blob: 9e117998274c8055c2b2727f05456597799037af [file] [log] [blame]
Thomas Gleixner457c8992019-05-19 13:08:55 +01001// SPDX-License-Identifier: GPL-2.0-only
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -07002#include <linux/kernel.h>
3#include <linux/errno.h>
4#include <linux/err.h>
5#include <linux/spinlock.h>
6
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -07007#include <linux/mm.h>
Dan Williams3565fce2016-01-15 16:56:55 -08008#include <linux/memremap.h>
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -07009#include <linux/pagemap.h>
10#include <linux/rmap.h>
11#include <linux/swap.h>
12#include <linux/swapops.h>
13
Ingo Molnar174cd4b2017-02-02 19:15:33 +010014#include <linux/sched/signal.h>
Steve Capper2667f502014-10-09 15:29:14 -070015#include <linux/rwsem.h>
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +053016#include <linux/hugetlb.h>
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -080017#include <linux/migrate.h>
18#include <linux/mm_inline.h>
19#include <linux/sched/mm.h>
Kirill A. Shutemov1027e442015-09-04 15:47:55 -070020
Dave Hansen33a709b2016-02-12 13:02:19 -080021#include <asm/mmu_context.h>
Steve Capper2667f502014-10-09 15:29:14 -070022#include <asm/pgtable.h>
Kirill A. Shutemov1027e442015-09-04 15:47:55 -070023#include <asm/tlbflush.h>
Steve Capper2667f502014-10-09 15:29:14 -070024
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -070025#include "internal.h"
26
Keith Buschdf06b372018-10-26 15:10:28 -070027struct follow_page_context {
28 struct dev_pagemap *pgmap;
29 unsigned int page_mask;
30};
31
John Hubbarda707cdd2020-01-30 22:12:21 -080032/*
33 * Return the compound head page with ref appropriately incremented,
34 * or NULL if that failed.
35 */
36static inline struct page *try_get_compound_head(struct page *page, int refs)
37{
38 struct page *head = compound_head(page);
39
40 if (WARN_ON_ONCE(page_ref_count(head) < 0))
41 return NULL;
42 if (unlikely(!page_cache_add_speculative(head, refs)))
43 return NULL;
44 return head;
45}
46
John Hubbardfc1d8e72019-05-13 17:19:08 -070047/**
John Hubbardf1f6a7d2020-01-30 22:13:35 -080048 * unpin_user_pages_dirty_lock() - release and optionally dirty gup-pinned pages
akpm@linux-foundation.org2d15eb32019-09-23 15:35:04 -070049 * @pages: array of pages to be maybe marked dirty, and definitely released.
John Hubbardfc1d8e72019-05-13 17:19:08 -070050 * @npages: number of pages in the @pages array.
akpm@linux-foundation.org2d15eb32019-09-23 15:35:04 -070051 * @make_dirty: whether to mark the pages dirty
John Hubbardfc1d8e72019-05-13 17:19:08 -070052 *
53 * "gup-pinned page" refers to a page that has had one of the get_user_pages()
54 * variants called on that page.
55 *
56 * For each page in the @pages array, make that page (or its head page, if a
akpm@linux-foundation.org2d15eb32019-09-23 15:35:04 -070057 * compound page) dirty, if @make_dirty is true, and if the page was previously
John Hubbardf1f6a7d2020-01-30 22:13:35 -080058 * listed as clean. In any case, releases all pages using unpin_user_page(),
59 * possibly via unpin_user_pages(), for the non-dirty case.
John Hubbardfc1d8e72019-05-13 17:19:08 -070060 *
John Hubbardf1f6a7d2020-01-30 22:13:35 -080061 * Please see the unpin_user_page() documentation for details.
John Hubbardfc1d8e72019-05-13 17:19:08 -070062 *
akpm@linux-foundation.org2d15eb32019-09-23 15:35:04 -070063 * set_page_dirty_lock() is used internally. If instead, set_page_dirty() is
64 * required, then the caller should a) verify that this is really correct,
65 * because _lock() is usually required, and b) hand code it:
John Hubbardf1f6a7d2020-01-30 22:13:35 -080066 * set_page_dirty_lock(), unpin_user_page().
John Hubbardfc1d8e72019-05-13 17:19:08 -070067 *
68 */
John Hubbardf1f6a7d2020-01-30 22:13:35 -080069void unpin_user_pages_dirty_lock(struct page **pages, unsigned long npages,
70 bool make_dirty)
John Hubbardfc1d8e72019-05-13 17:19:08 -070071{
akpm@linux-foundation.org2d15eb32019-09-23 15:35:04 -070072 unsigned long index;
John Hubbardfc1d8e72019-05-13 17:19:08 -070073
akpm@linux-foundation.org2d15eb32019-09-23 15:35:04 -070074 /*
75 * TODO: this can be optimized for huge pages: if a series of pages is
76 * physically contiguous and part of the same compound page, then a
77 * single operation to the head page should suffice.
78 */
79
80 if (!make_dirty) {
John Hubbardf1f6a7d2020-01-30 22:13:35 -080081 unpin_user_pages(pages, npages);
akpm@linux-foundation.org2d15eb32019-09-23 15:35:04 -070082 return;
83 }
84
85 for (index = 0; index < npages; index++) {
86 struct page *page = compound_head(pages[index]);
87 /*
88 * Checking PageDirty at this point may race with
89 * clear_page_dirty_for_io(), but that's OK. Two key
90 * cases:
91 *
92 * 1) This code sees the page as already dirty, so it
93 * skips the call to set_page_dirty(). That could happen
94 * because clear_page_dirty_for_io() called
95 * page_mkclean(), followed by set_page_dirty().
96 * However, now the page is going to get written back,
97 * which meets the original intention of setting it
98 * dirty, so all is well: clear_page_dirty_for_io() goes
99 * on to call TestClearPageDirty(), and write the page
100 * back.
101 *
102 * 2) This code sees the page as clean, so it calls
103 * set_page_dirty(). The page stays dirty, despite being
104 * written back, so it gets written back again in the
105 * next writeback cycle. This is harmless.
106 */
107 if (!PageDirty(page))
108 set_page_dirty_lock(page);
John Hubbardf1f6a7d2020-01-30 22:13:35 -0800109 unpin_user_page(page);
akpm@linux-foundation.org2d15eb32019-09-23 15:35:04 -0700110 }
John Hubbardfc1d8e72019-05-13 17:19:08 -0700111}
John Hubbardf1f6a7d2020-01-30 22:13:35 -0800112EXPORT_SYMBOL(unpin_user_pages_dirty_lock);
John Hubbardfc1d8e72019-05-13 17:19:08 -0700113
114/**
John Hubbardf1f6a7d2020-01-30 22:13:35 -0800115 * unpin_user_pages() - release an array of gup-pinned pages.
John Hubbardfc1d8e72019-05-13 17:19:08 -0700116 * @pages: array of pages to be marked dirty and released.
117 * @npages: number of pages in the @pages array.
118 *
John Hubbardf1f6a7d2020-01-30 22:13:35 -0800119 * For each page in the @pages array, release the page using unpin_user_page().
John Hubbardfc1d8e72019-05-13 17:19:08 -0700120 *
John Hubbardf1f6a7d2020-01-30 22:13:35 -0800121 * Please see the unpin_user_page() documentation for details.
John Hubbardfc1d8e72019-05-13 17:19:08 -0700122 */
John Hubbardf1f6a7d2020-01-30 22:13:35 -0800123void unpin_user_pages(struct page **pages, unsigned long npages)
John Hubbardfc1d8e72019-05-13 17:19:08 -0700124{
125 unsigned long index;
126
127 /*
128 * TODO: this can be optimized for huge pages: if a series of pages is
129 * physically contiguous and part of the same compound page, then a
130 * single operation to the head page should suffice.
131 */
132 for (index = 0; index < npages; index++)
John Hubbardf1f6a7d2020-01-30 22:13:35 -0800133 unpin_user_page(pages[index]);
John Hubbardfc1d8e72019-05-13 17:19:08 -0700134}
John Hubbardf1f6a7d2020-01-30 22:13:35 -0800135EXPORT_SYMBOL(unpin_user_pages);
John Hubbardfc1d8e72019-05-13 17:19:08 -0700136
Christoph Hellwig050a9ad2019-07-11 20:57:21 -0700137#ifdef CONFIG_MMU
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700138static struct page *no_page_table(struct vm_area_struct *vma,
139 unsigned int flags)
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700140{
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700141 /*
142 * When core dumping an enormous anonymous area that nobody
143 * has touched so far, we don't want to allocate unnecessary pages or
144 * page tables. Return error instead of NULL to skip handle_mm_fault,
145 * then get_dump_page() will return NULL to leave a hole in the dump.
146 * But we can only make this optimization where a hole would surely
147 * be zero-filled if handle_mm_fault() actually did handle it.
148 */
149 if ((flags & FOLL_DUMP) && (!vma->vm_ops || !vma->vm_ops->fault))
150 return ERR_PTR(-EFAULT);
151 return NULL;
152}
153
Kirill A. Shutemov1027e442015-09-04 15:47:55 -0700154static int follow_pfn_pte(struct vm_area_struct *vma, unsigned long address,
155 pte_t *pte, unsigned int flags)
156{
157 /* No page to get reference */
158 if (flags & FOLL_GET)
159 return -EFAULT;
160
161 if (flags & FOLL_TOUCH) {
162 pte_t entry = *pte;
163
164 if (flags & FOLL_WRITE)
165 entry = pte_mkdirty(entry);
166 entry = pte_mkyoung(entry);
167
168 if (!pte_same(*pte, entry)) {
169 set_pte_at(vma->vm_mm, address, pte, entry);
170 update_mmu_cache(vma, address, pte);
171 }
172 }
173
174 /* Proper page table entry exists, but no corresponding struct page */
175 return -EEXIST;
176}
177
Linus Torvalds19be0ea2016-10-13 13:07:36 -0700178/*
179 * FOLL_FORCE can write to even unwritable pte's, but only
180 * after we've gone through a COW cycle and they are dirty.
181 */
182static inline bool can_follow_write_pte(pte_t pte, unsigned int flags)
183{
Linus Torvaldsf6f37322017-12-15 18:53:22 -0800184 return pte_write(pte) ||
Linus Torvalds19be0ea2016-10-13 13:07:36 -0700185 ((flags & FOLL_FORCE) && (flags & FOLL_COW) && pte_dirty(pte));
186}
187
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700188static struct page *follow_page_pte(struct vm_area_struct *vma,
Keith Buschdf06b372018-10-26 15:10:28 -0700189 unsigned long address, pmd_t *pmd, unsigned int flags,
190 struct dev_pagemap **pgmap)
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700191{
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700192 struct mm_struct *mm = vma->vm_mm;
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700193 struct page *page;
194 spinlock_t *ptl;
195 pte_t *ptep, pte;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700196
John Hubbardeddb1c22020-01-30 22:12:54 -0800197 /* FOLL_GET and FOLL_PIN are mutually exclusive. */
198 if (WARN_ON_ONCE((flags & (FOLL_PIN | FOLL_GET)) ==
199 (FOLL_PIN | FOLL_GET)))
200 return ERR_PTR(-EINVAL);
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700201retry:
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700202 if (unlikely(pmd_bad(*pmd)))
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700203 return no_page_table(vma, flags);
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700204
205 ptep = pte_offset_map_lock(mm, pmd, address, &ptl);
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700206 pte = *ptep;
207 if (!pte_present(pte)) {
208 swp_entry_t entry;
209 /*
210 * KSM's break_ksm() relies upon recognizing a ksm page
211 * even while it is being migrated, so for that case we
212 * need migration_entry_wait().
213 */
214 if (likely(!(flags & FOLL_MIGRATION)))
215 goto no_page;
Kirill A. Shutemov0661a332015-02-10 14:10:04 -0800216 if (pte_none(pte))
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700217 goto no_page;
218 entry = pte_to_swp_entry(pte);
219 if (!is_migration_entry(entry))
220 goto no_page;
221 pte_unmap_unlock(ptep, ptl);
222 migration_entry_wait(mm, pmd, address);
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700223 goto retry;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700224 }
Mel Gorman8a0516e2015-02-12 14:58:22 -0800225 if ((flags & FOLL_NUMA) && pte_protnone(pte))
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700226 goto no_page;
Linus Torvalds19be0ea2016-10-13 13:07:36 -0700227 if ((flags & FOLL_WRITE) && !can_follow_write_pte(pte, flags)) {
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700228 pte_unmap_unlock(ptep, ptl);
229 return NULL;
230 }
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700231
232 page = vm_normal_page(vma, address, pte);
Dan Williams3565fce2016-01-15 16:56:55 -0800233 if (!page && pte_devmap(pte) && (flags & FOLL_GET)) {
234 /*
235 * Only return device mapping pages in the FOLL_GET case since
236 * they are only valid while holding the pgmap reference.
237 */
Keith Buschdf06b372018-10-26 15:10:28 -0700238 *pgmap = get_dev_pagemap(pte_pfn(pte), *pgmap);
239 if (*pgmap)
Dan Williams3565fce2016-01-15 16:56:55 -0800240 page = pte_page(pte);
241 else
242 goto no_page;
243 } else if (unlikely(!page)) {
Kirill A. Shutemov1027e442015-09-04 15:47:55 -0700244 if (flags & FOLL_DUMP) {
245 /* Avoid special (like zero) pages in core dumps */
246 page = ERR_PTR(-EFAULT);
247 goto out;
248 }
249
250 if (is_zero_pfn(pte_pfn(pte))) {
251 page = pte_page(pte);
252 } else {
253 int ret;
254
255 ret = follow_pfn_pte(vma, address, ptep, flags);
256 page = ERR_PTR(ret);
257 goto out;
258 }
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700259 }
260
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800261 if (flags & FOLL_SPLIT && PageTransCompound(page)) {
262 int ret;
263 get_page(page);
264 pte_unmap_unlock(ptep, ptl);
265 lock_page(page);
266 ret = split_huge_page(page);
267 unlock_page(page);
268 put_page(page);
269 if (ret)
270 return ERR_PTR(ret);
271 goto retry;
272 }
273
Linus Torvalds8fde12c2019-04-11 10:49:19 -0700274 if (flags & FOLL_GET) {
275 if (unlikely(!try_get_page(page))) {
276 page = ERR_PTR(-ENOMEM);
277 goto out;
278 }
279 }
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700280 if (flags & FOLL_TOUCH) {
281 if ((flags & FOLL_WRITE) &&
282 !pte_dirty(pte) && !PageDirty(page))
283 set_page_dirty(page);
284 /*
285 * pte_mkyoung() would be more correct here, but atomic care
286 * is needed to avoid losing the dirty bit: it is easier to use
287 * mark_page_accessed().
288 */
289 mark_page_accessed(page);
290 }
Eric B Munsonde60f5f2015-11-05 18:51:36 -0800291 if ((flags & FOLL_MLOCK) && (vma->vm_flags & VM_LOCKED)) {
Kirill A. Shutemove90309c2016-01-15 16:54:33 -0800292 /* Do not mlock pte-mapped THP */
293 if (PageTransCompound(page))
294 goto out;
295
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700296 /*
297 * The preliminary mapping check is mainly to avoid the
298 * pointless overhead of lock_page on the ZERO_PAGE
299 * which might bounce very badly if there is contention.
300 *
301 * If the page is already locked, we don't need to
302 * handle it now - vmscan will handle it later if and
303 * when it attempts to reclaim the page.
304 */
305 if (page->mapping && trylock_page(page)) {
306 lru_add_drain(); /* push cached pages to LRU */
307 /*
308 * Because we lock page here, and migration is
309 * blocked by the pte's page reference, and we
310 * know the page is still mapped, we don't even
311 * need to check for file-cache page truncation.
