]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | // SPDX-License-Identifier: GPL-2.0 |
1da177e4 LT |
2 | /* |
3 | * mm/mremap.c | |
4 | * | |
5 | * (C) Copyright 1996 Linus Torvalds | |
6 | * | |
046c6884 | 7 | * Address space accounting code <[email protected]> |
1da177e4 LT |
8 | * (C) Copyright 2002 Red Hat Inc, All Rights Reserved |
9 | */ | |
10 | ||
11 | #include <linux/mm.h> | |
12 | #include <linux/hugetlb.h> | |
1da177e4 | 13 | #include <linux/shm.h> |
1ff82995 | 14 | #include <linux/ksm.h> |
1da177e4 LT |
15 | #include <linux/mman.h> |
16 | #include <linux/swap.h> | |
c59ede7b | 17 | #include <linux/capability.h> |
1da177e4 | 18 | #include <linux/fs.h> |
6dec97dc | 19 | #include <linux/swapops.h> |
1da177e4 LT |
20 | #include <linux/highmem.h> |
21 | #include <linux/security.h> | |
22 | #include <linux/syscalls.h> | |
cddb8a5c | 23 | #include <linux/mmu_notifier.h> |
2581d202 | 24 | #include <linux/uaccess.h> |
4abad2ca | 25 | #include <linux/mm-arch-hooks.h> |
72f87654 | 26 | #include <linux/userfaultfd_k.h> |
1da177e4 | 27 | |
1da177e4 LT |
28 | #include <asm/cacheflush.h> |
29 | #include <asm/tlbflush.h> | |
30 | ||
ba470de4 RR |
31 | #include "internal.h" |
32 | ||
7be7a546 | 33 | static pmd_t *get_old_pmd(struct mm_struct *mm, unsigned long addr) |
1da177e4 LT |
34 | { |
35 | pgd_t *pgd; | |
c2febafc | 36 | p4d_t *p4d; |
1da177e4 LT |
37 | pud_t *pud; |
38 | pmd_t *pmd; | |
39 | ||
40 | pgd = pgd_offset(mm, addr); | |
41 | if (pgd_none_or_clear_bad(pgd)) | |
42 | return NULL; | |
43 | ||
c2febafc KS |
44 | p4d = p4d_offset(pgd, addr); |
45 | if (p4d_none_or_clear_bad(p4d)) | |
46 | return NULL; | |
47 | ||
48 | pud = pud_offset(p4d, addr); | |
1da177e4 LT |
49 | if (pud_none_or_clear_bad(pud)) |
50 | return NULL; | |
51 | ||
52 | pmd = pmd_offset(pud, addr); | |
37a1c49a | 53 | if (pmd_none(*pmd)) |
1da177e4 LT |
54 | return NULL; |
55 | ||
7be7a546 | 56 | return pmd; |
1da177e4 LT |
57 | } |
58 | ||
8ac1f832 AA |
59 | static pmd_t *alloc_new_pmd(struct mm_struct *mm, struct vm_area_struct *vma, |
60 | unsigned long addr) | |
1da177e4 LT |
61 | { |
62 | pgd_t *pgd; | |
c2febafc | 63 | p4d_t *p4d; |
1da177e4 | 64 | pud_t *pud; |
c74df32c | 65 | pmd_t *pmd; |
1da177e4 LT |
66 | |
67 | pgd = pgd_offset(mm, addr); | |
c2febafc KS |
68 | p4d = p4d_alloc(mm, pgd, addr); |
69 | if (!p4d) | |
70 | return NULL; | |
71 | pud = pud_alloc(mm, p4d, addr); | |
1da177e4 | 72 | if (!pud) |
c74df32c | 73 | return NULL; |
7be7a546 | 74 | |
1da177e4 | 75 | pmd = pmd_alloc(mm, pud, addr); |
57a8f0cd | 76 | if (!pmd) |
c74df32c | 77 | return NULL; |
7be7a546 | 78 | |
8ac1f832 | 79 | VM_BUG_ON(pmd_trans_huge(*pmd)); |
c74df32c | 80 | |
7be7a546 | 81 | return pmd; |
1da177e4 LT |
82 | } |
83 | ||
1d069b7d HD |
84 | static void take_rmap_locks(struct vm_area_struct *vma) |
85 | { | |
86 | if (vma->vm_file) | |
87 | i_mmap_lock_write(vma->vm_file->f_mapping); | |
88 | if (vma->anon_vma) | |
89 | anon_vma_lock_write(vma->anon_vma); | |
90 | } | |
91 | ||
92 | static void drop_rmap_locks(struct vm_area_struct *vma) | |
93 | { | |
94 | if (vma->anon_vma) | |
95 | anon_vma_unlock_write(vma->anon_vma); | |
96 | if (vma->vm_file) | |
97 | i_mmap_unlock_write(vma->vm_file->f_mapping); | |
98 | } | |
99 | ||
6dec97dc CG |
100 | static pte_t move_soft_dirty_pte(pte_t pte) |
101 | { | |
102 | /* | |
103 | * Set soft dirty bit so we can notice | |
104 | * in userspace the ptes were moved. | |
105 | */ | |
106 | #ifdef CONFIG_MEM_SOFT_DIRTY | |
107 | if (pte_present(pte)) | |
108 | pte = pte_mksoft_dirty(pte); | |
109 | else if (is_swap_pte(pte)) | |
110 | pte = pte_swp_mksoft_dirty(pte); | |
6dec97dc CG |
111 | #endif |
112 | return pte; | |
113 | } | |
114 | ||
7be7a546 HD |
115 | static void move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, |
116 | unsigned long old_addr, unsigned long old_end, | |
117 | struct vm_area_struct *new_vma, pmd_t *new_pmd, | |
eb66ae03 | 118 | unsigned long new_addr, bool need_rmap_locks) |
1da177e4 | 119 | { |
1da177e4 | 120 | struct mm_struct *mm = vma->vm_mm; |
7be7a546 | 121 | pte_t *old_pte, *new_pte, pte; |
