Thomas Gleixner | 457c899 | 2019-05-19 13:08:55 +0100 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0-only |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 2 | /* |
| 3 | * linux/mm/nommu.c |
| 4 | * |
| 5 | * Replacement code for mm functions to support CPU's that don't |
| 6 | * have any form of memory management unit (thus no virtual memory). |
| 7 | * |
| 8 | * See Documentation/nommu-mmap.txt |
| 9 | * |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 10 | * Copyright (c) 2004-2008 David Howells <dhowells@redhat.com> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 11 | * Copyright (c) 2000-2003 David McCullough <davidm@snapgear.com> |
| 12 | * Copyright (c) 2000-2001 D Jeff Dionne <jeff@uClinux.org> |
| 13 | * Copyright (c) 2002 Greg Ungerer <gerg@snapgear.com> |
Paul Mundt | 29c185e | 2010-12-24 12:08:30 +0900 | [diff] [blame] | 14 | * Copyright (c) 2007-2010 Paul Mundt <lethal@linux-sh.org> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 15 | */ |
| 16 | |
Mitchel Humpherys | b1de0d1 | 2014-06-06 14:38:30 -0700 | [diff] [blame] | 17 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
| 18 | |
Paul Gortmaker | b95f1b31 | 2011-10-16 02:01:52 -0400 | [diff] [blame] | 19 | #include <linux/export.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 20 | #include <linux/mm.h> |
Ingo Molnar | 6e84f31 | 2017-02-08 18:51:29 +0100 | [diff] [blame] | 21 | #include <linux/sched/mm.h> |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 22 | #include <linux/vmacache.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 23 | #include <linux/mman.h> |
| 24 | #include <linux/swap.h> |
| 25 | #include <linux/file.h> |
| 26 | #include <linux/highmem.h> |
| 27 | #include <linux/pagemap.h> |
| 28 | #include <linux/slab.h> |
| 29 | #include <linux/vmalloc.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 30 | #include <linux/blkdev.h> |
| 31 | #include <linux/backing-dev.h> |
Gideon Israel Dsouza | 3b32123 | 2014-04-07 15:37:26 -0700 | [diff] [blame] | 32 | #include <linux/compiler.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 33 | #include <linux/mount.h> |
| 34 | #include <linux/personality.h> |
| 35 | #include <linux/security.h> |
| 36 | #include <linux/syscalls.h> |
Al Viro | 120a795 | 2010-10-30 02:54:44 -0400 | [diff] [blame] | 37 | #include <linux/audit.h> |
Mitchel Humpherys | b1de0d1 | 2014-06-06 14:38:30 -0700 | [diff] [blame] | 38 | #include <linux/printk.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 39 | |
Linus Torvalds | 7c0f6ba | 2016-12-24 11:46:01 -0800 | [diff] [blame] | 40 | #include <linux/uaccess.h> |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 41 | #include <asm/tlb.h> |
| 42 | #include <asm/tlbflush.h> |
Bernd Schmidt | eb8cdec | 2009-09-21 17:03:57 -0700 | [diff] [blame] | 43 | #include <asm/mmu_context.h> |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 44 | #include "internal.h" |
| 45 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 46 | void *high_memory; |
Arnd Bergmann | 944b687 | 2015-02-05 12:25:12 -0800 | [diff] [blame] | 47 | EXPORT_SYMBOL(high_memory); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 48 | struct page *mem_map; |
| 49 | unsigned long max_mapnr; |
gchen gchen | 5b8bf30 | 2015-03-12 16:26:05 -0700 | [diff] [blame] | 50 | EXPORT_SYMBOL(max_mapnr); |
Hugh Dickins | 4266c97 | 2009-09-23 17:05:53 +0100 | [diff] [blame] | 51 | unsigned long highest_memmap_pfn; |
David Howells | fc4d5c2 | 2009-05-06 16:03:05 -0700 | [diff] [blame] | 52 | int sysctl_nr_trim_pages = CONFIG_NOMMU_INITIAL_TRIM_EXCESS; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 53 | int heap_stack_gap = 0; |
| 54 | |
David Howells | 33e5d769 | 2009-04-02 16:56:32 -0700 | [diff] [blame] | 55 | atomic_long_t mmap_pages_allocated; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 56 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 57 | EXPORT_SYMBOL(mem_map); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 58 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 59 | /* list of mapped, potentially shareable regions */ |
| 60 | static struct kmem_cache *vm_region_jar; |
| 61 | struct rb_root nommu_region_tree = RB_ROOT; |
| 62 | DECLARE_RWSEM(nommu_region_sem); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 63 | |
Alexey Dobriyan | f0f37e2f | 2009-09-27 22:29:37 +0400 | [diff] [blame] | 64 | const struct vm_operations_struct generic_file_vm_ops = { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 65 | }; |
| 66 | |
| 67 | /* |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 68 | * Return the total memory allocated for this pointer, not |
| 69 | * just what the caller asked for. |
| 70 | * |
| 71 | * Doesn't have to be accurate, i.e. may have races. |
| 72 | */ |
| 73 | unsigned int kobjsize(const void *objp) |
| 74 | { |
| 75 | struct page *page; |
| 76 | |
Michael Hennerich | 4016a13 | 2008-04-28 02:13:38 -0700 | [diff] [blame] | 77 | /* |
| 78 | * If the object we have should not have ksize performed on it, |
| 79 | * return size of 0 |
| 80 | */ |
Paul Mundt | 5a1603b | 2008-06-12 16:29:55 +0900 | [diff] [blame] | 81 | if (!objp || !virt_addr_valid(objp)) |
Paul Mundt | 6cfd53fc | 2008-06-05 22:46:08 -0700 | [diff] [blame] | 82 | return 0; |
| 83 | |
| 84 | page = virt_to_head_page(objp); |
Paul Mundt | 6cfd53fc | 2008-06-05 22:46:08 -0700 | [diff] [blame] | 85 | |
| 86 | /* |
| 87 | * If the allocator sets PageSlab, we know the pointer came from |
| 88 | * kmalloc(). |
| 89 | */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 90 | if (PageSlab(page)) |
| 91 | return ksize(objp); |
| 92 | |
Paul Mundt | 6cfd53fc | 2008-06-05 22:46:08 -0700 | [diff] [blame] | 93 | /* |
Paul Mundt | ab2e83e | 2009-01-08 12:04:48 +0000 | [diff] [blame] | 94 | * If it's not a compound page, see if we have a matching VMA |
| 95 | * region. This test is intentionally done in reverse order, |
| 96 | * so if there's no VMA, we still fall through and hand back |
| 97 | * PAGE_SIZE for 0-order pages. |
| 98 | */ |
| 99 | if (!PageCompound(page)) { |
| 100 | struct vm_area_struct *vma; |
| 101 | |
| 102 | vma = find_vma(current->mm, (unsigned long)objp); |
| 103 | if (vma) |
| 104 | return vma->vm_end - vma->vm_start; |
| 105 | } |
| 106 | |
| 107 | /* |
Paul Mundt | 6cfd53fc | 2008-06-05 22:46:08 -0700 | [diff] [blame] | 108 | * The ksize() function is only guaranteed to work for pointers |
Paul Mundt | 5a1603b | 2008-06-12 16:29:55 +0900 | [diff] [blame] | 109 | * returned by kmalloc(). So handle arbitrary pointers here. |
Paul Mundt | 6cfd53fc | 2008-06-05 22:46:08 -0700 | [diff] [blame] | 110 | */ |
Matthew Wilcox (Oracle) | a50b854 | 2019-09-23 15:34:25 -0700 | [diff] [blame] | 111 | return page_size(page); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 112 | } |
| 113 | |
Paul Mundt | dfc2f91 | 2009-06-26 04:31:57 +0900 | [diff] [blame] | 114 | /** |
| 115 | * follow_pfn - look up PFN at a user virtual address |
| 116 | * @vma: memory mapping |
| 117 | * @address: user virtual address |
| 118 | * @pfn: location to store found PFN |
| 119 | * |
| 120 | * Only IO mappings and raw PFN mappings are allowed. |
| 121 | * |
| 122 | * Returns zero and the pfn at @pfn on success, -ve otherwise. |
| 123 | */ |
| 124 | int follow_pfn(struct vm_area_struct *vma, unsigned long address, |
| 125 | unsigned long *pfn) |
| 126 | { |
| 127 | if (!(vma->vm_flags & (VM_IO | VM_PFNMAP))) |
| 128 | return -EINVAL; |
| 129 | |
| 130 | *pfn = address >> PAGE_SHIFT; |
| 131 | return 0; |
| 132 | } |
| 133 | EXPORT_SYMBOL(follow_pfn); |
| 134 | |
Joonsoo Kim | f1c4069 | 2013-04-29 15:07:37 -0700 | [diff] [blame] | 135 | LIST_HEAD(vmap_area_list); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 136 | |
Christoph Lameter | b3bdda0 | 2008-02-04 22:28:32 -0800 | [diff] [blame] | 137 | void vfree(const void *addr) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 138 | { |
| 139 | kfree(addr); |
| 140 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 141 | EXPORT_SYMBOL(vfree); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 142 | |
Christoph Hellwig | 88dca4c | 2020-06-01 21:51:40 -0700 | [diff] [blame] | 143 | void *__vmalloc(unsigned long size, gfp_t gfp_mask) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 144 | { |
| 145 | /* |
Robert P. J. Day | 8518609 | 2007-10-19 23:11:38 +0200 | [diff] [blame] | 146 | * You can't specify __GFP_HIGHMEM with kmalloc() since kmalloc() |
| 147 | * returns only a logical address. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 148 | */ |
Nick Piggin | 8409751 | 2006-03-22 00:08:34 -0800 | [diff] [blame] | 149 | return kmalloc(size, (gfp_mask | __GFP_COMP) & ~__GFP_HIGHMEM); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 150 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 151 | EXPORT_SYMBOL(__vmalloc); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 152 | |
Christoph Hellwig | 041de93 | 2020-06-01 21:52:02 -0700 | [diff] [blame] | 153 | void *__vmalloc_node_range(unsigned long size, unsigned long align, |
| 154 | unsigned long start, unsigned long end, gfp_t gfp_mask, |
| 155 | pgprot_t prot, unsigned long vm_flags, int node, |
| 156 | const void *caller) |
| 157 | { |
| 158 | return __vmalloc(size, gfp_mask); |
| 159 | } |
| 160 | |
Christoph Hellwig | 2b90594 | 2020-06-01 21:51:53 -0700 | [diff] [blame] | 161 | void *__vmalloc_node(unsigned long size, unsigned long align, gfp_t gfp_mask, |
| 162 | int node, const void *caller) |
Michal Hocko | a7c3e90 | 2017-05-08 15:57:09 -0700 | [diff] [blame] | 163 | { |
Christoph Hellwig | 2b90594 | 2020-06-01 21:51:53 -0700 | [diff] [blame] | 164 | return __vmalloc(size, gfp_mask); |
Michal Hocko | a7c3e90 | 2017-05-08 15:57:09 -0700 | [diff] [blame] | 165 | } |
| 166 | |
Andrii Nakryiko | ed81745 | 2019-11-23 14:08:35 -0800 | [diff] [blame] | 167 | static void *__vmalloc_user_flags(unsigned long size, gfp_t flags) |
Paul Mundt | f905bc4 | 2008-02-04 22:29:59 -0800 | [diff] [blame] | 168 | { |
| 169 | void *ret; |
| 170 | |
Christoph Hellwig | 88dca4c | 2020-06-01 21:51:40 -0700 | [diff] [blame] | 171 | ret = __vmalloc(size, flags); |
Paul Mundt | f905bc4 | 2008-02-04 22:29:59 -0800 | [diff] [blame] | 172 | if (ret) { |
| 173 | struct vm_area_struct *vma; |
| 174 | |
Michel Lespinasse | d8ed45c | 2020-06-08 21:33:25 -0700 | [diff] [blame] | 175 | mmap_write_lock(current->mm); |
Paul Mundt | f905bc4 | 2008-02-04 22:29:59 -0800 | [diff] [blame] | 176 | vma = find_vma(current->mm, (unsigned long)ret); |
| 177 | if (vma) |
| 178 | vma->vm_flags |= VM_USERMAP; |
Michel Lespinasse | d8ed45c | 2020-06-08 21:33:25 -0700 | [diff] [blame] | 179 | mmap_write_unlock(current->mm); |
Paul Mundt | f905bc4 | 2008-02-04 22:29:59 -0800 | [diff] [blame] | 180 | } |
| 181 | |
| 182 | return ret; |
| 183 | } |
Andrii Nakryiko | ed81745 | 2019-11-23 14:08:35 -0800 | [diff] [blame] | 184 | |
| 185 | void *vmalloc_user(unsigned long size) |
| 186 | { |
| 187 | return __vmalloc_user_flags(size, GFP_KERNEL | __GFP_ZERO); |
| 188 | } |
Paul Mundt | f905bc4 | 2008-02-04 22:29:59 -0800 | [diff] [blame] | 189 | EXPORT_SYMBOL(vmalloc_user); |
| 190 | |
Christoph Lameter | b3bdda0 | 2008-02-04 22:28:32 -0800 | [diff] [blame] | 191 | struct page *vmalloc_to_page(const void *addr) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 192 | { |
| 193 | return virt_to_page(addr); |
| 194 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 195 | EXPORT_SYMBOL(vmalloc_to_page); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 196 | |
Christoph Lameter | b3bdda0 | 2008-02-04 22:28:32 -0800 | [diff] [blame] | 197 | unsigned long vmalloc_to_pfn(const void *addr) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 198 | { |
| 199 | return page_to_pfn(virt_to_page(addr)); |
| 200 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 201 | EXPORT_SYMBOL(vmalloc_to_pfn); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 202 | |
| 203 | long vread(char *buf, char *addr, unsigned long count) |
| 204 | { |
Chen Gang | 9bde916 | 2013-07-03 15:02:36 -0700 | [diff] [blame] | 205 | /* Don't allow overflow */ |
| 206 | if ((unsigned long) buf + count < count) |
| 207 | count = -(unsigned long) buf; |
| 208 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 209 | memcpy(buf, addr, count); |
| 210 | return count; |
| 211 | } |
| 212 | |
| 213 | long vwrite(char *buf, char *addr, unsigned long count) |
| 214 | { |
| 215 | /* Don't allow overflow */ |
| 216 | if ((unsigned long) addr + count < count) |
| 217 | count = -(unsigned long) addr; |
| 218 | |
| 219 | memcpy(addr, buf, count); |
Choi Gi-yong | ac71490 | 2014-04-07 15:37:36 -0700 | [diff] [blame] | 220 | return count; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 221 | } |
| 222 | |
| 223 | /* |
Masahiro Yamada | e1c0506 | 2015-07-07 10:14:59 +0900 | [diff] [blame] | 224 | * vmalloc - allocate virtually contiguous memory |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 225 | * |
| 226 | * @size: allocation size |
| 227 | * |
| 228 | * Allocate enough pages to cover @size from the page level |
Masahiro Yamada | e1c0506 | 2015-07-07 10:14:59 +0900 | [diff] [blame] | 229 | * allocator and map them into contiguous kernel virtual space. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 230 | * |
Michael Opdenacker | c1c8897 | 2006-10-03 23:21:02 +0200 | [diff] [blame] | 231 | * For tight control over page level allocator and protection flags |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 232 | * use __vmalloc() instead. |