312 */
313 mlock_vma_page(page);
314 unlock_page(page);
315 }
316 }
Kirill A. Shutemov1027e442015-09-04 15:47:55 -0700317out:
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700318 pte_unmap_unlock(ptep, ptl);
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700319 return page;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700320no_page:
321 pte_unmap_unlock(ptep, ptl);
322 if (!pte_none(pte))
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700323 return NULL;
324 return no_page_table(vma, flags);
325}
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700326
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700327static struct page *follow_pmd_mask(struct vm_area_struct *vma,
328 unsigned long address, pud_t *pudp,
Keith Buschdf06b372018-10-26 15:10:28 -0700329 unsigned int flags,
330 struct follow_page_context *ctx)
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700331{
Huang Ying68827282018-06-07 17:06:34 -0700332 pmd_t *pmd, pmdval;
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700333 spinlock_t *ptl;
334 struct page *page;
335 struct mm_struct *mm = vma->vm_mm;
336
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700337 pmd = pmd_offset(pudp, address);
Huang Ying68827282018-06-07 17:06:34 -0700338 /*
339 * The READ_ONCE() will stabilize the pmdval in a register or
340 * on the stack so that it will stop changing under the code.
341 */
342 pmdval = READ_ONCE(*pmd);
343 if (pmd_none(pmdval))
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700344 return no_page_table(vma, flags);
Wei Yangbe9d3042020-01-30 22:12:14 -0800345 if (pmd_huge(pmdval) && is_vm_hugetlb_page(vma)) {
Naoya Horiguchie66f17f2015-02-11 15:25:22 -0800346 page = follow_huge_pmd(mm, address, pmd, flags);
347 if (page)
348 return page;
349 return no_page_table(vma, flags);
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700350 }
Huang Ying68827282018-06-07 17:06:34 -0700351 if (is_hugepd(__hugepd(pmd_val(pmdval)))) {
Aneesh Kumar K.V4dc71452017-07-06 15:38:56 -0700352 page = follow_huge_pd(vma, address,
Huang Ying68827282018-06-07 17:06:34 -0700353 __hugepd(pmd_val(pmdval)), flags,
Aneesh Kumar K.V4dc71452017-07-06 15:38:56 -0700354 PMD_SHIFT);
355 if (page)
356 return page;
357 return no_page_table(vma, flags);
358 }
Zi Yan84c3fc42017-09-08 16:11:01 -0700359retry:
Huang Ying68827282018-06-07 17:06:34 -0700360 if (!pmd_present(pmdval)) {
Zi Yan84c3fc42017-09-08 16:11:01 -0700361 if (likely(!(flags & FOLL_MIGRATION)))
362 return no_page_table(vma, flags);
363 VM_BUG_ON(thp_migration_supported() &&
Huang Ying68827282018-06-07 17:06:34 -0700364 !is_pmd_migration_entry(pmdval));
365 if (is_pmd_migration_entry(pmdval))
Zi Yan84c3fc42017-09-08 16:11:01 -0700366 pmd_migration_entry_wait(mm, pmd);
Huang Ying68827282018-06-07 17:06:34 -0700367 pmdval = READ_ONCE(*pmd);
368 /*
369 * MADV_DONTNEED may convert the pmd to null because
370 * mmap_sem is held in read mode
371 */
372 if (pmd_none(pmdval))
373 return no_page_table(vma, flags);
Zi Yan84c3fc42017-09-08 16:11:01 -0700374 goto retry;
375 }
Huang Ying68827282018-06-07 17:06:34 -0700376 if (pmd_devmap(pmdval)) {
Dan Williams3565fce2016-01-15 16:56:55 -0800377 ptl = pmd_lock(mm, pmd);
Keith Buschdf06b372018-10-26 15:10:28 -0700378 page = follow_devmap_pmd(vma, address, pmd, flags, &ctx->pgmap);
Dan Williams3565fce2016-01-15 16:56:55 -0800379 spin_unlock(ptl);
380 if (page)
381 return page;
382 }
Huang Ying68827282018-06-07 17:06:34 -0700383 if (likely(!pmd_trans_huge(pmdval)))
Keith Buschdf06b372018-10-26 15:10:28 -0700384 return follow_page_pte(vma, address, pmd, flags, &ctx->pgmap);
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800385
Huang Ying68827282018-06-07 17:06:34 -0700386 if ((flags & FOLL_NUMA) && pmd_protnone(pmdval))
Aneesh Kumar K.Vdb08f202017-02-24 14:59:53 -0800387 return no_page_table(vma, flags);
388
Zi Yan84c3fc42017-09-08 16:11:01 -0700389retry_locked:
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800390 ptl = pmd_lock(mm, pmd);
Huang Ying68827282018-06-07 17:06:34 -0700391 if (unlikely(pmd_none(*pmd))) {
392 spin_unlock(ptl);
393 return no_page_table(vma, flags);
394 }
Zi Yan84c3fc42017-09-08 16:11:01 -0700395 if (unlikely(!pmd_present(*pmd))) {
396 spin_unlock(ptl);
397 if (likely(!(flags & FOLL_MIGRATION)))
398 return no_page_table(vma, flags);
399 pmd_migration_entry_wait(mm, pmd);
400 goto retry_locked;
401 }
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800402 if (unlikely(!pmd_trans_huge(*pmd))) {
403 spin_unlock(ptl);
Keith Buschdf06b372018-10-26 15:10:28 -0700404 return follow_page_pte(vma, address, pmd, flags, &ctx->pgmap);
Kirill A. Shutemov69e68b42014-06-04 16:08:11 -0700405 }
Song Liubfe7b002019-09-23 15:38:25 -0700406 if (flags & (FOLL_SPLIT | FOLL_SPLIT_PMD)) {
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800407 int ret;
408 page = pmd_page(*pmd);
409 if (is_huge_zero_page(page)) {
410 spin_unlock(ptl);
411 ret = 0;
Kirill A. Shutemov78ddc532016-01-15 16:52:42 -0800412 split_huge_pmd(vma, pmd, address);
Naoya Horiguchi337d9ab2016-07-26 15:24:03 -0700413 if (pmd_trans_unstable(pmd))
414 ret = -EBUSY;
Song Liubfe7b002019-09-23 15:38:25 -0700415 } else if (flags & FOLL_SPLIT) {
Linus Torvalds8fde12c2019-04-11 10:49:19 -0700416 if (unlikely(!try_get_page(page))) {
417 spin_unlock(ptl);
418 return ERR_PTR(-ENOMEM);
419 }
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800420 spin_unlock(ptl);
421 lock_page(page);
422 ret = split_huge_page(page);
423 unlock_page(page);
424 put_page(page);
Kirill A. Shutemovbaa355f2016-07-26 15:25:51 -0700425 if (pmd_none(*pmd))
426 return no_page_table(vma, flags);
Song Liubfe7b002019-09-23 15:38:25 -0700427 } else { /* flags & FOLL_SPLIT_PMD */
428 spin_unlock(ptl);
429 split_huge_pmd(vma, pmd, address);
430 ret = pte_alloc(mm, pmd) ? -ENOMEM : 0;
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800431 }
432
433 return ret ? ERR_PTR(ret) :
Keith Buschdf06b372018-10-26 15:10:28 -0700434 follow_page_pte(vma, address, pmd, flags, &ctx->pgmap);
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800435 }
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800436 page = follow_trans_huge_pmd(vma, address, pmd, flags);
437 spin_unlock(ptl);
Keith Buschdf06b372018-10-26 15:10:28 -0700438 ctx->page_mask = HPAGE_PMD_NR - 1;
Kirill A. Shutemov6742d292016-01-15 16:52:28 -0800439 return page;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700440}
441
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700442static struct page *follow_pud_mask(struct vm_area_struct *vma,
443 unsigned long address, p4d_t *p4dp,
Keith Buschdf06b372018-10-26 15:10:28 -0700444 unsigned int flags,
445 struct follow_page_context *ctx)
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700446{
447 pud_t *pud;
448 spinlock_t *ptl;
449 struct page *page;
450 struct mm_struct *mm = vma->vm_mm;
451
452 pud = pud_offset(p4dp, address);
453 if (pud_none(*pud))
454 return no_page_table(vma, flags);
Wei Yangbe9d3042020-01-30 22:12:14 -0800455 if (pud_huge(*pud) && is_vm_hugetlb_page(vma)) {
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700456 page = follow_huge_pud(mm, address, pud, flags);
457 if (page)
458 return page;
459 return no_page_table(vma, flags);
460 }
Aneesh Kumar K.V4dc71452017-07-06 15:38:56 -0700461 if (is_hugepd(__hugepd(pud_val(*pud)))) {
462 page = follow_huge_pd(vma, address,
463 __hugepd(pud_val(*pud)), flags,
464 PUD_SHIFT);
465 if (page)
466 return page;
467 return no_page_table(vma, flags);
468 }
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700469 if (pud_devmap(*pud)) {
470 ptl = pud_lock(mm, pud);
Keith Buschdf06b372018-10-26 15:10:28 -0700471 page = follow_devmap_pud(vma, address, pud, flags, &ctx->pgmap);
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700472 spin_unlock(ptl);
473 if (page)
474 return page;
475 }
476 if (unlikely(pud_bad(*pud)))
477 return no_page_table(vma, flags);
478
Keith Buschdf06b372018-10-26 15:10:28 -0700479 return follow_pmd_mask(vma, address, pud, flags, ctx);
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700480}
481
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700482static struct page *follow_p4d_mask(struct vm_area_struct *vma,
483 unsigned long address, pgd_t *pgdp,
Keith Buschdf06b372018-10-26 15:10:28 -0700484 unsigned int flags,
485 struct follow_page_context *ctx)
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700486{
487 p4d_t *p4d;
Aneesh Kumar K.V4dc71452017-07-06 15:38:56 -0700488 struct page *page;
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700489
490 p4d = p4d_offset(pgdp, address);
491 if (p4d_none(*p4d))
492 return no_page_table(vma, flags);
493 BUILD_BUG_ON(p4d_huge(*p4d));
494 if (unlikely(p4d_bad(*p4d)))
495 return no_page_table(vma, flags);
496
Aneesh Kumar K.V4dc71452017-07-06 15:38:56 -0700497 if (is_hugepd(__hugepd(p4d_val(*p4d)))) {
498 page = follow_huge_pd(vma, address,
499 __hugepd(p4d_val(*p4d)), flags,
500 P4D_SHIFT);
501 if (page)
502 return page;
503 return no_page_table(vma, flags);
504 }
Keith Buschdf06b372018-10-26 15:10:28 -0700505 return follow_pud_mask(vma, address, p4d, flags, ctx);
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700506}
507
508/**
509 * follow_page_mask - look up a page descriptor from a user-virtual address
510 * @vma: vm_area_struct mapping @address
511 * @address: virtual address to look up
512 * @flags: flags modifying lookup behaviour
Mike Rapoport78179552018-11-16 15:08:29 -0800513 * @ctx: contains dev_pagemap for %ZONE_DEVICE memory pinning and a
514 * pointer to output page_mask
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700515 *
516 * @flags can have FOLL_ flags set, defined in <linux/mm.h>
517 *
Mike Rapoport78179552018-11-16 15:08:29 -0800518 * When getting pages from ZONE_DEVICE memory, the @ctx->pgmap caches
519 * the device's dev_pagemap metadata to avoid repeating expensive lookups.
520 *
521 * On output, the @ctx->page_mask is set according to the size of the page.
522 *
523 * Return: the mapped (struct page *), %NULL if no mapping exists, or
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700524 * an error pointer if there is a mapping to something not represented
525 * by a page descriptor (see also vm_normal_page()).
526 */
Bharath Vedarthama7030ae2019-07-11 20:54:34 -0700527static struct page *follow_page_mask(struct vm_area_struct *vma,
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700528 unsigned long address, unsigned int flags,
Keith Buschdf06b372018-10-26 15:10:28 -0700529 struct follow_page_context *ctx)
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700530{
531 pgd_t *pgd;
532 struct page *page;
533 struct mm_struct *mm = vma->vm_mm;
534
Keith Buschdf06b372018-10-26 15:10:28 -0700535 ctx->page_mask = 0;
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700536
537 /* make this handle hugepd */
538 page = follow_huge_addr(mm, address, flags & FOLL_WRITE);
539 if (!IS_ERR(page)) {
540 BUG_ON(flags & FOLL_GET);
541 return page;
542 }
543
544 pgd = pgd_offset(mm, address);
545
546 if (pgd_none(*pgd) || unlikely(pgd_bad(*pgd)))
547 return no_page_table(vma, flags);
548
Anshuman Khandualfaaa5b62017-07-06 15:38:50 -0700549 if (pgd_huge(*pgd)) {
550 page = follow_huge_pgd(mm, address, pgd, flags);
551 if (page)
552 return page;
553 return no_page_table(vma, flags);
554 }
Aneesh Kumar K.V4dc71452017-07-06 15:38:56 -0700555 if (is_hugepd(__hugepd(pgd_val(*pgd)))) {
556 page = follow_huge_pd(vma, address,
557 __hugepd(pgd_val(*pgd)), flags,
558 PGDIR_SHIFT);
559 if (page)
560 return page;
561 return no_page_table(vma, flags);
562 }
Anshuman Khandualfaaa5b62017-07-06 15:38:50 -0700563
Keith Buschdf06b372018-10-26 15:10:28 -0700564 return follow_p4d_mask(vma, address, pgd, flags, ctx);
565}
566
567struct page *follow_page(struct vm_area_struct *vma, unsigned long address,
568 unsigned int foll_flags)
569{
570 struct follow_page_context ctx = { NULL };
571 struct page *page;
572
573 page = follow_page_mask(vma, address, foll_flags, &ctx);
574 if (ctx.pgmap)
575 put_dev_pagemap(ctx.pgmap);
576 return page;
Aneesh Kumar K.V080dbb62017-07-06 15:38:44 -0700577}
578
Kirill A. Shutemovf2b495c2014-06-04 16:08:11 -0700579static int get_gate_page(struct mm_struct *mm, unsigned long address,
580 unsigned int gup_flags, struct vm_area_struct **vma,
581 struct page **page)
582{
583 pgd_t *pgd;
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +0300584 p4d_t *p4d;
Kirill A. Shutemovf2b495c2014-06-04 16:08:11 -0700585 pud_t *pud;
586 pmd_t *pmd;
587 pte_t *pte;
588 int ret = -EFAULT;
589
590 /* user gate pages are read-only */
591 if (gup_flags & FOLL_WRITE)
592 return -EFAULT;
593 if (address > TASK_SIZE)
594 pgd = pgd_offset_k(address);
595 else
596 pgd = pgd_offset_gate(mm, address);
Andy Lutomirskib5d1c392019-07-11 20:57:43 -0700597 if (pgd_none(*pgd))
598 return -EFAULT;
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +0300599 p4d = p4d_offset(pgd, address);
Andy Lutomirskib5d1c392019-07-11 20:57:43 -0700600 if (p4d_none(*p4d))
601 return -EFAULT;
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +0300602 pud = pud_offset(p4d, address);
Andy Lutomirskib5d1c392019-07-11 20:57:43 -0700603 if (pud_none(*pud))
604 return -EFAULT;
Kirill A. Shutemovf2b495c2014-06-04 16:08:11 -0700605 pmd = pmd_offset(pud, address);
Zi Yan84c3fc42017-09-08 16:11:01 -0700606 if (!pmd_present(*pmd))
Kirill A. Shutemovf2b495c2014-06-04 16:08:11 -0700607 return -EFAULT;
608 VM_BUG_ON(pmd_trans_huge(*pmd));
609 pte = pte_offset_map(pmd, address);
610 if (pte_none(*pte))
611 goto unmap;
612 *vma = get_gate_vma(mm);
613 if (!page)
614 goto out;
615 *page = vm_normal_page(*vma, address, *pte);
616 if (!*page) {
617 if ((gup_flags & FOLL_DUMP) || !is_zero_pfn(pte_pfn(*pte)))
618 goto unmap;
619 *page = pte_page(*pte);
620 }
Linus Torvalds8fde12c2019-04-11 10:49:19 -0700621 if (unlikely(!try_get_page(*page))) {
622 ret = -ENOMEM;
623 goto unmap;
624 }
Kirill A. Shutemovf2b495c2014-06-04 16:08:11 -0700625out:
626 ret = 0;
627unmap:
628 pte_unmap(pte);
629 return ret;
630}
631
Paul Cassella9a95f3c2014-08-06 16:07:24 -0700632/*
633 * mmap_sem must be held on entry. If @nonblocking != NULL and
634 * *@flags does not include FOLL_NOWAIT, the mmap_sem may be released.