4c21e2f2 | 122 | spinlock_t *old_ptl, *new_ptl; |
5d190420 AL |
123 | bool force_flush = false; |
124 | unsigned long len = old_end - old_addr; | |
1da177e4 | 125 | |
38a76013 | 126 | /* |
c8c06efa | 127 | * When need_rmap_locks is true, we take the i_mmap_rwsem and anon_vma |
38a76013 ML |
128 | * locks to ensure that rmap will always observe either the old or the |
129 | * new ptes. This is the easiest way to avoid races with | |
130 | * truncate_pagecache(), page migration, etc... | |
131 | * | |
132 | * When need_rmap_locks is false, we use other ways to avoid | |
133 | * such races: | |
134 | * | |
135 | * - During exec() shift_arg_pages(), we use a specially tagged vma | |
222100ee | 136 | * which rmap call sites look for using vma_is_temporary_stack(). |
38a76013 ML |
137 | * |
138 | * - During mremap(), new_vma is often known to be placed after vma | |
139 | * in rmap traversal order. This ensures rmap will always observe | |
140 | * either the old pte, or the new pte, or both (the page table locks | |
141 | * serialize access to individual ptes, but only rmap traversal | |
142 | * order guarantees that we won't miss both the old and new ptes). | |
143 | */ | |
1d069b7d HD |
144 | if (need_rmap_locks) |
145 | take_rmap_locks(vma); | |
1da177e4 | 146 | |
4c21e2f2 HD |
147 | /* |
148 | * We don't have to worry about the ordering of src and dst | |
c1e8d7c6 | 149 | * pte locks because exclusive mmap_lock prevents deadlock. |
4c21e2f2 | 150 | */ |
c74df32c | 151 | old_pte = pte_offset_map_lock(mm, old_pmd, old_addr, &old_ptl); |
ece0e2b6 | 152 | new_pte = pte_offset_map(new_pmd, new_addr); |
4c21e2f2 HD |
153 | new_ptl = pte_lockptr(mm, new_pmd); |
154 | if (new_ptl != old_ptl) | |
f20dc5f7 | 155 | spin_lock_nested(new_ptl, SINGLE_DEPTH_NESTING); |
3ea27719 | 156 | flush_tlb_batched_pending(vma->vm_mm); |
6606c3e0 | 157 | arch_enter_lazy_mmu_mode(); |
7be7a546 HD |
158 | |
159 | for (; old_addr < old_end; old_pte++, old_addr += PAGE_SIZE, | |
160 | new_pte++, new_addr += PAGE_SIZE) { | |
161 | if (pte_none(*old_pte)) | |
162 | continue; | |
5d190420 | 163 | |
a2ce2666 | 164 | pte = ptep_get_and_clear(mm, old_addr, old_pte); |
5d190420 | 165 | /* |
eb66ae03 | 166 | * If we are remapping a valid PTE, make sure |
a2ce2666 | 167 | * to flush TLB before we drop the PTL for the |
eb66ae03 | 168 | * PTE. |
a2ce2666 | 169 | * |
eb66ae03 LT |
170 | * NOTE! Both old and new PTL matter: the old one |
171 | * for racing with page_mkclean(), the new one to | |
172 | * make sure the physical page stays valid until | |
173 | * the TLB entry for the old mapping has been | |
174 | * flushed. | |
5d190420 | 175 | */ |
eb66ae03 | 176 | if (pte_present(pte)) |
5d190420 | 177 | force_flush = true; |
7be7a546 | 178 | pte = move_pte(pte, new_vma->vm_page_prot, old_addr, new_addr); |
6dec97dc CG |
179 | pte = move_soft_dirty_pte(pte); |
180 | set_pte_at(mm, new_addr, new_pte, pte); | |
1da177e4 | 181 | } |
7be7a546 | 182 | |
6606c3e0 | 183 | arch_leave_lazy_mmu_mode(); |
eb66ae03 LT |
184 | if (force_flush) |
185 | flush_tlb_range(vma, old_end - len, old_end); | |
4c21e2f2 HD |
186 | if (new_ptl != old_ptl) |
187 | spin_unlock(new_ptl); | |
ece0e2b6 | 188 | pte_unmap(new_pte - 1); |
c74df32c | 189 | pte_unmap_unlock(old_pte - 1, old_ptl); |
1d069b7d HD |
190 | if (need_rmap_locks) |
191 | drop_rmap_locks(vma); | |
1da177e4 LT |
192 | } |
193 | ||
2c91bd4a JFG |
194 | #ifdef CONFIG_HAVE_MOVE_PMD |
195 | static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, | |
b8aa9d9d | 196 | unsigned long new_addr, pmd_t *old_pmd, pmd_t *new_pmd) |
2c91bd4a JFG |
197 | { |
198 | spinlock_t *old_ptl, *new_ptl; | |
199 | struct mm_struct *mm = vma->vm_mm; | |
200 | pmd_t pmd; | |
201 | ||
2c91bd4a JFG |
202 | /* |
203 | * The destination pmd shouldn't be established, free_pgtables() | |
f81fdd0c LT |
204 | * should have released it. |
205 | * | |
206 | * However, there's a case during execve() where we use mremap | |
207 | * to move the initial stack, and in that case the target area | |
208 | * may overlap the source area (always moving down). | |