| 233 | */ |
| 234 | void *vmalloc(unsigned long size) |
| 235 | { |
Christoph Hellwig | 88dca4c | 2020-06-01 21:51:40 -0700 | [diff] [blame] | 236 | return __vmalloc(size, GFP_KERNEL | __GFP_HIGHMEM); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 237 | } |
Andrew Morton | f613888 | 2006-02-28 16:59:18 -0800 | [diff] [blame] | 238 | EXPORT_SYMBOL(vmalloc); |
| 239 | |
Dave Young | e1ca778 | 2010-10-26 14:22:06 -0700 | [diff] [blame] | 240 | /* |
Masahiro Yamada | e1c0506 | 2015-07-07 10:14:59 +0900 | [diff] [blame] | 241 | * vzalloc - allocate virtually contiguous memory with zero fill |
Dave Young | e1ca778 | 2010-10-26 14:22:06 -0700 | [diff] [blame] | 242 | * |
| 243 | * @size: allocation size |
| 244 | * |
| 245 | * Allocate enough pages to cover @size from the page level |
Masahiro Yamada | e1c0506 | 2015-07-07 10:14:59 +0900 | [diff] [blame] | 246 | * allocator and map them into contiguous kernel virtual space. |
Dave Young | e1ca778 | 2010-10-26 14:22:06 -0700 | [diff] [blame] | 247 | * The memory allocated is set to zero. |
| 248 | * |
| 249 | * For tight control over page level allocator and protection flags |
| 250 | * use __vmalloc() instead. |
| 251 | */ |
| 252 | void *vzalloc(unsigned long size) |
| 253 | { |
Christoph Hellwig | 88dca4c | 2020-06-01 21:51:40 -0700 | [diff] [blame] | 254 | return __vmalloc(size, GFP_KERNEL | __GFP_HIGHMEM | __GFP_ZERO); |
Dave Young | e1ca778 | 2010-10-26 14:22:06 -0700 | [diff] [blame] | 255 | } |
| 256 | EXPORT_SYMBOL(vzalloc); |
| 257 | |
| 258 | /** |
| 259 | * vmalloc_node - allocate memory on a specific node |
| 260 | * @size: allocation size |
| 261 | * @node: numa node |
| 262 | * |
| 263 | * Allocate enough pages to cover @size from the page level |
| 264 | * allocator and map them into contiguous kernel virtual space. |
| 265 | * |
| 266 | * For tight control over page level allocator and protection flags |
| 267 | * use __vmalloc() instead. |
| 268 | */ |
Andrew Morton | f613888 | 2006-02-28 16:59:18 -0800 | [diff] [blame] | 269 | void *vmalloc_node(unsigned long size, int node) |
| 270 | { |
| 271 | return vmalloc(size); |
| 272 | } |
Paul Mundt | 9a14f65 | 2010-12-24 11:50:34 +0900 | [diff] [blame] | 273 | EXPORT_SYMBOL(vmalloc_node); |
Dave Young | e1ca778 | 2010-10-26 14:22:06 -0700 | [diff] [blame] | 274 | |
| 275 | /** |
| 276 | * vzalloc_node - allocate memory on a specific node with zero fill |
| 277 | * @size: allocation size |
| 278 | * @node: numa node |
| 279 | * |
| 280 | * Allocate enough pages to cover @size from the page level |
| 281 | * allocator and map them into contiguous kernel virtual space. |
| 282 | * The memory allocated is set to zero. |
| 283 | * |
| 284 | * For tight control over page level allocator and protection flags |
| 285 | * use __vmalloc() instead. |
| 286 | */ |
| 287 | void *vzalloc_node(unsigned long size, int node) |
| 288 | { |
| 289 | return vzalloc(size); |
| 290 | } |
| 291 | EXPORT_SYMBOL(vzalloc_node); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 292 | |
Paul Mundt | 1af446e | 2008-08-04 16:01:47 +0900 | [diff] [blame] | 293 | /** |
| 294 | * vmalloc_exec - allocate virtually contiguous, executable memory |
| 295 | * @size: allocation size |
| 296 | * |
| 297 | * Kernel-internal function to allocate enough pages to cover @size |
| 298 | * the page level allocator and map them into contiguous and |
| 299 | * executable kernel virtual space. |
| 300 | * |
| 301 | * For tight control over page level allocator and protection flags |
| 302 | * use __vmalloc() instead. |
| 303 | */ |
| 304 | |
| 305 | void *vmalloc_exec(unsigned long size) |
| 306 | { |
Christoph Hellwig | 88dca4c | 2020-06-01 21:51:40 -0700 | [diff] [blame] | 307 | return __vmalloc(size, GFP_KERNEL | __GFP_HIGHMEM); |
Paul Mundt | 1af446e | 2008-08-04 16:01:47 +0900 | [diff] [blame] | 308 | } |
| 309 | |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 310 | /** |
| 311 | * vmalloc_32 - allocate virtually contiguous memory (32bit addressable) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 312 | * @size: allocation size |
| 313 | * |
| 314 | * Allocate enough 32bit PA addressable pages to cover @size from the |
Masahiro Yamada | e1c0506 | 2015-07-07 10:14:59 +0900 | [diff] [blame] | 315 | * page level allocator and map them into contiguous kernel virtual space. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 316 | */ |
| 317 | void *vmalloc_32(unsigned long size) |
| 318 | { |
Christoph Hellwig | 88dca4c | 2020-06-01 21:51:40 -0700 | [diff] [blame] | 319 | return __vmalloc(size, GFP_KERNEL); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 320 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 321 | EXPORT_SYMBOL(vmalloc_32); |
| 322 | |
| 323 | /** |
| 324 | * vmalloc_32_user - allocate zeroed virtually contiguous 32bit memory |
| 325 | * @size: allocation size |
| 326 | * |
| 327 | * The resulting memory area is 32bit addressable and zeroed so it can be |
| 328 | * mapped to userspace without leaking data. |
Paul Mundt | f905bc4 | 2008-02-04 22:29:59 -0800 | [diff] [blame] | 329 | * |
| 330 | * VM_USERMAP is set on the corresponding VMA so that subsequent calls to |
| 331 | * remap_vmalloc_range() are permissible. |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 332 | */ |
| 333 | void *vmalloc_32_user(unsigned long size) |
| 334 | { |
Paul Mundt | f905bc4 | 2008-02-04 22:29:59 -0800 | [diff] [blame] | 335 | /* |
| 336 | * We'll have to sort out the ZONE_DMA bits for 64-bit, |
| 337 | * but for now this can simply use vmalloc_user() directly. |
| 338 | */ |
| 339 | return vmalloc_user(size); |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 340 | } |
| 341 | EXPORT_SYMBOL(vmalloc_32_user); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 342 | |
| 343 | void *vmap(struct page **pages, unsigned int count, unsigned long flags, pgprot_t prot) |
| 344 | { |
| 345 | BUG(); |
| 346 | return NULL; |
| 347 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 348 | EXPORT_SYMBOL(vmap); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 349 | |
Christoph Lameter | b3bdda0 | 2008-02-04 22:28:32 -0800 | [diff] [blame] | 350 | void vunmap(const void *addr) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 351 | { |
| 352 | BUG(); |
| 353 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 354 | EXPORT_SYMBOL(vunmap); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 355 | |
Christoph Hellwig | d4efd79 | 2020-06-01 21:51:27 -0700 | [diff] [blame] | 356 | void *vm_map_ram(struct page **pages, unsigned int count, int node) |
Paul Mundt | eb6434d | 2009-01-21 17:45:47 +0900 | [diff] [blame] | 357 | { |
| 358 | BUG(); |
| 359 | return NULL; |
| 360 | } |
| 361 | EXPORT_SYMBOL(vm_map_ram); |
| 362 | |
| 363 | void vm_unmap_ram(const void *mem, unsigned int count) |
| 364 | { |
| 365 | BUG(); |
| 366 | } |
| 367 | EXPORT_SYMBOL(vm_unmap_ram); |
| 368 | |
| 369 | void vm_unmap_aliases(void) |
| 370 | { |
| 371 | } |
| 372 | EXPORT_SYMBOL_GPL(vm_unmap_aliases); |
| 373 | |
David Vrabel | cd12909 | 2011-09-29 16:53:32 +0100 | [diff] [blame] | 374 | struct vm_struct *alloc_vm_area(size_t size, pte_t **ptes) |
Paul Mundt | 29c185e | 2010-12-24 12:08:30 +0900 | [diff] [blame] | 375 | { |
| 376 | BUG(); |
| 377 | return NULL; |
| 378 | } |
| 379 | EXPORT_SYMBOL_GPL(alloc_vm_area); |
| 380 | |
| 381 | void free_vm_area(struct vm_struct *area) |
| 382 | { |
| 383 | BUG(); |
| 384 | } |
| 385 | EXPORT_SYMBOL_GPL(free_vm_area); |
| 386 | |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 387 | int vm_insert_page(struct vm_area_struct *vma, unsigned long addr, |
| 388 | struct page *page) |
| 389 | { |
| 390 | return -EINVAL; |
| 391 | } |
| 392 | EXPORT_SYMBOL(vm_insert_page); |
| 393 | |
Souptick Joarder | a667d74 | 2019-05-13 17:21:56 -0700 | [diff] [blame] | 394 | int vm_map_pages(struct vm_area_struct *vma, struct page **pages, |
| 395 | unsigned long num) |
| 396 | { |
| 397 | return -EINVAL; |
| 398 | } |
| 399 | EXPORT_SYMBOL(vm_map_pages); |
| 400 | |
| 401 | int vm_map_pages_zero(struct vm_area_struct *vma, struct page **pages, |
| 402 | unsigned long num) |
| 403 | { |
| 404 | return -EINVAL; |
| 405 | } |
| 406 | EXPORT_SYMBOL(vm_map_pages_zero); |
| 407 | |
Christoph Hellwig | 1eeb66a | 2007-05-08 00:27:03 -0700 | [diff] [blame] | 408 | /* |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 409 | * sys_brk() for the most part doesn't need the global kernel |
| 410 | * lock, except when an application is doing something nasty |
| 411 | * like trying to un-brk an area that has already been mapped |
| 412 | * to a regular file. in this case, the unmapping will need |
| 413 | * to invoke file system routines that need the global lock. |
| 414 | */ |
Heiko Carstens | 6a6160a | 2009-01-14 14:14:15 +0100 | [diff] [blame] | 415 | SYSCALL_DEFINE1(brk, unsigned long, brk) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 416 | { |
| 417 | struct mm_struct *mm = current->mm; |
| 418 | |
| 419 | if (brk < mm->start_brk || brk > mm->context.end_brk) |
| 420 | return mm->brk; |
| 421 | |
| 422 | if (mm->brk == brk) |
| 423 | return mm->brk; |
| 424 | |
| 425 | /* |
| 426 | * Always allow shrinking brk |
| 427 | */ |
| 428 | if (brk <= mm->brk) { |
| 429 | mm->brk = brk; |
| 430 | return brk; |
| 431 | } |
| 432 | |
| 433 | /* |
| 434 | * Ok, looks good - let it rip. |
| 435 | */ |
Christoph Hellwig | a75a2df | 2020-06-07 21:42:49 -0700 | [diff] [blame] | 436 | flush_icache_user_range(mm->brk, brk); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 437 | return mm->brk = brk; |
| 438 | } |
| 439 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 440 | /* |
seokhoon.yoon | 3edf41d | 2017-02-24 14:56:44 -0800 | [diff] [blame] | 441 | * initialise the percpu counter for VM and region record slabs |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 442 | */ |
| 443 | void __init mmap_init(void) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 444 | { |
KOSAKI Motohiro | 00a62ce | 2009-04-30 15:08:51 -0700 | [diff] [blame] | 445 | int ret; |
| 446 | |
Tejun Heo | 908c7f1 | 2014-09-08 09:51:29 +0900 | [diff] [blame] | 447 | ret = percpu_counter_init(&vm_committed_as, 0, GFP_KERNEL); |
KOSAKI Motohiro | 00a62ce | 2009-04-30 15:08:51 -0700 | [diff] [blame] | 448 | VM_BUG_ON(ret); |
Vladimir Davydov | 5d09705 | 2016-01-14 15:18:21 -0800 | [diff] [blame] | 449 | vm_region_jar = KMEM_CACHE(vm_region, SLAB_PANIC|SLAB_ACCOUNT); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 450 | } |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 451 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 452 | /* |
| 453 | * validate the region tree |
| 454 | * - the caller must hold the region lock |
| 455 | */ |
| 456 | #ifdef CONFIG_DEBUG_NOMMU_REGIONS |
| 457 | static noinline void validate_nommu_regions(void) |
| 458 | { |
| 459 | struct vm_region *region, *last; |
| 460 | struct rb_node *p, *lastp; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 461 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 462 | lastp = rb_first(&nommu_region_tree); |
| 463 | if (!lastp) |
| 464 | return; |
| 465 | |
| 466 | last = rb_entry(lastp, struct vm_region, vm_rb); |
Geliang Tang | c9427bc | 2015-11-05 18:48:38 -0800 | [diff] [blame] | 467 | BUG_ON(last->vm_end <= last->vm_start); |
| 468 | BUG_ON(last->vm_top < last->vm_end); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 469 | |
| 470 | while ((p = rb_next(lastp))) { |
| 471 | region = rb_entry(p, struct vm_region, vm_rb); |
| 472 | last = rb_entry(lastp, struct vm_region, vm_rb); |
| 473 | |
Geliang Tang | c9427bc | 2015-11-05 18:48:38 -0800 | [diff] [blame] | 474 | BUG_ON(region->vm_end <= region->vm_start); |
| 475 | BUG_ON(region->vm_top < region->vm_end); |
| 476 | BUG_ON(region->vm_start < last->vm_top); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 477 | |
| 478 | lastp = p; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 479 | } |
| 480 | } |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 481 | #else |
David Howells | 33e5d769 | 2009-04-02 16:56:32 -0700 | [diff] [blame] | 482 | static void validate_nommu_regions(void) |
| 483 | { |
| 484 | } |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 485 | #endif |
| 486 | |
| 487 | /* |
| 488 | * add a region into the global tree |
| 489 | */ |
| 490 | static void add_nommu_region(struct vm_region *region) |
| 491 | { |
| 492 | struct vm_region *pregion; |
| 493 | struct rb_node **p, *parent; |
| 494 | |
| 495 | validate_nommu_regions(); |
| 496 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 497 | parent = NULL; |
| 498 | p = &nommu_region_tree.rb_node; |
| 499 | while (*p) { |
| 500 | parent = *p; |
| 501 | pregion = rb_entry(parent, struct vm_region, vm_rb); |
| 502 | if (region->vm_start < pregion->vm_start) |
| 503 | p = &(*p)->rb_left; |
| 504 | else if (region->vm_start > pregion->vm_start) |
| 505 | p = &(*p)->rb_right; |
| 506 | else if (pregion == region) |
| 507 | return; |
| 508 | else |
| 509 | BUG(); |
| 510 | } |
| 511 | |
| 512 | rb_link_node(®ion->vm_rb, parent, p); |
| 513 | rb_insert_color(®ion->vm_rb, &nommu_region_tree); |
| 514 | |
| 515 | validate_nommu_regions(); |
| 516 | } |
| 517 | |
| 518 | /* |
| 519 | * delete a region from the global tree |
| 520 | */ |
| 521 | static void delete_nommu_region(struct vm_region *region) |