635 * If it is, *@nonblocking will be set to 0 and -EBUSY returned.
636 */
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700637static int faultin_page(struct task_struct *tsk, struct vm_area_struct *vma,
638 unsigned long address, unsigned int *flags, int *nonblocking)
639{
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700640 unsigned int fault_flags = 0;
Souptick Joarder2b740302018-08-23 17:01:36 -0700641 vm_fault_t ret;
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700642
Eric B Munsonde60f5f2015-11-05 18:51:36 -0800643 /* mlock all present pages, but do not fault in new pages */
644 if ((*flags & (FOLL_POPULATE | FOLL_MLOCK)) == FOLL_MLOCK)
645 return -ENOENT;
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700646 if (*flags & FOLL_WRITE)
647 fault_flags |= FAULT_FLAG_WRITE;
Dave Hansen1b2ee122016-02-12 13:02:21 -0800648 if (*flags & FOLL_REMOTE)
649 fault_flags |= FAULT_FLAG_REMOTE;
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700650 if (nonblocking)
651 fault_flags |= FAULT_FLAG_ALLOW_RETRY;
652 if (*flags & FOLL_NOWAIT)
653 fault_flags |= FAULT_FLAG_ALLOW_RETRY | FAULT_FLAG_RETRY_NOWAIT;
Andres Lagar-Cavilla234b2392014-09-17 10:51:48 -0700654 if (*flags & FOLL_TRIED) {
655 VM_WARN_ON_ONCE(fault_flags & FAULT_FLAG_ALLOW_RETRY);
656 fault_flags |= FAULT_FLAG_TRIED;
657 }
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700658
Kirill A. Shutemovdcddffd2016-07-26 15:25:18 -0700659 ret = handle_mm_fault(vma, address, fault_flags);
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700660 if (ret & VM_FAULT_ERROR) {
James Morse9a291a72017-06-02 14:46:46 -0700661 int err = vm_fault_to_errno(ret, *flags);
662
663 if (err)
664 return err;
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700665 BUG();
666 }
667
668 if (tsk) {
669 if (ret & VM_FAULT_MAJOR)
670 tsk->maj_flt++;
671 else
672 tsk->min_flt++;
673 }
674
675 if (ret & VM_FAULT_RETRY) {
Andrea Arcangeli96312e62018-03-09 15:51:06 -0800676 if (nonblocking && !(fault_flags & FAULT_FLAG_RETRY_NOWAIT))
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700677 *nonblocking = 0;
678 return -EBUSY;
679 }
680
681 /*
682 * The VM_FAULT_WRITE bit tells us that do_wp_page has broken COW when
683 * necessary, even if maybe_mkwrite decided not to set pte_write. We
684 * can thus safely do subsequent page lookups as if they were reads.
685 * But only do so when looping for pte_write is futile: in some cases
686 * userspace may also be wanting to write to the gotten user page,
687 * which a read fault here might prevent (a readonly page might get
688 * reCOWed by userspace write).
689 */
690 if ((ret & VM_FAULT_WRITE) && !(vma->vm_flags & VM_WRITE))
Mario Leinweber29231172018-04-05 16:24:18 -0700691 *flags |= FOLL_COW;
Kirill A. Shutemov16744482014-06-04 16:08:12 -0700692 return 0;
693}
694
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700695static int check_vma_flags(struct vm_area_struct *vma, unsigned long gup_flags)
696{
697 vm_flags_t vm_flags = vma->vm_flags;
Dave Hansen1b2ee122016-02-12 13:02:21 -0800698 int write = (gup_flags & FOLL_WRITE);
699 int foreign = (gup_flags & FOLL_REMOTE);
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700700
701 if (vm_flags & (VM_IO | VM_PFNMAP))
702 return -EFAULT;
703
Willy Tarreau7f7ccc22018-05-11 08:11:44 +0200704 if (gup_flags & FOLL_ANON && !vma_is_anonymous(vma))
705 return -EFAULT;
706
Dave Hansen1b2ee122016-02-12 13:02:21 -0800707 if (write) {
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700708 if (!(vm_flags & VM_WRITE)) {
709 if (!(gup_flags & FOLL_FORCE))
710 return -EFAULT;
711 /*
712 * We used to let the write,force case do COW in a
713 * VM_MAYWRITE VM_SHARED !VM_WRITE vma, so ptrace could
714 * set a breakpoint in a read-only mapping of an
715 * executable, without corrupting the file (yet only
716 * when that file had been opened for writing!).
717 * Anon pages in shared mappings are surprising: now
718 * just reject it.
719 */
Hugh Dickins46435362016-01-30 18:03:16 -0800720 if (!is_cow_mapping(vm_flags))
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700721 return -EFAULT;
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700722 }
723 } else if (!(vm_flags & VM_READ)) {
724 if (!(gup_flags & FOLL_FORCE))
725 return -EFAULT;
726 /*
727 * Is there actually any vma we can reach here which does not
728 * have VM_MAYREAD set?
729 */
730 if (!(vm_flags & VM_MAYREAD))
731 return -EFAULT;
732 }
Dave Hansend61172b2016-02-12 13:02:24 -0800733 /*
734 * gups are always data accesses, not instruction
735 * fetches, so execute=false here
736 */
737 if (!arch_vma_access_permitted(vma, write, false, foreign))
Dave Hansen33a709b2016-02-12 13:02:19 -0800738 return -EFAULT;
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700739 return 0;
740}
741
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700742/**
743 * __get_user_pages() - pin user pages in memory
744 * @tsk: task_struct of target task
745 * @mm: mm_struct of target mm
746 * @start: starting user address
747 * @nr_pages: number of pages from start to pin
748 * @gup_flags: flags modifying pin behaviour
749 * @pages: array that receives pointers to the pages pinned.
750 * Should be at least nr_pages long. Or NULL, if caller
751 * only intends to ensure the pages are faulted in.
752 * @vmas: array of pointers to vmas corresponding to each page.
753 * Or NULL if the caller does not require them.
754 * @nonblocking: whether waiting for disk IO or mmap_sem contention
755 *
Liu Xiangd2dfbe42019-11-30 17:49:53 -0800756 * Returns either number of pages pinned (which may be less than the
757 * number requested), or an error. Details about the return value:
758 *
759 * -- If nr_pages is 0, returns 0.
760 * -- If nr_pages is >0, but no pages were pinned, returns -errno.
761 * -- If nr_pages is >0, and some pages were pinned, returns the number of
762 * pages pinned. Again, this may be less than nr_pages.
763 *
764 * The caller is responsible for releasing returned @pages, via put_page().
765 *
766 * @vmas are valid only as long as mmap_sem is held.
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700767 *
Paul Cassella9a95f3c2014-08-06 16:07:24 -0700768 * Must be called with mmap_sem held. It may be released. See below.
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700769 *
770 * __get_user_pages walks a process's page tables and takes a reference to
771 * each struct page that each user address corresponds to at a given
772 * instant. That is, it takes the page that would be accessed if a user
773 * thread accesses the given user virtual address at that instant.
774 *
775 * This does not guarantee that the page exists in the user mappings when
776 * __get_user_pages returns, and there may even be a completely different
777 * page there in some cases (eg. if mmapped pagecache has been invalidated
778 * and subsequently re faulted). However it does guarantee that the page
779 * won't be freed completely. And mostly callers simply care that the page
780 * contains data that was valid *at some point in time*. Typically, an IO
781 * or similar operation cannot guarantee anything stronger anyway because
782 * locks can't be held over the syscall boundary.
783 *
784 * If @gup_flags & FOLL_WRITE == 0, the page must not be written to. If
785 * the page is written to, set_page_dirty (or set_page_dirty_lock, as
786 * appropriate) must be called after the page is finished with, and
787 * before put_page is called.
788 *
789 * If @nonblocking != NULL, __get_user_pages will not wait for disk IO
790 * or mmap_sem contention, and if waiting is needed to pin all pages,
Paul Cassella9a95f3c2014-08-06 16:07:24 -0700791 * *@nonblocking will be set to 0. Further, if @gup_flags does not
792 * include FOLL_NOWAIT, the mmap_sem will be released via up_read() in
793 * this case.
794 *
795 * A caller using such a combination of @nonblocking and @gup_flags
796 * must therefore hold the mmap_sem for reading only, and recognize
797 * when it's been released. Otherwise, it must be held for either
798 * reading or writing and will not be released.
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700799 *
800 * In most cases, get_user_pages or get_user_pages_fast should be used
801 * instead of __get_user_pages. __get_user_pages should be used only if
802 * you need some special @gup_flags.
803 */
Lorenzo Stoakes0d731752016-10-24 10:57:25 +0100804static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm,
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700805 unsigned long start, unsigned long nr_pages,
806 unsigned int gup_flags, struct page **pages,
807 struct vm_area_struct **vmas, int *nonblocking)
808{
Keith Buschdf06b372018-10-26 15:10:28 -0700809 long ret = 0, i = 0;
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700810 struct vm_area_struct *vma = NULL;
Keith Buschdf06b372018-10-26 15:10:28 -0700811 struct follow_page_context ctx = { NULL };
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700812
813 if (!nr_pages)
814 return 0;
815
Andrey Konovalovf9652592019-09-25 16:48:34 -0700816 start = untagged_addr(start);
817
John Hubbardeddb1c22020-01-30 22:12:54 -0800818 VM_BUG_ON(!!pages != !!(gup_flags & (FOLL_GET | FOLL_PIN)));
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700819
820 /*
821 * If FOLL_FORCE is set then do not force a full fault as the hinting
822 * fault information is unrelated to the reference behaviour of a task
823 * using the address space
824 */
825 if (!(gup_flags & FOLL_FORCE))
826 gup_flags |= FOLL_NUMA;
827
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700828 do {
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700829 struct page *page;
830 unsigned int foll_flags = gup_flags;
831 unsigned int page_increm;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700832
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700833 /* first iteration or cross vma bound */
834 if (!vma || start >= vma->vm_end) {
835 vma = find_extend_vma(mm, start);
836 if (!vma && in_gate_area(mm, start)) {
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700837 ret = get_gate_page(mm, start & PAGE_MASK,
838 gup_flags, &vma,
839 pages ? &pages[i] : NULL);
840 if (ret)
John Hubbard08be37b2018-11-30 14:08:53 -0800841 goto out;
Keith Buschdf06b372018-10-26 15:10:28 -0700842 ctx.page_mask = 0;
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700843 goto next_page;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700844 }
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700845
Keith Buschdf06b372018-10-26 15:10:28 -0700846 if (!vma || check_vma_flags(vma, gup_flags)) {
847 ret = -EFAULT;
848 goto out;
849 }
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700850 if (is_vm_hugetlb_page(vma)) {
851 i = follow_hugetlb_page(mm, vma, pages, vmas,
852 &start, &nr_pages, i,
Andrea Arcangeli87ffc112017-02-22 15:43:13 -0800853 gup_flags, nonblocking);
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700854 continue;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700855 }
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700856 }
857retry:
858 /*
859 * If we have a pending SIGKILL, don't keep faulting pages and
860 * potentially allocating memory.
861 */
Davidlohr Buesofa45f112019-01-03 15:28:55 -0800862 if (fatal_signal_pending(current)) {
Keith Buschdf06b372018-10-26 15:10:28 -0700863 ret = -ERESTARTSYS;
864 goto out;
865 }
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700866 cond_resched();
Keith Buschdf06b372018-10-26 15:10:28 -0700867
868 page = follow_page_mask(vma, start, foll_flags, &ctx);
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700869 if (!page) {
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700870 ret = faultin_page(tsk, vma, start, &foll_flags,
871 nonblocking);
872 switch (ret) {
873 case 0:
874 goto retry;
Keith Buschdf06b372018-10-26 15:10:28 -0700875 case -EBUSY:
876 ret = 0;
877 /* FALLTHRU */
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700878 case -EFAULT:
879 case -ENOMEM:
880 case -EHWPOISON:
Keith Buschdf06b372018-10-26 15:10:28 -0700881 goto out;
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700882 case -ENOENT:
883 goto next_page;
884 }
885 BUG();
Kirill A. Shutemov1027e442015-09-04 15:47:55 -0700886 } else if (PTR_ERR(page) == -EEXIST) {
887 /*
888 * Proper page table entry exists, but no corresponding
889 * struct page.
890 */
891 goto next_page;
892 } else if (IS_ERR(page)) {
Keith Buschdf06b372018-10-26 15:10:28 -0700893 ret = PTR_ERR(page);
894 goto out;
Kirill A. Shutemov1027e442015-09-04 15:47:55 -0700895 }
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700896 if (pages) {
897 pages[i] = page;
898 flush_anon_page(vma, page, start);
899 flush_dcache_page(page);
Keith Buschdf06b372018-10-26 15:10:28 -0700900 ctx.page_mask = 0;
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700901 }
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700902next_page:
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700903 if (vmas) {
904 vmas[i] = vma;
Keith Buschdf06b372018-10-26 15:10:28 -0700905 ctx.page_mask = 0;
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700906 }
Keith Buschdf06b372018-10-26 15:10:28 -0700907 page_increm = 1 + (~(start >> PAGE_SHIFT) & ctx.page_mask);
Kirill A. Shutemovfa5bb202014-06-04 16:08:13 -0700908 if (page_increm > nr_pages)
909 page_increm = nr_pages;
910 i += page_increm;
911 start += page_increm * PAGE_SIZE;
912 nr_pages -= page_increm;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700913 } while (nr_pages);
Keith Buschdf06b372018-10-26 15:10:28 -0700914out:
915 if (ctx.pgmap)
916 put_dev_pagemap(ctx.pgmap);
917 return i ? i : ret;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700918}
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700919
Tobias Klauser771ab432016-12-12 16:41:53 -0800920static bool vma_permits_fault(struct vm_area_struct *vma,
921 unsigned int fault_flags)
Dave Hansend4925e02016-02-12 13:02:16 -0800922{
Dave Hansen1b2ee122016-02-12 13:02:21 -0800923 bool write = !!(fault_flags & FAULT_FLAG_WRITE);
924 bool foreign = !!(fault_flags & FAULT_FLAG_REMOTE);
Dave Hansen33a709b2016-02-12 13:02:19 -0800925 vm_flags_t vm_flags = write ? VM_WRITE : VM_READ;
Dave Hansend4925e02016-02-12 13:02:16 -0800926
927 if (!(vm_flags & vma->vm_flags))
928 return false;
929
Dave Hansen33a709b2016-02-12 13:02:19 -0800930 /*
931 * The architecture might have a hardware protection
Dave Hansen1b2ee122016-02-12 13:02:21 -0800932 * mechanism other than read/write that can deny access.
Dave Hansend61172b2016-02-12 13:02:24 -0800933 *
934 * gup always represents data access, not instruction
935 * fetches, so execute=false here:
Dave Hansen33a709b2016-02-12 13:02:19 -0800936 */
Dave Hansend61172b2016-02-12 13:02:24 -0800937 if (!arch_vma_access_permitted(vma, write, false, foreign))
Dave Hansen33a709b2016-02-12 13:02:19 -0800938 return false;
939
Dave Hansend4925e02016-02-12 13:02:16 -0800940 return true;
941}
942
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700943/*
944 * fixup_user_fault() - manually resolve a user page fault
945 * @tsk: the task_struct to use for page fault accounting, or
946 * NULL if faults are not to be recorded.
947 * @mm: mm_struct of target mm
948 * @address: user address
949 * @fault_flags:flags to pass down to handle_mm_fault()
Dominik Dingel4a9e1cd2016-01-15 16:57:04 -0800950 * @unlocked: did we unlock the mmap_sem while retrying, maybe NULL if caller
951 * does not allow retry
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700952 *
953 * This is meant to be called in the specific scenario where for locking reasons
954 * we try to access user memory in atomic context (within a pagefault_disable()
955 * section), this returns -EFAULT, and we want to resolve the user fault before
956 * trying again.
