, vma->vm_page_prot); |
a145dd41 | 2114 | } |
e3c3374f | 2115 | EXPORT_SYMBOL(vm_insert_page); |
a145dd41 | 2116 | |
423bad60 NP |
2117 | static int insert_pfn(struct vm_area_struct *vma, unsigned long addr, |
2118 | unsigned long pfn, pgprot_t prot) | |
2119 | { | |
2120 | struct mm_struct *mm = vma->vm_mm; | |
2121 | int retval; | |
2122 | pte_t *pte, entry; | |
2123 | spinlock_t *ptl; | |
2124 | ||
2125 | retval = -ENOMEM; | |
2126 | pte = get_locked_pte(mm, addr, &ptl); | |
2127 | if (!pte) | |
2128 | goto out; | |
2129 | retval = -EBUSY; | |
2130 | if (!pte_none(*pte)) | |
2131 | goto out_unlock; | |
2132 | ||
2133 | /* Ok, finally just insert the thing.. */ | |
2134 | entry = pte_mkspecial(pfn_pte(pfn, prot)); | |
2135 | set_pte_at(mm, addr, pte, entry); | |
4b3073e1 | 2136 | update_mmu_cache(vma, addr, pte); /* XXX: why not for insert_page? */ |
423bad60 NP |
2137 | |
2138 | retval = 0; | |
2139 | out_unlock: | |
2140 | pte_unmap_unlock(pte, ptl); | |
2141 | out: | |
2142 | return retval; | |
2143 | } | |
2144 | ||
e0dc0d8f NP |
2145 | /** |
2146 | * vm_insert_pfn - insert single pfn into user vma | |
2147 | * @vma: user vma to map to | |
2148 | * @addr: target user address of this page | |
2149 | * @pfn: source kernel pfn | |
2150 | * | |
c462f179 | 2151 | * Similar to vm_insert_page, this allows drivers to insert individual pages |
e0dc0d8f NP |
2152 | * they've allocated into a user vma. Same comments apply. |
2153 | * | |
2154 | * This function should only be called from a vm_ops->fault handler, and | |
2155 | * in that case the handler should return NULL. | |
0d71d10a NP |
2156 | * |
2157 | * vma cannot be a COW mapping. | |
2158 | * | |
2159 | * As this is called only for pages that do not currently exist, we | |
2160 | * do not need to flush old virtual caches or the TLB. | |
e0dc0d8f NP |
2161 | */ |
2162 | int vm_insert_pfn(struct vm_area_struct *vma, unsigned long addr, | |
423bad60 | 2163 | unsigned long pfn) |
e0dc0d8f | 2164 | { |
2ab64037 | 2165 | int ret; |
e4b866ed | 2166 | pgprot_t pgprot = vma->vm_page_prot; |
7e675137 NP |
2167 | /* |
2168 | * Technically, architectures with pte_special can avoid all these | |
2169 | * restrictions (same for remap_pfn_range). However we would like | |
2170 | * consistency in testing and feature parity among all, so we should | |
2171 | * try to keep these invariants in place for everybody. | |
2172 | */ | |
b379d790 JH |
2173 | BUG_ON(!(vma->vm_flags & (VM_PFNMAP|VM_MIXEDMAP))); |
2174 | BUG_ON((vma->vm_flags & (VM_PFNMAP|VM_MIXEDMAP)) == | |
2175 | (VM_PFNMAP|VM_MIXEDMAP)); | |
2176 | BUG_ON((vma->vm_flags & VM_PFNMAP) && is_cow_mapping(vma->vm_flags)); | |
2177 | BUG_ON((vma->vm_flags & VM_MIXEDMAP) && pfn_valid(pfn)); | |
e0dc0d8f | 2178 | |
423bad60 NP |
2179 | if (addr < vma->vm_start || addr >= vma->vm_end) |
2180 | return -EFAULT; | |
5180da41 | 2181 | if (track_pfn_insert(vma, &pgprot, pfn)) |
2ab64037 | 2182 | return -EINVAL; |
2183 | ||
e4b866ed | 2184 | ret = insert_pfn(vma, addr, pfn, pgprot); |
2ab64037 | 2185 | |
2ab64037 | 2186 | return ret; |
423bad60 NP |
2187 | } |
2188 | EXPORT_SYMBOL(vm_insert_pfn); | |
e0dc0d8f | 2189 | |
423bad60 NP |
2190 | int vm_insert_mixed(struct vm_area_struct *vma, unsigned long addr, |
2191 | unsigned long pfn) | |
2192 | { | |
2193 | BUG_ON(!(vma->vm_flags & VM_MIXEDMAP)); | |
e0dc0d8f | 2194 | |
423bad60 NP |
2195 | if (addr < vma->vm_start || addr >= vma->vm_end) |
2196 | return -EFAULT; | |
e0dc0d8f | 2197 | |
423bad60 NP |
2198 | /* |
2199 | * If we don't have pte special, then we have to use the pfn_valid() | |
2200 | * based VM_MIXEDMAP scheme (see vm_normal_page), and thus we *must* | |
2201 | * refcount the page if pfn_valid is true (hence insert_page rather | |
62eede62 HD |
2202 | * than insert_pfn). If a zero_pfn were inserted into a VM_MIXEDMAP |
2203 | * without pte special, it would there be refcounted as a normal page. | |
423bad60 NP |
2204 | */ |
2205 | if (!HAVE_PTE_SPECIAL && pfn_valid(pfn)) { | |
2206 | struct page *page; | |
2207 | ||
2208 | page = pfn_to_page(pfn); | |
2209 | return insert_page(vma, addr, page, vma->vm_page_prot); | |
2210 | } | |
2211 | return insert_pfn(vma, addr, pfn, vma->vm_page_prot); | |
e0dc0d8f | 2212 | } |
423bad60 | 2213 | EXPORT_SYMBOL(vm_insert_mixed); |
e0dc0d8f | 2214 | |
1da177e4 LT |
2215 | /* |
2216 | * maps a range of physical memory into the requested pages. the old | |
2217 | * mappings are removed. any references to nonexistent pages results | |
2218 | * in null mappings (currently treated as "copy-on-access") | |
2219 | */ | |
2220 | static int remap_pte_range(struct mm_struct *mm, pmd_t *pmd, | |
2221 | unsigned long addr, unsigned long end, | |
2222 | unsigned long pfn, pgprot_t prot) | |
2223 | { | |
2224 | pte_t *pte; | |
c74df32c | 2225 | spinlock_t *ptl; |
1da177e4 | 2226 | |
c74df32c | 2227 | pte = pte_alloc_map_lock(mm, pmd, addr, &ptl); |
1da177e4 LT |
2228 | if (!pte) |
2229 | return -ENOMEM; | |
6606c3e0 | 2230 | arch_enter_lazy_mmu_mode(); |
1da177e4 LT |
2231 | do { |
2232 | BUG_ON(!pte_none(*pte)); | |
7e675137 | 2233 | set_pte_at(mm, addr, pte, pte_mkspecial(pfn_pte(pfn, prot))); |
1da177e4 LT |
2234 | pfn++; |
2235 | } while (pte++, addr += PAGE_SIZE, addr != end); | |
6606c3e0 | 2236 | arch_leave_lazy_mmu_mode(); |
c74df32c | 2237 | pte_unmap_unlock(pte - 1, ptl); |
1da177e4 LT |
2238 | return 0; |
2239 | } | |
2240 | ||
2241 | static inline int remap_pmd_range(struct mm_struct *mm, pud_t *pud, | |
2242 | unsigned long addr, unsigned long end, | |
2243 | unsigned long pfn, pgprot_t prot) | |
2244 | { | |
2245 | pmd_t *pmd; | |
2246 | unsigned long next; | |
2247 | ||
2248 | pfn -= addr >> PAGE_SHIFT; | |
2249 | pmd = pmd_alloc(mm, pud, addr); | |
2250 | if (!pmd) | |
2251 | return -ENOMEM; | |
f66055ab | 2252 | VM_BUG_ON(pmd_trans_huge(*pmd)); |
1da177e4 LT |
2253 | do { |
2254 | next = pmd_addr_end(addr, end); | |
2255 | if (remap_pte_range(mm, pmd, addr, next, | |
2256 | pfn + (addr >> PAGE_SHIFT), prot)) | |
2257 | return -ENOMEM; | |
2258 | } while (pmd++, addr = next, addr != end); | |
2259 | return 0; | |
2260 | } | |
2261 | ||
2262 | static inline int remap_pud_range(struct mm_struct *mm, pgd_t *pgd, | |
2263 | unsigned long addr, unsigned long end, | |
2264 | unsigned long pfn, pgprot_t prot) | |
2265 | { | |
2266 | pud_t *pud; | |
2267 | unsigned long next; | |
2268 | ||
2269 | pfn -= addr >> PAGE_SHIFT; | |
2270 | pud = pud_alloc(mm, pgd, addr); | |
2271 | if (!pud) | |
2272 | return -ENOMEM; | |
2273 | do { | |
2274 | next = pud_addr_end(addr, end); | |
2275 | if (remap_pmd_range(mm, pud, addr, next, | |
2276 | pfn + (addr >> PAGE_SHIFT), prot)) | |
2277 | return -ENOMEM; | |
2278 | } while (pud++, addr = next, addr != end); | |
2279 | return 0; | |
2280 | } | |
2281 | ||
bfa5bf6d REB |
2282 | /** |
2283 | * remap_pfn_range - remap kernel memory to userspace | |
2284 | * @vma: user vma to map to | |
2285 | * @addr: target user address to start at | |
2286 | * @pfn: physical address of kernel memory | |
2287 | * @size: size of map area | |
2288 | * @prot: page protection flags for this mapping | |
2289 | * | |
2290 | * Note: this is only safe if the mm semaphore is held when called. | |
2291 | */ | |
1da177e4 LT |
2292 | int remap_pfn_range(struct vm_area_struct *vma, unsigned long addr, |
2293 | unsigned long pfn, unsigned long size, pgprot_t prot) | |
2294 | { | |
2295 | pgd_t *pgd; | |
2296 | unsigned long next; | |
2d15cab8 | 2297 | unsigned long end = addr + PAGE_ALIGN(size); |
1da177e4 LT |
2298 | struct mm_struct *mm = vma->vm_mm; |
2299 | int err; | |
2300 | ||
2301 | /* | |
2302 | * Physically remapped pages are special. Tell the | |
2303 | * rest of the world about it: | |
2304 | * VM_IO tells people not to look at these pages | |
2305 | * (accesses can have side effects). | |
6aab341e LT |
2306 | * VM_PFNMAP tells the core MM that the base pages are just |
2307 | * raw PFN mappings, and do not have a "struct page" associated | |
2308 | * with them. | |
314e51b9 KK |
2309 | * VM_DONTEXPAND |
2310 | * Disable vma merging and expanding with mremap(). | |
2311 | * VM_DONTDUMP | |
2312 | * Omit vma from core dump, even when VM_IO turned off. | |
fb155c16 LT |
2313 | * |
2314 | * There's a horrible special case to handle copy-on-write | |
2315 | * behaviour that some programs depend on. We mark the "original" | |
2316 | * un-COW'ed pages by matching them up with "vma->vm_pgoff". | |
b3b9c293 | 2317 | * See vm_normal_page() for details. |
1da177e4 | 2318 | */ |
b3b9c293 KK |
2319 | if (is_cow_mapping(vma->vm_flags)) { |
2320 | if (addr != vma->vm_start || end != vma->vm_end) | |
2321 | return -EINVAL; | |
fb155c16 | 2322 | vma->vm_pgoff = pfn; |
b3b9c293 KK |
2323 | } |
2324 | ||
2325 | err = track_pfn_remap(vma, &prot, pfn, addr, PAGE_ALIGN(size)); | |
2326 | if (err) | |
3c8bb73a | 2327 | return -EINVAL; |
fb155c16 | 2328 | |
314e51b9 | 2329 | vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP; |
1da177e4 LT |
2330 | |
2331 | BUG_ON(addr >= end); | |
2332 | pfn -= addr >> PAGE_SHIFT; | |
2333 | pgd = pgd_offset(mm, addr); | |
2334 | flush_cache_range(vma, addr, end); | |
1da177e4 LT |
2335 | do { |
2336 | next = pgd_addr_end(addr, end); | |
2337 | err = remap_pud_range(mm, pgd, addr, next, | |
2338 | pfn + (addr >> PAGE_SHIFT), prot); | |
2339 | if (err) | |
2340 | break; | |
2341 | } while (pgd++, addr = next, addr != end); | |
2ab64037 | 2342 | |
2343 | if (err) | |
5180da41 | 2344 | untrack_pfn(vma, pfn, PAGE_ALIGN(size)); |
2ab64037 | 2345 | |
1da177e4 LT |
2346 | return err; |
2347 | } | |
2348 | EXPORT_SYMBOL(remap_pfn_range); | |
2349 | ||
aee16b3c JF |
2350 | static int apply_to_pte_range(struct mm_struct *mm, pmd_t *pmd, |
2351 | unsigned long addr, unsigned long end, | |