| 522 | { |
| 523 | BUG_ON(!nommu_region_tree.rb_node); |
| 524 | |
| 525 | validate_nommu_regions(); |
| 526 | rb_erase(®ion->vm_rb, &nommu_region_tree); |
| 527 | validate_nommu_regions(); |
| 528 | } |
| 529 | |
| 530 | /* |
| 531 | * free a contiguous series of pages |
| 532 | */ |
| 533 | static void free_page_series(unsigned long from, unsigned long to) |
| 534 | { |
| 535 | for (; from < to; from += PAGE_SIZE) { |
| 536 | struct page *page = virt_to_page(from); |
| 537 | |
David Howells | 33e5d769 | 2009-04-02 16:56:32 -0700 | [diff] [blame] | 538 | atomic_long_dec(&mmap_pages_allocated); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 539 | put_page(page); |
| 540 | } |
| 541 | } |
| 542 | |
| 543 | /* |
| 544 | * release a reference to a region |
David Howells | 33e5d769 | 2009-04-02 16:56:32 -0700 | [diff] [blame] | 545 | * - the caller must hold the region semaphore for writing, which this releases |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 546 | * - the region may not have been added to the tree yet, in which case vm_top |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 547 | * will equal vm_start |
| 548 | */ |
| 549 | static void __put_nommu_region(struct vm_region *region) |
| 550 | __releases(nommu_region_sem) |
| 551 | { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 552 | BUG_ON(!nommu_region_tree.rb_node); |
| 553 | |
David Howells | 1e2ae59 | 2010-01-15 17:01:33 -0800 | [diff] [blame] | 554 | if (--region->vm_usage == 0) { |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 555 | if (region->vm_top > region->vm_start) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 556 | delete_nommu_region(region); |
| 557 | up_write(&nommu_region_sem); |
| 558 | |
| 559 | if (region->vm_file) |
| 560 | fput(region->vm_file); |
| 561 | |
| 562 | /* IO memory and memory shared directly out of the pagecache |
| 563 | * from ramfs/tmpfs mustn't be released here */ |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 564 | if (region->vm_flags & VM_MAPPED_COPY) |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 565 | free_page_series(region->vm_start, region->vm_top); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 566 | kmem_cache_free(vm_region_jar, region); |
| 567 | } else { |
| 568 | up_write(&nommu_region_sem); |
| 569 | } |
| 570 | } |
| 571 | |
| 572 | /* |
| 573 | * release a reference to a region |
| 574 | */ |
| 575 | static void put_nommu_region(struct vm_region *region) |
| 576 | { |
| 577 | down_write(&nommu_region_sem); |
| 578 | __put_nommu_region(region); |
| 579 | } |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 580 | |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 581 | /* |
| 582 | * add a VMA into a process's mm_struct in the appropriate place in the list |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 583 | * and tree and add to the address space's page tree also if not an anonymous |
| 584 | * page |
Michel Lespinasse | c1e8d7c | 2020-06-08 21:33:54 -0700 | [diff] [blame^] | 585 | * - should be called with mm->mmap_lock held writelocked |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 586 | */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 587 | static void add_vma_to_mm(struct mm_struct *mm, struct vm_area_struct *vma) |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 588 | { |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 589 | struct vm_area_struct *pvma, *prev; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 590 | struct address_space *mapping; |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 591 | struct rb_node **p, *parent, *rb_prev; |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 592 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 593 | BUG_ON(!vma->vm_region); |
| 594 | |
| 595 | mm->map_count++; |
| 596 | vma->vm_mm = mm; |
| 597 | |
| 598 | /* add the VMA to the mapping */ |
| 599 | if (vma->vm_file) { |
| 600 | mapping = vma->vm_file->f_mapping; |
| 601 | |
Davidlohr Bueso | 83cde9e | 2014-12-12 16:54:21 -0800 | [diff] [blame] | 602 | i_mmap_lock_write(mapping); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 603 | flush_dcache_mmap_lock(mapping); |
Michel Lespinasse | 6b2dbba | 2012-10-08 16:31:25 -0700 | [diff] [blame] | 604 | vma_interval_tree_insert(vma, &mapping->i_mmap); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 605 | flush_dcache_mmap_unlock(mapping); |
Davidlohr Bueso | 83cde9e | 2014-12-12 16:54:21 -0800 | [diff] [blame] | 606 | i_mmap_unlock_write(mapping); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 607 | } |
| 608 | |
| 609 | /* add the VMA to the tree */ |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 610 | parent = rb_prev = NULL; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 611 | p = &mm->mm_rb.rb_node; |
| 612 | while (*p) { |
| 613 | parent = *p; |
| 614 | pvma = rb_entry(parent, struct vm_area_struct, vm_rb); |
| 615 | |
| 616 | /* sort by: start addr, end addr, VMA struct addr in that order |
| 617 | * (the latter is necessary as we may get identical VMAs) */ |
| 618 | if (vma->vm_start < pvma->vm_start) |
| 619 | p = &(*p)->rb_left; |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 620 | else if (vma->vm_start > pvma->vm_start) { |
| 621 | rb_prev = parent; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 622 | p = &(*p)->rb_right; |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 623 | } else if (vma->vm_end < pvma->vm_end) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 624 | p = &(*p)->rb_left; |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 625 | else if (vma->vm_end > pvma->vm_end) { |
| 626 | rb_prev = parent; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 627 | p = &(*p)->rb_right; |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 628 | } else if (vma < pvma) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 629 | p = &(*p)->rb_left; |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 630 | else if (vma > pvma) { |
| 631 | rb_prev = parent; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 632 | p = &(*p)->rb_right; |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 633 | } else |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 634 | BUG(); |
| 635 | } |
| 636 | |
| 637 | rb_link_node(&vma->vm_rb, parent, p); |
| 638 | rb_insert_color(&vma->vm_rb, &mm->mm_rb); |
| 639 | |
| 640 | /* add VMA to the VMA list also */ |
Namhyung Kim | 6038def | 2011-05-24 17:11:22 -0700 | [diff] [blame] | 641 | prev = NULL; |
| 642 | if (rb_prev) |
| 643 | prev = rb_entry(rb_prev, struct vm_area_struct, vm_rb); |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 644 | |
Wei Yang | aba6dfb | 2019-11-30 17:50:53 -0800 | [diff] [blame] | 645 | __vma_link_list(mm, vma, prev); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 646 | } |
| 647 | |
| 648 | /* |
| 649 | * delete a VMA from its owning mm_struct and address space |
| 650 | */ |
| 651 | static void delete_vma_from_mm(struct vm_area_struct *vma) |
| 652 | { |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 653 | int i; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 654 | struct address_space *mapping; |
| 655 | struct mm_struct *mm = vma->vm_mm; |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 656 | struct task_struct *curr = current; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 657 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 658 | mm->map_count--; |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 659 | for (i = 0; i < VMACACHE_SIZE; i++) { |
| 660 | /* if the vma is cached, invalidate the entire cache */ |
Ingo Molnar | 314ff78 | 2017-02-03 11:03:31 +0100 | [diff] [blame] | 661 | if (curr->vmacache.vmas[i] == vma) { |
Steven Miao | e020d5b | 2014-06-23 13:22:02 -0700 | [diff] [blame] | 662 | vmacache_invalidate(mm); |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 663 | break; |
| 664 | } |
| 665 | } |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 666 | |
| 667 | /* remove the VMA from the mapping */ |
| 668 | if (vma->vm_file) { |
| 669 | mapping = vma->vm_file->f_mapping; |
| 670 | |
Davidlohr Bueso | 83cde9e | 2014-12-12 16:54:21 -0800 | [diff] [blame] | 671 | i_mmap_lock_write(mapping); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 672 | flush_dcache_mmap_lock(mapping); |
Michel Lespinasse | 6b2dbba | 2012-10-08 16:31:25 -0700 | [diff] [blame] | 673 | vma_interval_tree_remove(vma, &mapping->i_mmap); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 674 | flush_dcache_mmap_unlock(mapping); |
Davidlohr Bueso | 83cde9e | 2014-12-12 16:54:21 -0800 | [diff] [blame] | 675 | i_mmap_unlock_write(mapping); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 676 | } |
| 677 | |
| 678 | /* remove from the MM's tree and list */ |
| 679 | rb_erase(&vma->vm_rb, &mm->mm_rb); |
Namhyung Kim | b951bf2 | 2011-05-24 17:11:23 -0700 | [diff] [blame] | 680 | |
Wei Yang | 1b9fc5b2 | 2019-11-30 17:50:49 -0800 | [diff] [blame] | 681 | __vma_unlink_list(mm, vma); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 682 | } |
| 683 | |
| 684 | /* |
| 685 | * destroy a VMA record |
| 686 | */ |
| 687 | static void delete_vma(struct mm_struct *mm, struct vm_area_struct *vma) |
| 688 | { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 689 | if (vma->vm_ops && vma->vm_ops->close) |
| 690 | vma->vm_ops->close(vma); |
Konstantin Khlebnikov | e9714ac | 2012-10-08 16:28:54 -0700 | [diff] [blame] | 691 | if (vma->vm_file) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 692 | fput(vma->vm_file); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 693 | put_nommu_region(vma->vm_region); |
Linus Torvalds | 3928d4f | 2018-07-21 13:48:51 -0700 | [diff] [blame] | 694 | vm_area_free(vma); |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 695 | } |
| 696 | |
| 697 | /* |
| 698 | * look up the first VMA in which addr resides, NULL if none |
Michel Lespinasse | c1e8d7c | 2020-06-08 21:33:54 -0700 | [diff] [blame^] | 699 | * - should be called with mm->mmap_lock at least held readlocked |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 700 | */ |
| 701 | struct vm_area_struct *find_vma(struct mm_struct *mm, unsigned long addr) |
| 702 | { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 703 | struct vm_area_struct *vma; |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 704 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 705 | /* check the cache first */ |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 706 | vma = vmacache_find(mm, addr); |
| 707 | if (likely(vma)) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 708 | return vma; |
| 709 | |
Namhyung Kim | e922c4c | 2011-05-24 17:11:24 -0700 | [diff] [blame] | 710 | /* trawl the list (there may be multiple mappings in which addr |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 711 | * resides) */ |
Namhyung Kim | e922c4c | 2011-05-24 17:11:24 -0700 | [diff] [blame] | 712 | for (vma = mm->mmap; vma; vma = vma->vm_next) { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 713 | if (vma->vm_start > addr) |
| 714 | return NULL; |
| 715 | if (vma->vm_end > addr) { |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 716 | vmacache_update(addr, vma); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 717 | return vma; |
| 718 | } |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 719 | } |
| 720 | |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 721 | return NULL; |
| 722 | } |
| 723 | EXPORT_SYMBOL(find_vma); |
| 724 | |
| 725 | /* |
David Howells | 930e652 | 2006-09-27 01:50:22 -0700 | [diff] [blame] | 726 | * find a VMA |
| 727 | * - we don't extend stack VMAs under NOMMU conditions |
| 728 | */ |
| 729 | struct vm_area_struct *find_extend_vma(struct mm_struct *mm, unsigned long addr) |
| 730 | { |
David Howells | 7561e8c | 2010-03-25 16:48:38 +0000 | [diff] [blame] | 731 | return find_vma(mm, addr); |
David Howells | 930e652 | 2006-09-27 01:50:22 -0700 | [diff] [blame] | 732 | } |
| 733 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 734 | /* |
| 735 | * expand a stack to a given address |
| 736 | * - not supported under NOMMU conditions |
| 737 | */ |
Greg Ungerer | 57c8f63 | 2007-07-15 23:38:28 -0700 | [diff] [blame] | 738 | int expand_stack(struct vm_area_struct *vma, unsigned long address) |
| 739 | { |
| 740 | return -ENOMEM; |
| 741 | } |
| 742 | |
David Howells | 930e652 | 2006-09-27 01:50:22 -0700 | [diff] [blame] | 743 | /* |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 744 | * look up the first VMA exactly that exactly matches addr |
Michel Lespinasse | c1e8d7c | 2020-06-08 21:33:54 -0700 | [diff] [blame^] | 745 | * - should be called with mm->mmap_lock at least held readlocked |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 746 | */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 747 | static struct vm_area_struct *find_vma_exact(struct mm_struct *mm, |
| 748 | unsigned long addr, |
| 749 | unsigned long len) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 750 | { |
| 751 | struct vm_area_struct *vma; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 752 | unsigned long end = addr + len; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 753 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 754 | /* check the cache first */ |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 755 | vma = vmacache_find_exact(mm, addr, end); |
| 756 | if (vma) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 757 | return vma; |