957 *
958 * Typically this is meant to be used by the futex code.
959 *
960 * The main difference with get_user_pages() is that this function will
961 * unconditionally call handle_mm_fault() which will in turn perform all the
962 * necessary SW fixup of the dirty and young bits in the PTE, while
Dominik Dingel4a9e1cd2016-01-15 16:57:04 -0800963 * get_user_pages() only guarantees to update these in the struct page.
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700964 *
965 * This is important for some architectures where those bits also gate the
966 * access permission to the page because they are maintained in software. On
967 * such architectures, gup() will not be enough to make a subsequent access
968 * succeed.
969 *
Dominik Dingel4a9e1cd2016-01-15 16:57:04 -0800970 * This function will not return with an unlocked mmap_sem. So it has not the
971 * same semantics wrt the @mm->mmap_sem as does filemap_fault().
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700972 */
973int fixup_user_fault(struct task_struct *tsk, struct mm_struct *mm,
Dominik Dingel4a9e1cd2016-01-15 16:57:04 -0800974 unsigned long address, unsigned int fault_flags,
975 bool *unlocked)
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700976{
977 struct vm_area_struct *vma;
Souptick Joarder2b740302018-08-23 17:01:36 -0700978 vm_fault_t ret, major = 0;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700979
Andrey Konovalovf9652592019-09-25 16:48:34 -0700980 address = untagged_addr(address);
981
Dominik Dingel4a9e1cd2016-01-15 16:57:04 -0800982 if (unlocked)
983 fault_flags |= FAULT_FLAG_ALLOW_RETRY;
984
985retry:
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700986 vma = find_extend_vma(mm, address);
987 if (!vma || address < vma->vm_start)
988 return -EFAULT;
989
Dave Hansend4925e02016-02-12 13:02:16 -0800990 if (!vma_permits_fault(vma, fault_flags))
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700991 return -EFAULT;
992
Kirill A. Shutemovdcddffd2016-07-26 15:25:18 -0700993 ret = handle_mm_fault(vma, address, fault_flags);
Dominik Dingel4a9e1cd2016-01-15 16:57:04 -0800994 major |= ret & VM_FAULT_MAJOR;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -0700995 if (ret & VM_FAULT_ERROR) {
James Morse9a291a72017-06-02 14:46:46 -0700996 int err = vm_fault_to_errno(ret, 0);
997
998 if (err)
999 return err;
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -07001000 BUG();
1001 }
Dominik Dingel4a9e1cd2016-01-15 16:57:04 -08001002
1003 if (ret & VM_FAULT_RETRY) {
1004 down_read(&mm->mmap_sem);
1005 if (!(fault_flags & FAULT_FLAG_TRIED)) {
1006 *unlocked = true;
1007 fault_flags &= ~FAULT_FLAG_ALLOW_RETRY;
1008 fault_flags |= FAULT_FLAG_TRIED;
1009 goto retry;
1010 }
1011 }
1012
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -07001013 if (tsk) {
Dominik Dingel4a9e1cd2016-01-15 16:57:04 -08001014 if (major)
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -07001015 tsk->maj_flt++;
1016 else
1017 tsk->min_flt++;
1018 }
1019 return 0;
1020}
Paolo Bonziniadd6a0c2016-06-07 17:51:18 +02001021EXPORT_SYMBOL_GPL(fixup_user_fault);
Kirill A. Shutemov4bbd4c72014-06-04 16:08:10 -07001022
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001023static __always_inline long __get_user_pages_locked(struct task_struct *tsk,
1024 struct mm_struct *mm,
1025 unsigned long start,
1026 unsigned long nr_pages,
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001027 struct page **pages,
1028 struct vm_area_struct **vmas,
Al Viroe7167122017-11-19 11:32:05 -05001029 int *locked,
Andrea Arcangeli0fd71a52015-02-11 15:27:20 -08001030 unsigned int flags)
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001031{
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001032 long ret, pages_done;
1033 bool lock_dropped;
1034
1035 if (locked) {
1036 /* if VM_FAULT_RETRY can be returned, vmas become invalid */
1037 BUG_ON(vmas);
1038 /* check caller initialized locked */
1039 BUG_ON(*locked != 1);
1040 }
1041
John Hubbardeddb1c22020-01-30 22:12:54 -08001042 /*
1043 * FOLL_PIN and FOLL_GET are mutually exclusive. Traditional behavior
1044 * is to set FOLL_GET if the caller wants pages[] filled in (but has
1045 * carelessly failed to specify FOLL_GET), so keep doing that, but only
1046 * for FOLL_GET, not for the newer FOLL_PIN.
1047 *
1048 * FOLL_PIN always expects pages to be non-null, but no need to assert
1049 * that here, as any failures will be obvious enough.
1050 */
1051 if (pages && !(flags & FOLL_PIN))
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001052 flags |= FOLL_GET;
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001053
1054 pages_done = 0;
1055 lock_dropped = false;
1056 for (;;) {
1057 ret = __get_user_pages(tsk, mm, start, nr_pages, flags, pages,
1058 vmas, locked);
1059 if (!locked)
1060 /* VM_FAULT_RETRY couldn't trigger, bypass */
1061 return ret;
1062
1063 /* VM_FAULT_RETRY cannot return errors */
1064 if (!*locked) {
1065 BUG_ON(ret < 0);
1066 BUG_ON(ret >= nr_pages);
1067 }
1068
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001069 if (ret > 0) {
1070 nr_pages -= ret;
1071 pages_done += ret;
1072 if (!nr_pages)
1073 break;
1074 }
1075 if (*locked) {
Andrea Arcangeli96312e62018-03-09 15:51:06 -08001076 /*
1077 * VM_FAULT_RETRY didn't trigger or it was a
1078 * FOLL_NOWAIT.
1079 */
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001080 if (!pages_done)
1081 pages_done = ret;
1082 break;
1083 }
Mike Rapoportdf172772019-05-31 22:30:33 -07001084 /*
1085 * VM_FAULT_RETRY triggered, so seek to the faulting offset.
1086 * For the prefault case (!pages) we only update counts.
1087 */
1088 if (likely(pages))
1089 pages += ret;
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001090 start += ret << PAGE_SHIFT;
1091
1092 /*
1093 * Repeat on the address that fired VM_FAULT_RETRY
1094 * without FAULT_FLAG_ALLOW_RETRY but with
1095 * FAULT_FLAG_TRIED.
1096 */
1097 *locked = 1;
1098 lock_dropped = true;
1099 down_read(&mm->mmap_sem);
1100 ret = __get_user_pages(tsk, mm, start, 1, flags | FOLL_TRIED,
1101 pages, NULL, NULL);
1102 if (ret != 1) {
1103 BUG_ON(ret > 1);
1104 if (!pages_done)
1105 pages_done = ret;
1106 break;
1107 }
1108 nr_pages--;
1109 pages_done++;
1110 if (!nr_pages)
1111 break;
Mike Rapoportdf172772019-05-31 22:30:33 -07001112 if (likely(pages))
1113 pages++;
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001114 start += PAGE_SIZE;
1115 }
Al Viroe7167122017-11-19 11:32:05 -05001116 if (lock_dropped && *locked) {
Andrea Arcangelif0818f42015-02-11 15:27:17 -08001117 /*
1118 * We must let the caller know we temporarily dropped the lock
1119 * and so the critical section protected by it was lost.
1120 */
1121 up_read(&mm->mmap_sem);
1122 *locked = 0;
1123 }
1124 return pages_done;
1125}
1126
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001127/**
1128 * populate_vma_page_range() - populate a range of pages in the vma.
1129 * @vma: target vma
1130 * @start: start address
1131 * @end: end address
1132 * @nonblocking:
1133 *
1134 * This takes care of mlocking the pages too if VM_LOCKED is set.
1135 *
1136 * return 0 on success, negative error code on error.
1137 *
1138 * vma->vm_mm->mmap_sem must be held.
1139 *
1140 * If @nonblocking is NULL, it may be held for read or write and will
1141 * be unperturbed.
1142 *
1143 * If @nonblocking is non-NULL, it must held for read only and may be
1144 * released. If it's released, *@nonblocking will be set to 0.
1145 */
1146long populate_vma_page_range(struct vm_area_struct *vma,
1147 unsigned long start, unsigned long end, int *nonblocking)
1148{
1149 struct mm_struct *mm = vma->vm_mm;
1150 unsigned long nr_pages = (end - start) / PAGE_SIZE;
1151 int gup_flags;
1152
1153 VM_BUG_ON(start & ~PAGE_MASK);
1154 VM_BUG_ON(end & ~PAGE_MASK);
1155 VM_BUG_ON_VMA(start < vma->vm_start, vma);
1156 VM_BUG_ON_VMA(end > vma->vm_end, vma);
1157 VM_BUG_ON_MM(!rwsem_is_locked(&mm->mmap_sem), mm);
1158
1159 gup_flags = FOLL_TOUCH | FOLL_POPULATE | FOLL_MLOCK;
1160 if (vma->vm_flags & VM_LOCKONFAULT)
1161 gup_flags &= ~FOLL_POPULATE;
1162 /*
1163 * We want to touch writable mappings with a write fault in order
1164 * to break COW, except for shared mappings because these don't COW
1165 * and we would not want to dirty them for nothing.
1166 */
1167 if ((vma->vm_flags & (VM_WRITE | VM_SHARED)) == VM_WRITE)
1168 gup_flags |= FOLL_WRITE;
1169
1170 /*
1171 * We want mlock to succeed for regions that have any permissions
1172 * other than PROT_NONE.
1173 */
1174 if (vma->vm_flags & (VM_READ | VM_WRITE | VM_EXEC))
1175 gup_flags |= FOLL_FORCE;
1176
1177 /*
1178 * We made sure addr is within a VMA, so the following will
1179 * not result in a stack expansion that recurses back here.
1180 */
1181 return __get_user_pages(current, mm, start, nr_pages, gup_flags,
1182 NULL, NULL, nonblocking);
1183}
1184
1185/*
1186 * __mm_populate - populate and/or mlock pages within a range of address space.
1187 *
1188 * This is used to implement mlock() and the MAP_POPULATE / MAP_LOCKED mmap
1189 * flags. VMAs must be already marked with the desired vm_flags, and
1190 * mmap_sem must not be held.
1191 */
1192int __mm_populate(unsigned long start, unsigned long len, int ignore_errors)
1193{
1194 struct mm_struct *mm = current->mm;
1195 unsigned long end, nstart, nend;
1196 struct vm_area_struct *vma = NULL;
1197 int locked = 0;
1198 long ret = 0;
1199
1200 end = start + len;
1201
1202 for (nstart = start; nstart < end; nstart = nend) {
1203 /*
1204 * We want to fault in pages for [nstart; end) address range.
1205 * Find first corresponding VMA.
1206 */
1207 if (!locked) {
1208 locked = 1;
1209 down_read(&mm->mmap_sem);
1210 vma = find_vma(mm, nstart);
1211 } else if (nstart >= vma->vm_end)
1212 vma = vma->vm_next;
1213 if (!vma || vma->vm_start >= end)
1214 break;
1215 /*
1216 * Set [nstart; nend) to intersection of desired address
1217 * range with the first VMA. Also, skip undesirable VMA types.
1218 */
1219 nend = min(end, vma->vm_end);
1220 if (vma->vm_flags & (VM_IO | VM_PFNMAP))
1221 continue;
1222 if (nstart < vma->vm_start)
1223 nstart = vma->vm_start;
1224 /*
1225 * Now fault in a range of pages. populate_vma_page_range()
1226 * double checks the vma flags, so that it won't mlock pages
1227 * if the vma was already munlocked.
1228 */
1229 ret = populate_vma_page_range(vma, nstart, nend, &locked);
1230 if (ret < 0) {
1231 if (ignore_errors) {
1232 ret = 0;
1233 continue; /* continue at next VMA */
1234 }
1235 break;
1236 }
1237 nend = nstart + ret * PAGE_SIZE;
1238 ret = 0;
1239 }
1240 if (locked)
1241 up_read(&mm->mmap_sem);
1242 return ret; /* 0 or negative error code */
1243}
1244
1245/**
1246 * get_dump_page() - pin user page in memory while writing it to core dump
1247 * @addr: user address
1248 *
1249 * Returns struct page pointer of user page pinned for dump,
1250 * to be freed afterwards by put_page().
1251 *
1252 * Returns NULL on any kind of failure - a hole must then be inserted into
1253 * the corefile, to preserve alignment with its headers; and also returns
1254 * NULL wherever the ZERO_PAGE, or an anonymous pte_none, has been found -
1255 * allowing a hole to be left in the corefile to save diskspace.
1256 *
1257 * Called without mmap_sem, but after all other threads have been killed.
1258 */
1259#ifdef CONFIG_ELF_CORE
1260struct page *get_dump_page(unsigned long addr)
1261{
1262 struct vm_area_struct *vma;
1263 struct page *page;
1264
1265 if (__get_user_pages(current, current->mm, addr, 1,
1266 FOLL_FORCE | FOLL_DUMP | FOLL_GET, &page, &vma,
1267 NULL) < 1)
1268 return NULL;
1269 flush_cache_page(vma, addr, page_to_pfn(page));
1270 return page;
1271}
1272#endif /* CONFIG_ELF_CORE */
Christoph Hellwig050a9ad2019-07-11 20:57:21 -07001273#else /* CONFIG_MMU */
1274static long __get_user_pages_locked(struct task_struct *tsk,
1275 struct mm_struct *mm, unsigned long start,
1276 unsigned long nr_pages, struct page **pages,
1277 struct vm_area_struct **vmas, int *locked,
1278 unsigned int foll_flags)
1279{
1280 struct vm_area_struct *vma;
1281 unsigned long vm_flags;
1282 int i;
1283
1284 /* calculate required read or write permissions.
1285 * If FOLL_FORCE is set, we only require the "MAY" flags.
1286 */
1287 vm_flags = (foll_flags & FOLL_WRITE) ?
1288 (VM_WRITE | VM_MAYWRITE) : (VM_READ | VM_MAYREAD);
1289 vm_flags &= (foll_flags & FOLL_FORCE) ?
1290 (VM_MAYREAD | VM_MAYWRITE) : (VM_READ | VM_WRITE);
1291
1292 for (i = 0; i < nr_pages; i++) {
1293 vma = find_vma(mm, start);
1294 if (!vma)
1295 goto finish_or_fault;
1296
1297 /* protect what we can, including chardevs */
1298 if ((vma->vm_flags & (VM_IO | VM_PFNMAP)) ||
1299 !(vm_flags & vma->vm_flags))
1300 goto finish_or_fault;
1301
1302 if (pages) {
1303 pages[i] = virt_to_page(start);
1304 if (pages[i])
1305 get_page(pages[i]);
1306 }
1307 if (vmas)
1308 vmas[i] = vma;
1309 start = (start + PAGE_SIZE) & PAGE_MASK;
1310 }
1311
1312 return i;
1313
1314finish_or_fault:
1315 return i ? : -EFAULT;
1316}
1317#endif /* !CONFIG_MMU */
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001318
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001319#if defined(CONFIG_FS_DAX) || defined (CONFIG_CMA)
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001320static bool check_dax_vmas(struct vm_area_struct **vmas, long nr_pages)
1321{
1322 long i;
1323 struct vm_area_struct *vma_prev = NULL;
1324
1325 for (i = 0; i < nr_pages; i++) {
1326 struct vm_area_struct *vma = vmas[i];
1327
1328 if (vma == vma_prev)
1329 continue;
1330
1331 vma_prev = vma;
1332
1333 if (vma_is_fsdax(vma))
1334 return true;
1335 }
1336 return false;
1337}
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001338
1339#ifdef CONFIG_CMA
1340static struct page *new_non_cma_page(struct page *page, unsigned long private)
1341{
1342 /*
1343 * We want to make sure we allocate the new page from the same node
1344 * as the source page.