2352 | pte_fn_t fn, void *data) | |
2353 | { | |
2354 | pte_t *pte; | |
2355 | int err; | |
2f569afd | 2356 | pgtable_t token; |
94909914 | 2357 | spinlock_t *uninitialized_var(ptl); |
aee16b3c JF |
2358 | |
2359 | pte = (mm == &init_mm) ? | |
2360 | pte_alloc_kernel(pmd, addr) : | |
2361 | pte_alloc_map_lock(mm, pmd, addr, &ptl); | |
2362 | if (!pte) | |
2363 | return -ENOMEM; | |
2364 | ||
2365 | BUG_ON(pmd_huge(*pmd)); | |
2366 | ||
38e0edb1 JF |
2367 | arch_enter_lazy_mmu_mode(); |
2368 | ||
2f569afd | 2369 | token = pmd_pgtable(*pmd); |
aee16b3c JF |
2370 | |
2371 | do { | |
c36987e2 | 2372 | err = fn(pte++, token, addr, data); |
aee16b3c JF |
2373 | if (err) |
2374 | break; | |
c36987e2 | 2375 | } while (addr += PAGE_SIZE, addr != end); |
aee16b3c | 2376 | |
38e0edb1 JF |
2377 | arch_leave_lazy_mmu_mode(); |
2378 | ||
aee16b3c JF |
2379 | if (mm != &init_mm) |
2380 | pte_unmap_unlock(pte-1, ptl); | |
2381 | return err; | |
2382 | } | |
2383 | ||
2384 | static int apply_to_pmd_range(struct mm_struct *mm, pud_t *pud, | |
2385 | unsigned long addr, unsigned long end, | |
2386 | pte_fn_t fn, void *data) | |
2387 | { | |
2388 | pmd_t *pmd; | |
2389 | unsigned long next; | |
2390 | int err; | |
2391 | ||
ceb86879 AK |
2392 | BUG_ON(pud_huge(*pud)); |
2393 | ||
aee16b3c JF |
2394 | pmd = pmd_alloc(mm, pud, addr); |
2395 | if (!pmd) | |
2396 | return -ENOMEM; | |
2397 | do { | |
2398 | next = pmd_addr_end(addr, end); | |
2399 | err = apply_to_pte_range(mm, pmd, addr, next, fn, data); | |
2400 | if (err) | |
2401 | break; | |
2402 | } while (pmd++, addr = next, addr != end); | |
2403 | return err; | |
2404 | } | |
2405 | ||
2406 | static int apply_to_pud_range(struct mm_struct *mm, pgd_t *pgd, | |
2407 | unsigned long addr, unsigned long end, | |
2408 | pte_fn_t fn, void *data) | |
2409 | { | |
2410 | pud_t *pud; | |
2411 | unsigned long next; | |
2412 | int err; | |
2413 | ||
2414 | pud = pud_alloc(mm, pgd, addr); | |
2415 | if (!pud) | |
2416 | return -ENOMEM; | |
2417 | do { | |
2418 | next = pud_addr_end(addr, end); | |
2419 | err = apply_to_pmd_range(mm, pud, addr, next, fn, data); | |
2420 | if (err) | |
2421 | break; | |
2422 | } while (pud++, addr = next, addr != end); | |
2423 | return err; | |
2424 | } | |
2425 | ||
2426 | /* | |
2427 | * Scan a region of virtual memory, filling in page tables as necessary | |
2428 | * and calling a provided function on each leaf page table. | |
2429 | */ | |
2430 | int apply_to_page_range(struct mm_struct *mm, unsigned long addr, | |
2431 | unsigned long size, pte_fn_t fn, void *data) | |
2432 | { | |
2433 | pgd_t *pgd; | |
2434 | unsigned long next; | |
57250a5b | 2435 | unsigned long end = addr + size; |
aee16b3c JF |
2436 | int err; |
2437 | ||
2438 | BUG_ON(addr >= end); | |
2439 | pgd = pgd_offset(mm, addr); | |
2440 | do { | |
2441 | next = pgd_addr_end(addr, end); | |
2442 | err = apply_to_pud_range(mm, pgd, addr, next, fn, data); | |
2443 | if (err) | |
2444 | break; | |
2445 | } while (pgd++, addr = next, addr != end); | |
57250a5b | 2446 | |
aee16b3c JF |
2447 | return err; |
2448 | } | |
2449 | EXPORT_SYMBOL_GPL(apply_to_page_range); | |
2450 | ||
8f4e2101 HD |
2451 | /* |
2452 | * handle_pte_fault chooses page fault handler according to an entry | |
2453 | * which was read non-atomically. Before making any commitment, on | |
2454 | * those architectures or configurations (e.g. i386 with PAE) which | |
a335b2e1 | 2455 | * might give a mix of unmatched parts, do_swap_page and do_nonlinear_fault |
8f4e2101 HD |
2456 | * must check under lock before unmapping the pte and proceeding |
2457 | * (but do_wp_page is only called after already making such a check; | |
a335b2e1 | 2458 | * and do_anonymous_page can safely check later on). |
8f4e2101 | 2459 | */ |
4c21e2f2 | 2460 | static inline int pte_unmap_same(struct mm_struct *mm, pmd_t *pmd, |
8f4e2101 HD |
2461 | pte_t *page_table, pte_t orig_pte) |
2462 | { | |
2463 | int same = 1; | |
2464 | #if defined(CONFIG_SMP) || defined(CONFIG_PREEMPT) | |
2465 | if (sizeof(pte_t) > sizeof(unsigned long)) { | |
4c21e2f2 HD |
2466 | spinlock_t *ptl = pte_lockptr(mm, pmd); |
2467 | spin_lock(ptl); | |
8f4e2101 | 2468 | same = pte_same(*page_table, orig_pte); |
4c21e2f2 | 2469 | spin_unlock(ptl); |
8f4e2101 HD |
2470 | } |
2471 | #endif | |
2472 | pte_unmap(page_table); | |
2473 | return same; | |
2474 | } | |
2475 | ||
9de455b2 | 2476 | static inline void cow_user_page(struct page *dst, struct page *src, unsigned long va, struct vm_area_struct *vma) |
6aab341e LT |
2477 | { |
2478 | /* | |
2479 | * If the source page was a PFN mapping, we don't have | |
2480 | * a "struct page" for it. We do a best-effort copy by | |
2481 | * just copying from the original user address. If that | |
2482 | * fails, we just zero-fill it. Live with it. | |
2483 | */ | |
2484 | if (unlikely(!src)) { | |
9b04c5fe | 2485 | void *kaddr = kmap_atomic(dst); |
5d2a2dbb LT |
2486 | void __user *uaddr = (void __user *)(va & PAGE_MASK); |
2487 | ||
2488 | /* | |
2489 | * This really shouldn't fail, because the page is there | |
2490 | * in the page tables. But it might just be unreadable, | |
2491 | * in which case we just give up and fill the result with | |
2492 | * zeroes. | |
2493 | */ | |
2494 | if (__copy_from_user_inatomic(kaddr, uaddr, PAGE_SIZE)) | |
3ecb01df | 2495 | clear_page(kaddr); |
9b04c5fe | 2496 | kunmap_atomic(kaddr); |
c4ec7b0d | 2497 | flush_dcache_page(dst); |
0ed361de NP |
2498 | } else |
2499 | copy_user_highpage(dst, src, va, vma); | |
6aab341e LT |
2500 | } |
2501 | ||
1da177e4 LT |
2502 | /* |
2503 | * This routine handles present pages, when users try to write | |
2504 | * to a shared page. It is done by copying the page to a new address | |
2505 | * and decrementing the shared-page counter for the old page. | |
2506 | * | |
1da177e4 LT |
2507 | * Note that this routine assumes that the protection checks have been |
2508 | * done by the caller (the low-level page fault routine in most cases). | |
2509 | * Thus we can safely just mark it writable once we've done any necessary | |
2510 | * COW. | |
2511 | * | |
2512 | * We also mark the page dirty at this point even though the page will | |
2513 | * change only once the write actually happens. This avoids a few races, | |
2514 | * and potentially makes it more efficient. | |
2515 | * | |
8f4e2101 HD |
2516 | * We enter with non-exclusive mmap_sem (to exclude vma changes, |
2517 | * but allow concurrent faults), with pte both mapped and locked. | |
2518 | * We return with mmap_sem still held, but pte unmapped and unlocked. | |
1da177e4 | 2519 | */ |
65500d23 HD |
2520 | static int do_wp_page(struct mm_struct *mm, struct vm_area_struct *vma, |
2521 | unsigned long address, pte_t *page_table, pmd_t *pmd, | |
8f4e2101 | 2522 | spinlock_t *ptl, pte_t orig_pte) |
e6219ec8 | 2523 | __releases(ptl) |
1da177e4 | 2524 | { |
2ec74c3e | 2525 | struct page *old_page, *new_page = NULL; |
1da177e4 | 2526 | pte_t entry; |
b009c024 | 2527 | int ret = 0; |
a200ee18 | 2528 | int page_mkwrite = 0; |
d08b3851 | 2529 | struct page *dirty_page = NULL; |
1756954c DR |
2530 | unsigned long mmun_start = 0; /* For mmu_notifiers */ |
2531 | unsigned long mmun_end = 0; /* For mmu_notifiers */ | |
1da177e4 | 2532 | |
6aab341e | 2533 | old_page = vm_normal_page(vma, address, orig_pte); |
251b97f5 PZ |
2534 | if (!old_page) { |
2535 | /* | |
2536 | * VM_MIXEDMAP !pfn_valid() case | |
2537 | * | |
2538 | * We should not cow pages in a shared writeable mapping. | |
2539 | * Just mark the pages writable as we can't do any dirty | |
2540 | * accounting on raw pfn maps. | |
2541 | */ | |
2542 | if ((vma->vm_flags & (VM_WRITE|VM_SHARED)) == | |
2543 | (VM_WRITE|VM_SHARED)) | |
2544 | goto reuse; | |
6aab341e | 2545 | goto gotten; |
251b97f5 | 2546 | } |
1da177e4 | 2547 | |
d08b3851 | 2548 | /* |
ee6a6457 PZ |
2549 | * Take out anonymous pages first, anonymous shared vmas are |
2550 | * not dirty accountable. | |
d08b3851 | 2551 | */ |
9a840895 | 2552 | if (PageAnon(old_page) && !PageKsm(old_page)) { |
ab967d86 HD |
2553 | if (!trylock_page(old_page)) { |
2554 | page_cache_get(old_page); | |
2555 | pte_unmap_unlock(page_table, ptl); | |
2556 | lock_page(old_page); | |
2557 | page_table = pte_offset_map_lock(mm, pmd, address, | |
2558 | &ptl); | |
2559 | if (!pte_same(*page_table, orig_pte)) { | |
2560 | unlock_page(old_page); | |
ab967d86 HD |
2561 | goto unlock; |
2562 | } | |
2563 | page_cache_release(old_page); | |
ee6a6457 | 2564 | } |
b009c024 | 2565 | if (reuse_swap_page(old_page)) { |
c44b6743 RR |
2566 | /* |
2567 | * The page is all ours. Move it to our anon_vma so | |
2568 | * the rmap code will not search our parent or siblings. | |
2569 | * Protected against the rmap code by the page lock. | |
2570 | */ | |
2571 | page_move_anon_rmap(old_page, vma, address); | |
b009c024 ML |
2572 | unlock_page(old_page); |
2573 | goto reuse; | |
2574 | } | |
ab967d86 | 2575 | unlock_page(old_page); |
ee6a6457 | 2576 | } else if (unlikely((vma->vm_flags & (VM_WRITE|VM_SHARED)) == |
d08b3851 | 2577 | (VM_WRITE|VM_SHARED))) { |
ee6a6457 PZ |
2578 | /* |
2579 | * Only catch write-faults on shared writable pages, | |
2580 | * read-only shared pages can get COWed by | |
2581 | * get_user_pages(.write=1, .force=1). | |
2582 | */ | |
9637a5ef | 2583 | if (vma->vm_ops && vma->vm_ops->page_mkwrite) { |
c2ec175c NP |
2584 | struct vm_fault vmf; |
2585 | int tmp; | |
2586 | ||
2587 | vmf.virtual_address = (void __user *)(address & | |
2588 | PAGE_MASK); | |
2589 | vmf.pgoff = old_page->index; | |
2590 | vmf.flags = FAULT_FLAG_WRITE|FAULT_FLAG_MKWRITE; | |
2591 | vmf.page = old_page; | |
2592 | ||
9637a5ef DH |
2593 | /* |
2594 | * Notify the address space that the page is about to | |