209 | * | |
210 | * If everything is PMD-aligned, that works fine, as moving | |
211 | * each pmd down will clear the source pmd. But if we first | |
212 | * have a few 4kB-only pages that get moved down, and then | |
213 | * hit the "now the rest is PMD-aligned, let's do everything | |
214 | * one pmd at a time", we will still have the old (now empty | |
215 | * of any 4kB pages, but still there) PMD in the page table | |
216 | * tree. | |
217 | * | |
218 | * Warn on it once - because we really should try to figure | |
219 | * out how to do this better - but then say "I won't move | |
220 | * this pmd". | |
221 | * | |
222 | * One alternative might be to just unmap the target pmd at | |
223 | * this point, and verify that it really is empty. We'll see. | |
2c91bd4a | 224 | */ |
f81fdd0c | 225 | if (WARN_ON_ONCE(!pmd_none(*new_pmd))) |
2c91bd4a JFG |
226 | return false; |
227 | ||
228 | /* | |
229 | * We don't have to worry about the ordering of src and dst | |
c1e8d7c6 | 230 | * ptlocks because exclusive mmap_lock prevents deadlock. |
2c91bd4a JFG |
231 | */ |
232 | old_ptl = pmd_lock(vma->vm_mm, old_pmd); | |
233 | new_ptl = pmd_lockptr(mm, new_pmd); | |
234 | if (new_ptl != old_ptl) | |
235 | spin_lock_nested(new_ptl, SINGLE_DEPTH_NESTING); | |
236 | ||
237 | /* Clear the pmd */ | |
238 | pmd = *old_pmd; | |
239 | pmd_clear(old_pmd); | |
240 | ||
241 | VM_BUG_ON(!pmd_none(*new_pmd)); | |
242 | ||
243 | /* Set the new pmd */ | |
244 | set_pmd_at(mm, new_addr, new_pmd, pmd); | |
245 | flush_tlb_range(vma, old_addr, old_addr + PMD_SIZE); | |
246 | if (new_ptl != old_ptl) | |
247 | spin_unlock(new_ptl); | |
248 | spin_unlock(old_ptl); | |
249 | ||
250 | return true; | |
251 | } | |
252 | #endif | |
253 | ||
b6a2fea3 | 254 | unsigned long move_page_tables(struct vm_area_struct *vma, |
1da177e4 | 255 | unsigned long old_addr, struct vm_area_struct *new_vma, |
38a76013 ML |
256 | unsigned long new_addr, unsigned long len, |
257 | bool need_rmap_locks) | |
1da177e4 | 258 | { |
7be7a546 | 259 | unsigned long extent, next, old_end; |
ac46d4f3 | 260 | struct mmu_notifier_range range; |
7be7a546 | 261 | pmd_t *old_pmd, *new_pmd; |
1da177e4 | 262 | |
7be7a546 HD |
263 | old_end = old_addr + len; |
264 | flush_cache_range(vma, old_addr, old_end); | |
1da177e4 | 265 | |
6f4f13e8 JG |
266 | mmu_notifier_range_init(&range, MMU_NOTIFY_UNMAP, 0, vma, vma->vm_mm, |
267 | old_addr, old_end); | |
ac46d4f3 | 268 | mmu_notifier_invalidate_range_start(&range); |
7b6efc2b | 269 | |
7be7a546 | 270 | for (; old_addr < old_end; old_addr += extent, new_addr += extent) { |
1da177e4 | 271 | cond_resched(); |
7be7a546 | 272 | next = (old_addr + PMD_SIZE) & PMD_MASK; |
ebed4846 | 273 | /* even if next overflowed, extent below will be ok */ |
7be7a546 | 274 | extent = next - old_addr; |
ebed4846 AA |
275 | if (extent > old_end - old_addr) |
276 | extent = old_end - old_addr; | |
9ad9718b WY |
277 | next = (new_addr + PMD_SIZE) & PMD_MASK; |
278 | if (extent > next - new_addr) | |
279 | extent = next - new_addr; | |
7be7a546 HD |
280 | old_pmd = get_old_pmd(vma->vm_mm, old_addr); |
281 | if (!old_pmd) | |
282 | continue; | |
8ac1f832 | 283 | new_pmd = alloc_new_pmd(vma->vm_mm, vma, new_addr); |
7be7a546 HD |
284 | if (!new_pmd) |
285 | break; | |
5bfea2d9 | 286 | if (is_swap_pmd(*old_pmd) || pmd_trans_huge(*old_pmd) || pmd_devmap(*old_pmd)) { |
dd18dbc2 | 287 | if (extent == HPAGE_PMD_SIZE) { |
4b471e88 | 288 | bool moved; |
dd18dbc2 KS |
289 | /* See comment in move_ptes() */ |
290 | if (need_rmap_locks) | |
1d069b7d | 291 | take_rmap_locks(vma); |
bf8616d5 | 292 | moved = move_huge_pmd(vma, old_addr, new_addr, |
b8aa9d9d | 293 | old_pmd, new_pmd); |
dd18dbc2 | 294 | if (need_rmap_locks) |
1d069b7d | 295 | drop_rmap_locks(vma); |
5d190420 | 296 | if (moved) |
4b471e88 | 297 | continue; |
dd18dbc2 | 298 | } |
4b471e88 | 299 | split_huge_pmd(vma, old_pmd, old_addr); |
337d9abf | 300 | if (pmd_trans_unstable(old_pmd)) |
6b9116a6 | 301 | continue; |
2c91bd4a JFG |
302 | } else if (extent == PMD_SIZE) { |
303 | #ifdef CONFIG_HAVE_MOVE_PMD | |
304 | /* | |