| 758 | |
Namhyung Kim | e922c4c | 2011-05-24 17:11:24 -0700 | [diff] [blame] | 759 | /* trawl the list (there may be multiple mappings in which addr |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 760 | * resides) */ |
Namhyung Kim | e922c4c | 2011-05-24 17:11:24 -0700 | [diff] [blame] | 761 | for (vma = mm->mmap; vma; vma = vma->vm_next) { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 762 | if (vma->vm_start < addr) |
| 763 | continue; |
| 764 | if (vma->vm_start > addr) |
| 765 | return NULL; |
| 766 | if (vma->vm_end == end) { |
Davidlohr Bueso | 615d6e8 | 2014-04-07 15:37:25 -0700 | [diff] [blame] | 767 | vmacache_update(addr, vma); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 768 | return vma; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 769 | } |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 770 | } |
| 771 | |
| 772 | return NULL; |
| 773 | } |
| 774 | |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 775 | /* |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 776 | * determine whether a mapping should be permitted and, if so, what sort of |
| 777 | * mapping we're capable of supporting |
| 778 | */ |
| 779 | static int validate_mmap_request(struct file *file, |
| 780 | unsigned long addr, |
| 781 | unsigned long len, |
| 782 | unsigned long prot, |
| 783 | unsigned long flags, |
| 784 | unsigned long pgoff, |
| 785 | unsigned long *_capabilities) |
| 786 | { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 787 | unsigned long capabilities, rlen; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 788 | int ret; |
| 789 | |
| 790 | /* do the simple checks first */ |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 791 | if (flags & MAP_FIXED) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 792 | return -EINVAL; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 793 | |
| 794 | if ((flags & MAP_TYPE) != MAP_PRIVATE && |
| 795 | (flags & MAP_TYPE) != MAP_SHARED) |
| 796 | return -EINVAL; |
| 797 | |
Mike Frysinger | f81cff0d | 2006-12-06 12:02:59 +1000 | [diff] [blame] | 798 | if (!len) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 799 | return -EINVAL; |
| 800 | |
Mike Frysinger | f81cff0d | 2006-12-06 12:02:59 +1000 | [diff] [blame] | 801 | /* Careful about overflows.. */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 802 | rlen = PAGE_ALIGN(len); |
| 803 | if (!rlen || rlen > TASK_SIZE) |
Mike Frysinger | f81cff0d | 2006-12-06 12:02:59 +1000 | [diff] [blame] | 804 | return -ENOMEM; |
| 805 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 806 | /* offset overflow? */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 807 | if ((pgoff + (rlen >> PAGE_SHIFT)) < pgoff) |
Mike Frysinger | f81cff0d | 2006-12-06 12:02:59 +1000 | [diff] [blame] | 808 | return -EOVERFLOW; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 809 | |
| 810 | if (file) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 811 | /* files must support mmap */ |
Al Viro | 72c2d53 | 2013-09-22 16:27:52 -0400 | [diff] [blame] | 812 | if (!file->f_op->mmap) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 813 | return -ENODEV; |
| 814 | |
| 815 | /* work out if what we've got could possibly be shared |
| 816 | * - we support chardevs that provide their own "memory" |
| 817 | * - we support files/blockdevs that are memory backed |
| 818 | */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 819 | if (file->f_op->mmap_capabilities) { |
| 820 | capabilities = file->f_op->mmap_capabilities(file); |
| 821 | } else { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 822 | /* no explicit capabilities set, so assume some |
| 823 | * defaults */ |
Al Viro | 496ad9a | 2013-01-23 17:07:38 -0500 | [diff] [blame] | 824 | switch (file_inode(file)->i_mode & S_IFMT) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 825 | case S_IFREG: |
| 826 | case S_IFBLK: |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 827 | capabilities = NOMMU_MAP_COPY; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 828 | break; |
| 829 | |
| 830 | case S_IFCHR: |
| 831 | capabilities = |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 832 | NOMMU_MAP_DIRECT | |
| 833 | NOMMU_MAP_READ | |
| 834 | NOMMU_MAP_WRITE; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 835 | break; |
| 836 | |
| 837 | default: |
| 838 | return -EINVAL; |
| 839 | } |
| 840 | } |
| 841 | |
| 842 | /* eliminate any capabilities that we can't support on this |
| 843 | * device */ |
| 844 | if (!file->f_op->get_unmapped_area) |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 845 | capabilities &= ~NOMMU_MAP_DIRECT; |
Al Viro | 6e242a1 | 2015-03-31 12:35:13 -0400 | [diff] [blame] | 846 | if (!(file->f_mode & FMODE_CAN_READ)) |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 847 | capabilities &= ~NOMMU_MAP_COPY; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 848 | |
Graff Yang | 28d7a6a | 2009-08-18 14:11:17 -0700 | [diff] [blame] | 849 | /* The file shall have been opened with read permission. */ |
| 850 | if (!(file->f_mode & FMODE_READ)) |
| 851 | return -EACCES; |
| 852 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 853 | if (flags & MAP_SHARED) { |
| 854 | /* do checks for writing, appending and locking */ |
| 855 | if ((prot & PROT_WRITE) && |
| 856 | !(file->f_mode & FMODE_WRITE)) |
| 857 | return -EACCES; |
| 858 | |
Al Viro | 496ad9a | 2013-01-23 17:07:38 -0500 | [diff] [blame] | 859 | if (IS_APPEND(file_inode(file)) && |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 860 | (file->f_mode & FMODE_WRITE)) |
| 861 | return -EACCES; |
| 862 | |
Jeff Layton | d7a0698 | 2014-03-10 09:54:15 -0400 | [diff] [blame] | 863 | if (locks_verify_locked(file)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 864 | return -EAGAIN; |
| 865 | |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 866 | if (!(capabilities & NOMMU_MAP_DIRECT)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 867 | return -ENODEV; |
| 868 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 869 | /* we mustn't privatise shared mappings */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 870 | capabilities &= ~NOMMU_MAP_COPY; |
Choi Gi-yong | ac71490 | 2014-04-07 15:37:36 -0700 | [diff] [blame] | 871 | } else { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 872 | /* we're going to read the file into private memory we |
| 873 | * allocate */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 874 | if (!(capabilities & NOMMU_MAP_COPY)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 875 | return -ENODEV; |
| 876 | |
| 877 | /* we don't permit a private writable mapping to be |
| 878 | * shared with the backing device */ |
| 879 | if (prot & PROT_WRITE) |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 880 | capabilities &= ~NOMMU_MAP_DIRECT; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 881 | } |
| 882 | |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 883 | if (capabilities & NOMMU_MAP_DIRECT) { |
| 884 | if (((prot & PROT_READ) && !(capabilities & NOMMU_MAP_READ)) || |
| 885 | ((prot & PROT_WRITE) && !(capabilities & NOMMU_MAP_WRITE)) || |
| 886 | ((prot & PROT_EXEC) && !(capabilities & NOMMU_MAP_EXEC)) |
Bernd Schmidt | 3c7b204 | 2010-05-25 23:43:00 -0700 | [diff] [blame] | 887 | ) { |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 888 | capabilities &= ~NOMMU_MAP_DIRECT; |
Bernd Schmidt | 3c7b204 | 2010-05-25 23:43:00 -0700 | [diff] [blame] | 889 | if (flags & MAP_SHARED) { |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 890 | pr_warn("MAP_SHARED not completely supported on !MMU\n"); |
Bernd Schmidt | 3c7b204 | 2010-05-25 23:43:00 -0700 | [diff] [blame] | 891 | return -EINVAL; |
| 892 | } |
| 893 | } |
| 894 | } |
| 895 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 896 | /* handle executable mappings and implied executable |
| 897 | * mappings */ |
Eric W. Biederman | 90f8572 | 2015-06-29 14:42:03 -0500 | [diff] [blame] | 898 | if (path_noexec(&file->f_path)) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 899 | if (prot & PROT_EXEC) |
| 900 | return -EPERM; |
Choi Gi-yong | ac71490 | 2014-04-07 15:37:36 -0700 | [diff] [blame] | 901 | } else if ((prot & PROT_READ) && !(prot & PROT_EXEC)) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 902 | /* handle implication of PROT_EXEC by PROT_READ */ |
| 903 | if (current->personality & READ_IMPLIES_EXEC) { |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 904 | if (capabilities & NOMMU_MAP_EXEC) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 905 | prot |= PROT_EXEC; |
| 906 | } |
Choi Gi-yong | ac71490 | 2014-04-07 15:37:36 -0700 | [diff] [blame] | 907 | } else if ((prot & PROT_READ) && |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 908 | (prot & PROT_EXEC) && |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 909 | !(capabilities & NOMMU_MAP_EXEC) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 910 | ) { |
| 911 | /* backing file is not executable, try to copy */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 912 | capabilities &= ~NOMMU_MAP_DIRECT; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 913 | } |
Choi Gi-yong | ac71490 | 2014-04-07 15:37:36 -0700 | [diff] [blame] | 914 | } else { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 915 | /* anonymous mappings are always memory backed and can be |
| 916 | * privately mapped |
| 917 | */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 918 | capabilities = NOMMU_MAP_COPY; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 919 | |
| 920 | /* handle PROT_EXEC implication by PROT_READ */ |
| 921 | if ((prot & PROT_READ) && |
| 922 | (current->personality & READ_IMPLIES_EXEC)) |
| 923 | prot |= PROT_EXEC; |
| 924 | } |
| 925 | |
| 926 | /* allow the security API to have its say */ |
Al Viro | e546785 | 2012-05-30 13:30:51 -0400 | [diff] [blame] | 927 | ret = security_mmap_addr(addr); |
| 928 | if (ret < 0) |
| 929 | return ret; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 930 | |
| 931 | /* looks okay */ |
| 932 | *_capabilities = capabilities; |
| 933 | return 0; |
| 934 | } |
| 935 | |
| 936 | /* |
| 937 | * we've determined that we can make the mapping, now translate what we |
| 938 | * now know into VMA flags |
| 939 | */ |
| 940 | static unsigned long determine_vm_flags(struct file *file, |
| 941 | unsigned long prot, |
| 942 | unsigned long flags, |
| 943 | unsigned long capabilities) |
| 944 | { |
| 945 | unsigned long vm_flags; |
| 946 | |
Dave Hansen | e6bfb70 | 2016-02-12 13:02:31 -0800 | [diff] [blame] | 947 | vm_flags = calc_vm_prot_bits(prot, 0) | calc_vm_flag_bits(flags); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 948 | /* vm_flags |= mm->def_flags; */ |
| 949 | |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 950 | if (!(capabilities & NOMMU_MAP_DIRECT)) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 951 | /* attempt to share read-only copies of mapped file chunks */ |
Bernd Schmidt | 3c7b204 | 2010-05-25 23:43:00 -0700 | [diff] [blame] | 952 | vm_flags |= VM_MAYREAD | VM_MAYWRITE | VM_MAYEXEC; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 953 | if (file && !(prot & PROT_WRITE)) |
| 954 | vm_flags |= VM_MAYSHARE; |
Bernd Schmidt | 3c7b204 | 2010-05-25 23:43:00 -0700 | [diff] [blame] | 955 | } else { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 956 | /* overlay a shareable mapping on the backing device or inode |
| 957 | * if possible - used for chardevs, ramfs/tmpfs/shmfs and |
| 958 | * romfs/cramfs */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 959 | vm_flags |= VM_MAYSHARE | (capabilities & NOMMU_VMFLAGS); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 960 | if (flags & MAP_SHARED) |
Bernd Schmidt | 3c7b204 | 2010-05-25 23:43:00 -0700 | [diff] [blame] | 961 | vm_flags |= VM_SHARED; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 962 | } |
| 963 | |
| 964 | /* refuse to let anyone share private mappings with this process if |
| 965 | * it's being traced - otherwise breakpoints set in it may interfere |
| 966 | * with another untraced process |
| 967 | */ |
Tejun Heo | a288eec | 2011-06-17 16:50:37 +0200 | [diff] [blame] | 968 | if ((flags & MAP_PRIVATE) && current->ptrace) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 969 | vm_flags &= ~VM_MAYSHARE; |
| 970 | |
| 971 | return vm_flags; |
| 972 | } |
| 973 | |
| 974 | /* |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 975 | * set up a shared mapping on a file (the driver or filesystem provides and |
| 976 | * pins the storage) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 977 | */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 978 | static int do_mmap_shared_file(struct vm_area_struct *vma) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 979 | { |
| 980 | int ret; |
| 981 | |
Miklos Szeredi | f74ac01 | 2017-02-20 16:51:23 +0100 | [diff] [blame] | 982 | ret = call_mmap(vma->vm_file, vma); |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 983 | if (ret == 0) { |
| 984 | vma->vm_region->vm_top = vma->vm_region->vm_end; |
David Howells | 645d83c | 2009-09-24 15:13:10 +0100 | [diff] [blame] | 985 | return 0; |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 986 | } |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 987 | if (ret != -ENOSYS) |
| 988 | return ret; |
| 989 | |