2595 | * become writable so that it can prohibit this or wait | |
2596 | * for the page to get into an appropriate state. | |
2597 | * | |
2598 | * We do this without the lock held, so that it can | |
2599 | * sleep if it needs to. | |
2600 | */ | |
2601 | page_cache_get(old_page); | |
2602 | pte_unmap_unlock(page_table, ptl); | |
2603 | ||
c2ec175c NP |
2604 | tmp = vma->vm_ops->page_mkwrite(vma, &vmf); |
2605 | if (unlikely(tmp & | |
2606 | (VM_FAULT_ERROR | VM_FAULT_NOPAGE))) { | |
2607 | ret = tmp; | |
9637a5ef | 2608 | goto unwritable_page; |
c2ec175c | 2609 | } |
b827e496 NP |
2610 | if (unlikely(!(tmp & VM_FAULT_LOCKED))) { |
2611 | lock_page(old_page); | |
2612 | if (!old_page->mapping) { | |
2613 | ret = 0; /* retry the fault */ | |
2614 | unlock_page(old_page); | |
2615 | goto unwritable_page; | |
2616 | } | |
2617 | } else | |
2618 | VM_BUG_ON(!PageLocked(old_page)); | |
9637a5ef | 2619 | |
9637a5ef DH |
2620 | /* |
2621 | * Since we dropped the lock we need to revalidate | |
2622 | * the PTE as someone else may have changed it. If | |
2623 | * they did, we just return, as we can count on the | |
2624 | * MMU to tell us if they didn't also make it writable. | |
2625 | */ | |
2626 | page_table = pte_offset_map_lock(mm, pmd, address, | |
2627 | &ptl); | |
b827e496 NP |
2628 | if (!pte_same(*page_table, orig_pte)) { |
2629 | unlock_page(old_page); | |
9637a5ef | 2630 | goto unlock; |
b827e496 | 2631 | } |
a200ee18 PZ |
2632 | |
2633 | page_mkwrite = 1; | |
1da177e4 | 2634 | } |
d08b3851 PZ |
2635 | dirty_page = old_page; |
2636 | get_page(dirty_page); | |
9637a5ef | 2637 | |
251b97f5 | 2638 | reuse: |
9637a5ef DH |
2639 | flush_cache_page(vma, address, pte_pfn(orig_pte)); |
2640 | entry = pte_mkyoung(orig_pte); | |
2641 | entry = maybe_mkwrite(pte_mkdirty(entry), vma); | |
954ffcb3 | 2642 | if (ptep_set_access_flags(vma, address, page_table, entry,1)) |
4b3073e1 | 2643 | update_mmu_cache(vma, address, page_table); |
72ddc8f7 | 2644 | pte_unmap_unlock(page_table, ptl); |
9637a5ef | 2645 | ret |= VM_FAULT_WRITE; |
72ddc8f7 ML |
2646 | |
2647 | if (!dirty_page) | |
2648 | return ret; | |
2649 | ||
2650 | /* | |
2651 | * Yes, Virginia, this is actually required to prevent a race | |
2652 | * with clear_page_dirty_for_io() from clearing the page dirty | |
2653 | * bit after it clear all dirty ptes, but before a racing | |
2654 | * do_wp_page installs a dirty pte. | |
2655 | * | |
a335b2e1 | 2656 | * __do_fault is protected similarly. |
72ddc8f7 ML |
2657 | */ |
2658 | if (!page_mkwrite) { | |
2659 | wait_on_page_locked(dirty_page); | |
2660 | set_page_dirty_balance(dirty_page, page_mkwrite); | |
41c4d25f JK |
2661 | /* file_update_time outside page_lock */ |
2662 | if (vma->vm_file) | |
2663 | file_update_time(vma->vm_file); | |
72ddc8f7 ML |
2664 | } |
2665 | put_page(dirty_page); | |
2666 | if (page_mkwrite) { | |
2667 | struct address_space *mapping = dirty_page->mapping; | |
2668 | ||
2669 | set_page_dirty(dirty_page); | |
2670 | unlock_page(dirty_page); | |
2671 | page_cache_release(dirty_page); | |
2672 | if (mapping) { | |
2673 | /* | |
2674 | * Some device drivers do not set page.mapping | |
2675 | * but still dirty their pages | |
2676 | */ | |
2677 | balance_dirty_pages_ratelimited(mapping); | |
2678 | } | |
2679 | } | |
2680 | ||
72ddc8f7 | 2681 | return ret; |
1da177e4 | 2682 | } |
1da177e4 LT |
2683 | |
2684 | /* | |
2685 | * Ok, we need to copy. Oh, well.. | |
2686 | */ | |
b5810039 | 2687 | page_cache_get(old_page); |
920fc356 | 2688 | gotten: |
8f4e2101 | 2689 | pte_unmap_unlock(page_table, ptl); |
1da177e4 LT |
2690 | |
2691 | if (unlikely(anon_vma_prepare(vma))) | |
65500d23 | 2692 | goto oom; |
a13ea5b7 | 2693 | |
62eede62 | 2694 | if (is_zero_pfn(pte_pfn(orig_pte))) { |
a13ea5b7 HD |
2695 | new_page = alloc_zeroed_user_highpage_movable(vma, address); |
2696 | if (!new_page) | |
2697 | goto oom; | |
2698 | } else { | |
2699 | new_page = alloc_page_vma(GFP_HIGHUSER_MOVABLE, vma, address); | |
2700 | if (!new_page) | |
2701 | goto oom; | |
2702 | cow_user_page(new_page, old_page, address, vma); | |
2703 | } | |
2704 | __SetPageUptodate(new_page); | |
2705 | ||
2c26fdd7 | 2706 | if (mem_cgroup_newpage_charge(new_page, mm, GFP_KERNEL)) |
8a9f3ccd BS |
2707 | goto oom_free_new; |
2708 | ||
6bdb913f | 2709 | mmun_start = address & PAGE_MASK; |
1756954c | 2710 | mmun_end = mmun_start + PAGE_SIZE; |
6bdb913f HE |
2711 | mmu_notifier_invalidate_range_start(mm, mmun_start, mmun_end); |
2712 | ||
1da177e4 LT |
2713 | /* |
2714 | * Re-check the pte - we dropped the lock | |
2715 | */ | |
8f4e2101 | 2716 | page_table = pte_offset_map_lock(mm, pmd, address, &ptl); |
65500d23 | 2717 | if (likely(pte_same(*page_table, orig_pte))) { |
920fc356 | 2718 | if (old_page) { |
920fc356 | 2719 | if (!PageAnon(old_page)) { |
34e55232 KH |
2720 | dec_mm_counter_fast(mm, MM_FILEPAGES); |
2721 | inc_mm_counter_fast(mm, MM_ANONPAGES); | |
920fc356 HD |
2722 | } |
2723 | } else | |
34e55232 | 2724 | inc_mm_counter_fast(mm, MM_ANONPAGES); |
eca35133 | 2725 | flush_cache_page(vma, address, pte_pfn(orig_pte)); |
65500d23 HD |
2726 | entry = mk_pte(new_page, vma->vm_page_prot); |
2727 | entry = maybe_mkwrite(pte_mkdirty(entry), vma); | |
4ce072f1 SS |
2728 | /* |
2729 | * Clear the pte entry and flush it first, before updating the | |
2730 | * pte with the new entry. This will avoid a race condition | |
2731 | * seen in the presence of one thread doing SMC and another | |
2732 | * thread doing COW. | |
2733 | */ | |
828502d3 | 2734 | ptep_clear_flush(vma, address, page_table); |
9617d95e | 2735 | page_add_new_anon_rmap(new_page, vma, address); |
828502d3 IE |
2736 | /* |
2737 | * We call the notify macro here because, when using secondary | |
2738 | * mmu page tables (such as kvm shadow page tables), we want the | |
2739 | * new page to be mapped directly into the secondary page table. | |
2740 | */ | |
2741 | set_pte_at_notify(mm, address, page_table, entry); | |
4b3073e1 | 2742 | update_mmu_cache(vma, address, page_table); |
945754a1 NP |
2743 | if (old_page) { |
2744 | /* | |
2745 | * Only after switching the pte to the new page may | |
2746 | * we remove the mapcount here. Otherwise another | |
2747 | * process may come and find the rmap count decremented | |
2748 | * before the pte is switched to the new page, and | |
2749 | * "reuse" the old page writing into it while our pte | |
2750 | * here still points into it and can be read by other | |
2751 | * threads. | |
2752 | * | |
2753 | * The critical issue is to order this | |
2754 | * page_remove_rmap with the ptp_clear_flush above. | |
2755 | * Those stores are ordered by (if nothing else,) | |
2756 | * the barrier present in the atomic_add_negative | |
2757 | * in page_remove_rmap. | |
2758 | * | |
2759 | * Then the TLB flush in ptep_clear_flush ensures that | |
2760 | * no process can access the old page before the | |
2761 | * decremented mapcount is visible. And the old page | |
2762 | * cannot be reused until after the decremented | |
2763 | * mapcount is visible. So transitively, TLBs to | |
2764 | * old page will be flushed before it can be reused. | |
2765 | */ | |
edc315fd | 2766 | page_remove_rmap(old_page); |
945754a1 NP |
2767 | } |
2768 | ||
1da177e4 LT |
2769 | /* Free the old page.. */ |
2770 | new_page = old_page; | |
f33ea7f4 | 2771 | ret |= VM_FAULT_WRITE; |
8a9f3ccd BS |
2772 | } else |
2773 | mem_cgroup_uncharge_page(new_page); | |
2774 | ||
6bdb913f HE |
2775 | if (new_page) |
2776 | page_cache_release(new_page); | |
65500d23 | 2777 | unlock: |
8f4e2101 | 2778 | pte_unmap_unlock(page_table, ptl); |
1756954c | 2779 | if (mmun_end > mmun_start) |
6bdb913f | 2780 | mmu_notifier_invalidate_range_end(mm, mmun_start, mmun_end); |
e15f8c01 ML |
2781 | if (old_page) { |
2782 | /* | |
2783 | * Don't let another task, with possibly unlocked vma, | |
2784 | * keep the mlocked page. | |
2785 | */ | |
2786 | if ((ret & VM_FAULT_WRITE) && (vma->vm_flags & VM_LOCKED)) { | |
2787 | lock_page(old_page); /* LRU manipulation */ | |
2788 | munlock_vma_page(old_page); | |
2789 | unlock_page(old_page); | |
2790 | } | |
2791 | page_cache_release(old_page); | |
2792 | } | |
f33ea7f4 | 2793 | return ret; |
8a9f3ccd | 2794 | oom_free_new: |
6dbf6d3b | 2795 | page_cache_release(new_page); |
65500d23 | 2796 | oom: |
b827e496 NP |
2797 | if (old_page) { |
2798 | if (page_mkwrite) { | |
2799 | unlock_page(old_page); | |
2800 | page_cache_release(old_page); | |
2801 | } | |
920fc356 | 2802 | page_cache_release(old_page); |
b827e496 | 2803 | } |
1da177e4 | 2804 | return VM_FAULT_OOM; |
9637a5ef DH |
2805 | |
2806 | unwritable_page: | |
2807 | page_cache_release(old_page); | |
c2ec175c | 2808 | return ret; |
1da177e4 LT |
2809 | } |
2810 | ||
97a89413 | 2811 | static void unmap_mapping_range_vma(struct vm_area_struct *vma, |
1da177e4 LT |
2812 | unsigned long start_addr, unsigned long end_addr, |
2813 | struct zap_details *details) | |
2814 | { | |
f5cc4eef | 2815 | zap_page_range_single(vma, start_addr, end_addr - start_addr, details); |
1da177e4 LT |
2816 | } |
2817 | ||
6b2dbba8 | 2818 | static inline void unmap_mapping_range_tree(struct rb_root *root, |
1da177e4 LT |
2819 | struct zap_details *details) |
2820 | { | |
2821 | struct vm_area_struct *vma; | |
1da177e4 LT |
2822 | pgoff_t vba, vea, zba, zea; |
2823 | ||
6b2dbba8 | 2824 | vma_interval_tree_foreach(vma, root, |
1da177e4 | 2825 | details->first_index, details->last_index) { |
1da177e4 LT |
2826 | |
2827 | vba = vma->vm_pgoff; | |
2828 | vea = vba + ((vma->vm_end - vma->vm_start) >> PAGE_SHIFT) - 1; | |
2829 | /* Assume for now that PAGE_CACHE_SHIFT == PAGE_SHIFT */ | |
2830 | zba = details->first_index; | |
2831 | if (zba < vba) | |
2832 | zba = vba; | |
2833 | zea = details->last_index; | |
2834 | if (zea > vea) | |