305 | * If the extent is PMD-sized, try to speed the move by | |
306 | * moving at the PMD level if possible. | |
307 | */ | |
308 | bool moved; | |
309 | ||
310 | if (need_rmap_locks) | |
311 | take_rmap_locks(vma); | |
312 | moved = move_normal_pmd(vma, old_addr, new_addr, | |
b8aa9d9d | 313 | old_pmd, new_pmd); |
2c91bd4a JFG |
314 | if (need_rmap_locks) |
315 | drop_rmap_locks(vma); | |
316 | if (moved) | |
317 | continue; | |
318 | #endif | |
37a1c49a | 319 | } |
2c91bd4a | 320 | |
4cf58924 | 321 | if (pte_alloc(new_vma->vm_mm, new_pmd)) |
37a1c49a | 322 | break; |
5d190420 | 323 | move_ptes(vma, old_pmd, old_addr, old_addr + extent, new_vma, |
eb66ae03 | 324 | new_pmd, new_addr, need_rmap_locks); |
1da177e4 | 325 | } |
7b6efc2b | 326 | |
ac46d4f3 | 327 | mmu_notifier_invalidate_range_end(&range); |
7be7a546 HD |
328 | |
329 | return len + old_addr - old_end; /* how much done */ | |
1da177e4 LT |
330 | } |
331 | ||
332 | static unsigned long move_vma(struct vm_area_struct *vma, | |
333 | unsigned long old_addr, unsigned long old_len, | |
72f87654 | 334 | unsigned long new_len, unsigned long new_addr, |
e346b381 BG |
335 | bool *locked, unsigned long flags, |
336 | struct vm_userfaultfd_ctx *uf, struct list_head *uf_unmap) | |
1da177e4 LT |
337 | { |
338 | struct mm_struct *mm = vma->vm_mm; | |
339 | struct vm_area_struct *new_vma; | |
340 | unsigned long vm_flags = vma->vm_flags; | |
341 | unsigned long new_pgoff; | |
342 | unsigned long moved_len; | |
343 | unsigned long excess = 0; | |
365e9c87 | 344 | unsigned long hiwater_vm; |
1da177e4 | 345 | int split = 0; |
7103ad32 | 346 | int err; |
38a76013 | 347 | bool need_rmap_locks; |
1da177e4 LT |
348 | |
349 | /* | |
350 | * We'd prefer to avoid failure later on in do_munmap: | |
351 | * which may split one vma into three before unmapping. | |
352 | */ | |
353 | if (mm->map_count >= sysctl_max_map_count - 3) | |
354 | return -ENOMEM; | |
355 | ||
1ff82995 HD |
356 | /* |
357 | * Advise KSM to break any KSM pages in the area to be moved: | |
358 | * it would be confusing if they were to turn up at the new | |
359 | * location, where they happen to coincide with different KSM | |
360 | * pages recently unmapped. But leave vma->vm_flags as it was, | |
361 | * so KSM can come around to merge on vma and new_vma afterwards. | |
362 | */ | |
7103ad32 HD |
363 | err = ksm_madvise(vma, old_addr, old_addr + old_len, |
364 | MADV_UNMERGEABLE, &vm_flags); | |
365 | if (err) | |
366 | return err; | |
1ff82995 | 367 | |
1da177e4 | 368 | new_pgoff = vma->vm_pgoff + ((old_addr - vma->vm_start) >> PAGE_SHIFT); |
38a76013 ML |
369 | new_vma = copy_vma(&vma, new_addr, new_len, new_pgoff, |
370 | &need_rmap_locks); | |
1da177e4 LT |
371 | if (!new_vma) |
372 | return -ENOMEM; | |
373 | ||
38a76013 ML |
374 | moved_len = move_page_tables(vma, old_addr, new_vma, new_addr, old_len, |
375 | need_rmap_locks); | |
1da177e4 | 376 | if (moved_len < old_len) { |
df1eab30 | 377 | err = -ENOMEM; |
5477e70a ON |
378 | } else if (vma->vm_ops && vma->vm_ops->mremap) { |
379 | err = vma->vm_ops->mremap(new_vma); | |
df1eab30 ON |
380 | } |
381 | ||
382 | if (unlikely(err)) { | |
1da177e4 LT |
383 | /* |
384 | * On error, move entries back from new area to old, | |
385 | * which will succeed since page tables still there, | |
386 | * and then proceed to unmap new area instead of old. | |
387 | */ | |
38a76013 ML |
388 | move_page_tables(new_vma, new_addr, vma, old_addr, moved_len, |
389 | true); | |
1da177e4 LT |
390 | vma = new_vma; |
391 | old_len = new_len; | |
392 | old_addr = new_addr; | |
df1eab30 | 393 | new_addr = err; |
4abad2ca | 394 | } else { |
72f87654 | 395 | mremap_userfaultfd_prep(new_vma, uf); |
4abad2ca LD |
396 | arch_remap(mm, old_addr, old_addr + old_len, |
397 | new_addr, new_addr + new_len); | |
b2edffdd | 398 | } |
1da177e4 LT |
399 | |
400 | /* Conceal VM_ACCOUNT so old reservation is not undone */ | |
401 | if (vm_flags & VM_ACCOUNT) { | |
402 | vma->vm_flags &= ~VM_ACCOUNT; | |
403 | excess = vma->vm_end - vma->vm_start - old_len; | |
404 | if (old_addr > vma->vm_start && | |