David Howells | 3fa3046 | 2010-03-23 13:35:21 -0700 | [diff] [blame] | 990 | /* getting -ENOSYS indicates that direct mmap isn't possible (as |
| 991 | * opposed to tried but failed) so we can only give a suitable error as |
| 992 | * it's not possible to make a private copy if MAP_SHARED was given */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 993 | return -ENODEV; |
| 994 | } |
| 995 | |
| 996 | /* |
| 997 | * set up a private mapping or an anonymous shared mapping |
| 998 | */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 999 | static int do_mmap_private(struct vm_area_struct *vma, |
| 1000 | struct vm_region *region, |
David Howells | 645d83c | 2009-09-24 15:13:10 +0100 | [diff] [blame] | 1001 | unsigned long len, |
| 1002 | unsigned long capabilities) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1003 | { |
Joonsoo Kim | dbc8358 | 2014-12-12 16:55:55 -0800 | [diff] [blame] | 1004 | unsigned long total, point; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1005 | void *base; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1006 | int ret, order; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1007 | |
| 1008 | /* invoke the file's mapping function so that it can keep track of |
| 1009 | * shared mappings on devices or memory |
| 1010 | * - VM_MAYSHARE will be set if it may attempt to share |
| 1011 | */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 1012 | if (capabilities & NOMMU_MAP_DIRECT) { |
Miklos Szeredi | f74ac01 | 2017-02-20 16:51:23 +0100 | [diff] [blame] | 1013 | ret = call_mmap(vma->vm_file, vma); |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1014 | if (ret == 0) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1015 | /* shouldn't return success if we're not sharing */ |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1016 | BUG_ON(!(vma->vm_flags & VM_MAYSHARE)); |
| 1017 | vma->vm_region->vm_top = vma->vm_region->vm_end; |
David Howells | 645d83c | 2009-09-24 15:13:10 +0100 | [diff] [blame] | 1018 | return 0; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1019 | } |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1020 | if (ret != -ENOSYS) |
| 1021 | return ret; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1022 | |
| 1023 | /* getting an ENOSYS error indicates that direct mmap isn't |
| 1024 | * possible (as opposed to tried but failed) so we'll try to |
| 1025 | * make a private copy of the data and map that instead */ |
| 1026 | } |
| 1027 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1028 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1029 | /* allocate some memory to hold the mapping |
| 1030 | * - note that this may not return a page-aligned address if the object |
| 1031 | * we're allocating is smaller than a page |
| 1032 | */ |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1033 | order = get_order(len); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1034 | total = 1 << order; |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1035 | point = len >> PAGE_SHIFT; |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1036 | |
Joonsoo Kim | dbc8358 | 2014-12-12 16:55:55 -0800 | [diff] [blame] | 1037 | /* we don't want to allocate a power-of-2 sized page set */ |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1038 | if (sysctl_nr_trim_pages && total - point >= sysctl_nr_trim_pages) |
Joonsoo Kim | dbc8358 | 2014-12-12 16:55:55 -0800 | [diff] [blame] | 1039 | total = point; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1040 | |
Joonsoo Kim | da61653 | 2015-02-27 15:51:43 -0800 | [diff] [blame] | 1041 | base = alloc_pages_exact(total << PAGE_SHIFT, GFP_KERNEL); |
Joonsoo Kim | dbc8358 | 2014-12-12 16:55:55 -0800 | [diff] [blame] | 1042 | if (!base) |
| 1043 | goto enomem; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1044 | |
Joonsoo Kim | dbc8358 | 2014-12-12 16:55:55 -0800 | [diff] [blame] | 1045 | atomic_long_add(total, &mmap_pages_allocated); |
| 1046 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1047 | region->vm_flags = vma->vm_flags |= VM_MAPPED_COPY; |
| 1048 | region->vm_start = (unsigned long) base; |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1049 | region->vm_end = region->vm_start + len; |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1050 | region->vm_top = region->vm_start + (total << PAGE_SHIFT); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1051 | |
| 1052 | vma->vm_start = region->vm_start; |
| 1053 | vma->vm_end = region->vm_start + len; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1054 | |
| 1055 | if (vma->vm_file) { |
| 1056 | /* read the contents of a file into the copy */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1057 | loff_t fpos; |
| 1058 | |
| 1059 | fpos = vma->vm_pgoff; |
| 1060 | fpos <<= PAGE_SHIFT; |
| 1061 | |
Christoph Hellwig | b4bf802 | 2017-09-01 17:39:17 +0200 | [diff] [blame] | 1062 | ret = kernel_read(vma->vm_file, base, len, &fpos); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1063 | if (ret < 0) |
| 1064 | goto error_free; |
| 1065 | |
| 1066 | /* clear the last little bit */ |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1067 | if (ret < len) |
| 1068 | memset(base + ret, 0, len - ret); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1069 | |
Kirill A. Shutemov | bfd40ea | 2018-07-26 16:37:35 -0700 | [diff] [blame] | 1070 | } else { |
| 1071 | vma_set_anonymous(vma); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1072 | } |
| 1073 | |
| 1074 | return 0; |
| 1075 | |
| 1076 | error_free: |
Namhyung Kim | 7223bb4 | 2011-05-24 17:11:26 -0700 | [diff] [blame] | 1077 | free_page_series(region->vm_start, region->vm_top); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1078 | region->vm_start = vma->vm_start = 0; |
| 1079 | region->vm_end = vma->vm_end = 0; |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1080 | region->vm_top = 0; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1081 | return ret; |
| 1082 | |
| 1083 | enomem: |
Mitchel Humpherys | b1de0d1 | 2014-06-06 14:38:30 -0700 | [diff] [blame] | 1084 | pr_err("Allocation of length %lu from process %d (%s) failed\n", |
Greg Ungerer | 05ae6fa | 2009-01-13 17:30:22 +1000 | [diff] [blame] | 1085 | len, current->pid, current->comm); |
Michal Hocko | 9af744d | 2017-02-22 15:46:16 -0800 | [diff] [blame] | 1086 | show_free_areas(0, NULL); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1087 | return -ENOMEM; |
| 1088 | } |
| 1089 | |
| 1090 | /* |
| 1091 | * handle mapping creation for uClinux |
| 1092 | */ |
Oleg Nesterov | 1fcfd8d | 2015-09-09 15:39:29 -0700 | [diff] [blame] | 1093 | unsigned long do_mmap(struct file *file, |
| 1094 | unsigned long addr, |
| 1095 | unsigned long len, |
| 1096 | unsigned long prot, |
| 1097 | unsigned long flags, |
| 1098 | vm_flags_t vm_flags, |
| 1099 | unsigned long pgoff, |
Mike Rapoport | 897ab3e | 2017-02-24 14:58:22 -0800 | [diff] [blame] | 1100 | unsigned long *populate, |
| 1101 | struct list_head *uf) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1102 | { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1103 | struct vm_area_struct *vma; |
| 1104 | struct vm_region *region; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1105 | struct rb_node *rb; |
Oleg Nesterov | 1fcfd8d | 2015-09-09 15:39:29 -0700 | [diff] [blame] | 1106 | unsigned long capabilities, result; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1107 | int ret; |
| 1108 | |
Michel Lespinasse | 41badc1 | 2013-02-22 16:32:47 -0800 | [diff] [blame] | 1109 | *populate = 0; |
Michel Lespinasse | bebeb3d | 2013-02-22 16:32:37 -0800 | [diff] [blame] | 1110 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1111 | /* decide whether we should attempt the mapping, and if so what sort of |
| 1112 | * mapping */ |
| 1113 | ret = validate_mmap_request(file, addr, len, prot, flags, pgoff, |
| 1114 | &capabilities); |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1115 | if (ret < 0) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1116 | return ret; |
| 1117 | |
David Howells | 06aab5a | 2009-09-24 12:33:48 +0100 | [diff] [blame] | 1118 | /* we ignore the address hint */ |
| 1119 | addr = 0; |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1120 | len = PAGE_ALIGN(len); |
David Howells | 06aab5a | 2009-09-24 12:33:48 +0100 | [diff] [blame] | 1121 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1122 | /* we've determined that we can make the mapping, now translate what we |
| 1123 | * now know into VMA flags */ |
Oleg Nesterov | 1fcfd8d | 2015-09-09 15:39:29 -0700 | [diff] [blame] | 1124 | vm_flags |= determine_vm_flags(file, prot, flags, capabilities); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1125 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1126 | /* we're going to need to record the mapping */ |
| 1127 | region = kmem_cache_zalloc(vm_region_jar, GFP_KERNEL); |
| 1128 | if (!region) |
| 1129 | goto error_getting_region; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1130 | |
Linus Torvalds | 490fc05 | 2018-07-21 15:24:03 -0700 | [diff] [blame] | 1131 | vma = vm_area_alloc(current->mm); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1132 | if (!vma) |
| 1133 | goto error_getting_vma; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1134 | |
David Howells | 1e2ae59 | 2010-01-15 17:01:33 -0800 | [diff] [blame] | 1135 | region->vm_usage = 1; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1136 | region->vm_flags = vm_flags; |
| 1137 | region->vm_pgoff = pgoff; |
| 1138 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1139 | vma->vm_flags = vm_flags; |
| 1140 | vma->vm_pgoff = pgoff; |
| 1141 | |
| 1142 | if (file) { |
Al Viro | cb0942b | 2012-08-27 14:48:26 -0400 | [diff] [blame] | 1143 | region->vm_file = get_file(file); |
| 1144 | vma->vm_file = get_file(file); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1145 | } |
| 1146 | |
| 1147 | down_write(&nommu_region_sem); |
| 1148 | |
| 1149 | /* if we want to share, we need to check for regions created by other |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1150 | * mmap() calls that overlap with our proposed mapping |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1151 | * - we can only share with a superset match on most regular files |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1152 | * - shared mappings on character devices and memory backed files are |
| 1153 | * permitted to overlap inexactly as far as we are concerned for in |
| 1154 | * these cases, sharing is handled in the driver or filesystem rather |
| 1155 | * than here |
| 1156 | */ |
| 1157 | if (vm_flags & VM_MAYSHARE) { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1158 | struct vm_region *pregion; |
| 1159 | unsigned long pglen, rpglen, pgend, rpgend, start; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1160 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1161 | pglen = (len + PAGE_SIZE - 1) >> PAGE_SHIFT; |
| 1162 | pgend = pgoff + pglen; |
David Howells | 165b239 | 2007-03-22 00:11:24 -0800 | [diff] [blame] | 1163 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1164 | for (rb = rb_first(&nommu_region_tree); rb; rb = rb_next(rb)) { |
| 1165 | pregion = rb_entry(rb, struct vm_region, vm_rb); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1166 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1167 | if (!(pregion->vm_flags & VM_MAYSHARE)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1168 | continue; |
| 1169 | |
| 1170 | /* search for overlapping mappings on the same file */ |
Al Viro | 496ad9a | 2013-01-23 17:07:38 -0500 | [diff] [blame] | 1171 | if (file_inode(pregion->vm_file) != |
| 1172 | file_inode(file)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1173 | continue; |
| 1174 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1175 | if (pregion->vm_pgoff >= pgend) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1176 | continue; |
| 1177 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1178 | rpglen = pregion->vm_end - pregion->vm_start; |
| 1179 | rpglen = (rpglen + PAGE_SIZE - 1) >> PAGE_SHIFT; |
| 1180 | rpgend = pregion->vm_pgoff + rpglen; |
| 1181 | if (pgoff >= rpgend) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1182 | continue; |
| 1183 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1184 | /* handle inexactly overlapping matches between |
| 1185 | * mappings */ |
| 1186 | if ((pregion->vm_pgoff != pgoff || rpglen != pglen) && |
| 1187 | !(pgoff >= pregion->vm_pgoff && pgend <= rpgend)) { |
| 1188 | /* new mapping is not a subset of the region */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 1189 | if (!(capabilities & NOMMU_MAP_DIRECT)) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1190 | goto sharing_violation; |
| 1191 | continue; |
| 1192 | } |
| 1193 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1194 | /* we've found a region we can share */ |
David Howells | 1e2ae59 | 2010-01-15 17:01:33 -0800 | [diff] [blame] | 1195 | pregion->vm_usage++; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1196 | vma->vm_region = pregion; |
| 1197 | start = pregion->vm_start; |
| 1198 | start += (pgoff - pregion->vm_pgoff) << PAGE_SHIFT; |
| 1199 | vma->vm_start = start; |
| 1200 | vma->vm_end = start + len; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1201 | |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1202 | if (pregion->vm_flags & VM_MAPPED_COPY) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1203 | vma->vm_flags |= VM_MAPPED_COPY; |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1204 | else { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1205 | ret = do_mmap_shared_file(vma); |