2835 | zea = vea; | |
2836 | ||
97a89413 | 2837 | unmap_mapping_range_vma(vma, |
1da177e4 LT |
2838 | ((zba - vba) << PAGE_SHIFT) + vma->vm_start, |
2839 | ((zea - vba + 1) << PAGE_SHIFT) + vma->vm_start, | |
97a89413 | 2840 | details); |
1da177e4 LT |
2841 | } |
2842 | } | |
2843 | ||
2844 | static inline void unmap_mapping_range_list(struct list_head *head, | |
2845 | struct zap_details *details) | |
2846 | { | |
2847 | struct vm_area_struct *vma; | |
2848 | ||
2849 | /* | |
2850 | * In nonlinear VMAs there is no correspondence between virtual address | |
2851 | * offset and file offset. So we must perform an exhaustive search | |
2852 | * across *all* the pages in each nonlinear VMA, not just the pages | |
2853 | * whose virtual address lies outside the file truncation point. | |
2854 | */ | |
6b2dbba8 | 2855 | list_for_each_entry(vma, head, shared.nonlinear) { |
1da177e4 | 2856 | details->nonlinear_vma = vma; |
97a89413 | 2857 | unmap_mapping_range_vma(vma, vma->vm_start, vma->vm_end, details); |
1da177e4 LT |
2858 | } |
2859 | } | |
2860 | ||
2861 | /** | |
72fd4a35 | 2862 | * unmap_mapping_range - unmap the portion of all mmaps in the specified address_space corresponding to the specified page range in the underlying file. |
3d41088f | 2863 | * @mapping: the address space containing mmaps to be unmapped. |
1da177e4 LT |
2864 | * @holebegin: byte in first page to unmap, relative to the start of |
2865 | * the underlying file. This will be rounded down to a PAGE_SIZE | |
25d9e2d1 | 2866 | * boundary. Note that this is different from truncate_pagecache(), which |
1da177e4 LT |
2867 | * must keep the partial page. In contrast, we must get rid of |
2868 | * partial pages. | |
2869 | * @holelen: size of prospective hole in bytes. This will be rounded | |
2870 | * up to a PAGE_SIZE boundary. A holelen of zero truncates to the | |
2871 | * end of the file. | |
2872 | * @even_cows: 1 when truncating a file, unmap even private COWed pages; | |
2873 | * but 0 when invalidating pagecache, don't throw away private data. | |
2874 | */ | |
2875 | void unmap_mapping_range(struct address_space *mapping, | |
2876 | loff_t const holebegin, loff_t const holelen, int even_cows) | |
2877 | { | |
2878 | struct zap_details details; | |
2879 | pgoff_t hba = holebegin >> PAGE_SHIFT; | |
2880 | pgoff_t hlen = (holelen + PAGE_SIZE - 1) >> PAGE_SHIFT; | |
2881 | ||
2882 | /* Check for overflow. */ | |
2883 | if (sizeof(holelen) > sizeof(hlen)) { | |
2884 | long long holeend = | |
2885 | (holebegin + holelen + PAGE_SIZE - 1) >> PAGE_SHIFT; | |
2886 | if (holeend & ~(long long)ULONG_MAX) | |
2887 | hlen = ULONG_MAX - hba + 1; | |
2888 | } | |
2889 | ||
2890 | details.check_mapping = even_cows? NULL: mapping; | |
2891 | details.nonlinear_vma = NULL; | |
2892 | details.first_index = hba; | |
2893 | details.last_index = hba + hlen - 1; | |
2894 | if (details.last_index < details.first_index) | |
2895 | details.last_index = ULONG_MAX; | |
1da177e4 | 2896 | |
1da177e4 | 2897 | |
3d48ae45 | 2898 | mutex_lock(&mapping->i_mmap_mutex); |
6b2dbba8 | 2899 | if (unlikely(!RB_EMPTY_ROOT(&mapping->i_mmap))) |
1da177e4 LT |
2900 | unmap_mapping_range_tree(&mapping->i_mmap, &details); |
2901 | if (unlikely(!list_empty(&mapping->i_mmap_nonlinear))) | |
2902 | unmap_mapping_range_list(&mapping->i_mmap_nonlinear, &details); | |
3d48ae45 | 2903 | mutex_unlock(&mapping->i_mmap_mutex); |
1da177e4 LT |
2904 | } |
2905 | EXPORT_SYMBOL(unmap_mapping_range); | |
2906 | ||
1da177e4 | 2907 | /* |
8f4e2101 HD |
2908 | * We enter with non-exclusive mmap_sem (to exclude vma changes, |
2909 | * but allow concurrent faults), and pte mapped but not yet locked. | |
2910 | * We return with mmap_sem still held, but pte unmapped and unlocked. | |
1da177e4 | 2911 | */ |
65500d23 HD |
2912 | static int do_swap_page(struct mm_struct *mm, struct vm_area_struct *vma, |
2913 | unsigned long address, pte_t *page_table, pmd_t *pmd, | |
30c9f3a9 | 2914 | unsigned int flags, pte_t orig_pte) |
1da177e4 | 2915 | { |
8f4e2101 | 2916 | spinlock_t *ptl; |
4969c119 | 2917 | struct page *page, *swapcache = NULL; |
65500d23 | 2918 | swp_entry_t entry; |
1da177e4 | 2919 | pte_t pte; |
d065bd81 | 2920 | int locked; |
56039efa | 2921 | struct mem_cgroup *ptr; |
ad8c2ee8 | 2922 | int exclusive = 0; |
83c54070 | 2923 | int ret = 0; |
1da177e4 | 2924 | |
4c21e2f2 | 2925 | if (!pte_unmap_same(mm, pmd, page_table, orig_pte)) |
8f4e2101 | 2926 | goto out; |
65500d23 HD |
2927 | |
2928 | entry = pte_to_swp_entry(orig_pte); | |
d1737fdb AK |
2929 | if (unlikely(non_swap_entry(entry))) { |
2930 | if (is_migration_entry(entry)) { | |
2931 | migration_entry_wait(mm, pmd, address); | |
2932 | } else if (is_hwpoison_entry(entry)) { | |
2933 | ret = VM_FAULT_HWPOISON; | |
2934 | } else { | |
2935 | print_bad_pte(vma, address, orig_pte, NULL); | |
d99be1a8 | 2936 | ret = VM_FAULT_SIGBUS; |
d1737fdb | 2937 | } |
0697212a CL |
2938 | goto out; |
2939 | } | |
0ff92245 | 2940 | delayacct_set_flag(DELAYACCT_PF_SWAPIN); |
1da177e4 LT |
2941 | page = lookup_swap_cache(entry); |
2942 | if (!page) { | |
02098fea HD |
2943 | page = swapin_readahead(entry, |
2944 | GFP_HIGHUSER_MOVABLE, vma, address); | |
1da177e4 LT |
2945 | if (!page) { |
2946 | /* | |
8f4e2101 HD |
2947 | * Back out if somebody else faulted in this pte |
2948 | * while we released the pte lock. | |
1da177e4 | 2949 | */ |
8f4e2101 | 2950 | page_table = pte_offset_map_lock(mm, pmd, address, &ptl); |
1da177e4 LT |
2951 | if (likely(pte_same(*page_table, orig_pte))) |
2952 | ret = VM_FAULT_OOM; | |
0ff92245 | 2953 | delayacct_clear_flag(DELAYACCT_PF_SWAPIN); |
65500d23 | 2954 | goto unlock; |
1da177e4 LT |
2955 | } |
2956 | ||
2957 | /* Had to read the page from swap area: Major fault */ | |
2958 | ret = VM_FAULT_MAJOR; | |
f8891e5e | 2959 | count_vm_event(PGMAJFAULT); |
456f998e | 2960 | mem_cgroup_count_vm_event(mm, PGMAJFAULT); |
d1737fdb | 2961 | } else if (PageHWPoison(page)) { |
71f72525 WF |
2962 | /* |
2963 | * hwpoisoned dirty swapcache pages are kept for killing | |
2964 | * owner processes (which may be unknown at hwpoison time) | |
2965 | */ | |
d1737fdb AK |
2966 | ret = VM_FAULT_HWPOISON; |
2967 | delayacct_clear_flag(DELAYACCT_PF_SWAPIN); | |
4779cb31 | 2968 | goto out_release; |
1da177e4 LT |
2969 | } |
2970 | ||
d065bd81 | 2971 | locked = lock_page_or_retry(page, mm, flags); |
e709ffd6 | 2972 | |
073e587e | 2973 | delayacct_clear_flag(DELAYACCT_PF_SWAPIN); |
d065bd81 ML |
2974 | if (!locked) { |
2975 | ret |= VM_FAULT_RETRY; | |
2976 | goto out_release; | |
2977 | } | |
073e587e | 2978 | |
4969c119 | 2979 | /* |
31c4a3d3 HD |
2980 | * Make sure try_to_free_swap or reuse_swap_page or swapoff did not |
2981 | * release the swapcache from under us. The page pin, and pte_same | |
2982 | * test below, are not enough to exclude that. Even if it is still | |
2983 | * swapcache, we need to check that the page's swap has not changed. | |
4969c119 | 2984 | */ |
31c4a3d3 | 2985 | if (unlikely(!PageSwapCache(page) || page_private(page) != entry.val)) |
4969c119 AA |
2986 | goto out_page; |
2987 | ||
2988 | if (ksm_might_need_to_copy(page, vma, address)) { | |
2989 | swapcache = page; | |
2990 | page = ksm_does_need_to_copy(page, vma, address); | |
2991 | ||
2992 | if (unlikely(!page)) { | |
2993 | ret = VM_FAULT_OOM; | |
2994 | page = swapcache; | |
2995 | swapcache = NULL; | |
2996 | goto out_page; | |
2997 | } | |
5ad64688 HD |
2998 | } |
2999 | ||
2c26fdd7 | 3000 | if (mem_cgroup_try_charge_swapin(mm, page, GFP_KERNEL, &ptr)) { |
8a9f3ccd | 3001 | ret = VM_FAULT_OOM; |
bc43f75c | 3002 | goto out_page; |
8a9f3ccd BS |
3003 | } |
3004 | ||
1da177e4 | 3005 | /* |
8f4e2101 | 3006 | * Back out if somebody else already faulted in this pte. |
1da177e4 | 3007 | */ |
8f4e2101 | 3008 | page_table = pte_offset_map_lock(mm, pmd, address, &ptl); |
9e9bef07 | 3009 | if (unlikely(!pte_same(*page_table, orig_pte))) |
b8107480 | 3010 | goto out_nomap; |
b8107480 KK |
3011 | |
3012 | if (unlikely(!PageUptodate(page))) { | |
3013 | ret = VM_FAULT_SIGBUS; | |
3014 | goto out_nomap; | |
1da177e4 LT |
3015 | } |
3016 | ||
8c7c6e34 KH |
3017 | /* |
3018 | * The page isn't present yet, go ahead with the fault. | |
3019 | * | |
3020 | * Be careful about the sequence of operations here. | |
3021 | * To get its accounting right, reuse_swap_page() must be called | |
3022 | * while the page is counted on swap but not yet in mapcount i.e. | |
3023 | * before page_add_anon_rmap() and swap_free(); try_to_free_swap() | |
3024 | * must be called after the swap_free(), or it will never succeed. | |
03f3c433 KH |
3025 | * Because delete_from_swap_page() may be called by reuse_swap_page(), |
3026 | * mem_cgroup_commit_charge_swapin() may not be able to find swp_entry | |
3027 | * in page->private. In this case, a record in swap_cgroup is silently | |
3028 | * discarded at swap_free(). | |
8c7c6e34 | 3029 | */ |
1da177e4 | 3030 | |
34e55232 | 3031 | inc_mm_counter_fast(mm, MM_ANONPAGES); |
b084d435 | 3032 | dec_mm_counter_fast(mm, MM_SWAPENTS); |
1da177e4 | 3033 | pte = mk_pte(page, vma->vm_page_prot); |
30c9f3a9 | 3034 | if ((flags & FAULT_FLAG_WRITE) && reuse_swap_page(page)) { |
1da177e4 | 3035 | pte = maybe_mkwrite(pte_mkdirty(pte), vma); |
30c9f3a9 | 3036 | flags &= ~FAULT_FLAG_WRITE; |
9a5b489b | 3037 | ret |= VM_FAULT_WRITE; |
ad8c2ee8 | 3038 | exclusive = 1; |
1da177e4 | 3039 | } |
1da177e4 LT |
3040 | flush_icache_page(vma, page); |
3041 | set_pte_at(mm, address, page_table, pte); | |
ad8c2ee8 | 3042 | do_page_add_anon_rmap(page, vma, address, exclusive); |
03f3c433 KH |
3043 | /* It's better to call commit-charge after rmap is established */ |
3044 | mem_cgroup_commit_charge_swapin(page, ptr); | |
1da177e4 | 3045 | |
c475a8ab | 3046 | swap_free(entry); |