405 | old_addr + old_len < vma->vm_end) | |
406 | split = 1; | |
407 | } | |
408 | ||
71799062 | 409 | /* |
365e9c87 HD |
410 | * If we failed to move page tables we still do total_vm increment |
411 | * since do_munmap() will decrement it by old_len == new_len. | |
412 | * | |
413 | * Since total_vm is about to be raised artificially high for a | |
414 | * moment, we need to restore high watermark afterwards: if stats | |
415 | * are taken meanwhile, total_vm and hiwater_vm appear too high. | |
416 | * If this were a serious issue, we'd add a flag to do_munmap(). | |
71799062 | 417 | */ |
365e9c87 | 418 | hiwater_vm = mm->hiwater_vm; |
84638335 | 419 | vm_stat_account(mm, vma->vm_flags, new_len >> PAGE_SHIFT); |
71799062 | 420 | |
d9fe4fab TK |
421 | /* Tell pfnmap has moved from this vma */ |
422 | if (unlikely(vma->vm_flags & VM_PFNMAP)) | |
423 | untrack_pfn_moved(vma); | |
424 | ||
e346b381 BG |
425 | if (unlikely(!err && (flags & MREMAP_DONTUNMAP))) { |
426 | if (vm_flags & VM_ACCOUNT) { | |
427 | /* Always put back VM_ACCOUNT since we won't unmap */ | |
428 | vma->vm_flags |= VM_ACCOUNT; | |
429 | ||
dadbd85f | 430 | vm_acct_memory(new_len >> PAGE_SHIFT); |
e346b381 BG |
431 | } |
432 | ||
dadbd85f BG |
433 | /* |
434 | * VMAs can actually be merged back together in copy_vma | |
435 | * calling merge_vma. This can happen with anonymous vmas | |
436 | * which have not yet been faulted, so if we were to consider | |
437 | * this VMA split we'll end up adding VM_ACCOUNT on the | |
438 | * next VMA, which is completely unrelated if this VMA | |
439 | * was re-merged. | |
440 | */ | |
441 | if (split && new_vma == vma) | |
442 | split = 0; | |
443 | ||
e346b381 BG |
444 | /* We always clear VM_LOCKED[ONFAULT] on the old vma */ |
445 | vma->vm_flags &= VM_LOCKED_CLEAR_MASK; | |
446 | ||
447 | /* Because we won't unmap we don't need to touch locked_vm */ | |
448 | goto out; | |
449 | } | |
450 | ||
897ab3e0 | 451 | if (do_munmap(mm, old_addr, old_len, uf_unmap) < 0) { |
1da177e4 LT |
452 | /* OOM: unable to split vma, just get accounts right */ |
453 | vm_unacct_memory(excess >> PAGE_SHIFT); | |
454 | excess = 0; | |
455 | } | |
e346b381 BG |
456 | |
457 | if (vm_flags & VM_LOCKED) { | |
458 | mm->locked_vm += new_len >> PAGE_SHIFT; | |
459 | *locked = true; | |
460 | } | |
461 | out: | |
365e9c87 | 462 | mm->hiwater_vm = hiwater_vm; |
1da177e4 LT |
463 | |
464 | /* Restore VM_ACCOUNT if one or two pieces of vma left */ | |
465 | if (excess) { | |
466 | vma->vm_flags |= VM_ACCOUNT; | |
467 | if (split) | |
468 | vma->vm_next->vm_flags |= VM_ACCOUNT; | |
469 | } | |
470 | ||
1da177e4 LT |
471 | return new_addr; |
472 | } | |
473 | ||
54f5de70 | 474 | static struct vm_area_struct *vma_to_resize(unsigned long addr, |
e346b381 BG |
475 | unsigned long old_len, unsigned long new_len, unsigned long flags, |
476 | unsigned long *p) | |
54f5de70 AV |
477 | { |
478 | struct mm_struct *mm = current->mm; | |
479 | struct vm_area_struct *vma = find_vma(mm, addr); | |
1d391686 | 480 | unsigned long pgoff; |
54f5de70 AV |
481 | |
482 | if (!vma || vma->vm_start > addr) | |
6cd57613 | 483 | return ERR_PTR(-EFAULT); |
54f5de70 | 484 | |
dba58d3b MK |
485 | /* |
486 | * !old_len is a special case where an attempt is made to 'duplicate' | |
487 | * a mapping. This makes no sense for private mappings as it will | |
488 | * instead create a fresh/new mapping unrelated to the original. This | |
489 | * is contrary to the basic idea of mremap which creates new mappings | |
490 | * based on the original. There are no known use cases for this | |
491 | * behavior. As a result, fail such attempts. | |
492 | */ | |
493 | if (!old_len && !(vma->vm_flags & (VM_SHARED | VM_MAYSHARE))) { | |
494 | pr_warn_once("%s (%d): attempted to duplicate a private mapping with mremap. This is not supported.\n", current->comm, current->pid); | |
495 | return ERR_PTR(-EINVAL); | |
496 | } | |
497 | ||
e346b381 BG |
498 | if (flags & MREMAP_DONTUNMAP && (!vma_is_anonymous(vma) || |
499 | vma->vm_flags & VM_SHARED)) | |
500 | return ERR_PTR(-EINVAL); | |
501 | ||