1345 */
1346 int nid = page_to_nid(page);
1347 /*
1348 * Trying to allocate a page for migration. Ignore allocation
1349 * failure warnings. We don't force __GFP_THISNODE here because
1350 * this node here is the node where we have CMA reservation and
1351 * in some case these nodes will have really less non movable
1352 * allocation memory.
1353 */
1354 gfp_t gfp_mask = GFP_USER | __GFP_NOWARN;
1355
1356 if (PageHighMem(page))
1357 gfp_mask |= __GFP_HIGHMEM;
1358
1359#ifdef CONFIG_HUGETLB_PAGE
1360 if (PageHuge(page)) {
1361 struct hstate *h = page_hstate(page);
1362 /*
1363 * We don't want to dequeue from the pool because pool pages will
1364 * mostly be from the CMA region.
1365 */
1366 return alloc_migrate_huge_page(h, gfp_mask, nid, NULL);
1367 }
1368#endif
1369 if (PageTransHuge(page)) {
1370 struct page *thp;
1371 /*
1372 * ignore allocation failure warnings
1373 */
1374 gfp_t thp_gfpmask = GFP_TRANSHUGE | __GFP_NOWARN;
1375
1376 /*
1377 * Remove the movable mask so that we don't allocate from
1378 * CMA area again.
1379 */
1380 thp_gfpmask &= ~__GFP_MOVABLE;
1381 thp = __alloc_pages_node(nid, thp_gfpmask, HPAGE_PMD_ORDER);
1382 if (!thp)
1383 return NULL;
1384 prep_transhuge_page(thp);
1385 return thp;
1386 }
1387
1388 return __alloc_pages_node(nid, gfp_mask, 0);
1389}
1390
Ira Weiny932f4a62019-05-13 17:17:03 -07001391static long check_and_migrate_cma_pages(struct task_struct *tsk,
1392 struct mm_struct *mm,
1393 unsigned long start,
1394 unsigned long nr_pages,
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001395 struct page **pages,
Ira Weiny932f4a62019-05-13 17:17:03 -07001396 struct vm_area_struct **vmas,
1397 unsigned int gup_flags)
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001398{
Pingfan Liuaa712392019-07-11 20:57:39 -07001399 unsigned long i;
1400 unsigned long step;
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001401 bool drain_allow = true;
1402 bool migrate_allow = true;
1403 LIST_HEAD(cma_page_list);
zhong jiangb96cc652019-11-30 17:49:50 -08001404 long ret = nr_pages;
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001405
1406check_again:
Pingfan Liuaa712392019-07-11 20:57:39 -07001407 for (i = 0; i < nr_pages;) {
1408
1409 struct page *head = compound_head(pages[i]);
1410
1411 /*
1412 * gup may start from a tail page. Advance step by the left
1413 * part.
1414 */
Matthew Wilcox (Oracle)d8c65462019-09-23 15:34:30 -07001415 step = compound_nr(head) - (pages[i] - head);
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001416 /*
1417 * If we get a page from the CMA zone, since we are going to
1418 * be pinning these entries, we might as well move them out
1419 * of the CMA zone if possible.
1420 */
Pingfan Liuaa712392019-07-11 20:57:39 -07001421 if (is_migrate_cma_page(head)) {
1422 if (PageHuge(head))
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001423 isolate_huge_page(head, &cma_page_list);
Pingfan Liuaa712392019-07-11 20:57:39 -07001424 else {
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001425 if (!PageLRU(head) && drain_allow) {
1426 lru_add_drain_all();
1427 drain_allow = false;
1428 }
1429
1430 if (!isolate_lru_page(head)) {
1431 list_add_tail(&head->lru, &cma_page_list);
1432 mod_node_page_state(page_pgdat(head),
1433 NR_ISOLATED_ANON +
1434 page_is_file_cache(head),
1435 hpage_nr_pages(head));
1436 }
1437 }
1438 }
Pingfan Liuaa712392019-07-11 20:57:39 -07001439
1440 i += step;
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001441 }
1442
1443 if (!list_empty(&cma_page_list)) {
1444 /*
1445 * drop the above get_user_pages reference.
1446 */
1447 for (i = 0; i < nr_pages; i++)
1448 put_page(pages[i]);
1449
1450 if (migrate_pages(&cma_page_list, new_non_cma_page,
1451 NULL, 0, MIGRATE_SYNC, MR_CONTIG_RANGE)) {
1452 /*
1453 * some of the pages failed migration. Do get_user_pages
1454 * without migration.
1455 */
1456 migrate_allow = false;
1457
1458 if (!list_empty(&cma_page_list))
1459 putback_movable_pages(&cma_page_list);
1460 }
1461 /*
Ira Weiny932f4a62019-05-13 17:17:03 -07001462 * We did migrate all the pages, Try to get the page references
1463 * again migrating any new CMA pages which we failed to isolate
1464 * earlier.
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001465 */
zhong jiangb96cc652019-11-30 17:49:50 -08001466 ret = __get_user_pages_locked(tsk, mm, start, nr_pages,
Ira Weiny932f4a62019-05-13 17:17:03 -07001467 pages, vmas, NULL,
1468 gup_flags);
1469
zhong jiangb96cc652019-11-30 17:49:50 -08001470 if ((ret > 0) && migrate_allow) {
1471 nr_pages = ret;
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001472 drain_allow = true;
1473 goto check_again;
1474 }
1475 }
1476
zhong jiangb96cc652019-11-30 17:49:50 -08001477 return ret;
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001478}
1479#else
Ira Weiny932f4a62019-05-13 17:17:03 -07001480static long check_and_migrate_cma_pages(struct task_struct *tsk,
1481 struct mm_struct *mm,
1482 unsigned long start,
1483 unsigned long nr_pages,
1484 struct page **pages,
1485 struct vm_area_struct **vmas,
1486 unsigned int gup_flags)
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001487{
1488 return nr_pages;
1489}
Christoph Hellwig050a9ad2019-07-11 20:57:21 -07001490#endif /* CONFIG_CMA */
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001491
Dan Williams2bb6d282017-11-29 16:10:35 -08001492/*
Ira Weiny932f4a62019-05-13 17:17:03 -07001493 * __gup_longterm_locked() is a wrapper for __get_user_pages_locked which
1494 * allows us to process the FOLL_LONGTERM flag.
Dan Williams2bb6d282017-11-29 16:10:35 -08001495 */
Ira Weiny932f4a62019-05-13 17:17:03 -07001496static long __gup_longterm_locked(struct task_struct *tsk,
1497 struct mm_struct *mm,
1498 unsigned long start,
1499 unsigned long nr_pages,
1500 struct page **pages,
1501 struct vm_area_struct **vmas,
1502 unsigned int gup_flags)
Dan Williams2bb6d282017-11-29 16:10:35 -08001503{
Ira Weiny932f4a62019-05-13 17:17:03 -07001504 struct vm_area_struct **vmas_tmp = vmas;
1505 unsigned long flags = 0;
Dan Williams2bb6d282017-11-29 16:10:35 -08001506 long rc, i;
1507
Ira Weiny932f4a62019-05-13 17:17:03 -07001508 if (gup_flags & FOLL_LONGTERM) {
1509 if (!pages)
1510 return -EINVAL;
Dan Williams2bb6d282017-11-29 16:10:35 -08001511
Ira Weiny932f4a62019-05-13 17:17:03 -07001512 if (!vmas_tmp) {
1513 vmas_tmp = kcalloc(nr_pages,
1514 sizeof(struct vm_area_struct *),
1515 GFP_KERNEL);
1516 if (!vmas_tmp)
1517 return -ENOMEM;
1518 }
1519 flags = memalloc_nocma_save();
Dan Williams2bb6d282017-11-29 16:10:35 -08001520 }
1521
Ira Weiny932f4a62019-05-13 17:17:03 -07001522 rc = __get_user_pages_locked(tsk, mm, start, nr_pages, pages,
1523 vmas_tmp, NULL, gup_flags);
Dan Williams2bb6d282017-11-29 16:10:35 -08001524
Ira Weiny932f4a62019-05-13 17:17:03 -07001525 if (gup_flags & FOLL_LONGTERM) {
1526 memalloc_nocma_restore(flags);
1527 if (rc < 0)
1528 goto out;
1529
1530 if (check_dax_vmas(vmas_tmp, rc)) {
1531 for (i = 0; i < rc; i++)
1532 put_page(pages[i]);
1533 rc = -EOPNOTSUPP;
1534 goto out;
1535 }
1536
1537 rc = check_and_migrate_cma_pages(tsk, mm, start, rc, pages,
1538 vmas_tmp, gup_flags);
Aneesh Kumar K.V9a4e9f32019-03-05 15:47:44 -08001539 }
1540
Dan Williams2bb6d282017-11-29 16:10:35 -08001541out:
Ira Weiny932f4a62019-05-13 17:17:03 -07001542 if (vmas_tmp != vmas)
1543 kfree(vmas_tmp);
Dan Williams2bb6d282017-11-29 16:10:35 -08001544 return rc;
1545}
Ira Weiny932f4a62019-05-13 17:17:03 -07001546#else /* !CONFIG_FS_DAX && !CONFIG_CMA */
1547static __always_inline long __gup_longterm_locked(struct task_struct *tsk,
1548 struct mm_struct *mm,
1549 unsigned long start,
1550 unsigned long nr_pages,
1551 struct page **pages,
1552 struct vm_area_struct **vmas,
1553 unsigned int flags)
1554{
1555 return __get_user_pages_locked(tsk, mm, start, nr_pages, pages, vmas,
1556 NULL, flags);
1557}
1558#endif /* CONFIG_FS_DAX || CONFIG_CMA */
1559
John Hubbard22bf29b2020-04-01 21:05:10 -07001560#ifdef CONFIG_MMU
1561static long __get_user_pages_remote(struct task_struct *tsk,
1562 struct mm_struct *mm,
1563 unsigned long start, unsigned long nr_pages,
1564 unsigned int gup_flags, struct page **pages,
1565 struct vm_area_struct **vmas, int *locked)
1566{
1567 /*
1568 * Parts of FOLL_LONGTERM behavior are incompatible with
1569 * FAULT_FLAG_ALLOW_RETRY because of the FS DAX check requirement on
1570 * vmas. However, this only comes up if locked is set, and there are
1571 * callers that do request FOLL_LONGTERM, but do not set locked. So,
1572 * allow what we can.
1573 */
1574 if (gup_flags & FOLL_LONGTERM) {
1575 if (WARN_ON_ONCE(locked))
1576 return -EINVAL;
1577 /*
1578 * This will check the vmas (even if our vmas arg is NULL)
1579 * and return -ENOTSUPP if DAX isn't allowed in this case:
1580 */
1581 return __gup_longterm_locked(tsk, mm, start, nr_pages, pages,
1582 vmas, gup_flags | FOLL_TOUCH |
1583 FOLL_REMOTE);
1584 }
1585
1586 return __get_user_pages_locked(tsk, mm, start, nr_pages, pages, vmas,
1587 locked,
1588 gup_flags | FOLL_TOUCH | FOLL_REMOTE);
1589}
1590
Ira Weiny932f4a62019-05-13 17:17:03 -07001591/*
John Hubbardc4237f82020-01-30 22:12:36 -08001592 * get_user_pages_remote() - pin user pages in memory
1593 * @tsk: the task_struct to use for page fault accounting, or
1594 * NULL if faults are not to be recorded.
1595 * @mm: mm_struct of target mm
1596 * @start: starting user address
1597 * @nr_pages: number of pages from start to pin
1598 * @gup_flags: flags modifying lookup behaviour
1599 * @pages: array that receives pointers to the pages pinned.
1600 * Should be at least nr_pages long. Or NULL, if caller
1601 * only intends to ensure the pages are faulted in.
1602 * @vmas: array of pointers to vmas corresponding to each page.
1603 * Or NULL if the caller does not require them.
1604 * @locked: pointer to lock flag indicating whether lock is held and
1605 * subsequently whether VM_FAULT_RETRY functionality can be
1606 * utilised. Lock must initially be held.
1607 *
1608 * Returns either number of pages pinned (which may be less than the
1609 * number requested), or an error. Details about the return value:
1610 *
1611 * -- If nr_pages is 0, returns 0.
1612 * -- If nr_pages is >0, but no pages were pinned, returns -errno.
1613 * -- If nr_pages is >0, and some pages were pinned, returns the number of
1614 * pages pinned. Again, this may be less than nr_pages.
1615 *
1616 * The caller is responsible for releasing returned @pages, via put_page().
1617 *
1618 * @vmas are valid only as long as mmap_sem is held.
1619 *
1620 * Must be called with mmap_sem held for read or write.
1621 *
1622 * get_user_pages walks a process's page tables and takes a reference to
1623 * each struct page that each user address corresponds to at a given
1624 * instant. That is, it takes the page that would be accessed if a user
1625 * thread accesses the given user virtual address at that instant.
1626 *
1627 * This does not guarantee that the page exists in the user mappings when
1628 * get_user_pages returns, and there may even be a completely different
1629 * page there in some cases (eg. if mmapped pagecache has been invalidated
1630 * and subsequently re faulted). However it does guarantee that the page
1631 * won't be freed completely. And mostly callers simply care that the page
1632 * contains data that was valid *at some point in time*. Typically, an IO
1633 * or similar operation cannot guarantee anything stronger anyway because
1634 * locks can't be held over the syscall boundary.
1635 *
1636 * If gup_flags & FOLL_WRITE == 0, the page must not be written to. If the page
1637 * is written to, set_page_dirty (or set_page_dirty_lock, as appropriate) must
1638 * be called after the page is finished with, and before put_page is called.
1639 *
1640 * get_user_pages is typically used for fewer-copy IO operations, to get a
1641 * handle on the memory by some means other than accesses via the user virtual
1642 * addresses. The pages may be submitted for DMA to devices or accessed via
1643 * their kernel linear mapping (via the kmap APIs). Care should be taken to
1644 * use the correct cache flushing APIs.
1645 *
1646 * See also get_user_pages_fast, for performance critical applications.
1647 *
1648 * get_user_pages should be phased out in favor of
1649 * get_user_pages_locked|unlocked or get_user_pages_fast. Nothing
1650 * should use get_user_pages because it cannot pass
1651 * FAULT_FLAG_ALLOW_RETRY to handle_mm_fault.
1652 */
1653long get_user_pages_remote(struct task_struct *tsk, struct mm_struct *mm,
1654 unsigned long start, unsigned long nr_pages,
1655 unsigned int gup_flags, struct page **pages,
1656 struct vm_area_struct **vmas, int *locked)
1657{
1658 /*
John Hubbardeddb1c22020-01-30 22:12:54 -08001659 * FOLL_PIN must only be set internally by the pin_user_pages*() APIs,
1660 * never directly by the caller, so enforce that with an assertion:
1661 */
1662 if (WARN_ON_ONCE(gup_flags & FOLL_PIN))
1663 return -EINVAL;
1664
John Hubbard22bf29b2020-04-01 21:05:10 -07001665 return __get_user_pages_remote(tsk, mm, start, nr_pages, gup_flags,
1666 pages, vmas, locked);
John Hubbardc4237f82020-01-30 22:12:36 -08001667}
1668EXPORT_SYMBOL(get_user_pages_remote);
1669
John Hubbardeddb1c22020-01-30 22:12:54 -08001670#else /* CONFIG_MMU */
1671long get_user_pages_remote(struct task_struct *tsk, struct mm_struct *mm,
1672 unsigned long start, unsigned long nr_pages,
1673 unsigned int gup_flags, struct page **pages,
1674 struct vm_area_struct **vmas, int *locked)
1675{
1676 return 0;
1677}
1678#endif /* !CONFIG_MMU */
1679
John Hubbardc4237f82020-01-30 22:12:36 -08001680/*
Ira Weiny932f4a62019-05-13 17:17:03 -07001681 * This is the same as get_user_pages_remote(), just with a
1682 * less-flexible calling convention where we assume that the task
1683 * and mm being operated on are the current task's and don't allow
1684 * passing of a locked parameter. We also obviously don't pass
1685 * FOLL_REMOTE in here.