| 1206 | if (ret < 0) { |
| 1207 | vma->vm_region = NULL; |
| 1208 | vma->vm_start = 0; |
| 1209 | vma->vm_end = 0; |
David Howells | 1e2ae59 | 2010-01-15 17:01:33 -0800 | [diff] [blame] | 1210 | pregion->vm_usage--; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1211 | pregion = NULL; |
| 1212 | goto error_just_free; |
| 1213 | } |
| 1214 | } |
| 1215 | fput(region->vm_file); |
| 1216 | kmem_cache_free(vm_region_jar, region); |
| 1217 | region = pregion; |
| 1218 | result = start; |
| 1219 | goto share; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1220 | } |
| 1221 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1222 | /* obtain the address at which to make a shared mapping |
| 1223 | * - this is the hook for quasi-memory character devices to |
| 1224 | * tell us the location of a shared mapping |
| 1225 | */ |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 1226 | if (capabilities & NOMMU_MAP_DIRECT) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1227 | addr = file->f_op->get_unmapped_area(file, addr, len, |
| 1228 | pgoff, flags); |
Namhyung Kim | bb005a5 | 2011-05-24 17:11:27 -0700 | [diff] [blame] | 1229 | if (IS_ERR_VALUE(addr)) { |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1230 | ret = addr; |
Namhyung Kim | bb005a5 | 2011-05-24 17:11:27 -0700 | [diff] [blame] | 1231 | if (ret != -ENOSYS) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1232 | goto error_just_free; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1233 | |
| 1234 | /* the driver refused to tell us where to site |
| 1235 | * the mapping so we'll have to attempt to copy |
| 1236 | * it */ |
Namhyung Kim | bb005a5 | 2011-05-24 17:11:27 -0700 | [diff] [blame] | 1237 | ret = -ENODEV; |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 1238 | if (!(capabilities & NOMMU_MAP_COPY)) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1239 | goto error_just_free; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1240 | |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 1241 | capabilities &= ~NOMMU_MAP_DIRECT; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1242 | } else { |
| 1243 | vma->vm_start = region->vm_start = addr; |
| 1244 | vma->vm_end = region->vm_end = addr + len; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1245 | } |
| 1246 | } |
| 1247 | } |
| 1248 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1249 | vma->vm_region = region; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1250 | |
David Howells | 645d83c | 2009-09-24 15:13:10 +0100 | [diff] [blame] | 1251 | /* set up the mapping |
Christoph Hellwig | b4caecd | 2015-01-14 10:42:32 +0100 | [diff] [blame] | 1252 | * - the region is filled in if NOMMU_MAP_DIRECT is still set |
David Howells | 645d83c | 2009-09-24 15:13:10 +0100 | [diff] [blame] | 1253 | */ |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1254 | if (file && vma->vm_flags & VM_SHARED) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1255 | ret = do_mmap_shared_file(vma); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1256 | else |
David Howells | 645d83c | 2009-09-24 15:13:10 +0100 | [diff] [blame] | 1257 | ret = do_mmap_private(vma, region, len, capabilities); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1258 | if (ret < 0) |
David Howells | 645d83c | 2009-09-24 15:13:10 +0100 | [diff] [blame] | 1259 | goto error_just_free; |
| 1260 | add_nommu_region(region); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1261 | |
Jie Zhang | ea63763 | 2009-12-14 18:00:02 -0800 | [diff] [blame] | 1262 | /* clear anonymous mappings that don't ask for uninitialized data */ |
Christoph Hellwig | 0bf5f94 | 2019-07-16 16:26:27 -0700 | [diff] [blame] | 1263 | if (!vma->vm_file && |
| 1264 | (!IS_ENABLED(CONFIG_MMAP_ALLOW_UNINITIALIZED) || |
| 1265 | !(flags & MAP_UNINITIALIZED))) |
Jie Zhang | ea63763 | 2009-12-14 18:00:02 -0800 | [diff] [blame] | 1266 | memset((void *)region->vm_start, 0, |
| 1267 | region->vm_end - region->vm_start); |
| 1268 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1269 | /* okay... we have a mapping; now we have to register it */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1270 | result = vma->vm_start; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1271 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1272 | current->mm->total_vm += len >> PAGE_SHIFT; |
| 1273 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1274 | share: |
| 1275 | add_vma_to_mm(current->mm, vma); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1276 | |
Mike Frysinger | cfe79c0 | 2010-01-06 17:23:23 +0000 | [diff] [blame] | 1277 | /* we flush the region from the icache only when the first executable |
| 1278 | * mapping of it is made */ |
| 1279 | if (vma->vm_flags & VM_EXEC && !region->vm_icache_flushed) { |
Christoph Hellwig | a75a2df | 2020-06-07 21:42:49 -0700 | [diff] [blame] | 1280 | flush_icache_user_range(region->vm_start, region->vm_end); |
Mike Frysinger | cfe79c0 | 2010-01-06 17:23:23 +0000 | [diff] [blame] | 1281 | region->vm_icache_flushed = true; |
| 1282 | } |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1283 | |
Mike Frysinger | cfe79c0 | 2010-01-06 17:23:23 +0000 | [diff] [blame] | 1284 | up_write(&nommu_region_sem); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1285 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1286 | return result; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1287 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1288 | error_just_free: |
| 1289 | up_write(&nommu_region_sem); |
| 1290 | error: |
David Howells | 89a8640 | 2009-10-30 13:13:26 +0000 | [diff] [blame] | 1291 | if (region->vm_file) |
| 1292 | fput(region->vm_file); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1293 | kmem_cache_free(vm_region_jar, region); |
David Howells | 89a8640 | 2009-10-30 13:13:26 +0000 | [diff] [blame] | 1294 | if (vma->vm_file) |
| 1295 | fput(vma->vm_file); |
Linus Torvalds | 3928d4f | 2018-07-21 13:48:51 -0700 | [diff] [blame] | 1296 | vm_area_free(vma); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1297 | return ret; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1298 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1299 | sharing_violation: |
| 1300 | up_write(&nommu_region_sem); |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1301 | pr_warn("Attempt to share mismatched mappings\n"); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1302 | ret = -EINVAL; |
| 1303 | goto error; |
| 1304 | |
| 1305 | error_getting_vma: |
| 1306 | kmem_cache_free(vm_region_jar, region); |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1307 | pr_warn("Allocation of vma for %lu byte allocation from process %d failed\n", |
| 1308 | len, current->pid); |
Michal Hocko | 9af744d | 2017-02-22 15:46:16 -0800 | [diff] [blame] | 1309 | show_free_areas(0, NULL); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1310 | return -ENOMEM; |
| 1311 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1312 | error_getting_region: |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1313 | pr_warn("Allocation of vm region for %lu byte allocation from process %d failed\n", |
| 1314 | len, current->pid); |
Michal Hocko | 9af744d | 2017-02-22 15:46:16 -0800 | [diff] [blame] | 1315 | show_free_areas(0, NULL); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1316 | return -ENOMEM; |
| 1317 | } |
Linus Torvalds | 6be5ceb | 2012-04-20 17:13:58 -0700 | [diff] [blame] | 1318 | |
Dominik Brodowski | a90f590 | 2018-03-11 11:34:46 +0100 | [diff] [blame] | 1319 | unsigned long ksys_mmap_pgoff(unsigned long addr, unsigned long len, |
| 1320 | unsigned long prot, unsigned long flags, |
| 1321 | unsigned long fd, unsigned long pgoff) |
Hugh Dickins | 66f0dc4 | 2009-12-30 20:17:34 +0000 | [diff] [blame] | 1322 | { |
| 1323 | struct file *file = NULL; |
| 1324 | unsigned long retval = -EBADF; |
| 1325 | |
Al Viro | 120a795 | 2010-10-30 02:54:44 -0400 | [diff] [blame] | 1326 | audit_mmap_fd(fd, flags); |
Hugh Dickins | 66f0dc4 | 2009-12-30 20:17:34 +0000 | [diff] [blame] | 1327 | if (!(flags & MAP_ANONYMOUS)) { |
| 1328 | file = fget(fd); |
| 1329 | if (!file) |
| 1330 | goto out; |
| 1331 | } |
| 1332 | |
| 1333 | flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE); |
| 1334 | |
Greg Ungerer | ad1ed29 | 2012-06-04 14:29:59 +1000 | [diff] [blame] | 1335 | retval = vm_mmap_pgoff(file, addr, len, prot, flags, pgoff); |
Hugh Dickins | 66f0dc4 | 2009-12-30 20:17:34 +0000 | [diff] [blame] | 1336 | |
| 1337 | if (file) |
| 1338 | fput(file); |
| 1339 | out: |
| 1340 | return retval; |
| 1341 | } |
| 1342 | |
Dominik Brodowski | a90f590 | 2018-03-11 11:34:46 +0100 | [diff] [blame] | 1343 | SYSCALL_DEFINE6(mmap_pgoff, unsigned long, addr, unsigned long, len, |
| 1344 | unsigned long, prot, unsigned long, flags, |
| 1345 | unsigned long, fd, unsigned long, pgoff) |
| 1346 | { |
| 1347 | return ksys_mmap_pgoff(addr, len, prot, flags, fd, pgoff); |
| 1348 | } |
| 1349 | |
Christoph Hellwig | a467937 | 2010-03-10 15:21:15 -0800 | [diff] [blame] | 1350 | #ifdef __ARCH_WANT_SYS_OLD_MMAP |
| 1351 | struct mmap_arg_struct { |
| 1352 | unsigned long addr; |
| 1353 | unsigned long len; |
| 1354 | unsigned long prot; |
| 1355 | unsigned long flags; |
| 1356 | unsigned long fd; |
| 1357 | unsigned long offset; |
| 1358 | }; |
| 1359 | |
| 1360 | SYSCALL_DEFINE1(old_mmap, struct mmap_arg_struct __user *, arg) |
| 1361 | { |
| 1362 | struct mmap_arg_struct a; |
| 1363 | |
| 1364 | if (copy_from_user(&a, arg, sizeof(a))) |
| 1365 | return -EFAULT; |
Alexander Kuleshov | 1824cb7 | 2015-11-05 18:46:35 -0800 | [diff] [blame] | 1366 | if (offset_in_page(a.offset)) |
Christoph Hellwig | a467937 | 2010-03-10 15:21:15 -0800 | [diff] [blame] | 1367 | return -EINVAL; |
| 1368 | |
Dominik Brodowski | a90f590 | 2018-03-11 11:34:46 +0100 | [diff] [blame] | 1369 | return ksys_mmap_pgoff(a.addr, a.len, a.prot, a.flags, a.fd, |
| 1370 | a.offset >> PAGE_SHIFT); |
Christoph Hellwig | a467937 | 2010-03-10 15:21:15 -0800 | [diff] [blame] | 1371 | } |
| 1372 | #endif /* __ARCH_WANT_SYS_OLD_MMAP */ |
| 1373 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1374 | /* |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1375 | * split a vma into two pieces at address 'addr', a new vma is allocated either |
| 1376 | * for the first part or the tail. |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1377 | */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1378 | int split_vma(struct mm_struct *mm, struct vm_area_struct *vma, |
| 1379 | unsigned long addr, int new_below) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1380 | { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1381 | struct vm_area_struct *new; |
| 1382 | struct vm_region *region; |
| 1383 | unsigned long npages; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1384 | |
David Howells | 779c102 | 2010-01-15 17:01:34 -0800 | [diff] [blame] | 1385 | /* we're only permitted to split anonymous regions (these should have |
| 1386 | * only a single usage on the region) */ |
| 1387 | if (vma->vm_file) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1388 | return -ENOMEM; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1389 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1390 | if (mm->map_count >= sysctl_max_map_count) |
| 1391 | return -ENOMEM; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1392 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1393 | region = kmem_cache_alloc(vm_region_jar, GFP_KERNEL); |
| 1394 | if (!region) |
| 1395 | return -ENOMEM; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1396 | |
Linus Torvalds | 3928d4f | 2018-07-21 13:48:51 -0700 | [diff] [blame] | 1397 | new = vm_area_dup(vma); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1398 | if (!new) { |
| 1399 | kmem_cache_free(vm_region_jar, region); |
| 1400 | return -ENOMEM; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1401 | } |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1402 | |
| 1403 | /* most fields are the same, copy all, and then fixup */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1404 | *region = *vma->vm_region; |
| 1405 | new->vm_region = region; |
| 1406 | |
| 1407 | npages = (addr - vma->vm_start) >> PAGE_SHIFT; |
| 1408 | |
| 1409 | if (new_below) { |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1410 | region->vm_top = region->vm_end = new->vm_end = addr; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1411 | } else { |
| 1412 | region->vm_start = new->vm_start = addr; |
| 1413 | region->vm_pgoff = new->vm_pgoff += npages; |
| 1414 | } |
| 1415 | |
| 1416 | if (new->vm_ops && new->vm_ops->open) |
| 1417 | new->vm_ops->open(new); |
| 1418 | |
| 1419 | delete_vma_from_mm(vma); |
| 1420 | down_write(&nommu_region_sem); |
| 1421 | delete_nommu_region(vma->vm_region); |
| 1422 | if (new_below) { |
| 1423 | vma->vm_region->vm_start = vma->vm_start = addr; |
| 1424 | vma->vm_region->vm_pgoff = vma->vm_pgoff += npages; |
| 1425 | } else { |
| 1426 | vma->vm_region->vm_end = vma->vm_end = addr; |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1427 | vma->vm_region->vm_top = addr; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1428 | } |