54f5de70 | 502 | if (is_vm_hugetlb_page(vma)) |
6cd57613 | 503 | return ERR_PTR(-EINVAL); |
54f5de70 AV |
504 | |
505 | /* We can't remap across vm area boundaries */ | |
506 | if (old_len > vma->vm_end - addr) | |
6cd57613 | 507 | return ERR_PTR(-EFAULT); |
54f5de70 | 508 | |
1d391686 ON |
509 | if (new_len == old_len) |
510 | return vma; | |
511 | ||
982134ba | 512 | /* Need to be careful about a growing mapping */ |
1d391686 ON |
513 | pgoff = (addr - vma->vm_start) >> PAGE_SHIFT; |
514 | pgoff += vma->vm_pgoff; | |
515 | if (pgoff + (new_len >> PAGE_SHIFT) < pgoff) | |
516 | return ERR_PTR(-EINVAL); | |
517 | ||
518 | if (vma->vm_flags & (VM_DONTEXPAND | VM_PFNMAP)) | |
519 | return ERR_PTR(-EFAULT); | |
54f5de70 AV |
520 | |
521 | if (vma->vm_flags & VM_LOCKED) { | |
522 | unsigned long locked, lock_limit; | |
523 | locked = mm->locked_vm << PAGE_SHIFT; | |
59e99e5b | 524 | lock_limit = rlimit(RLIMIT_MEMLOCK); |
54f5de70 AV |
525 | locked += new_len - old_len; |
526 | if (locked > lock_limit && !capable(CAP_IPC_LOCK)) | |
6cd57613 | 527 | return ERR_PTR(-EAGAIN); |
54f5de70 AV |
528 | } |
529 | ||
84638335 KK |
530 | if (!may_expand_vm(mm, vma->vm_flags, |
531 | (new_len - old_len) >> PAGE_SHIFT)) | |
6cd57613 | 532 | return ERR_PTR(-ENOMEM); |
54f5de70 AV |
533 | |
534 | if (vma->vm_flags & VM_ACCOUNT) { | |
535 | unsigned long charged = (new_len - old_len) >> PAGE_SHIFT; | |
191c5424 | 536 | if (security_vm_enough_memory_mm(mm, charged)) |
6cd57613 | 537 | return ERR_PTR(-ENOMEM); |
54f5de70 AV |
538 | *p = charged; |
539 | } | |
540 | ||
541 | return vma; | |
54f5de70 AV |
542 | } |
543 | ||
81909b84 | 544 | static unsigned long mremap_to(unsigned long addr, unsigned long old_len, |
72f87654 | 545 | unsigned long new_addr, unsigned long new_len, bool *locked, |
e346b381 | 546 | unsigned long flags, struct vm_userfaultfd_ctx *uf, |
b2282371 | 547 | struct list_head *uf_unmap_early, |
897ab3e0 | 548 | struct list_head *uf_unmap) |
ecc1a899 AV |
549 | { |
550 | struct mm_struct *mm = current->mm; | |
551 | struct vm_area_struct *vma; | |
552 | unsigned long ret = -EINVAL; | |
553 | unsigned long charged = 0; | |
e346b381 | 554 | unsigned long map_flags = 0; |
ecc1a899 | 555 | |
f19cb115 | 556 | if (offset_in_page(new_addr)) |
ecc1a899 AV |
557 | goto out; |
558 | ||
559 | if (new_len > TASK_SIZE || new_addr > TASK_SIZE - new_len) | |
560 | goto out; | |
561 | ||
9943242c ON |
562 | /* Ensure the old/new locations do not overlap */ |
563 | if (addr + old_len > new_addr && new_addr + new_len > addr) | |
ecc1a899 AV |
564 | goto out; |
565 | ||
ea2c3f6f OS |
566 | /* |
567 | * move_vma() need us to stay 4 maps below the threshold, otherwise | |
568 | * it will bail out at the very beginning. | |
569 | * That is a problem if we have already unmaped the regions here | |
570 | * (new_addr, and old_addr), because userspace will not know the | |
571 | * state of the vma's after it gets -ENOMEM. | |
572 | * So, to avoid such scenario we can pre-compute if the whole | |
573 | * operation has high chances to success map-wise. | |
574 | * Worst-scenario case is when both vma's (new_addr and old_addr) get | |
575 | * split in 3 before unmaping it. | |
576 | * That means 2 more maps (1 for each) to the ones we already hold. | |
577 | * Check whether current map count plus 2 still leads us to 4 maps below | |
578 | * the threshold, otherwise return -ENOMEM here to be more safe. | |
579 | */ | |
580 | if ((mm->map_count + 2) >= sysctl_max_map_count - 3) | |
581 | return -ENOMEM; | |
582 | ||
e346b381 BG |
583 | if (flags & MREMAP_FIXED) { |
584 | ret = do_munmap(mm, new_addr, new_len, uf_unmap_early); | |
585 | if (ret) | |
586 | goto out; | |
587 | } | |
ecc1a899 AV |
588 | |
589 | if (old_len >= new_len) { | |
897ab3e0 | 590 | ret = do_munmap(mm, addr+new_len, old_len - new_len, uf_unmap); |
ecc1a899 AV |
591 | if (ret && old_len != new_len) |
592 | goto out; | |
593 | old_len = new_len; | |
594 | } | |
595 | ||
e346b381 | 596 | vma = vma_to_resize(addr, old_len, new_len, flags, &charged); |
ecc1a899 AV |
597 | if (IS_ERR(vma)) { |