1686 */
1687long get_user_pages(unsigned long start, unsigned long nr_pages,
1688 unsigned int gup_flags, struct page **pages,
1689 struct vm_area_struct **vmas)
1690{
John Hubbardeddb1c22020-01-30 22:12:54 -08001691 /*
1692 * FOLL_PIN must only be set internally by the pin_user_pages*() APIs,
1693 * never directly by the caller, so enforce that with an assertion:
1694 */
1695 if (WARN_ON_ONCE(gup_flags & FOLL_PIN))
1696 return -EINVAL;
1697
Ira Weiny932f4a62019-05-13 17:17:03 -07001698 return __gup_longterm_locked(current, current->mm, start, nr_pages,
1699 pages, vmas, gup_flags | FOLL_TOUCH);
1700}
1701EXPORT_SYMBOL(get_user_pages);
Dan Williams2bb6d282017-11-29 16:10:35 -08001702
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001703/*
1704 * We can leverage the VM_FAULT_RETRY functionality in the page fault
1705 * paths better by using either get_user_pages_locked() or
1706 * get_user_pages_unlocked().
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001707 *
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001708 * get_user_pages_locked() is suitable to replace the form:
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001709 *
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001710 * down_read(&mm->mmap_sem);
1711 * do_something()
1712 * get_user_pages(tsk, mm, ..., pages, NULL);
1713 * up_read(&mm->mmap_sem);
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001714 *
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001715 * to:
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001716 *
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001717 * int locked = 1;
1718 * down_read(&mm->mmap_sem);
1719 * do_something()
1720 * get_user_pages_locked(tsk, mm, ..., pages, &locked);
1721 * if (locked)
1722 * up_read(&mm->mmap_sem);
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001723 */
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001724long get_user_pages_locked(unsigned long start, unsigned long nr_pages,
1725 unsigned int gup_flags, struct page **pages,
1726 int *locked)
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001727{
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001728 /*
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001729 * FIXME: Current FOLL_LONGTERM behavior is incompatible with
1730 * FAULT_FLAG_ALLOW_RETRY because of the FS DAX check requirement on
1731 * vmas. As there are no users of this flag in this call we simply
1732 * disallow this option for now.
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001733 */
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001734 if (WARN_ON_ONCE(gup_flags & FOLL_LONGTERM))
1735 return -EINVAL;
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001736
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001737 return __get_user_pages_locked(current, current->mm, start, nr_pages,
1738 pages, NULL, locked,
1739 gup_flags | FOLL_TOUCH);
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001740}
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001741EXPORT_SYMBOL(get_user_pages_locked);
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001742
1743/*
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001744 * get_user_pages_unlocked() is suitable to replace the form:
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001745 *
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001746 * down_read(&mm->mmap_sem);
1747 * get_user_pages(tsk, mm, ..., pages, NULL);
1748 * up_read(&mm->mmap_sem);
1749 *
1750 * with:
1751 *
1752 * get_user_pages_unlocked(tsk, mm, ..., pages);
1753 *
1754 * It is functionally equivalent to get_user_pages_fast so
1755 * get_user_pages_fast should be used instead if specific gup_flags
1756 * (e.g. FOLL_FORCE) are not required.
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001757 */
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001758long get_user_pages_unlocked(unsigned long start, unsigned long nr_pages,
1759 struct page **pages, unsigned int gup_flags)
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001760{
1761 struct mm_struct *mm = current->mm;
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001762 int locked = 1;
1763 long ret;
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001764
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001765 /*
1766 * FIXME: Current FOLL_LONGTERM behavior is incompatible with
1767 * FAULT_FLAG_ALLOW_RETRY because of the FS DAX check requirement on
1768 * vmas. As there are no users of this flag in this call we simply
1769 * disallow this option for now.
1770 */
1771 if (WARN_ON_ONCE(gup_flags & FOLL_LONGTERM))
1772 return -EINVAL;
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001773
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001774 down_read(&mm->mmap_sem);
1775 ret = __get_user_pages_locked(current, mm, start, nr_pages, pages, NULL,
1776 &locked, gup_flags | FOLL_TOUCH);
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001777 if (locked)
1778 up_read(&mm->mmap_sem);
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001779 return ret;
Kirill A. Shutemovacc3c8d2015-04-14 15:44:45 -07001780}
Christoph Hellwigd3649f62019-07-11 20:57:18 -07001781EXPORT_SYMBOL(get_user_pages_unlocked);
Steve Capper2667f502014-10-09 15:29:14 -07001782
1783/*
Christoph Hellwig67a929e2019-07-11 20:57:14 -07001784 * Fast GUP
Steve Capper2667f502014-10-09 15:29:14 -07001785 *
1786 * get_user_pages_fast attempts to pin user pages by walking the page
1787 * tables directly and avoids taking locks. Thus the walker needs to be
1788 * protected from page table pages being freed from under it, and should
1789 * block any THP splits.
1790 *
1791 * One way to achieve this is to have the walker disable interrupts, and
1792 * rely on IPIs from the TLB flushing code blocking before the page table
1793 * pages are freed. This is unsuitable for architectures that do not need
1794 * to broadcast an IPI when invalidating TLBs.
1795 *
1796 * Another way to achieve this is to batch up page table containing pages
1797 * belonging to more than one mm_user, then rcu_sched a callback to free those
1798 * pages. Disabling interrupts will allow the fast_gup walker to both block
1799 * the rcu_sched callback, and an IPI that we broadcast for splitting THPs
1800 * (which is a relatively rare event). The code below adopts this strategy.
1801 *
1802 * Before activating this code, please be aware that the following assumptions
1803 * are currently made:
1804 *
Peter Zijlstraff2e6d722020-02-03 17:37:02 -08001805 * *) Either MMU_GATHER_RCU_TABLE_FREE is enabled, and tlb_remove_table() is used to
Kirill A. Shutemove5855132017-06-06 14:31:20 +03001806 * free pages containing page tables or TLB flushing requires IPI broadcast.
Steve Capper2667f502014-10-09 15:29:14 -07001807 *
Steve Capper2667f502014-10-09 15:29:14 -07001808 * *) ptes can be read atomically by the architecture.
1809 *
1810 * *) access_ok is sufficient to validate userspace address ranges.
1811 *
1812 * The last two assumptions can be relaxed by the addition of helper functions.
1813 *
1814 * This code is based heavily on the PowerPC implementation by Nick Piggin.
1815 */
Christoph Hellwig67a929e2019-07-11 20:57:14 -07001816#ifdef CONFIG_HAVE_FAST_GUP
Christoph Hellwig39656e82019-07-11 20:56:49 -07001817#ifdef CONFIG_GUP_GET_PTE_LOW_HIGH
Kirill A. Shutemov0005d202017-03-16 18:26:51 +03001818/*
Christoph Hellwig39656e82019-07-11 20:56:49 -07001819 * WARNING: only to be used in the get_user_pages_fast() implementation.
1820 *
1821 * With get_user_pages_fast(), we walk down the pagetables without taking any
1822 * locks. For this we would like to load the pointers atomically, but sometimes
1823 * that is not possible (e.g. without expensive cmpxchg8b on x86_32 PAE). What
1824 * we do have is the guarantee that a PTE will only either go from not present
1825 * to present, or present to not present or both -- it will not switch to a
1826 * completely different present page without a TLB flush in between; something
1827 * that we are blocking by holding interrupts off.
1828 *
1829 * Setting ptes from not present to present goes:
1830 *
1831 * ptep->pte_high = h;
1832 * smp_wmb();
1833 * ptep->pte_low = l;
1834 *
1835 * And present to not present goes:
1836 *
1837 * ptep->pte_low = 0;
1838 * smp_wmb();
1839 * ptep->pte_high = 0;
1840 *
1841 * We must ensure here that the load of pte_low sees 'l' IFF pte_high sees 'h'.
1842 * We load pte_high *after* loading pte_low, which ensures we don't see an older
1843 * value of pte_high. *Then* we recheck pte_low, which ensures that we haven't
1844 * picked up a changed pte high. We might have gotten rubbish values from
1845 * pte_low and pte_high, but we are guaranteed that pte_low will not have the
1846 * present bit set *unless* it is 'l'. Because get_user_pages_fast() only
1847 * operates on present ptes we're safe.
1848 */
1849static inline pte_t gup_get_pte(pte_t *ptep)
1850{
1851 pte_t pte;
1852
1853 do {
1854 pte.pte_low = ptep->pte_low;
1855 smp_rmb();
1856 pte.pte_high = ptep->pte_high;
1857 smp_rmb();
1858 } while (unlikely(pte.pte_low != ptep->pte_low));
1859
1860 return pte;
1861}
1862#else /* CONFIG_GUP_GET_PTE_LOW_HIGH */
1863/*
1864 * We require that the PTE can be read atomically.
Kirill A. Shutemov0005d202017-03-16 18:26:51 +03001865 */
1866static inline pte_t gup_get_pte(pte_t *ptep)
1867{
1868 return READ_ONCE(*ptep);
1869}
Christoph Hellwig39656e82019-07-11 20:56:49 -07001870#endif /* CONFIG_GUP_GET_PTE_LOW_HIGH */
Kirill A. Shutemov0005d202017-03-16 18:26:51 +03001871
Guenter Roeck790c7362019-07-11 20:57:46 -07001872static void __maybe_unused undo_dev_pagemap(int *nr, int nr_start,
1873 struct page **pages)
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001874{
1875 while ((*nr) - nr_start) {
1876 struct page *page = pages[--(*nr)];
1877
1878 ClearPageReferenced(page);
1879 put_page(page);
1880 }
1881}
1882
Laurent Dufour3010a5e2018-06-07 17:06:08 -07001883#ifdef CONFIG_ARCH_HAS_PTE_SPECIAL
Steve Capper2667f502014-10-09 15:29:14 -07001884static int gup_pte_range(pmd_t pmd, unsigned long addr, unsigned long end,
Ira Weinyb798bec2019-05-13 17:17:07 -07001885 unsigned int flags, struct page **pages, int *nr)
Steve Capper2667f502014-10-09 15:29:14 -07001886{
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001887 struct dev_pagemap *pgmap = NULL;
1888 int nr_start = *nr, ret = 0;
Steve Capper2667f502014-10-09 15:29:14 -07001889 pte_t *ptep, *ptem;
Steve Capper2667f502014-10-09 15:29:14 -07001890
1891 ptem = ptep = pte_offset_map(&pmd, addr);
1892 do {
Kirill A. Shutemov0005d202017-03-16 18:26:51 +03001893 pte_t pte = gup_get_pte(ptep);
Kirill A. Shutemov7aef4172016-01-15 16:52:32 -08001894 struct page *head, *page;
Steve Capper2667f502014-10-09 15:29:14 -07001895
1896 /*
1897 * Similar to the PMD case below, NUMA hinting must take slow
Mel Gorman8a0516e2015-02-12 14:58:22 -08001898 * path using the pte_protnone check.
Steve Capper2667f502014-10-09 15:29:14 -07001899 */
Kirill A. Shutemove7884f82017-03-16 18:26:50 +03001900 if (pte_protnone(pte))
1901 goto pte_unmap;
1902
Ira Weinyb798bec2019-05-13 17:17:07 -07001903 if (!pte_access_permitted(pte, flags & FOLL_WRITE))
Kirill A. Shutemove7884f82017-03-16 18:26:50 +03001904 goto pte_unmap;
1905
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001906 if (pte_devmap(pte)) {
Ira Weiny7af75562019-05-13 17:17:14 -07001907 if (unlikely(flags & FOLL_LONGTERM))
1908 goto pte_unmap;
1909
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001910 pgmap = get_dev_pagemap(pte_pfn(pte), pgmap);
1911 if (unlikely(!pgmap)) {
1912 undo_dev_pagemap(nr, nr_start, pages);
1913 goto pte_unmap;
1914 }
1915 } else if (pte_special(pte))
Steve Capper2667f502014-10-09 15:29:14 -07001916 goto pte_unmap;
1917
1918 VM_BUG_ON(!pfn_valid(pte_pfn(pte)));
1919 page = pte_page(pte);
1920
Linus Torvalds8fde12c2019-04-11 10:49:19 -07001921 head = try_get_compound_head(page, 1);
1922 if (!head)
Steve Capper2667f502014-10-09 15:29:14 -07001923 goto pte_unmap;
1924
1925 if (unlikely(pte_val(pte) != pte_val(*ptep))) {
Kirill A. Shutemov7aef4172016-01-15 16:52:32 -08001926 put_page(head);
Steve Capper2667f502014-10-09 15:29:14 -07001927 goto pte_unmap;
1928 }
1929
Kirill A. Shutemov7aef4172016-01-15 16:52:32 -08001930 VM_BUG_ON_PAGE(compound_head(page) != head, page);
Kirill A. Shutemove9348052017-03-16 18:26:52 +03001931
1932 SetPageReferenced(page);
Steve Capper2667f502014-10-09 15:29:14 -07001933 pages[*nr] = page;
1934 (*nr)++;
1935
1936 } while (ptep++, addr += PAGE_SIZE, addr != end);
1937
1938 ret = 1;
1939
1940pte_unmap:
Christoph Hellwig832d7aa2017-12-29 08:54:01 +01001941 if (pgmap)
1942 put_dev_pagemap(pgmap);
Steve Capper2667f502014-10-09 15:29:14 -07001943 pte_unmap(ptem);
1944 return ret;
1945}
1946#else
1947
1948/*
1949 * If we can't determine whether or not a pte is special, then fail immediately
1950 * for ptes. Note, we can still pin HugeTLB and THP as these are guaranteed not
1951 * to be special.
1952 *
1953 * For a futex to be placed on a THP tail page, get_futex_key requires a
1954 * __get_user_pages_fast implementation that can pin pages. Thus it's still
1955 * useful to have gup_huge_pmd even if we can't operate on ptes.