| 1429 | add_nommu_region(vma->vm_region); |
| 1430 | add_nommu_region(new->vm_region); |
| 1431 | up_write(&nommu_region_sem); |
| 1432 | add_vma_to_mm(mm, vma); |
| 1433 | add_vma_to_mm(mm, new); |
| 1434 | return 0; |
| 1435 | } |
| 1436 | |
| 1437 | /* |
| 1438 | * shrink a VMA by removing the specified chunk from either the beginning or |
| 1439 | * the end |
| 1440 | */ |
| 1441 | static int shrink_vma(struct mm_struct *mm, |
| 1442 | struct vm_area_struct *vma, |
| 1443 | unsigned long from, unsigned long to) |
| 1444 | { |
| 1445 | struct vm_region *region; |
| 1446 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1447 | /* adjust the VMA's pointers, which may reposition it in the MM's tree |
| 1448 | * and list */ |
| 1449 | delete_vma_from_mm(vma); |
| 1450 | if (from > vma->vm_start) |
| 1451 | vma->vm_end = from; |
| 1452 | else |
| 1453 | vma->vm_start = to; |
| 1454 | add_vma_to_mm(mm, vma); |
| 1455 | |
| 1456 | /* cut the backing region down to size */ |
| 1457 | region = vma->vm_region; |
David Howells | 1e2ae59 | 2010-01-15 17:01:33 -0800 | [diff] [blame] | 1458 | BUG_ON(region->vm_usage != 1); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1459 | |
| 1460 | down_write(&nommu_region_sem); |
| 1461 | delete_nommu_region(region); |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1462 | if (from > region->vm_start) { |
| 1463 | to = region->vm_top; |
| 1464 | region->vm_top = region->vm_end = from; |
| 1465 | } else { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1466 | region->vm_start = to; |
Paul Mundt | dd8632a | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1467 | } |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1468 | add_nommu_region(region); |
| 1469 | up_write(&nommu_region_sem); |
| 1470 | |
| 1471 | free_page_series(from, to); |
| 1472 | return 0; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1473 | } |
| 1474 | |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1475 | /* |
| 1476 | * release a mapping |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1477 | * - under NOMMU conditions the chunk to be unmapped must be backed by a single |
| 1478 | * VMA, though it need not cover the whole VMA |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1479 | */ |
Mike Rapoport | 897ab3e | 2017-02-24 14:58:22 -0800 | [diff] [blame] | 1480 | int do_munmap(struct mm_struct *mm, unsigned long start, size_t len, struct list_head *uf) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1481 | { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1482 | struct vm_area_struct *vma; |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1483 | unsigned long end; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1484 | int ret; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1485 | |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1486 | len = PAGE_ALIGN(len); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1487 | if (len == 0) |
| 1488 | return -EINVAL; |
| 1489 | |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1490 | end = start + len; |
| 1491 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1492 | /* find the first potentially overlapping VMA */ |
| 1493 | vma = find_vma(mm, start); |
| 1494 | if (!vma) { |
Choi Gi-yong | ac71490 | 2014-04-07 15:37:36 -0700 | [diff] [blame] | 1495 | static int limit; |
David Howells | 33e5d769 | 2009-04-02 16:56:32 -0700 | [diff] [blame] | 1496 | if (limit < 5) { |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1497 | pr_warn("munmap of memory not mmapped by process %d (%s): 0x%lx-0x%lx\n", |
| 1498 | current->pid, current->comm, |
| 1499 | start, start + len - 1); |
David Howells | 33e5d769 | 2009-04-02 16:56:32 -0700 | [diff] [blame] | 1500 | limit++; |
| 1501 | } |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1502 | return -EINVAL; |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1503 | } |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1504 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1505 | /* we're allowed to split an anonymous VMA but not a file-backed one */ |
| 1506 | if (vma->vm_file) { |
| 1507 | do { |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1508 | if (start > vma->vm_start) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1509 | return -EINVAL; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1510 | if (end == vma->vm_end) |
| 1511 | goto erase_whole_vma; |
Namhyung Kim | d75a310 | 2011-05-24 17:11:25 -0700 | [diff] [blame] | 1512 | vma = vma->vm_next; |
| 1513 | } while (vma); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1514 | return -EINVAL; |
| 1515 | } else { |
| 1516 | /* the chunk must be a subset of the VMA found */ |
| 1517 | if (start == vma->vm_start && end == vma->vm_end) |
| 1518 | goto erase_whole_vma; |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1519 | if (start < vma->vm_start || end > vma->vm_end) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1520 | return -EINVAL; |
Alexander Kuleshov | 1824cb7 | 2015-11-05 18:46:35 -0800 | [diff] [blame] | 1521 | if (offset_in_page(start)) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1522 | return -EINVAL; |
Alexander Kuleshov | 1824cb7 | 2015-11-05 18:46:35 -0800 | [diff] [blame] | 1523 | if (end != vma->vm_end && offset_in_page(end)) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1524 | return -EINVAL; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1525 | if (start != vma->vm_start && end != vma->vm_end) { |
| 1526 | ret = split_vma(mm, vma, start, 1); |
Leon Romanovsky | 22cc877 | 2015-06-24 16:57:47 -0700 | [diff] [blame] | 1527 | if (ret < 0) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1528 | return ret; |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1529 | } |
| 1530 | return shrink_vma(mm, vma, start, end); |
| 1531 | } |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1532 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1533 | erase_whole_vma: |
| 1534 | delete_vma_from_mm(vma); |
| 1535 | delete_vma(mm, vma); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1536 | return 0; |
| 1537 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 1538 | EXPORT_SYMBOL(do_munmap); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1539 | |
Al Viro | bfce281 | 2012-04-20 21:57:04 -0400 | [diff] [blame] | 1540 | int vm_munmap(unsigned long addr, size_t len) |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1541 | { |
Al Viro | bfce281 | 2012-04-20 21:57:04 -0400 | [diff] [blame] | 1542 | struct mm_struct *mm = current->mm; |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1543 | int ret; |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1544 | |
Michel Lespinasse | d8ed45c | 2020-06-08 21:33:25 -0700 | [diff] [blame] | 1545 | mmap_write_lock(mm); |
Mike Rapoport | 897ab3e | 2017-02-24 14:58:22 -0800 | [diff] [blame] | 1546 | ret = do_munmap(mm, addr, len, NULL); |
Michel Lespinasse | d8ed45c | 2020-06-08 21:33:25 -0700 | [diff] [blame] | 1547 | mmap_write_unlock(mm); |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1548 | return ret; |
| 1549 | } |
Linus Torvalds | a46ef99 | 2012-04-20 16:20:01 -0700 | [diff] [blame] | 1550 | EXPORT_SYMBOL(vm_munmap); |
| 1551 | |
| 1552 | SYSCALL_DEFINE2(munmap, unsigned long, addr, size_t, len) |
| 1553 | { |
Al Viro | bfce281 | 2012-04-20 21:57:04 -0400 | [diff] [blame] | 1554 | return vm_munmap(addr, len); |
Linus Torvalds | a46ef99 | 2012-04-20 16:20:01 -0700 | [diff] [blame] | 1555 | } |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1556 | |
| 1557 | /* |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1558 | * release all the mappings made in a process's VM space |
David Howells | 3034097 | 2006-09-27 01:50:20 -0700 | [diff] [blame] | 1559 | */ |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1560 | void exit_mmap(struct mm_struct *mm) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1561 | { |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1562 | struct vm_area_struct *vma; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1563 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1564 | if (!mm) |
| 1565 | return; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1566 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1567 | mm->total_vm = 0; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1568 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1569 | while ((vma = mm->mmap)) { |
| 1570 | mm->mmap = vma->vm_next; |
| 1571 | delete_vma_from_mm(vma); |
| 1572 | delete_vma(mm, vma); |
Steven J. Magnani | 04c3496 | 2010-11-24 12:56:54 -0800 | [diff] [blame] | 1573 | cond_resched(); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1574 | } |
| 1575 | } |
| 1576 | |
Linus Torvalds | 5d22fc2 | 2016-05-27 15:57:31 -0700 | [diff] [blame] | 1577 | int vm_brk(unsigned long addr, unsigned long len) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1578 | { |
| 1579 | return -ENOMEM; |
| 1580 | } |
| 1581 | |
| 1582 | /* |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1583 | * expand (or shrink) an existing mapping, potentially moving it at the same |
| 1584 | * time (controlled by the MREMAP_MAYMOVE flag and available VM space) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1585 | * |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1586 | * under NOMMU conditions, we only permit changing a mapping's size, and only |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1587 | * as long as it stays within the region allocated by do_mmap_private() and the |
| 1588 | * block is not shareable |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1589 | * |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1590 | * MREMAP_FIXED is not supported under NOMMU conditions |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1591 | */ |
Al Viro | 4b377ba | 2013-03-04 10:47:59 -0500 | [diff] [blame] | 1592 | static unsigned long do_mremap(unsigned long addr, |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1593 | unsigned long old_len, unsigned long new_len, |
| 1594 | unsigned long flags, unsigned long new_addr) |
| 1595 | { |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1596 | struct vm_area_struct *vma; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1597 | |
| 1598 | /* insanity checks first */ |
Bob Liu | f67d9b1 | 2011-05-24 17:12:56 -0700 | [diff] [blame] | 1599 | old_len = PAGE_ALIGN(old_len); |
| 1600 | new_len = PAGE_ALIGN(new_len); |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1601 | if (old_len == 0 || new_len == 0) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1602 | return (unsigned long) -EINVAL; |
| 1603 | |
Alexander Kuleshov | 1824cb7 | 2015-11-05 18:46:35 -0800 | [diff] [blame] | 1604 | if (offset_in_page(addr)) |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1605 | return -EINVAL; |
| 1606 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1607 | if (flags & MREMAP_FIXED && new_addr != addr) |
| 1608 | return (unsigned long) -EINVAL; |
| 1609 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1610 | vma = find_vma_exact(current->mm, addr, old_len); |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1611 | if (!vma) |
| 1612 | return (unsigned long) -EINVAL; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1613 | |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1614 | if (vma->vm_end != vma->vm_start + old_len) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1615 | return (unsigned long) -EFAULT; |
| 1616 | |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1617 | if (vma->vm_flags & VM_MAYSHARE) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1618 | return (unsigned long) -EPERM; |
| 1619 | |
David Howells | 8feae13 | 2009-01-08 12:04:47 +0000 | [diff] [blame] | 1620 | if (new_len > vma->vm_region->vm_end - vma->vm_region->vm_start) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1621 | return (unsigned long) -ENOMEM; |
| 1622 | |
| 1623 | /* all checks complete - do it */ |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1624 | vma->vm_end = vma->vm_start + new_len; |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1625 | return vma->vm_start; |
| 1626 | } |
| 1627 | |
Heiko Carstens | 6a6160a | 2009-01-14 14:14:15 +0100 | [diff] [blame] | 1628 | SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, |
| 1629 | unsigned long, new_len, unsigned long, flags, |
| 1630 | unsigned long, new_addr) |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1631 | { |
| 1632 | unsigned long ret; |
| 1633 | |
Michel Lespinasse | d8ed45c | 2020-06-08 21:33:25 -0700 | [diff] [blame] | 1634 | mmap_write_lock(current->mm); |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1635 | ret = do_mremap(addr, old_len, new_len, flags, new_addr); |
Michel Lespinasse | d8ed45c | 2020-06-08 21:33:25 -0700 | [diff] [blame] | 1636 | mmap_write_unlock(current->mm); |
David Howells | 6fa5f80 | 2006-09-27 01:50:21 -0700 | [diff] [blame] | 1637 | return ret; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1638 | } |
| 1639 | |
Keith Busch | df06b37 | 2018-10-26 15:10:28 -0700 | [diff] [blame] | 1640 | struct page *follow_page(struct vm_area_struct *vma, unsigned long address, |
| 1641 | unsigned int foll_flags) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1642 | { |
| 1643 | return NULL; |
| 1644 | } |
| 1645 | |
Bob Liu | 8f3b132 | 2011-07-08 15:39:46 -0700 | [diff] [blame] | 1646 | int remap_pfn_range(struct vm_area_struct *vma, unsigned long addr, |