598 | ret = PTR_ERR(vma); | |
599 | goto out; | |
600 | } | |
601 | ||
e346b381 BG |
602 | /* MREMAP_DONTUNMAP expands by old_len since old_len == new_len */ |
603 | if (flags & MREMAP_DONTUNMAP && | |
604 | !may_expand_vm(mm, vma->vm_flags, old_len >> PAGE_SHIFT)) { | |
605 | ret = -ENOMEM; | |
606 | goto out; | |
607 | } | |
608 | ||
609 | if (flags & MREMAP_FIXED) | |
610 | map_flags |= MAP_FIXED; | |
611 | ||
097eed10 AV |
612 | if (vma->vm_flags & VM_MAYSHARE) |
613 | map_flags |= MAP_SHARED; | |
9206de95 | 614 | |
097eed10 AV |
615 | ret = get_unmapped_area(vma->vm_file, new_addr, new_len, vma->vm_pgoff + |
616 | ((addr - vma->vm_start) >> PAGE_SHIFT), | |
617 | map_flags); | |
ff68dac6 | 618 | if (IS_ERR_VALUE(ret)) |
097eed10 AV |
619 | goto out1; |
620 | ||
e346b381 BG |
621 | /* We got a new mapping */ |
622 | if (!(flags & MREMAP_FIXED)) | |
623 | new_addr = ret; | |
624 | ||
625 | ret = move_vma(vma, addr, old_len, new_len, new_addr, locked, flags, uf, | |
897ab3e0 | 626 | uf_unmap); |
e346b381 | 627 | |
f19cb115 | 628 | if (!(offset_in_page(ret))) |
097eed10 | 629 | goto out; |
e346b381 | 630 | |
097eed10 AV |
631 | out1: |
632 | vm_unacct_memory(charged); | |
ecc1a899 AV |
633 | |
634 | out: | |
635 | return ret; | |
636 | } | |
637 | ||
1a0ef85f AV |
638 | static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) |
639 | { | |
f106af4e | 640 | unsigned long end = vma->vm_end + delta; |
9206de95 | 641 | if (end < vma->vm_end) /* overflow */ |
f106af4e | 642 | return 0; |
9206de95 | 643 | if (vma->vm_next && vma->vm_next->vm_start < end) /* intersection */ |
f106af4e AV |
644 | return 0; |
645 | if (get_unmapped_area(NULL, vma->vm_start, end - vma->vm_start, | |
646 | 0, MAP_FIXED) & ~PAGE_MASK) | |
1a0ef85f | 647 | return 0; |
1a0ef85f AV |
648 | return 1; |
649 | } | |
650 | ||
1da177e4 LT |
651 | /* |
652 | * Expand (or shrink) an existing mapping, potentially moving it at the | |
653 | * same time (controlled by the MREMAP_MAYMOVE flag and available VM space) | |
654 | * | |
655 | * MREMAP_FIXED option added 5-Dec-1999 by Benjamin LaHaise | |
656 | * This option implies MREMAP_MAYMOVE. | |
657 | */ | |
63a81db1 AV |
658 | SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, |
659 | unsigned long, new_len, unsigned long, flags, | |
660 | unsigned long, new_addr) | |
1da177e4 | 661 | { |
d0de32d9 | 662 | struct mm_struct *mm = current->mm; |
1da177e4 LT |
663 | struct vm_area_struct *vma; |
664 | unsigned long ret = -EINVAL; | |
665 | unsigned long charged = 0; | |
81909b84 | 666 | bool locked = false; |
85a06835 | 667 | bool downgraded = false; |
72f87654 | 668 | struct vm_userfaultfd_ctx uf = NULL_VM_UFFD_CTX; |
b2282371 | 669 | LIST_HEAD(uf_unmap_early); |
897ab3e0 | 670 | LIST_HEAD(uf_unmap); |
1da177e4 | 671 | |
b2a84de2 WD |
672 | /* |
673 | * There is a deliberate asymmetry here: we strip the pointer tag | |
674 | * from the old address but leave the new address alone. This is | |
675 | * for consistency with mmap(), where we prevent the creation of | |
676 | * aliasing mappings in userspace by leaving the tag bits of the | |
677 | * mapping address intact. A non-zero tag will cause the subsequent | |
678 | * range checks to reject the address as invalid. | |
679 | * | |
680 | * See Documentation/arm64/tagged-address-abi.rst for more information. | |
681 | */ | |
057d3389 AK |
682 | addr = untagged_addr(addr); |
683 | ||
e346b381 | 684 | if (flags & ~(MREMAP_FIXED | MREMAP_MAYMOVE | MREMAP_DONTUNMAP)) |
9a2458a6 RV |
685 | return ret; |
686 | ||
687 | if (flags & MREMAP_FIXED && !(flags & MREMAP_MAYMOVE)) | |
688 | return ret; | |
1da177e4 | 689 | |
e346b381 BG |
690 | /* |
691 | * MREMAP_DONTUNMAP is always a move and it does not allow resizing | |
692 | * in the process. | |
693 | */ | |
694 | if (flags & MREMAP_DONTUNMAP && | |
695 | (!(flags & MREMAP_MAYMOVE) || old_len != new_len)) | |
696 | return ret; | |
697 | ||
698 | ||
f19cb115 | 699 | if (offset_in_page(addr)) |
9a2458a6 | 700 | return ret; |
1da177e4 LT |
701 | |
702 | old_len = PAGE_ALIGN(old_len); | |
703 | new_len = PAGE_ALIGN(new_len); | |
704 | ||