1956 */
1957static int gup_pte_range(pmd_t pmd, unsigned long addr, unsigned long end,
Ira Weinyb798bec2019-05-13 17:17:07 -07001958 unsigned int flags, struct page **pages, int *nr)
Steve Capper2667f502014-10-09 15:29:14 -07001959{
1960 return 0;
1961}
Laurent Dufour3010a5e2018-06-07 17:06:08 -07001962#endif /* CONFIG_ARCH_HAS_PTE_SPECIAL */
Steve Capper2667f502014-10-09 15:29:14 -07001963
Robin Murphy17596732019-07-16 16:30:47 -07001964#if defined(CONFIG_ARCH_HAS_PTE_DEVMAP) && defined(CONFIG_TRANSPARENT_HUGEPAGE)
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001965static int __gup_device_huge(unsigned long pfn, unsigned long addr,
John Hubbard86dfbed2020-04-01 21:05:14 -07001966 unsigned long end, unsigned int flags,
1967 struct page **pages, int *nr)
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001968{
1969 int nr_start = *nr;
1970 struct dev_pagemap *pgmap = NULL;
1971
1972 do {
1973 struct page *page = pfn_to_page(pfn);
1974
1975 pgmap = get_dev_pagemap(pfn, pgmap);
1976 if (unlikely(!pgmap)) {
1977 undo_dev_pagemap(nr, nr_start, pages);
1978 return 0;
1979 }
1980 SetPageReferenced(page);
1981 pages[*nr] = page;
1982 get_page(page);
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001983 (*nr)++;
1984 pfn++;
1985 } while (addr += PAGE_SIZE, addr != end);
Christoph Hellwig832d7aa2017-12-29 08:54:01 +01001986
1987 if (pgmap)
1988 put_dev_pagemap(pgmap);
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001989 return 1;
1990}
1991
Dan Williamsa9b6de72018-04-19 21:32:19 -07001992static int __gup_device_huge_pmd(pmd_t orig, pmd_t *pmdp, unsigned long addr,
John Hubbard86dfbed2020-04-01 21:05:14 -07001993 unsigned long end, unsigned int flags,
1994 struct page **pages, int *nr)
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001995{
1996 unsigned long fault_pfn;
Dan Williamsa9b6de72018-04-19 21:32:19 -07001997 int nr_start = *nr;
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03001998
Dan Williamsa9b6de72018-04-19 21:32:19 -07001999 fault_pfn = pmd_pfn(orig) + ((addr & ~PMD_MASK) >> PAGE_SHIFT);
John Hubbard86dfbed2020-04-01 21:05:14 -07002000 if (!__gup_device_huge(fault_pfn, addr, end, flags, pages, nr))
Dan Williamsa9b6de72018-04-19 21:32:19 -07002001 return 0;
2002
2003 if (unlikely(pmd_val(orig) != pmd_val(*pmdp))) {
2004 undo_dev_pagemap(nr, nr_start, pages);
2005 return 0;
2006 }
2007 return 1;
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002008}
2009
Dan Williamsa9b6de72018-04-19 21:32:19 -07002010static int __gup_device_huge_pud(pud_t orig, pud_t *pudp, unsigned long addr,
John Hubbard86dfbed2020-04-01 21:05:14 -07002011 unsigned long end, unsigned int flags,
2012 struct page **pages, int *nr)
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002013{
2014 unsigned long fault_pfn;
Dan Williamsa9b6de72018-04-19 21:32:19 -07002015 int nr_start = *nr;
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002016
Dan Williamsa9b6de72018-04-19 21:32:19 -07002017 fault_pfn = pud_pfn(orig) + ((addr & ~PUD_MASK) >> PAGE_SHIFT);
John Hubbard86dfbed2020-04-01 21:05:14 -07002018 if (!__gup_device_huge(fault_pfn, addr, end, flags, pages, nr))
Dan Williamsa9b6de72018-04-19 21:32:19 -07002019 return 0;
2020
2021 if (unlikely(pud_val(orig) != pud_val(*pudp))) {
2022 undo_dev_pagemap(nr, nr_start, pages);
2023 return 0;
2024 }
2025 return 1;
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002026}
2027#else
Dan Williamsa9b6de72018-04-19 21:32:19 -07002028static int __gup_device_huge_pmd(pmd_t orig, pmd_t *pmdp, unsigned long addr,
John Hubbard86dfbed2020-04-01 21:05:14 -07002029 unsigned long end, unsigned int flags,
2030 struct page **pages, int *nr)
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002031{
2032 BUILD_BUG();
2033 return 0;
2034}
2035
Dan Williamsa9b6de72018-04-19 21:32:19 -07002036static int __gup_device_huge_pud(pud_t pud, pud_t *pudp, unsigned long addr,
John Hubbard86dfbed2020-04-01 21:05:14 -07002037 unsigned long end, unsigned int flags,
2038 struct page **pages, int *nr)
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002039{
2040 BUILD_BUG();
2041 return 0;
2042}
2043#endif
2044
John Hubbarda43e9822020-01-30 22:12:17 -08002045static int record_subpages(struct page *page, unsigned long addr,
2046 unsigned long end, struct page **pages)
2047{
2048 int nr;
2049
2050 for (nr = 0; addr != end; addr += PAGE_SIZE)
2051 pages[nr++] = page++;
2052
2053 return nr;
2054}
2055
2056static void put_compound_head(struct page *page, int refs)
2057{
2058 VM_BUG_ON_PAGE(page_ref_count(page) < refs, page);
2059 /*
2060 * Calling put_page() for each ref is unnecessarily slow. Only the last
2061 * ref needs a put_page().
2062 */
2063 if (refs > 1)
2064 page_ref_sub(page, refs - 1);
2065 put_page(page);
2066}
2067
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002068#ifdef CONFIG_ARCH_HAS_HUGEPD
2069static unsigned long hugepte_addr_end(unsigned long addr, unsigned long end,
2070 unsigned long sz)
2071{
2072 unsigned long __boundary = (addr + sz) & ~(sz-1);
2073 return (__boundary - 1 < end - 1) ? __boundary : end;
2074}
2075
2076static int gup_hugepte(pte_t *ptep, unsigned long sz, unsigned long addr,
John Hubbard0cd22af2019-10-18 20:19:53 -07002077 unsigned long end, unsigned int flags,
2078 struct page **pages, int *nr)
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002079{
2080 unsigned long pte_end;
2081 struct page *head, *page;
2082 pte_t pte;
2083 int refs;
2084
2085 pte_end = (addr + sz) & ~(sz-1);
2086 if (pte_end < end)
2087 end = pte_end;
2088
2089 pte = READ_ONCE(*ptep);
2090
John Hubbard0cd22af2019-10-18 20:19:53 -07002091 if (!pte_access_permitted(pte, flags & FOLL_WRITE))
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002092 return 0;
2093
2094 /* hugepages are never "special" */
2095 VM_BUG_ON(!pfn_valid(pte_pfn(pte)));
2096
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002097 head = pte_page(pte);
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002098 page = head + ((addr & (sz-1)) >> PAGE_SHIFT);
John Hubbarda43e9822020-01-30 22:12:17 -08002099 refs = record_subpages(page, addr, end, pages + *nr);
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002100
Christoph Hellwig01a36912019-07-11 20:57:32 -07002101 head = try_get_compound_head(head, refs);
John Hubbarda43e9822020-01-30 22:12:17 -08002102 if (!head)
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002103 return 0;
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002104
2105 if (unlikely(pte_val(pte) != pte_val(*ptep))) {
John Hubbarda43e9822020-01-30 22:12:17 -08002106 put_compound_head(head, refs);
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002107 return 0;
2108 }
2109
John Hubbarda43e9822020-01-30 22:12:17 -08002110 *nr += refs;
Christoph Hellwig520b4a42019-07-11 20:57:36 -07002111 SetPageReferenced(head);
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002112 return 1;
2113}
2114
2115static int gup_huge_pd(hugepd_t hugepd, unsigned long addr,
John Hubbard0cd22af2019-10-18 20:19:53 -07002116 unsigned int pdshift, unsigned long end, unsigned int flags,
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002117 struct page **pages, int *nr)
2118{
2119 pte_t *ptep;
2120 unsigned long sz = 1UL << hugepd_shift(hugepd);
2121 unsigned long next;
2122
2123 ptep = hugepte_offset(hugepd, addr, pdshift);
2124 do {
2125 next = hugepte_addr_end(addr, end, sz);
John Hubbard0cd22af2019-10-18 20:19:53 -07002126 if (!gup_hugepte(ptep, sz, addr, end, flags, pages, nr))
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002127 return 0;
2128 } while (ptep++, addr = next, addr != end);
2129
2130 return 1;
2131}
2132#else
2133static inline int gup_huge_pd(hugepd_t hugepd, unsigned long addr,
John Hubbard0cd22af2019-10-18 20:19:53 -07002134 unsigned int pdshift, unsigned long end, unsigned int flags,
Christoph Hellwigcbd34da2019-07-11 20:57:28 -07002135 struct page **pages, int *nr)
2136{
2137 return 0;
2138}
2139#endif /* CONFIG_ARCH_HAS_HUGEPD */
2140
Steve Capper2667f502014-10-09 15:29:14 -07002141static int gup_huge_pmd(pmd_t orig, pmd_t *pmdp, unsigned long addr,
John Hubbard0cd22af2019-10-18 20:19:53 -07002142 unsigned long end, unsigned int flags,
2143 struct page **pages, int *nr)
Steve Capper2667f502014-10-09 15:29:14 -07002144{
Kirill A. Shutemovddc58f22016-01-15 16:52:56 -08002145 struct page *head, *page;
Steve Capper2667f502014-10-09 15:29:14 -07002146 int refs;
2147
Ira Weinyb798bec2019-05-13 17:17:07 -07002148 if (!pmd_access_permitted(orig, flags & FOLL_WRITE))
Steve Capper2667f502014-10-09 15:29:14 -07002149 return 0;
2150
Ira Weiny7af75562019-05-13 17:17:14 -07002151 if (pmd_devmap(orig)) {
2152 if (unlikely(flags & FOLL_LONGTERM))
2153 return 0;
John Hubbard86dfbed2020-04-01 21:05:14 -07002154 return __gup_device_huge_pmd(orig, pmdp, addr, end, flags,
2155 pages, nr);
Ira Weiny7af75562019-05-13 17:17:14 -07002156 }
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002157
Punit Agrawald63206e2017-07-06 15:39:39 -07002158 page = pmd_page(orig) + ((addr & ~PMD_MASK) >> PAGE_SHIFT);
John Hubbarda43e9822020-01-30 22:12:17 -08002159 refs = record_subpages(page, addr, end, pages + *nr);
Steve Capper2667f502014-10-09 15:29:14 -07002160
Linus Torvalds8fde12c2019-04-11 10:49:19 -07002161 head = try_get_compound_head(pmd_page(orig), refs);
John Hubbarda43e9822020-01-30 22:12:17 -08002162 if (!head)
Steve Capper2667f502014-10-09 15:29:14 -07002163 return 0;
Steve Capper2667f502014-10-09 15:29:14 -07002164
2165 if (unlikely(pmd_val(orig) != pmd_val(*pmdp))) {
John Hubbarda43e9822020-01-30 22:12:17 -08002166 put_compound_head(head, refs);
Steve Capper2667f502014-10-09 15:29:14 -07002167 return 0;
2168 }
2169
John Hubbarda43e9822020-01-30 22:12:17 -08002170 *nr += refs;
Kirill A. Shutemove9348052017-03-16 18:26:52 +03002171 SetPageReferenced(head);
Steve Capper2667f502014-10-09 15:29:14 -07002172 return 1;
2173}
2174
2175static int gup_huge_pud(pud_t orig, pud_t *pudp, unsigned long addr,
John Hubbard86dfbed2020-04-01 21:05:14 -07002176 unsigned long end, unsigned int flags,
2177 struct page **pages, int *nr)
Steve Capper2667f502014-10-09 15:29:14 -07002178{
Kirill A. Shutemovddc58f22016-01-15 16:52:56 -08002179 struct page *head, *page;
Steve Capper2667f502014-10-09 15:29:14 -07002180 int refs;
2181
Ira Weinyb798bec2019-05-13 17:17:07 -07002182 if (!pud_access_permitted(orig, flags & FOLL_WRITE))
Steve Capper2667f502014-10-09 15:29:14 -07002183 return 0;
2184
Ira Weiny7af75562019-05-13 17:17:14 -07002185 if (pud_devmap(orig)) {
2186 if (unlikely(flags & FOLL_LONGTERM))
2187 return 0;
John Hubbard86dfbed2020-04-01 21:05:14 -07002188 return __gup_device_huge_pud(orig, pudp, addr, end, flags,
2189 pages, nr);
Ira Weiny7af75562019-05-13 17:17:14 -07002190 }
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002191
Punit Agrawald63206e2017-07-06 15:39:39 -07002192 page = pud_page(orig) + ((addr & ~PUD_MASK) >> PAGE_SHIFT);
John Hubbarda43e9822020-01-30 22:12:17 -08002193 refs = record_subpages(page, addr, end, pages + *nr);
Steve Capper2667f502014-10-09 15:29:14 -07002194
Linus Torvalds8fde12c2019-04-11 10:49:19 -07002195 head = try_get_compound_head(pud_page(orig), refs);
John Hubbarda43e9822020-01-30 22:12:17 -08002196 if (!head)
Steve Capper2667f502014-10-09 15:29:14 -07002197 return 0;
Steve Capper2667f502014-10-09 15:29:14 -07002198
2199 if (unlikely(pud_val(orig) != pud_val(*pudp))) {
John Hubbarda43e9822020-01-30 22:12:17 -08002200 put_compound_head(head, refs);
Steve Capper2667f502014-10-09 15:29:14 -07002201 return 0;
2202 }
2203
John Hubbarda43e9822020-01-30 22:12:17 -08002204 *nr += refs;
Kirill A. Shutemove9348052017-03-16 18:26:52 +03002205 SetPageReferenced(head);
Steve Capper2667f502014-10-09 15:29:14 -07002206 return 1;
2207}
2208
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302209static int gup_huge_pgd(pgd_t orig, pgd_t *pgdp, unsigned long addr,
Ira Weinyb798bec2019-05-13 17:17:07 -07002210 unsigned long end, unsigned int flags,
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302211 struct page **pages, int *nr)
2212{
2213 int refs;
Kirill A. Shutemovddc58f22016-01-15 16:52:56 -08002214 struct page *head, *page;
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302215
Ira Weinyb798bec2019-05-13 17:17:07 -07002216 if (!pgd_access_permitted(orig, flags & FOLL_WRITE))
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302217 return 0;
2218
Kirill A. Shutemovb59f65f2017-03-16 18:26:53 +03002219 BUILD_BUG_ON(pgd_devmap(orig));
John Hubbarda43e9822020-01-30 22:12:17 -08002220
Punit Agrawald63206e2017-07-06 15:39:39 -07002221 page = pgd_page(orig) + ((addr & ~PGDIR_MASK) >> PAGE_SHIFT);
John Hubbarda43e9822020-01-30 22:12:17 -08002222 refs = record_subpages(page, addr, end, pages + *nr);
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302223
Linus Torvalds8fde12c2019-04-11 10:49:19 -07002224 head = try_get_compound_head(pgd_page(orig), refs);
John Hubbarda43e9822020-01-30 22:12:17 -08002225 if (!head)
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302226 return 0;
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302227
2228 if (unlikely(pgd_val(orig) != pgd_val(*pgdp))) {
John Hubbarda43e9822020-01-30 22:12:17 -08002229 put_compound_head(head, refs);
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302230 return 0;
2231 }
2232
John Hubbarda43e9822020-01-30 22:12:17 -08002233 *nr += refs;
Kirill A. Shutemove9348052017-03-16 18:26:52 +03002234 SetPageReferenced(head);
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302235 return 1;
2236}
2237
Steve Capper2667f502014-10-09 15:29:14 -07002238static int gup_pmd_range(pud_t pud, unsigned long addr, unsigned long end,
Ira Weinyb798bec2019-05-13 17:17:07 -07002239 unsigned int flags, struct page **pages, int *nr)
Steve Capper2667f502014-10-09 15:29:14 -07002240{
2241 unsigned long next;
2242 pmd_t *pmdp;
2243
2244 pmdp = pmd_offset(&pud, addr);
2245 do {
Christian Borntraeger38c5ce92015-01-06 22:54:46 +01002246 pmd_t pmd = READ_ONCE(*pmdp);
Steve Capper2667f502014-10-09 15:29:14 -07002247
2248 next = pmd_addr_end(addr, end);
Zi Yan84c3fc42017-09-08 16:11:01 -07002249 if (!pmd_present(pmd))
Steve Capper2667f502014-10-09 15:29:14 -07002250 return 0;
2251
Yu Zhao414fd082019-02-12 15:35:58 -08002252 if (unlikely(pmd_trans_huge(pmd) || pmd_huge(pmd) ||
2253 pmd_devmap(pmd))) {
Steve Capper2667f502014-10-09 15:29:14 -07002254 /*
2255 * NUMA hinting faults need to be handled in the GUP
2256 * slowpath for accounting purposes and so that they
2257 * can be serialised against THP migration.