| 1647 | unsigned long pfn, unsigned long size, pgprot_t prot) |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1648 | { |
Bob Liu | 8f3b132 | 2011-07-08 15:39:46 -0700 | [diff] [blame] | 1649 | if (addr != (pfn << PAGE_SHIFT)) |
| 1650 | return -EINVAL; |
| 1651 | |
Konstantin Khlebnikov | 314e51b | 2012-10-08 16:29:02 -0700 | [diff] [blame] | 1652 | vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP; |
Greg Ungerer | 66aa2b4 | 2005-09-12 11:18:10 +1000 | [diff] [blame] | 1653 | return 0; |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1654 | } |
Luke Yang | 22c4af4 | 2006-07-14 00:24:09 -0700 | [diff] [blame] | 1655 | EXPORT_SYMBOL(remap_pfn_range); |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1656 | |
Linus Torvalds | 3c0b9de | 2013-04-27 13:25:38 -0700 | [diff] [blame] | 1657 | int vm_iomap_memory(struct vm_area_struct *vma, phys_addr_t start, unsigned long len) |
| 1658 | { |
| 1659 | unsigned long pfn = start >> PAGE_SHIFT; |
| 1660 | unsigned long vm_len = vma->vm_end - vma->vm_start; |
| 1661 | |
| 1662 | pfn += vma->vm_pgoff; |
| 1663 | return io_remap_pfn_range(vma, vma->vm_start, pfn, vm_len, vma->vm_page_prot); |
| 1664 | } |
| 1665 | EXPORT_SYMBOL(vm_iomap_memory); |
| 1666 | |
Paul Mundt | f905bc4 | 2008-02-04 22:29:59 -0800 | [diff] [blame] | 1667 | int remap_vmalloc_range(struct vm_area_struct *vma, void *addr, |
| 1668 | unsigned long pgoff) |
| 1669 | { |
| 1670 | unsigned int size = vma->vm_end - vma->vm_start; |
| 1671 | |
| 1672 | if (!(vma->vm_flags & VM_USERMAP)) |
| 1673 | return -EINVAL; |
| 1674 | |
| 1675 | vma->vm_start = (unsigned long)(addr + (pgoff << PAGE_SHIFT)); |
| 1676 | vma->vm_end = vma->vm_start + size; |
| 1677 | |
| 1678 | return 0; |
| 1679 | } |
| 1680 | EXPORT_SYMBOL(remap_vmalloc_range); |
| 1681 | |
Linus Torvalds | 1da177e | 2005-04-16 15:20:36 -0700 | [diff] [blame] | 1682 | unsigned long arch_get_unmapped_area(struct file *file, unsigned long addr, |
| 1683 | unsigned long len, unsigned long pgoff, unsigned long flags) |
| 1684 | { |
| 1685 | return -ENOMEM; |
| 1686 | } |
| 1687 | |
Souptick Joarder | 2bcd645 | 2018-06-07 17:08:00 -0700 | [diff] [blame] | 1688 | vm_fault_t filemap_fault(struct vm_fault *vmf) |
David Howells | b0e1519 | 2006-01-06 00:11:42 -0800 | [diff] [blame] | 1689 | { |
| 1690 | BUG(); |
Nick Piggin | d0217ac | 2007-07-19 01:47:03 -0700 | [diff] [blame] | 1691 | return 0; |
David Howells | b0e1519 | 2006-01-06 00:11:42 -0800 | [diff] [blame] | 1692 | } |
Paul Mundt | b507317 | 2007-07-21 04:37:25 -0700 | [diff] [blame] | 1693 | EXPORT_SYMBOL(filemap_fault); |
David Howells | 0ec76a1 | 2006-09-27 01:50:15 -0700 | [diff] [blame] | 1694 | |
Jan Kara | 82b0f8c | 2016-12-14 15:06:58 -0800 | [diff] [blame] | 1695 | void filemap_map_pages(struct vm_fault *vmf, |
Kirill A. Shutemov | bae473a | 2016-07-26 15:25:20 -0700 | [diff] [blame] | 1696 | pgoff_t start_pgoff, pgoff_t end_pgoff) |
Kirill A. Shutemov | f182036 | 2014-04-07 15:37:19 -0700 | [diff] [blame] | 1697 | { |
| 1698 | BUG(); |
| 1699 | } |
| 1700 | EXPORT_SYMBOL(filemap_map_pages); |
| 1701 | |
Eric W. Biederman | 84d77d3 | 2016-11-22 12:06:50 -0600 | [diff] [blame] | 1702 | int __access_remote_vm(struct task_struct *tsk, struct mm_struct *mm, |
Lorenzo Stoakes | 442486e | 2016-10-13 01:20:18 +0100 | [diff] [blame] | 1703 | unsigned long addr, void *buf, int len, unsigned int gup_flags) |
David Howells | 0ec76a1 | 2006-09-27 01:50:15 -0700 | [diff] [blame] | 1704 | { |
David Howells | 0ec76a1 | 2006-09-27 01:50:15 -0700 | [diff] [blame] | 1705 | struct vm_area_struct *vma; |
Lorenzo Stoakes | 442486e | 2016-10-13 01:20:18 +0100 | [diff] [blame] | 1706 | int write = gup_flags & FOLL_WRITE; |
David Howells | 0ec76a1 | 2006-09-27 01:50:15 -0700 | [diff] [blame] | 1707 | |
Michel Lespinasse | d8ed45c | 2020-06-08 21:33:25 -0700 | [diff] [blame] | 1708 | if (mmap_read_lock_killable(mm)) |
Konstantin Khlebnikov | 1e426fe | 2019-07-11 21:00:07 -0700 | [diff] [blame] | 1709 | return 0; |
David Howells | 0ec76a1 | 2006-09-27 01:50:15 -0700 | [diff] [blame] | 1710 | |
| 1711 | /* the access must start within one of the target process's mappings */ |
David Howells | 0159b14 | 2006-09-27 01:50:16 -0700 | [diff] [blame] | 1712 | vma = find_vma(mm, addr); |
| 1713 | if (vma) { |
David Howells | 0ec76a1 | 2006-09-27 01:50:15 -0700 | [diff] [blame] | 1714 | /* don't overrun this mapping */ |
| 1715 | if (addr + len >= vma->vm_end) |
| 1716 | len = vma->vm_end - addr; |
| 1717 | |
| 1718 | /* only read or write mappings where it is permitted */ |
David Howells | d00c7b99 | 2006-09-27 01:50:19 -0700 | [diff] [blame] | 1719 | if (write && vma->vm_flags & VM_MAYWRITE) |
Jie Zhang | 7959722 | 2010-01-06 17:23:28 +0000 | [diff] [blame] | 1720 | copy_to_user_page(vma, NULL, addr, |
| 1721 | (void *) addr, buf, len); |
David Howells | d00c7b99 | 2006-09-27 01:50:19 -0700 | [diff] [blame] | 1722 | else if (!write && vma->vm_flags & VM_MAYREAD) |
Jie Zhang | 7959722 | 2010-01-06 17:23:28 +0000 | [diff] [blame] | 1723 | copy_from_user_page(vma, NULL, addr, |
| 1724 | buf, (void *) addr, len); |
David Howells | 0ec76a1 | 2006-09-27 01:50:15 -0700 | [diff] [blame] | 1725 | else |
| 1726 | len = 0; |
| 1727 | } else { |
| 1728 | len = 0; |
| 1729 | } |
| 1730 | |
Michel Lespinasse | d8ed45c | 2020-06-08 21:33:25 -0700 | [diff] [blame] | 1731 | mmap_read_unlock(mm); |
Mike Frysinger | f55f199 | 2011-03-29 14:05:12 +0100 | [diff] [blame] | 1732 | |
| 1733 | return len; |
| 1734 | } |
| 1735 | |
| 1736 | /** |
Mike Rapoport | b7701a5 | 2018-02-06 15:42:13 -0800 | [diff] [blame] | 1737 | * access_remote_vm - access another process' address space |
Mike Frysinger | f55f199 | 2011-03-29 14:05:12 +0100 | [diff] [blame] | 1738 | * @mm: the mm_struct of the target address space |
| 1739 | * @addr: start address to access |
| 1740 | * @buf: source or destination buffer |
| 1741 | * @len: number of bytes to transfer |
Lorenzo Stoakes | 6347e8d | 2016-10-13 01:20:19 +0100 | [diff] [blame] | 1742 | * @gup_flags: flags modifying lookup behaviour |
Mike Frysinger | f55f199 | 2011-03-29 14:05:12 +0100 | [diff] [blame] | 1743 | * |
| 1744 | * The caller must hold a reference on @mm. |
| 1745 | */ |
| 1746 | int access_remote_vm(struct mm_struct *mm, unsigned long addr, |
Lorenzo Stoakes | 6347e8d | 2016-10-13 01:20:19 +0100 | [diff] [blame] | 1747 | void *buf, int len, unsigned int gup_flags) |
Mike Frysinger | f55f199 | 2011-03-29 14:05:12 +0100 | [diff] [blame] | 1748 | { |
Lorenzo Stoakes | 6347e8d | 2016-10-13 01:20:19 +0100 | [diff] [blame] | 1749 | return __access_remote_vm(NULL, mm, addr, buf, len, gup_flags); |
Mike Frysinger | f55f199 | 2011-03-29 14:05:12 +0100 | [diff] [blame] | 1750 | } |
| 1751 | |
| 1752 | /* |
| 1753 | * Access another process' address space. |
| 1754 | * - source/target buffer must be kernel space |
| 1755 | */ |
Lorenzo Stoakes | f307ab6 | 2016-10-13 01:20:20 +0100 | [diff] [blame] | 1756 | int access_process_vm(struct task_struct *tsk, unsigned long addr, void *buf, int len, |
| 1757 | unsigned int gup_flags) |
Mike Frysinger | f55f199 | 2011-03-29 14:05:12 +0100 | [diff] [blame] | 1758 | { |
| 1759 | struct mm_struct *mm; |
| 1760 | |
| 1761 | if (addr + len < addr) |
| 1762 | return 0; |
| 1763 | |
| 1764 | mm = get_task_mm(tsk); |
| 1765 | if (!mm) |
| 1766 | return 0; |
| 1767 | |
Lorenzo Stoakes | f307ab6 | 2016-10-13 01:20:20 +0100 | [diff] [blame] | 1768 | len = __access_remote_vm(tsk, mm, addr, buf, len, gup_flags); |
Mike Frysinger | f55f199 | 2011-03-29 14:05:12 +0100 | [diff] [blame] | 1769 | |
David Howells | 0ec76a1 | 2006-09-27 01:50:15 -0700 | [diff] [blame] | 1770 | mmput(mm); |
| 1771 | return len; |
| 1772 | } |
Catalin Marinas | fcd3585 | 2016-11-01 14:43:25 -0700 | [diff] [blame] | 1773 | EXPORT_SYMBOL_GPL(access_process_vm); |
David Howells | 7e66087 | 2010-01-15 17:01:39 -0800 | [diff] [blame] | 1774 | |
| 1775 | /** |
| 1776 | * nommu_shrink_inode_mappings - Shrink the shared mappings on an inode |
| 1777 | * @inode: The inode to check |
| 1778 | * @size: The current filesize of the inode |
| 1779 | * @newsize: The proposed filesize of the inode |
| 1780 | * |
| 1781 | * Check the shared mappings on an inode on behalf of a shrinking truncate to |
| 1782 | * make sure that that any outstanding VMAs aren't broken and then shrink the |
| 1783 | * vm_regions that extend that beyond so that do_mmap_pgoff() doesn't |
| 1784 | * automatically grant mappings that are too large. |
| 1785 | */ |
| 1786 | int nommu_shrink_inode_mappings(struct inode *inode, size_t size, |
| 1787 | size_t newsize) |
| 1788 | { |
| 1789 | struct vm_area_struct *vma; |
David Howells | 7e66087 | 2010-01-15 17:01:39 -0800 | [diff] [blame] | 1790 | struct vm_region *region; |
| 1791 | pgoff_t low, high; |
| 1792 | size_t r_size, r_top; |
| 1793 | |
| 1794 | low = newsize >> PAGE_SHIFT; |
| 1795 | high = (size + PAGE_SIZE - 1) >> PAGE_SHIFT; |
| 1796 | |
| 1797 | down_write(&nommu_region_sem); |
Davidlohr Bueso | 1acf2e0 | 2014-12-12 16:54:39 -0800 | [diff] [blame] | 1798 | i_mmap_lock_read(inode->i_mapping); |
David Howells | 7e66087 | 2010-01-15 17:01:39 -0800 | [diff] [blame] | 1799 | |
| 1800 | /* search for VMAs that fall within the dead zone */ |
Michel Lespinasse | 6b2dbba | 2012-10-08 16:31:25 -0700 | [diff] [blame] | 1801 | vma_interval_tree_foreach(vma, &inode->i_mapping->i_mmap, low, high) { |
David Howells | 7e66087 | 2010-01-15 17:01:39 -0800 | [diff] [blame] | 1802 | /* found one - only interested if it's shared out of the page |
| 1803 | * cache */ |
| 1804 | if (vma->vm_flags & VM_SHARED) { |
Davidlohr Bueso | 1acf2e0 | 2014-12-12 16:54:39 -0800 | [diff] [blame] | 1805 | i_mmap_unlock_read(inode->i_mapping); |
David Howells | 7e66087 | 2010-01-15 17:01:39 -0800 | [diff] [blame] | 1806 | up_write(&nommu_region_sem); |
| 1807 | return -ETXTBSY; /* not quite true, but near enough */ |
| 1808 | } |
| 1809 | } |
| 1810 | |
| 1811 | /* reduce any regions that overlap the dead zone - if in existence, |
| 1812 | * these will be pointed to by VMAs that don't overlap the dead zone |
| 1813 | * |
| 1814 | * we don't check for any regions that start beyond the EOF as there |
| 1815 | * shouldn't be any |
| 1816 | */ |
Davidlohr Bueso | 1acf2e0 | 2014-12-12 16:54:39 -0800 | [diff] [blame] | 1817 | vma_interval_tree_foreach(vma, &inode->i_mapping->i_mmap, 0, ULONG_MAX) { |
David Howells | 7e66087 | 2010-01-15 17:01:39 -0800 | [diff] [blame] | 1818 | if (!(vma->vm_flags & VM_SHARED)) |
| 1819 | continue; |
| 1820 | |
| 1821 | region = vma->vm_region; |
| 1822 | r_size = region->vm_top - region->vm_start; |
| 1823 | r_top = (region->vm_pgoff << PAGE_SHIFT) + r_size; |
| 1824 | |
| 1825 | if (r_top > newsize) { |
| 1826 | region->vm_top -= r_top - newsize; |
| 1827 | if (region->vm_end > region->vm_top) |
| 1828 | region->vm_end = region->vm_top; |
| 1829 | } |
| 1830 | } |
| 1831 | |
Davidlohr Bueso | 1acf2e0 | 2014-12-12 16:54:39 -0800 | [diff] [blame] | 1832 | i_mmap_unlock_read(inode->i_mapping); |
David Howells | 7e66087 | 2010-01-15 17:01:39 -0800 | [diff] [blame] | 1833 | up_write(&nommu_region_sem); |
| 1834 | return 0; |
| 1835 | } |
Andrew Shewmaker | c9b1d09 | 2013-04-29 15:08:10 -0700 | [diff] [blame] | 1836 | |
| 1837 | /* |
| 1838 | * Initialise sysctl_user_reserve_kbytes. |
| 1839 | * |
| 1840 | * This is intended to prevent a user from starting a single memory hogging |
| 1841 | * process, such that they cannot recover (kill the hog) in OVERCOMMIT_NEVER |
| 1842 | * mode. |
| 1843 | * |
| 1844 | * The default value is min(3% of free memory, 128MB) |
| 1845 | * 128MB is enough to recover with sshd/login, bash, and top/kill. |
| 1846 | */ |
| 1847 | static int __meminit init_user_reserve(void) |
| 1848 | { |
| 1849 | unsigned long free_kbytes; |
| 1850 | |
Michal Hocko | c41f012 | 2017-09-06 16:23:36 -0700 | [diff] [blame] | 1851 | free_kbytes = global_zone_page_state(NR_FREE_PAGES) << (PAGE_SHIFT - 10); |
Andrew Shewmaker | c9b1d09 | 2013-04-29 15:08:10 -0700 | [diff] [blame] | 1852 | |
| 1853 | sysctl_user_reserve_kbytes = min(free_kbytes / 32, 1UL << 17); |
| 1854 | return 0; |
| 1855 | } |
Paul Gortmaker | a4bc6fc | 2015-05-01 20:08:20 -0400 | [diff] [blame] | 1856 | subsys_initcall(init_user_reserve); |
Andrew Shewmaker | 4eeab4f | 2013-04-29 15:08:11 -0700 | [diff] [blame] | 1857 | |
| 1858 | /* |
| 1859 | * Initialise sysctl_admin_reserve_kbytes. |
| 1860 | * |
| 1861 | * The purpose of sysctl_admin_reserve_kbytes is to allow the sys admin |
| 1862 | * to log in and kill a memory hogging process. |
| 1863 | * |
| 1864 | * Systems with more than 256MB will reserve 8MB, enough to recover |
| 1865 | * with sshd, bash, and top in OVERCOMMIT_GUESS. Smaller systems will |
| 1866 | * only reserve 3% of free pages by default. |
| 1867 | */ |
| 1868 | static int __meminit init_admin_reserve(void) |
| 1869 | { |
| 1870 | unsigned long free_kbytes; |
| 1871 | |
Michal Hocko | c41f012 | 2017-09-06 16:23:36 -0700 | [diff] [blame] | 1872 | free_kbytes = global_zone_page_state(NR_FREE_PAGES) << (PAGE_SHIFT - 10); |
Andrew Shewmaker | 4eeab4f | 2013-04-29 15:08:11 -0700 | [diff] [blame] | 1873 | |
| 1874 | sysctl_admin_reserve_kbytes = min(free_kbytes / 32, 1UL << 13); |
| 1875 | return 0; |
| 1876 | } |
Paul Gortmaker | a4bc6fc | 2015-05-01 20:08:20 -0400 | [diff] [blame] | 1877 | subsys_initcall(init_admin_reserve); |