705 | /* | |
706 | * We allow a zero old-len as a special case | |
707 | * for DOS-emu "duplicate shm area" thing. But | |
708 | * a zero new-len is nonsensical. | |
709 | */ | |
710 | if (!new_len) | |
9a2458a6 RV |
711 | return ret; |
712 | ||
d8ed45c5 | 713 | if (mmap_write_lock_killable(current->mm)) |
dc0ef0df | 714 | return -EINTR; |
1da177e4 | 715 | |
e346b381 | 716 | if (flags & (MREMAP_FIXED | MREMAP_DONTUNMAP)) { |
9a2458a6 | 717 | ret = mremap_to(addr, old_len, new_addr, new_len, |
e346b381 BG |
718 | &locked, flags, &uf, &uf_unmap_early, |
719 | &uf_unmap); | |
ecc1a899 | 720 | goto out; |
1da177e4 LT |
721 | } |
722 | ||
723 | /* | |
724 | * Always allow a shrinking remap: that just unmaps | |
725 | * the unnecessary pages.. | |
85a06835 | 726 | * __do_munmap does all the needed commit accounting, and |
c1e8d7c6 | 727 | * downgrades mmap_lock to read if so directed. |
1da177e4 LT |
728 | */ |
729 | if (old_len >= new_len) { | |
85a06835 YS |
730 | int retval; |
731 | ||
732 | retval = __do_munmap(mm, addr+new_len, old_len - new_len, | |
733 | &uf_unmap, true); | |
734 | if (retval < 0 && old_len != new_len) { | |
735 | ret = retval; | |
1da177e4 | 736 | goto out; |
c1e8d7c6 | 737 | /* Returning 1 indicates mmap_lock is downgraded to read. */ |
85a06835 YS |
738 | } else if (retval == 1) |
739 | downgraded = true; | |
1da177e4 | 740 | ret = addr; |
ecc1a899 | 741 | goto out; |
1da177e4 LT |
742 | } |
743 | ||
744 | /* | |
ecc1a899 | 745 | * Ok, we need to grow.. |
1da177e4 | 746 | */ |
e346b381 | 747 | vma = vma_to_resize(addr, old_len, new_len, flags, &charged); |
54f5de70 AV |
748 | if (IS_ERR(vma)) { |
749 | ret = PTR_ERR(vma); | |
1da177e4 | 750 | goto out; |
119f657c | 751 | } |
1da177e4 | 752 | |
1da177e4 | 753 | /* old_len exactly to the end of the area.. |
1da177e4 | 754 | */ |
ecc1a899 | 755 | if (old_len == vma->vm_end - addr) { |
1da177e4 | 756 | /* can we just expand the current mapping? */ |
1a0ef85f | 757 | if (vma_expandable(vma, new_len - old_len)) { |
1da177e4 LT |
758 | int pages = (new_len - old_len) >> PAGE_SHIFT; |
759 | ||
5beb4930 RR |
760 | if (vma_adjust(vma, vma->vm_start, addr + new_len, |
761 | vma->vm_pgoff, NULL)) { | |
762 | ret = -ENOMEM; | |
763 | goto out; | |
764 | } | |
1da177e4 | 765 | |
84638335 | 766 | vm_stat_account(mm, vma->vm_flags, pages); |
1da177e4 | 767 | if (vma->vm_flags & VM_LOCKED) { |
d0de32d9 | 768 | mm->locked_vm += pages; |
81909b84 ML |
769 | locked = true; |
770 | new_addr = addr; | |
1da177e4 LT |
771 | } |
772 | ret = addr; | |
773 | goto out; | |
774 | } | |
775 | } | |
776 | ||
777 | /* | |
778 | * We weren't able to just expand or shrink the area, | |
779 | * we need to create a new one and move it.. | |
780 | */ | |
781 | ret = -ENOMEM; | |
782 | if (flags & MREMAP_MAYMOVE) { | |
ecc1a899 AV |
783 | unsigned long map_flags = 0; |
784 | if (vma->vm_flags & VM_MAYSHARE) | |
785 | map_flags |= MAP_SHARED; | |
786 | ||
787 | new_addr = get_unmapped_area(vma->vm_file, 0, new_len, | |
93587414 AV |
788 | vma->vm_pgoff + |
789 | ((addr - vma->vm_start) >> PAGE_SHIFT), | |
790 | map_flags); | |
ff68dac6 | 791 | if (IS_ERR_VALUE(new_addr)) { |
ecc1a899 AV |
792 | ret = new_addr; |
793 | goto out; | |
1da177e4 | 794 | } |
ecc1a899 | 795 | |
72f87654 | 796 | ret = move_vma(vma, addr, old_len, new_len, new_addr, |
e346b381 | 797 | &locked, flags, &uf, &uf_unmap); |
1da177e4 LT |
798 | } |
799 | out: | |
f19cb115 | 800 | if (offset_in_page(ret)) { |
1da177e4 | 801 | vm_unacct_memory(charged); |
fa1f68cc | 802 | locked = false; |
d456fb9e | 803 | } |
85a06835 | 804 | if (downgraded) |
d8ed45c5 | 805 | mmap_read_unlock(current->mm); |
85a06835 | 806 | else |
d8ed45c5 | 807 | mmap_write_unlock(current->mm); |
81909b84 ML |
808 | if (locked && new_len > old_len) |
809 | mm_populate(new_addr + old_len, new_len - old_len); | |
b2282371 | 810 | userfaultfd_unmap_complete(mm, &uf_unmap_early); |
d1564926 | 811 | mremap_userfaultfd_complete(&uf, addr, ret, old_len); |
897ab3e0 | 812 | userfaultfd_unmap_complete(mm, &uf_unmap); |
1da177e4 LT |
813 | return ret; |
814 | } |