b291f000 | 3047 | if (vm_swap_full() || (vma->vm_flags & VM_LOCKED) || PageMlocked(page)) |
a2c43eed | 3048 | try_to_free_swap(page); |
c475a8ab | 3049 | unlock_page(page); |
4969c119 AA |
3050 | if (swapcache) { |
3051 | /* | |
3052 | * Hold the lock to avoid the swap entry to be reused | |
3053 | * until we take the PT lock for the pte_same() check | |
3054 | * (to avoid false positives from pte_same). For | |
3055 | * further safety release the lock after the swap_free | |
3056 | * so that the swap count won't change under a | |
3057 | * parallel locked swapcache. | |
3058 | */ | |
3059 | unlock_page(swapcache); | |
3060 | page_cache_release(swapcache); | |
3061 | } | |
c475a8ab | 3062 | |
30c9f3a9 | 3063 | if (flags & FAULT_FLAG_WRITE) { |
61469f1d HD |
3064 | ret |= do_wp_page(mm, vma, address, page_table, pmd, ptl, pte); |
3065 | if (ret & VM_FAULT_ERROR) | |
3066 | ret &= VM_FAULT_ERROR; | |
1da177e4 LT |
3067 | goto out; |
3068 | } | |
3069 | ||
3070 | /* No need to invalidate - it was non-present before */ | |
4b3073e1 | 3071 | update_mmu_cache(vma, address, page_table); |
65500d23 | 3072 | unlock: |
8f4e2101 | 3073 | pte_unmap_unlock(page_table, ptl); |
1da177e4 LT |
3074 | out: |
3075 | return ret; | |
b8107480 | 3076 | out_nomap: |
7a81b88c | 3077 | mem_cgroup_cancel_charge_swapin(ptr); |
8f4e2101 | 3078 | pte_unmap_unlock(page_table, ptl); |
bc43f75c | 3079 | out_page: |
b8107480 | 3080 | unlock_page(page); |
4779cb31 | 3081 | out_release: |
b8107480 | 3082 | page_cache_release(page); |
4969c119 AA |
3083 | if (swapcache) { |
3084 | unlock_page(swapcache); | |
3085 | page_cache_release(swapcache); | |
3086 | } | |
65500d23 | 3087 | return ret; |
1da177e4 LT |
3088 | } |
3089 | ||
320b2b8d | 3090 | /* |
8ca3eb08 TL |
3091 | * This is like a special single-page "expand_{down|up}wards()", |
3092 | * except we must first make sure that 'address{-|+}PAGE_SIZE' | |
320b2b8d | 3093 | * doesn't hit another vma. |
320b2b8d LT |
3094 | */ |
3095 | static inline int check_stack_guard_page(struct vm_area_struct *vma, unsigned long address) | |
3096 | { | |
3097 | address &= PAGE_MASK; | |
3098 | if ((vma->vm_flags & VM_GROWSDOWN) && address == vma->vm_start) { | |
0e8e50e2 LT |
3099 | struct vm_area_struct *prev = vma->vm_prev; |
3100 | ||
3101 | /* | |
3102 | * Is there a mapping abutting this one below? | |
3103 | * | |
3104 | * That's only ok if it's the same stack mapping | |
3105 | * that has gotten split.. | |
3106 | */ | |
3107 | if (prev && prev->vm_end == address) | |
3108 | return prev->vm_flags & VM_GROWSDOWN ? 0 : -ENOMEM; | |
320b2b8d | 3109 | |
d05f3169 | 3110 | expand_downwards(vma, address - PAGE_SIZE); |
320b2b8d | 3111 | } |
8ca3eb08 TL |
3112 | if ((vma->vm_flags & VM_GROWSUP) && address + PAGE_SIZE == vma->vm_end) { |
3113 | struct vm_area_struct *next = vma->vm_next; | |
3114 | ||
3115 | /* As VM_GROWSDOWN but s/below/above/ */ | |
3116 | if (next && next->vm_start == address + PAGE_SIZE) | |
3117 | return next->vm_flags & VM_GROWSUP ? 0 : -ENOMEM; | |
3118 | ||
3119 | expand_upwards(vma, address + PAGE_SIZE); | |
3120 | } | |
320b2b8d LT |
3121 | return 0; |
3122 | } | |
3123 | ||
1da177e4 | 3124 | /* |
8f4e2101 HD |
3125 | * We enter with non-exclusive mmap_sem (to exclude vma changes, |
3126 | * but allow concurrent faults), and pte mapped but not yet locked. | |
3127 | * We return with mmap_sem still held, but pte unmapped and unlocked. | |
1da177e4 | 3128 | */ |
65500d23 HD |
3129 | static int do_anonymous_page(struct mm_struct *mm, struct vm_area_struct *vma, |
3130 | unsigned long address, pte_t *page_table, pmd_t *pmd, | |
30c9f3a9 | 3131 | unsigned int flags) |
1da177e4 | 3132 | { |
8f4e2101 HD |
3133 | struct page *page; |
3134 | spinlock_t *ptl; | |
1da177e4 | 3135 | pte_t entry; |
1da177e4 | 3136 | |
11ac5524 LT |
3137 | pte_unmap(page_table); |
3138 | ||
3139 | /* Check if we need to add a guard page to the stack */ | |
3140 | if (check_stack_guard_page(vma, address) < 0) | |
320b2b8d LT |
3141 | return VM_FAULT_SIGBUS; |
3142 | ||
11ac5524 | 3143 | /* Use the zero-page for reads */ |
62eede62 HD |
3144 | if (!(flags & FAULT_FLAG_WRITE)) { |
3145 | entry = pte_mkspecial(pfn_pte(my_zero_pfn(address), | |
3146 | vma->vm_page_prot)); | |
11ac5524 | 3147 | page_table = pte_offset_map_lock(mm, pmd, address, &ptl); |
a13ea5b7 HD |
3148 | if (!pte_none(*page_table)) |
3149 | goto unlock; | |
3150 | goto setpte; | |
3151 | } | |
3152 | ||
557ed1fa | 3153 | /* Allocate our own private page. */ |
557ed1fa NP |
3154 | if (unlikely(anon_vma_prepare(vma))) |
3155 | goto oom; | |
3156 | page = alloc_zeroed_user_highpage_movable(vma, address); | |
3157 | if (!page) | |
3158 | goto oom; | |
0ed361de | 3159 | __SetPageUptodate(page); |
8f4e2101 | 3160 | |
2c26fdd7 | 3161 | if (mem_cgroup_newpage_charge(page, mm, GFP_KERNEL)) |
8a9f3ccd BS |
3162 | goto oom_free_page; |
3163 | ||
557ed1fa | 3164 | entry = mk_pte(page, vma->vm_page_prot); |
1ac0cb5d HD |
3165 | if (vma->vm_flags & VM_WRITE) |
3166 | entry = pte_mkwrite(pte_mkdirty(entry)); | |
1da177e4 | 3167 | |
557ed1fa | 3168 | page_table = pte_offset_map_lock(mm, pmd, address, &ptl); |
1c2fb7a4 | 3169 | if (!pte_none(*page_table)) |
557ed1fa | 3170 | goto release; |
9ba69294 | 3171 | |
34e55232 | 3172 | inc_mm_counter_fast(mm, MM_ANONPAGES); |
557ed1fa | 3173 | page_add_new_anon_rmap(page, vma, address); |
a13ea5b7 | 3174 | setpte: |
65500d23 | 3175 | set_pte_at(mm, address, page_table, entry); |
1da177e4 LT |
3176 | |
3177 | /* No need to invalidate - it was non-present before */ | |
4b3073e1 | 3178 | update_mmu_cache(vma, address, page_table); |
65500d23 | 3179 | unlock: |
8f4e2101 | 3180 | pte_unmap_unlock(page_table, ptl); |
83c54070 | 3181 | return 0; |
8f4e2101 | 3182 | release: |
8a9f3ccd | 3183 | mem_cgroup_uncharge_page(page); |
8f4e2101 HD |
3184 | page_cache_release(page); |
3185 | goto unlock; | |
8a9f3ccd | 3186 | oom_free_page: |
6dbf6d3b | 3187 | page_cache_release(page); |
65500d23 | 3188 | oom: |
1da177e4 LT |
3189 | return VM_FAULT_OOM; |
3190 | } | |
3191 | ||
3192 | /* | |
54cb8821 | 3193 | * __do_fault() tries to create a new page mapping. It aggressively |
1da177e4 | 3194 | * tries to share with existing pages, but makes a separate copy if |
54cb8821 NP |
3195 | * the FAULT_FLAG_WRITE is set in the flags parameter in order to avoid |
3196 | * the next page fault. | |
1da177e4 LT |
3197 | * |
3198 | * As this is called only for pages that do not currently exist, we | |
3199 | * do not need to flush old virtual caches or the TLB. | |
3200 | * | |
8f4e2101 | 3201 | * We enter with non-exclusive mmap_sem (to exclude vma changes, |
16abfa08 | 3202 | * but allow concurrent faults), and pte neither mapped nor locked. |
8f4e2101 | 3203 | * We return with mmap_sem still held, but pte unmapped and unlocked. |
1da177e4 | 3204 | */ |
54cb8821 | 3205 | static int __do_fault(struct mm_struct *mm, struct vm_area_struct *vma, |
16abfa08 | 3206 | unsigned long address, pmd_t *pmd, |
54cb8821 | 3207 | pgoff_t pgoff, unsigned int flags, pte_t orig_pte) |
1da177e4 | 3208 | { |
16abfa08 | 3209 | pte_t *page_table; |
8f4e2101 | 3210 | spinlock_t *ptl; |
d0217ac0 | 3211 | struct page *page; |
1d65f86d | 3212 | struct page *cow_page; |
1da177e4 | 3213 | pte_t entry; |
1da177e4 | 3214 | int anon = 0; |
d08b3851 | 3215 | struct page *dirty_page = NULL; |
d0217ac0 NP |
3216 | struct vm_fault vmf; |
3217 | int ret; | |
a200ee18 | 3218 | int page_mkwrite = 0; |
54cb8821 | 3219 | |
1d65f86d KH |
3220 | /* |
3221 | * If we do COW later, allocate page befor taking lock_page() | |
3222 | * on the file cache page. This will reduce lock holding time. | |
3223 | */ | |
3224 | if ((flags & FAULT_FLAG_WRITE) && !(vma->vm_flags & VM_SHARED)) { | |
3225 | ||
3226 | if (unlikely(anon_vma_prepare(vma))) | |
3227 | return VM_FAULT_OOM; | |
3228 | ||
3229 | cow_page = alloc_page_vma(GFP_HIGHUSER_MOVABLE, vma, address); | |
3230 | if (!cow_page) | |
3231 | return VM_FAULT_OOM; | |
3232 | ||
3233 | if (mem_cgroup_newpage_charge(cow_page, mm, GFP_KERNEL)) { | |
3234 | page_cache_release(cow_page); | |
3235 | return VM_FAULT_OOM; | |
3236 | } | |
3237 | } else | |
3238 | cow_page = NULL; | |
3239 | ||
d0217ac0 NP |
3240 | vmf.virtual_address = (void __user *)(address & PAGE_MASK); |
3241 | vmf.pgoff = pgoff; | |
3242 | vmf.flags = flags; | |
3243 | vmf.page = NULL; | |
1da177e4 | 3244 | |
3c18ddd1 | 3245 | ret = vma->vm_ops->fault(vma, &vmf); |
d065bd81 ML |
3246 | if (unlikely(ret & (VM_FAULT_ERROR | VM_FAULT_NOPAGE | |
3247 | VM_FAULT_RETRY))) | |
1d65f86d | 3248 | goto uncharge_out; |
1da177e4 | 3249 | |
a3b947ea AK |
3250 | if (unlikely(PageHWPoison(vmf.page))) { |
3251 | if (ret & VM_FAULT_LOCKED) | |
3252 | unlock_page(vmf.page); | |
1d65f86d KH |
3253 | ret = VM_FAULT_HWPOISON; |
3254 | goto uncharge_out; | |
a3b947ea AK |
3255 | } |
3256 | ||
d00806b1 | 3257 | /* |
d0217ac0 | 3258 | * For consistency in subsequent calls, make the faulted page always |
d00806b1 NP |
3259 | * locked. |
3260 | */ | |
83c54070 | 3261 | if (unlikely(!(ret & VM_FAULT_LOCKED))) |
d0217ac0 | 3262 | lock_page(vmf.page); |
54cb8821 | 3263 | else |
d0217ac0 | 3264 | VM_BUG_ON(!PageLocked(vmf.page)); |
d00806b1 | 3265 | |
1da177e4 LT |
3266 | /* |
3267 | * Should we do an early C-O-W break? | |
3268 | */ | |
d0217ac0 | 3269 | page = vmf.page; |
54cb8821 | 3270 | if (flags & FAULT_FLAG_WRITE) { |
9637a5ef | 3271 | if (!(vma->vm_flags & VM_SHARED)) { |
1d65f86d | 3272 | page = cow_page; |
54cb8821 | 3273 | anon = 1; |
d0217ac0 | 3274 | copy_user_highpage(page, vmf.page, address, vma); |
0ed361de | 3275 | __SetPageUptodate(page); |
9637a5ef | 3276 | } else { |
54cb8821 NP |
3277 | /* |
3278 | * If the page will be shareable, see if the backing | |
9637a5ef | 3279 | * address space wants to know that the page is about |
54cb8821 NP |
3280 | * to become writable |
3281 | */ | |
69676147 | 3282 | if (vma->vm_ops->page_mkwrite) { |
c2ec175c NP |
3283 | int tmp; |
3284 | ||
69676147 | 3285 | unlock_page(page); |
b827e496 | 3286 | vmf.flags = FAULT_FLAG_WRITE|FAULT_FLAG_MKWRITE; |
c2ec175c NP |
3287 | tmp = vma->vm_ops->page_mkwrite(vma, &vmf); |
3288 | if (unlikely(tmp & | |
3289 | (VM_FAULT_ERROR | VM_FAULT_NOPAGE))) { | |
3290 | ret = tmp; | |
b827e496 | 3291 | goto unwritable_page; |
d0217ac0 | 3292 | } |
b827e496 NP |
3293 | if (unlikely(!(tmp & VM_FAULT_LOCKED))) { |
3294 | lock_page(page); | |
3295 | if (!page->mapping) { | |
3296 | ret = 0; /* retry the fault */ | |
3297 | unlock_page(page); | |
3298 | goto unwritable_page; | |
3299 | } | |
3300 | } else | |
3301 | VM_BUG_ON(!PageLocked(page)); | |
a200ee18 | 3302 | page_mkwrite = 1; |
9637a5ef DH |
3303 | } |
3304 | } | |
54cb8821 | 3305 | |
1da177e4 LT |
3306 | } |
3307 | ||
8f4e2101 | 3308 | page_table = pte_offset_map_lock(mm, pmd, address, &ptl); |
1da177e4 LT |
3309 | |
3310 | /* | |
3311 | * This silly early PAGE_DIRTY setting removes a race | |
3312 | * due to the bad i386 page protection. But it's valid | |
3313 | * for other architectures too. | |
3314 | * | |
30c9f3a9 | 3315 | * Note that if FAULT_FLAG_WRITE is set, we either now have |
1da177e4 LT |
3316 | * an exclusive copy of the page, or this is a shared mapping, |
3317 | * so we can make it writable and dirty to avoid having to | |
3318 | * handle that later. | |
3319 | */ | |
3320 | /* Only go through if we didn't race with anybody else... */ | |
1c2fb7a4 | 3321 | if (likely(pte_same(*page_table, orig_pte))) { |
d00806b1 NP |
3322 | flush_icache_page(vma, page); |
3323 | entry = mk_pte(page, vma->vm_page_prot); | |
54cb8821 | 3324 | if (flags & FAULT_FLAG_WRITE) |
1da177e4 | 3325 | entry = maybe_mkwrite(pte_mkdirty(entry), vma); |
1da177e4 | 3326 | if (anon) { |
34e55232 | 3327 | inc_mm_counter_fast(mm, MM_ANONPAGES); |
64d6519d | 3328 | page_add_new_anon_rmap(page, vma, address); |
f57e88a8 | 3329 | } else { |
34e55232 | 3330 | inc_mm_counter_fast(mm, MM_FILEPAGES); |
d00806b1 | 3331 | page_add_file_rmap(page); |
54cb8821 | 3332 | if (flags & FAULT_FLAG_WRITE) { |
d00806b1 | 3333 | dirty_page = page; |
d08b3851 PZ |
3334 | get_page(dirty_page); |
3335 | } | |
4294621f | 3336 | } |
64d6519d | 3337 | set_pte_at(mm, address, page_table, entry); |
d00806b1 NP |
3338 | |
3339 | /* no need to invalidate: a not-present page won't be cached */ | |
4b3073e1 | 3340 | update_mmu_cache(vma, address, page_table); |
1da177e4 | 3341 | } else { |
1d65f86d KH |
3342 | if (cow_page) |
3343 | mem_cgroup_uncharge_page(cow_page); | |
d00806b1 NP |
3344 | if (anon) |
3345 | page_cache_release(page); | |
3346 | else | |
54cb8821 | 3347 | anon = 1; /* no anon but release faulted_page */ |
1da177e4 LT |
3348 | } |
3349 | ||
8f4e2101 | 3350 | pte_unmap_unlock(page_table, ptl); |
d00806b1 | 3351 | |
b827e496 NP |
3352 | if (dirty_page) { |
3353 | struct address_space *mapping = page->mapping; | |
41c4d25f | 3354 | int dirtied = 0; |
8f7b3d15 | 3355 | |
b827e496 | 3356 | if (set_page_dirty(dirty_page)) |
41c4d25f | 3357 | dirtied = 1; |
b827e496 | 3358 | unlock_page(dirty_page); |
d08b3851 | 3359 | put_page(dirty_page); |
41c4d25f | 3360 | if ((dirtied || page_mkwrite) && mapping) { |
b827e496 NP |
3361 | /* |
3362 | * Some device drivers do not set page.mapping but still | |
3363 | * dirty their pages | |
3364 | */ | |
3365 | balance_dirty_pages_ratelimited(mapping); | |
3366 | } | |
3367 | ||
3368 | /* file_update_time outside page_lock */ | |
41c4d25f | 3369 | if (vma->vm_file && !page_mkwrite) |
b827e496 NP |
3370 | file_update_time(vma->vm_file); |
3371 | } else { | |
3372 | unlock_page(vmf.page); | |
3373 | if (anon) | |
3374 | page_cache_release(vmf.page); | |
d08b3851 | 3375 | } |
d00806b1 | 3376 | |
83c54070 | 3377 | return ret; |
b827e496 NP |
3378 | |
3379 | unwritable_page: | |
3380 | page_cache_release(page); | |
3381 | return ret; | |
1d65f86d KH |
3382 | uncharge_out: |
3383 | /* fs's fault handler get error */ | |
3384 | if (cow_page) { | |
3385 | mem_cgroup_uncharge_page(cow_page); | |
3386 | page_cache_release(cow_page); | |
3387 | } | |
3388 | return ret; | |
54cb8821 | 3389 | } |
d00806b1 | 3390 | |
54cb8821 NP |
3391 | static int do_linear_fault(struct mm_struct *mm, struct vm_area_struct *vma, |
3392 | unsigned long address, pte_t *page_table, pmd_t *pmd, | |
30c9f3a9 | 3393 | unsigned int flags, pte_t orig_pte) |
54cb8821 NP |
3394 | { |
3395 | pgoff_t pgoff = (((address & PAGE_MASK) | |
0da7e01f | 3396 | - vma->vm_start) >> PAGE_SHIFT) + vma->vm_pgoff; |
54cb8821 | 3397 | |
16abfa08 HD |
3398 | pte_unmap(page_table); |
3399 | return __do_fault(mm, vma, address, pmd, pgoff, flags, orig_pte); | |
54cb8821 NP |
3400 | } |
3401 | ||
1da177e4 LT |
3402 | /* |
3403 | * Fault of a previously existing named mapping. Repopulate the pte | |
3404 | * from the encoded file_pte if possible. This enables swappable | |
3405 | * nonlinear vmas. | |
8f4e2101 HD |
3406 | * |
3407 | * We enter with non-exclusive mmap_sem (to exclude vma changes, | |
3408 | * but allow concurrent faults), and pte mapped but not yet locked. | |
3409 | * We return with mmap_sem still held, but pte unmapped and unlocked. | |
1da177e4 | 3410 | */ |
d0217ac0 | 3411 | static int do_nonlinear_fault(struct mm_struct *mm, struct vm_area_struct *vma, |
65500d23 | 3412 | unsigned long address, pte_t *page_table, pmd_t *pmd, |
30c9f3a9 | 3413 | unsigned int flags, pte_t orig_pte) |
1da177e4 | 3414 | { |
65500d23 | 3415 | pgoff_t pgoff; |
1da177e4 | 3416 | |
30c9f3a9 LT |
3417 | flags |= FAULT_FLAG_NONLINEAR; |
3418 | ||
4c21e2f2 | 3419 | if (!pte_unmap_same(mm, pmd, page_table, orig_pte)) |
83c54070 | 3420 | return 0; |
1da177e4 | 3421 | |
2509ef26 | 3422 | if (unlikely(!(vma->vm_flags & VM_NONLINEAR))) { |
65500d23 HD |
3423 | /* |
3424 | * Page table corrupted: show pte and kill process. | |
3425 | */ | |
3dc14741 | 3426 | print_bad_pte(vma, address, orig_pte, NULL); |
d99be1a8 | 3427 | return VM_FAULT_SIGBUS; |
65500d23 | 3428 | } |
65500d23 HD |
3429 | |
3430 | pgoff = pte_to_pgoff(orig_pte); | |
16abfa08 | 3431 | return __do_fault(mm, vma, address, pmd, pgoff, flags, orig_pte); |
1da177e4 LT |
3432 | } |
3433 | ||
3434 | /* | |
3435 | * These routines also need to handle stuff like marking pages dirty | |
3436 | * and/or accessed for architectures that don't do it in hardware (most | |
3437 | * RISC architectures). The early dirtying is also good on the i386. | |
3438 | * | |
3439 | * There is also a hook called "update_mmu_cache()" that architectures | |
3440 | * with external mmu caches can use to update those (ie the Sparc or | |
3441 | * PowerPC hashed page tables that act as extended TLBs). | |
3442 | * | |
c74df32c HD |
3443 | * We enter with non-exclusive mmap_sem (to exclude vma changes, |
3444 | * but allow concurrent faults), and pte mapped but not yet locked. | |
3445 | * We return with mmap_sem still held, but pte unmapped and unlocked. | |
1da177e4 | 3446 | */ |
71e3aac0 AA |
3447 | int handle_pte_fault(struct mm_struct *mm, |
3448 | struct vm_area_struct *vma, unsigned long address, | |
3449 | pte_t *pte, pmd_t *pmd, unsigned int flags) | |
1da177e4 LT |
3450 | { |
3451 | pte_t entry; | |
8f4e2101 | 3452 | spinlock_t *ptl; |
1da177e4 | 3453 | |
8dab5241 | 3454 | entry = *pte; |
1da177e4 | 3455 | if (!pte_present(entry)) { |
65500d23 | 3456 | if (pte_none(entry)) { |
f4b81804 | 3457 | if (vma->vm_ops) { |
3c18ddd1 | 3458 | if (likely(vma->vm_ops->fault)) |
54cb8821 | 3459 | return do_linear_fault(mm, vma, address, |
30c9f3a9 | 3460 | pte, pmd, flags, entry); |
f4b81804 JS |
3461 | } |
3462 | return do_anonymous_page(mm, vma, address, | |
30c9f3a9 | 3463 | pte, pmd, flags); |
65500d23 | 3464 | } |
1da177e4 | 3465 | if (pte_file(entry)) |
d0217ac0 | 3466 | return do_nonlinear_fault(mm, vma, address, |
30c9f3a9 | 3467 | pte, pmd, flags, entry); |
65500d23 | 3468 | return do_swap_page(mm, vma, address, |
30c9f3a9 | 3469 | pte, pmd, flags, entry); |
1da177e4 LT |
3470 | } |
3471 | ||
4c21e2f2 | 3472 | ptl = pte_lockptr(mm, pmd); |
8f4e2101 HD |
3473 | spin_lock(ptl); |
3474 | if (unlikely(!pte_same(*pte, entry))) | |
3475 | goto unlock; | |
30c9f3a9 | 3476 | if (flags & FAULT_FLAG_WRITE) { |
1da177e4 | 3477 | if (!pte_write(entry)) |
8f4e2101 HD |
3478 | return do_wp_page(mm, vma, address, |
3479 | pte, pmd, ptl, entry); | |
1da177e4 LT |
3480 | entry = pte_mkdirty(entry); |
3481 | } | |
3482 | entry = pte_mkyoung(entry); | |
30c9f3a9 | 3483 | if (ptep_set_access_flags(vma, address, pte, entry, flags & FAULT_FLAG_WRITE)) { |
4b3073e1 | 3484 | update_mmu_cache(vma, address, pte); |
1a44e149 AA |
3485 | } else { |
3486 | /* | |
3487 | * This is needed only for protection faults but the arch code | |
3488 | * is not yet telling us if this is a protection fault or not. | |
3489 | * This still avoids useless tlb flushes for .text page faults | |
3490 | * with threads. | |
3491 | */ | |
30c9f3a9 | 3492 | if (flags & FAULT_FLAG_WRITE) |
61c77326 | 3493 | flush_tlb_fix_spurious_fault(vma, address); |
1a44e149 | 3494 | } |
8f4e2101 HD |
3495 | unlock: |
3496 | pte_unmap_unlock(pte, ptl); | |
83c54070 | 3497 | return 0; |
1da177e4 LT |
3498 | } |
3499 | ||
3500 | /* | |
3501 | * By the time we get here, we already hold the mm semaphore | |
3502 | */ | |
83c54070 | 3503 | int handle_mm_fault(struct mm_struct *mm, struct vm_area_struct *vma, |
d06063cc | 3504 | unsigned long address, unsigned int flags) |
1da177e4 LT |
3505 | { |
3506 | pgd_t *pgd; | |
3507 | pud_t *pud; | |
3508 | pmd_t *pmd; | |
3509 | pte_t *pte; | |
3510 | ||
3511 | __set_current_state(TASK_RUNNING); | |
3512 | ||
f8891e5e | 3513 | count_vm_event(PGFAULT); |
456f998e | 3514 | mem_cgroup_count_vm_event(mm, PGFAULT); |
1da177e4 | 3515 | |
34e55232 KH |
3516 | /* do counter updates before entering really critical section. */ |
3517 | check_sync_rss_stat(current); | |
3518 | ||
ac9b9c66 | 3519 | if (unlikely(is_vm_hugetlb_page(vma))) |
30c9f3a9 | 3520 | return hugetlb_fault(mm, vma, address, flags); |
1da177e4 | 3521 | |
1f1d06c3 | 3522 | retry: |
1da177e4 | 3523 | pgd = pgd_offset(mm, address); |
1da177e4 LT |
3524 | pud = pud_alloc(mm, pgd, address); |
3525 | if (!pud) | |
c74df32c | 3526 | return VM_FAULT_OOM; |
1da177e4 LT |
3527 | pmd = pmd_alloc(mm, pud, address); |
3528 | if (!pmd) | |
c74df32c | 3529 | return VM_FAULT_OOM; |
71e3aac0 AA |
3530 | if (pmd_none(*pmd) && transparent_hugepage_enabled(vma)) { |
3531 | if (!vma->vm_ops) | |
3532 | return do_huge_pmd_anonymous_page(mm, vma, address, | |
3533 | pmd, flags); | |
3534 | } else { | |
3535 | pmd_t orig_pmd = *pmd; | |
1f1d06c3 DR |
3536 | int ret; |
3537 | ||
71e3aac0 AA |
3538 | barrier(); |
3539 | if (pmd_trans_huge(orig_pmd)) { | |
3540 | if (flags & FAULT_FLAG_WRITE && | |
3541 | !pmd_write(orig_pmd) && | |
1f1d06c3 DR |
3542 | !pmd_trans_splitting(orig_pmd)) { |
3543 | ret = do_huge_pmd_wp_page(mm, vma, address, pmd, | |
3544 | orig_pmd); | |
3545 | /* | |
3546 | * If COW results in an oom, the huge pmd will | |
3547 | * have been split, so retry the fault on the | |
3548 | * pte for a smaller charge. | |
3549 | */ | |
3550 | if (unlikely(ret & VM_FAULT_OOM)) | |
3551 | goto retry; | |
3552 | return ret; | |
3553 | } | |
71e3aac0 AA |
3554 | return 0; |
3555 | } | |
3556 | } | |
3557 | ||
3558 | /* | |
3559 | * Use __pte_alloc instead of pte_alloc_map, because we can't | |
3560 | * run pte_offset_map on the pmd, if an huge pmd could | |
3561 | * materialize from under us from a different thread. | |
3562 | */ | |
4fd01770 MG |
3563 | if (unlikely(pmd_none(*pmd)) && |
3564 | unlikely(__pte_alloc(mm, vma, pmd, address))) | |
c74df32c | 3565 | return VM_FAULT_OOM; |
71e3aac0 AA |
3566 | /* if an huge pmd materialized from under us just retry later */ |
3567 | if (unlikely(pmd_trans_huge(*pmd))) | |
3568 | return 0; | |
3569 | /* | |
3570 | * A regular pmd is established and it can't morph into a huge pmd | |
3571 | * from under us anymore at this point because we hold the mmap_sem | |
3572 | * read mode and khugepaged takes it in write mode. So now it's | |
3573 | * safe to run pte_offset_map(). | |
3574 | */ | |
3575 | pte = pte_offset_map(pmd, address); | |
1da177e4 | 3576 | |
30c9f3a9 | 3577 | return handle_pte_fault(mm, vma, address, pte, pmd, flags); |
1da177e4 LT |
3578 | } |
3579 | ||
3580 | #ifndef __PAGETABLE_PUD_FOLDED | |
3581 | /* | |
3582 | * Allocate page upper directory. | |
872fec16 | 3583 | * We've already handled the fast-path in-line. |
1da177e4 | 3584 | */ |
1bb3630e | 3585 | int __pud_alloc(struct mm_struct *mm, pgd_t *pgd, unsigned long address) |
1da177e4 | 3586 | { |
c74df32c HD |
3587 | pud_t *new = pud_alloc_one(mm, address); |
3588 | if (!new) | |
1bb3630e | 3589 | return -ENOMEM; |
1da177e4 | 3590 | |
362a61ad NP |
3591 | smp_wmb(); /* See comment in __pte_alloc */ |
3592 | ||
872fec16 | 3593 | spin_lock(&mm->page_table_lock); |
1bb3630e | 3594 | if (pgd_present(*pgd)) /* Another has populated it */ |
5e541973 | 3595 | pud_free(mm, new); |
1bb3630e HD |
3596 | else |
3597 | pgd_populate(mm, pgd, new); | |
c74df32c | 3598 | spin_unlock(&mm->page_table_lock); |
1bb3630e | 3599 | return 0; |
1da177e4 LT |
3600 | } |
3601 | #endif /* __PAGETABLE_PUD_FOLDED */ | |
3602 | ||
3603 | #ifndef __PAGETABLE_PMD_FOLDED | |
3604 | /* | |
3605 | * Allocate page middle directory. | |
872fec16 | 3606 | * We've already handled the fast-path in-line. |
1da177e4 | 3607 | */ |
1bb3630e | 3608 | int __pmd_alloc(struct mm_struct *mm, pud_t *pud, unsigned long address) |
1da177e4 | 3609 | { |
c74df32c HD |
3610 | pmd_t *new = pmd_alloc_one(mm, address); |
3611 | if (!new) | |
1bb3630e | 3612 | return -ENOMEM; |
1da177e4 | 3613 | |
362a61ad NP |
3614 | smp_wmb(); /* See comment in __pte_alloc */ |
3615 | ||
872fec16 | 3616 | spin_lock(&mm->page_table_lock); |
1da177e4 | 3617 | #ifndef __ARCH_HAS_4LEVEL_HACK |
1bb3630e | 3618 | if (pud_present(*pud)) /* Another has populated it */ |
5e541973 | 3619 | pmd_free(mm, new); |
1bb3630e HD |
3620 | else |
3621 | pud_populate(mm, pud, new); | |
1da177e4 | 3622 | #else |
1bb3630e | 3623 | if (pgd_present(*pud)) /* Another has populated it */ |
5e541973 | 3624 | pmd_free(mm, new); |
1bb3630e HD |
3625 | else |
3626 | pgd_populate(mm, pud, new); | |
1da177e4 | 3627 | #endif /* __ARCH_HAS_4LEVEL_HACK */ |
c74df32c | 3628 | spin_unlock(&mm->page_table_lock); |
1bb3630e | 3629 | return 0; |
e0f39591 | 3630 | } |
1da177e4 LT |
3631 | #endif /* __PAGETABLE_PMD_FOLDED */ |
3632 | ||
3633 | int make_pages_present(unsigned long addr, unsigned long end) | |
3634 | { | |
3635 | int ret, len, write; | |
3636 | struct vm_area_struct * vma; | |
3637 | ||
3638 | vma = find_vma(current->mm, addr); | |
3639 | if (!vma) | |
a477097d | 3640 | return -ENOMEM; |
5ecfda04 ML |
3641 | /* |
3642 | * We want to touch writable mappings with a write fault in order | |
3643 | * to break COW, except for shared mappings because these don't COW | |
3644 | * and we would not want to dirty them for nothing. | |
3645 | */ | |
3646 | write = (vma->vm_flags & (VM_WRITE | VM_SHARED)) == VM_WRITE; | |
5bcb28b1 ES |
3647 | BUG_ON(addr >= end); |
3648 | BUG_ON(end > vma->vm_end); | |
68e116a3 | 3649 | len = DIV_ROUND_UP(end, PAGE_SIZE) - addr/PAGE_SIZE; |
1da177e4 LT |
3650 | ret = get_user_pages(current, current->mm, addr, |
3651 | len, write, 0, NULL, NULL); | |
c11d69d8 | 3652 | if (ret < 0) |
1da177e4 | 3653 | return ret; |
9978ad58 | 3654 | return ret == len ? 0 : -EFAULT; |
1da177e4 LT |
3655 | } |
3656 | ||
1da177e4 LT |
3657 | #if !defined(__HAVE_ARCH_GATE_AREA) |
3658 | ||
3659 | #if defined(AT_SYSINFO_EHDR) | |
5ce7852c | 3660 | static struct vm_area_struct gate_vma; |
1da177e4 LT |
3661 | |
3662 | static int __init gate_vma_init(void) | |
3663 | { | |
3664 | gate_vma.vm_mm = NULL; | |
3665 | gate_vma.vm_start = FIXADDR_USER_START; | |
3666 | gate_vma.vm_end = FIXADDR_USER_END; | |
b6558c4a RM |
3667 | gate_vma.vm_flags = VM_READ | VM_MAYREAD | VM_EXEC | VM_MAYEXEC; |
3668 | gate_vma.vm_page_prot = __P101; | |
909af768 | 3669 | |
1da177e4 LT |
3670 | return 0; |
3671 | } | |
3672 | __initcall(gate_vma_init); | |
3673 | #endif | |
3674 | ||
31db58b3 | 3675 | struct vm_area_struct *get_gate_vma(struct mm_struct *mm) |
1da177e4 LT |
3676 | { |
3677 | #ifdef AT_SYSINFO_EHDR | |
3678 | return &gate_vma; | |
3679 | #else | |
3680 | return NULL; | |
3681 | #endif | |
3682 | } | |
3683 | ||
cae5d390 | 3684 | int in_gate_area_no_mm(unsigned long addr) |
1da177e4 LT |
3685 | { |
3686 | #ifdef AT_SYSINFO_EHDR | |
3687 | if ((addr >= FIXADDR_USER_START) && (addr < FIXADDR_USER_END)) | |
3688 | return 1; | |
3689 | #endif | |
3690 | return 0; | |
3691 | } | |
3692 | ||
3693 | #endif /* __HAVE_ARCH_GATE_AREA */ | |
0ec76a11 | 3694 | |
1b36ba81 | 3695 | static int __follow_pte(struct mm_struct *mm, unsigned long address, |
f8ad0f49 JW |
3696 | pte_t **ptepp, spinlock_t **ptlp) |
3697 | { | |
3698 | pgd_t *pgd; | |
3699 | pud_t *pud; | |
3700 | pmd_t *pmd; | |
3701 | pte_t *ptep; | |
3702 | ||
3703 | pgd = pgd_offset(mm, address); | |
3704 | if (pgd_none(*pgd) || unlikely(pgd_bad(*pgd))) | |
3705 | goto out; | |
3706 | ||
3707 | pud = pud_offset(pgd, address); | |
3708 | if (pud_none(*pud) || unlikely(pud_bad(*pud))) | |
3709 | goto out; | |
3710 | ||
3711 | pmd = pmd_offset(pud, address); | |
f66055ab | 3712 | VM_BUG_ON(pmd_trans_huge(*pmd)); |
f8ad0f49 JW |
3713 | if (pmd_none(*pmd) || unlikely(pmd_bad(*pmd))) |
3714 | goto out; | |
3715 | ||
3716 | /* We cannot handle huge page PFN maps. Luckily they don't exist. */ | |
3717 | if (pmd_huge(*pmd)) | |
3718 | goto out; | |
3719 | ||
3720 | ptep = pte_offset_map_lock(mm, pmd, address, ptlp); | |
3721 | if (!ptep) | |
3722 | goto out; | |
3723 | if (!pte_present(*ptep)) | |
3724 | goto unlock; | |
3725 | *ptepp = ptep; | |
3726 | return 0; | |
3727 | unlock: | |
3728 | pte_unmap_unlock(ptep, *ptlp); | |
3729 | out: | |
3730 | return -EINVAL; | |
3731 | } | |
3732 | ||
1b36ba81 NK |
3733 | static inline int follow_pte(struct mm_struct *mm, unsigned long address, |
3734 | pte_t **ptepp, spinlock_t **ptlp) | |
3735 | { | |
3736 | int res; | |
3737 | ||
3738 | /* (void) is needed to make gcc happy */ | |
3739 | (void) __cond_lock(*ptlp, | |
3740 | !(res = __follow_pte(mm, address, ptepp, ptlp))); | |
3741 | return res; | |
3742 | } | |
3743 | ||
3b6748e2 JW |
3744 | /** |
3745 | * follow_pfn - look up PFN at a user virtual address | |
3746 | * @vma: memory mapping | |
3747 | * @address: user virtual address | |
3748 | * @pfn: location to store found PFN | |
3749 | * | |
3750 | * Only IO mappings and raw PFN mappings are allowed. | |
3751 | * | |
3752 | * Returns zero and the pfn at @pfn on success, -ve otherwise. | |
3753 | */ | |
3754 | int follow_pfn(struct vm_area_struct *vma, unsigned long address, | |
3755 | unsigned long *pfn) | |
3756 | { | |
3757 | int ret = -EINVAL; | |
3758 | spinlock_t *ptl; | |
3759 | pte_t *ptep; | |
3760 | ||
3761 | if (!(vma->vm_flags & (VM_IO | VM_PFNMAP))) | |
3762 | return ret; | |
3763 | ||
3764 | ret = follow_pte(vma->vm_mm, address, &ptep, &ptl); | |
3765 | if (ret) | |
3766 | return ret; | |
3767 | *pfn = pte_pfn(*ptep); | |
3768 | pte_unmap_unlock(ptep, ptl); | |
3769 | return 0; | |
3770 | } | |
3771 | EXPORT_SYMBOL(follow_pfn); | |
3772 | ||
28b2ee20 | 3773 | #ifdef CONFIG_HAVE_IOREMAP_PROT |
d87fe660 | 3774 | int follow_phys(struct vm_area_struct *vma, |
3775 | unsigned long address, unsigned int flags, | |
3776 | unsigned long *prot, resource_size_t *phys) | |
28b2ee20 | 3777 | { |
03668a4d | 3778 | int ret = -EINVAL; |
28b2ee20 RR |
3779 | pte_t *ptep, pte; |
3780 | spinlock_t *ptl; | |
28b2ee20 | 3781 | |
d87fe660 | 3782 | if (!(vma->vm_flags & (VM_IO | VM_PFNMAP))) |
3783 | goto out; | |
28b2ee20 | 3784 | |
03668a4d | 3785 | if (follow_pte(vma->vm_mm, address, &ptep, &ptl)) |
d87fe660 | 3786 | goto out; |
28b2ee20 | 3787 | pte = *ptep; |
03668a4d | 3788 | |
28b2ee20 RR |
3789 | if ((flags & FOLL_WRITE) && !pte_write(pte)) |
3790 | goto unlock; | |
28b2ee20 RR |
3791 | |
3792 | *prot = pgprot_val(pte_pgprot(pte)); | |
03668a4d | 3793 | *phys = (resource_size_t)pte_pfn(pte) << PAGE_SHIFT; |
28b2ee20 | 3794 | |
03668a4d | 3795 | ret = 0; |
28b2ee20 RR |
3796 | unlock: |
3797 | pte_unmap_unlock(ptep, ptl); | |
3798 | out: | |
d87fe660 | 3799 | return ret; |
28b2ee20 RR |
3800 | } |
3801 | ||
3802 | int generic_access_phys(struct vm_area_struct *vma, unsigned long addr, | |
3803 | void *buf, int len, int write) | |
3804 | { | |
3805 | resource_size_t phys_addr; | |
3806 | unsigned long prot = 0; | |
2bc7273b | 3807 | void __iomem *maddr; |
28b2ee20 RR |
3808 | int offset = addr & (PAGE_SIZE-1); |
3809 | ||
d87fe660 | 3810 | if (follow_phys(vma, addr, write, &prot, &phys_addr)) |
28b2ee20 RR |
3811 | return -EINVAL; |
3812 | ||
3813 | maddr = ioremap_prot(phys_addr, PAGE_SIZE, prot); | |
3814 | if (write) | |
3815 | memcpy_toio(maddr + offset, buf, len); | |
3816 | else | |
3817 | memcpy_fromio(buf, maddr + offset, len); | |
3818 | iounmap(maddr); | |
3819 | ||
3820 | return len; | |
3821 | } | |
3822 | #endif | |
3823 | ||
0ec76a11 | 3824 | /* |
206cb636 SW |
3825 | * Access another process' address space as given in mm. If non-NULL, use the |
3826 | * given task for page fault accounting. | |
0ec76a11 | 3827 | */ |
206cb636 SW |
3828 | static int __access_remote_vm(struct task_struct *tsk, struct mm_struct *mm, |
3829 | unsigned long addr, void *buf, int len, int write) | |
0ec76a11 | 3830 | { |
0ec76a11 | 3831 | struct vm_area_struct *vma; |
0ec76a11 DH |
3832 | void *old_buf = buf; |
3833 | ||
0ec76a11 | 3834 | down_read(&mm->mmap_sem); |
183ff22b | 3835 | /* ignore errors, just check how much was successfully transferred */ |
0ec76a11 DH |
3836 | while (len) { |
3837 | int bytes, ret, offset; | |
3838 | void *maddr; | |
28b2ee20 | 3839 | struct page *page = NULL; |
0ec76a11 DH |
3840 | |
3841 | ret = get_user_pages(tsk, mm, addr, 1, | |
3842 | write, 1, &page, &vma); | |
28b2ee20 RR |
3843 | if (ret <= 0) { |
3844 | /* | |
3845 | * Check if this is a VM_IO | VM_PFNMAP VMA, which | |
3846 | * we can access using slightly different code. | |
3847 | */ | |
3848 | #ifdef CONFIG_HAVE_IOREMAP_PROT | |
3849 | vma = find_vma(mm, addr); | |
fe936dfc | 3850 | if (!vma || vma->vm_start > addr) |
28b2ee20 RR |
3851 | break; |
3852 | if (vma->vm_ops && vma->vm_ops->access) | |
3853 | ret = vma->vm_ops->access(vma, addr, buf, | |
3854 | len, write); | |
3855 | if (ret <= 0) | |
3856 | #endif | |
3857 | break; | |
3858 | bytes = ret; | |
0ec76a11 | 3859 | } else { |
28b2ee20 RR |
3860 | bytes = len; |
3861 | offset = addr & (PAGE_SIZE-1); | |
3862 | if (bytes > PAGE_SIZE-offset) | |
3863 | bytes = PAGE_SIZE-offset; | |
3864 | ||
3865 | maddr = kmap(page); | |
3866 | if (write) { | |
3867 | copy_to_user_page(vma, page, addr, | |
3868 | maddr + offset, buf, bytes); | |
3869 | set_page_dirty_lock(page); | |
3870 | } else { | |
3871 | copy_from_user_page(vma, page, addr, | |
3872 | buf, maddr + offset, bytes); | |
3873 | } | |
3874 | kunmap(page); | |
3875 | page_cache_release(page); | |
0ec76a11 | 3876 | } |
0ec76a11 DH |
3877 | len -= bytes; |
3878 | buf += bytes; | |
3879 | addr += bytes; | |
3880 | } | |
3881 | up_read(&mm->mmap_sem); | |
0ec76a11 DH |
3882 | |
3883 | return buf - old_buf; | |
3884 | } | |
03252919 | 3885 | |
5ddd36b9 | 3886 | /** |
ae91dbfc | 3887 | * access_remote_vm - access another process' address space |
5ddd36b9 SW |
3888 | * @mm: the mm_struct of the target address space |
3889 | * @addr: start address to access | |
3890 | * @buf: source or destination buffer | |
3891 | * @len: number of bytes to transfer | |
3892 | * @write: whether the access is a write | |
3893 | * | |
3894 | * The caller must hold a reference on @mm. | |
3895 | */ | |
3896 | int access_remote_vm(struct mm_struct *mm, unsigned long addr, | |
3897 | void *buf, int len, int write) | |
3898 | { | |
3899 | return __access_remote_vm(NULL, mm, addr, buf, len, write); | |
3900 | } | |
3901 | ||
206cb636 SW |
3902 | /* |
3903 | * Access another process' address space. | |
3904 | * Source/target buffer must be kernel space, | |
3905 | * Do not walk the page table directly, use get_user_pages | |
3906 | */ | |
3907 | int access_process_vm(struct task_struct *tsk, unsigned long addr, | |
3908 | void *buf, int len, int write) | |
3909 | { | |
3910 | struct mm_struct *mm; | |
3911 | int ret; | |
3912 | ||
3913 | mm = get_task_mm(tsk); | |
3914 | if (!mm) | |
3915 | return 0; | |
3916 | ||
3917 | ret = __access_remote_vm(tsk, mm, addr, buf, len, write); | |
3918 | mmput(mm); | |
3919 | ||
3920 | return ret; | |
3921 | } | |
3922 | ||
03252919 AK |
3923 | /* |
3924 | * Print the name of a VMA. | |
3925 | */ | |
3926 | void print_vma_addr(char *prefix, unsigned long ip) | |
3927 | { | |
3928 | struct mm_struct *mm = current->mm; | |
3929 | struct vm_area_struct *vma; | |
3930 | ||
e8bff74a IM |
3931 | /* |
3932 | * Do not print if we are in atomic | |
3933 | * contexts (in exception stacks, etc.): | |
3934 | */ | |
3935 | if (preempt_count()) | |
3936 | return; | |
3937 | ||
03252919 AK |
3938 | down_read(&mm->mmap_sem); |
3939 | vma = find_vma(mm, ip); | |
3940 | if (vma && vma->vm_file) { | |
3941 | struct file *f = vma->vm_file; | |
3942 | char *buf = (char *)__get_free_page(GFP_KERNEL); | |
3943 | if (buf) { | |
3944 | char *p, *s; | |
3945 | ||
cf28b486 | 3946 | p = d_path(&f->f_path, buf, PAGE_SIZE); |
03252919 AK |
3947 | if (IS_ERR(p)) |
3948 | p = "?"; | |
3949 | s = strrchr(p, '/'); | |
3950 | if (s) | |
3951 | p = s+1; | |
3952 | printk("%s%s[%lx+%lx]", prefix, p, | |
3953 | vma->vm_start, | |
3954 | vma->vm_end - vma->vm_start); | |
3955 | free_page((unsigned long)buf); | |
3956 | } | |
3957 | } | |
51a07e50 | 3958 | up_read(&mm->mmap_sem); |
03252919 | 3959 | } |
3ee1afa3 NP |
3960 | |
3961 | #ifdef CONFIG_PROVE_LOCKING | |
3962 | void might_fault(void) | |
3963 | { | |
95156f00 PZ |
3964 | /* |
3965 | * Some code (nfs/sunrpc) uses socket ops on kernel memory while | |
3966 | * holding the mmap_sem, this is safe because kernel memory doesn't | |
3967 | * get paged out, therefore we'll never actually fault, and the | |
3968 | * below annotations will generate false positives. | |
3969 | */ | |
3970 | if (segment_eq(get_fs(), KERNEL_DS)) | |
3971 | return; | |
3972 | ||
3ee1afa3 NP |
3973 | might_sleep(); |
3974 | /* | |
3975 | * it would be nicer only to annotate paths which are not under | |
3976 | * pagefault_disable, however that requires a larger audit and | |
3977 | * providing helpers like get_user_atomic. | |
3978 | */ | |
3979 | if (!in_atomic() && current->mm) | |
3980 | might_lock_read(¤t->mm->mmap_sem); | |
3981 | } | |
3982 | EXPORT_SYMBOL(might_fault); | |
3983 | #endif | |
47ad8475 AA |
3984 | |
3985 | #if defined(CONFIG_TRANSPARENT_HUGEPAGE) || defined(CONFIG_HUGETLBFS) | |
3986 | static void clear_gigantic_page(struct page *page, | |
3987 | unsigned long addr, | |
3988 | unsigned int pages_per_huge_page) | |
3989 | { | |
3990 | int i; | |
3991 | struct page *p = page; | |
3992 | ||
3993 | might_sleep(); | |
3994 | for (i = 0; i < pages_per_huge_page; | |
3995 | i++, p = mem_map_next(p, page, i)) { | |
3996 | cond_resched(); | |
3997 | clear_user_highpage(p, addr + i * PAGE_SIZE); | |
3998 | } | |
3999 | } | |
4000 | void clear_huge_page(struct page *page, | |
4001 | unsigned long addr, unsigned int pages_per_huge_page) | |
4002 | { | |
4003 | int i; | |
4004 | ||
4005 | if (unlikely(pages_per_huge_page > MAX_ORDER_NR_PAGES)) { | |
4006 | clear_gigantic_page(page, addr, pages_per_huge_page); | |
4007 | return; | |
4008 | } | |
4009 | ||
4010 | might_sleep(); | |
4011 | for (i = 0; i < pages_per_huge_page; i++) { | |
4012 | cond_resched(); | |
4013 | clear_user_highpage(page + i, addr + i * PAGE_SIZE); | |
4014 | } | |
4015 | } | |
4016 | ||
4017 | static void copy_user_gigantic_page(struct page *dst, struct page *src, | |
4018 | unsigned long addr, | |
4019 | struct vm_area_struct *vma, | |
4020 | unsigned int pages_per_huge_page) | |
4021 | { | |
4022 | int i; | |
4023 | struct page *dst_base = dst; | |
4024 | struct page *src_base = src; | |
4025 | ||
4026 | for (i = 0; i < pages_per_huge_page; ) { | |
4027 | cond_resched(); | |
4028 | copy_user_highpage(dst, src, addr + i*PAGE_SIZE, vma); | |
4029 | ||
4030 | i++; | |
4031 | dst = mem_map_next(dst, dst_base, i); | |
4032 | src = mem_map_next(src, src_base, i); | |
4033 | } | |
4034 | } | |
4035 | ||
4036 | void copy_user_huge_page(struct page *dst, struct page *src, | |
4037 | unsigned long addr, struct vm_area_struct *vma, | |
4038 | unsigned int pages_per_huge_page) | |
4039 | { | |
4040 | int i; | |
4041 | ||
4042 | if (unlikely(pages_per_huge_page > MAX_ORDER_NR_PAGES)) { | |
4043 | copy_user_gigantic_page(dst, src, addr, vma, | |
4044 | pages_per_huge_page); | |
4045 | return; | |
4046 | } | |
4047 | ||
4048 | might_sleep(); | |
4049 | for (i = 0; i < pages_per_huge_page; i++) { | |
4050 | cond_resched(); | |
4051 | copy_user_highpage(dst + i, src + i, addr + i*PAGE_SIZE, vma); | |
4052 | } | |
4053 | } | |
4054 | #endif /* CONFIG_TRANSPARENT_HUGEPAGE || CONFIG_HUGETLBFS */ |