2258 */
Mel Gorman8a0516e2015-02-12 14:58:22 -08002259 if (pmd_protnone(pmd))
Steve Capper2667f502014-10-09 15:29:14 -07002260 return 0;
2261
Ira Weinyb798bec2019-05-13 17:17:07 -07002262 if (!gup_huge_pmd(pmd, pmdp, addr, next, flags,
Steve Capper2667f502014-10-09 15:29:14 -07002263 pages, nr))
2264 return 0;
2265
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302266 } else if (unlikely(is_hugepd(__hugepd(pmd_val(pmd))))) {
2267 /*
2268 * architecture have different format for hugetlbfs
2269 * pmd format and THP pmd format
2270 */
2271 if (!gup_huge_pd(__hugepd(pmd_val(pmd)), addr,
Ira Weinyb798bec2019-05-13 17:17:07 -07002272 PMD_SHIFT, next, flags, pages, nr))
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302273 return 0;
Ira Weinyb798bec2019-05-13 17:17:07 -07002274 } else if (!gup_pte_range(pmd, addr, next, flags, pages, nr))
Mario Leinweber29231172018-04-05 16:24:18 -07002275 return 0;
Steve Capper2667f502014-10-09 15:29:14 -07002276 } while (pmdp++, addr = next, addr != end);
2277
2278 return 1;
2279}
2280
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +03002281static int gup_pud_range(p4d_t p4d, unsigned long addr, unsigned long end,
Ira Weinyb798bec2019-05-13 17:17:07 -07002282 unsigned int flags, struct page **pages, int *nr)
Steve Capper2667f502014-10-09 15:29:14 -07002283{
2284 unsigned long next;
2285 pud_t *pudp;
2286
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +03002287 pudp = pud_offset(&p4d, addr);
Steve Capper2667f502014-10-09 15:29:14 -07002288 do {
Christian Borntraegere37c6982014-12-07 21:41:33 +01002289 pud_t pud = READ_ONCE(*pudp);
Steve Capper2667f502014-10-09 15:29:14 -07002290
2291 next = pud_addr_end(addr, end);
Qiujun Huang154945202020-01-30 22:12:10 -08002292 if (unlikely(!pud_present(pud)))
Steve Capper2667f502014-10-09 15:29:14 -07002293 return 0;
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302294 if (unlikely(pud_huge(pud))) {
Ira Weinyb798bec2019-05-13 17:17:07 -07002295 if (!gup_huge_pud(pud, pudp, addr, next, flags,
Aneesh Kumar K.Vf30c59e2014-11-05 21:57:40 +05302296 pages, nr))
2297 return 0;
2298 } else if (unlikely(is_hugepd(__hugepd(pud_val(pud))))) {
2299 if (!gup_huge_pd(__hugepd(pud_val(pud)), addr,
Ira Weinyb798bec2019-05-13 17:17:07 -07002300 PUD_SHIFT, next, flags, pages, nr))
Steve Capper2667f502014-10-09 15:29:14 -07002301 return 0;
Ira Weinyb798bec2019-05-13 17:17:07 -07002302 } else if (!gup_pmd_range(pud, addr, next, flags, pages, nr))
Steve Capper2667f502014-10-09 15:29:14 -07002303 return 0;
2304 } while (pudp++, addr = next, addr != end);
2305
2306 return 1;
2307}
2308
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +03002309static int gup_p4d_range(pgd_t pgd, unsigned long addr, unsigned long end,
Ira Weinyb798bec2019-05-13 17:17:07 -07002310 unsigned int flags, struct page **pages, int *nr)
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +03002311{
2312 unsigned long next;
2313 p4d_t *p4dp;
2314
2315 p4dp = p4d_offset(&pgd, addr);
2316 do {
2317 p4d_t p4d = READ_ONCE(*p4dp);
2318
2319 next = p4d_addr_end(addr, end);
2320 if (p4d_none(p4d))
2321 return 0;
2322 BUILD_BUG_ON(p4d_huge(p4d));
2323 if (unlikely(is_hugepd(__hugepd(p4d_val(p4d))))) {
2324 if (!gup_huge_pd(__hugepd(p4d_val(p4d)), addr,
Ira Weinyb798bec2019-05-13 17:17:07 -07002325 P4D_SHIFT, next, flags, pages, nr))
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +03002326 return 0;
Ira Weinyb798bec2019-05-13 17:17:07 -07002327 } else if (!gup_pud_range(p4d, addr, next, flags, pages, nr))
Kirill A. Shutemovc2febaf2017-03-09 17:24:07 +03002328 return 0;
2329 } while (p4dp++, addr = next, addr != end);
2330
2331 return 1;
2332}
2333
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002334static void gup_pgd_range(unsigned long addr, unsigned long end,
Ira Weinyb798bec2019-05-13 17:17:07 -07002335 unsigned int flags, struct page **pages, int *nr)
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002336{
2337 unsigned long next;
2338 pgd_t *pgdp;
2339
2340 pgdp = pgd_offset(current->mm, addr);
2341 do {
2342 pgd_t pgd = READ_ONCE(*pgdp);
2343
2344 next = pgd_addr_end(addr, end);
2345 if (pgd_none(pgd))
2346 return;
2347 if (unlikely(pgd_huge(pgd))) {
Ira Weinyb798bec2019-05-13 17:17:07 -07002348 if (!gup_huge_pgd(pgd, pgdp, addr, next, flags,
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002349 pages, nr))
2350 return;
2351 } else if (unlikely(is_hugepd(__hugepd(pgd_val(pgd))))) {
2352 if (!gup_huge_pd(__hugepd(pgd_val(pgd)), addr,
Ira Weinyb798bec2019-05-13 17:17:07 -07002353 PGDIR_SHIFT, next, flags, pages, nr))
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002354 return;
Ira Weinyb798bec2019-05-13 17:17:07 -07002355 } else if (!gup_p4d_range(pgd, addr, next, flags, pages, nr))
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002356 return;
2357 } while (pgdp++, addr = next, addr != end);
2358}
Christoph Hellwig050a9ad2019-07-11 20:57:21 -07002359#else
2360static inline void gup_pgd_range(unsigned long addr, unsigned long end,
2361 unsigned int flags, struct page **pages, int *nr)
2362{
2363}
2364#endif /* CONFIG_HAVE_FAST_GUP */
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002365
2366#ifndef gup_fast_permitted
2367/*
2368 * Check if it's allowed to use __get_user_pages_fast() for the range, or
2369 * we need to fall back to the slow version:
2370 */
Christoph Hellwig26f4c322019-07-11 20:56:45 -07002371static bool gup_fast_permitted(unsigned long start, unsigned long end)
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002372{
Christoph Hellwig26f4c322019-07-11 20:56:45 -07002373 return true;
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002374}
2375#endif
2376
Steve Capper2667f502014-10-09 15:29:14 -07002377/*
2378 * Like get_user_pages_fast() except it's IRQ-safe in that it won't fall back to
Michael S. Tsirkind0811072018-04-13 15:35:23 -07002379 * the regular GUP.
2380 * Note a difference with get_user_pages_fast: this always returns the
2381 * number of pages pinned, 0 if no pages were pinned.
Christoph Hellwig050a9ad2019-07-11 20:57:21 -07002382 *
2383 * If the architecture does not support this function, simply return with no
2384 * pages pinned.
Steve Capper2667f502014-10-09 15:29:14 -07002385 */
2386int __get_user_pages_fast(unsigned long start, int nr_pages, int write,
2387 struct page **pages)
2388{
Wei Yangd4faa402018-10-26 15:07:55 -07002389 unsigned long len, end;
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002390 unsigned long flags;
Steve Capper2667f502014-10-09 15:29:14 -07002391 int nr = 0;
2392
Christoph Hellwigf455c8542019-07-11 20:56:41 -07002393 start = untagged_addr(start) & PAGE_MASK;
Steve Capper2667f502014-10-09 15:29:14 -07002394 len = (unsigned long) nr_pages << PAGE_SHIFT;
2395 end = start + len;
2396
Christoph Hellwig26f4c322019-07-11 20:56:45 -07002397 if (end <= start)
2398 return 0;
Linus Torvalds96d4f262019-01-03 18:57:57 -08002399 if (unlikely(!access_ok((void __user *)start, len)))
Steve Capper2667f502014-10-09 15:29:14 -07002400 return 0;
2401
2402 /*
2403 * Disable interrupts. We use the nested form as we can already have
2404 * interrupts disabled by get_futex_key.
2405 *
2406 * With interrupts disabled, we block page table pages from being
Fengguang Wu2ebe8222018-10-30 15:10:51 -07002407 * freed from under us. See struct mmu_table_batch comments in
2408 * include/asm-generic/tlb.h for more details.
Steve Capper2667f502014-10-09 15:29:14 -07002409 *
2410 * We do not adopt an rcu_read_lock(.) here as we also want to
2411 * block IPIs that come from THPs splitting.
2412 */
2413
Christoph Hellwig050a9ad2019-07-11 20:57:21 -07002414 if (IS_ENABLED(CONFIG_HAVE_FAST_GUP) &&
2415 gup_fast_permitted(start, end)) {
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002416 local_irq_save(flags);
Ira Weinyb798bec2019-05-13 17:17:07 -07002417 gup_pgd_range(start, end, write ? FOLL_WRITE : 0, pages, &nr);
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002418 local_irq_restore(flags);
2419 }
Steve Capper2667f502014-10-09 15:29:14 -07002420
2421 return nr;
2422}
Christoph Hellwig050a9ad2019-07-11 20:57:21 -07002423EXPORT_SYMBOL_GPL(__get_user_pages_fast);
Steve Capper2667f502014-10-09 15:29:14 -07002424
Ira Weiny7af75562019-05-13 17:17:14 -07002425static int __gup_longterm_unlocked(unsigned long start, int nr_pages,
2426 unsigned int gup_flags, struct page **pages)
2427{
2428 int ret;
2429
2430 /*
2431 * FIXME: FOLL_LONGTERM does not work with
2432 * get_user_pages_unlocked() (see comments in that function)
2433 */
2434 if (gup_flags & FOLL_LONGTERM) {
2435 down_read(&current->mm->mmap_sem);
2436 ret = __gup_longterm_locked(current, current->mm,
2437 start, nr_pages,
2438 pages, NULL, gup_flags);
2439 up_read(&current->mm->mmap_sem);
2440 } else {
2441 ret = get_user_pages_unlocked(start, nr_pages,
2442 pages, gup_flags);
2443 }
2444
2445 return ret;
2446}
2447
John Hubbardeddb1c22020-01-30 22:12:54 -08002448static int internal_get_user_pages_fast(unsigned long start, int nr_pages,
2449 unsigned int gup_flags,
2450 struct page **pages)
Steve Capper2667f502014-10-09 15:29:14 -07002451{
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002452 unsigned long addr, len, end;
Kirill A. Shutemov73e10a62017-03-16 18:26:54 +03002453 int nr = 0, ret = 0;
Steve Capper2667f502014-10-09 15:29:14 -07002454
John Hubbardf4000fd2020-01-30 22:12:43 -08002455 if (WARN_ON_ONCE(gup_flags & ~(FOLL_WRITE | FOLL_LONGTERM |
John Hubbardeddb1c22020-01-30 22:12:54 -08002456 FOLL_FORCE | FOLL_PIN)))
Christoph Hellwig817be122019-07-11 20:57:25 -07002457 return -EINVAL;
2458
Christoph Hellwigf455c8542019-07-11 20:56:41 -07002459 start = untagged_addr(start) & PAGE_MASK;
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002460 addr = start;
2461 len = (unsigned long) nr_pages << PAGE_SHIFT;
2462 end = start + len;
2463
Christoph Hellwig26f4c322019-07-11 20:56:45 -07002464 if (end <= start)
Michael S. Tsirkinc61611f2018-04-13 15:35:20 -07002465 return 0;
Linus Torvalds96d4f262019-01-03 18:57:57 -08002466 if (unlikely(!access_ok((void __user *)start, len)))
Michael S. Tsirkinc61611f2018-04-13 15:35:20 -07002467 return -EFAULT;
Kirill A. Shutemov73e10a62017-03-16 18:26:54 +03002468
Christoph Hellwig050a9ad2019-07-11 20:57:21 -07002469 if (IS_ENABLED(CONFIG_HAVE_FAST_GUP) &&
2470 gup_fast_permitted(start, end)) {
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002471 local_irq_disable();
Ira Weiny73b01402019-05-13 17:17:11 -07002472 gup_pgd_range(addr, end, gup_flags, pages, &nr);
Kirill A. Shutemov5b65c4672017-09-09 00:56:03 +03002473 local_irq_enable();
Kirill A. Shutemov73e10a62017-03-16 18:26:54 +03002474 ret = nr;
2475 }
Steve Capper2667f502014-10-09 15:29:14 -07002476
2477 if (nr < nr_pages) {
2478 /* Try to get the remaining pages with get_user_pages */
2479 start += nr << PAGE_SHIFT;
2480 pages += nr;
2481
Ira Weiny7af75562019-05-13 17:17:14 -07002482 ret = __gup_longterm_unlocked(start, nr_pages - nr,
2483 gup_flags, pages);
Steve Capper2667f502014-10-09 15:29:14 -07002484
2485 /* Have to be a bit careful with return values */
2486 if (nr > 0) {
2487 if (ret < 0)
2488 ret = nr;
2489 else
2490 ret += nr;
2491 }
2492 }
2493
2494 return ret;
2495}
John Hubbardeddb1c22020-01-30 22:12:54 -08002496
2497/**
2498 * get_user_pages_fast() - pin user pages in memory
2499 * @start: starting user address
2500 * @nr_pages: number of pages from start to pin
2501 * @gup_flags: flags modifying pin behaviour
2502 * @pages: array that receives pointers to the pages pinned.
2503 * Should be at least nr_pages long.
2504 *
2505 * Attempt to pin user pages in memory without taking mm->mmap_sem.
2506 * If not successful, it will fall back to taking the lock and
2507 * calling get_user_pages().
2508 *
2509 * Returns number of pages pinned. This may be fewer than the number requested.
2510 * If nr_pages is 0 or negative, returns 0. If no pages were pinned, returns
2511 * -errno.
2512 */
2513int get_user_pages_fast(unsigned long start, int nr_pages,
2514 unsigned int gup_flags, struct page **pages)
2515{
2516 /*
2517 * FOLL_PIN must only be set internally by the pin_user_pages*() APIs,
2518 * never directly by the caller, so enforce that:
2519 */
2520 if (WARN_ON_ONCE(gup_flags & FOLL_PIN))
2521 return -EINVAL;
2522
2523 return internal_get_user_pages_fast(start, nr_pages, gup_flags, pages);
2524}
Christoph Hellwig050a9ad2019-07-11 20:57:21 -07002525EXPORT_SYMBOL_GPL(get_user_pages_fast);
John Hubbardeddb1c22020-01-30 22:12:54 -08002526
2527/**
2528 * pin_user_pages_fast() - pin user pages in memory without taking locks
2529 *
2530 * For now, this is a placeholder function, until various call sites are
2531 * converted to use the correct get_user_pages*() or pin_user_pages*() API. So,
2532 * this is identical to get_user_pages_fast().
2533 *
2534 * This is intended for Case 1 (DIO) in Documentation/vm/pin_user_pages.rst. It
2535 * is NOT intended for Case 2 (RDMA: long-term pins).
2536 */
2537int pin_user_pages_fast(unsigned long start, int nr_pages,
2538 unsigned int gup_flags, struct page **pages)
2539{
2540 /*
2541 * This is a placeholder, until the pin functionality is activated.
2542 * Until then, just behave like the corresponding get_user_pages*()
2543 * routine.
2544 */
2545 return get_user_pages_fast(start, nr_pages, gup_flags, pages);
2546}
2547EXPORT_SYMBOL_GPL(pin_user_pages_fast);
2548
2549/**
2550 * pin_user_pages_remote() - pin pages of a remote process (task != current)
2551 *
2552 * For now, this is a placeholder function, until various call sites are
2553 * converted to use the correct get_user_pages*() or pin_user_pages*() API. So,
2554 * this is identical to get_user_pages_remote().
2555 *
2556 * This is intended for Case 1 (DIO) in Documentation/vm/pin_user_pages.rst. It
2557 * is NOT intended for Case 2 (RDMA: long-term pins).
2558 */
2559long pin_user_pages_remote(struct task_struct *tsk, struct mm_struct *mm,
2560 unsigned long start, unsigned long nr_pages,
2561 unsigned int gup_flags, struct page **pages,
2562 struct vm_area_struct **vmas, int *locked)
2563{
2564 /*
2565 * This is a placeholder, until the pin functionality is activated.
2566 * Until then, just behave like the corresponding get_user_pages*()
2567 * routine.
2568 */
2569 return get_user_pages_remote(tsk, mm, start, nr_pages, gup_flags, pages,
2570 vmas, locked);
2571}
2572EXPORT_SYMBOL(pin_user_pages_remote);
2573
2574/**
2575 * pin_user_pages() - pin user pages in memory for use by other devices
2576 *
2577 * For now, this is a placeholder function, until various call sites are
2578 * converted to use the correct get_user_pages*() or pin_user_pages*() API. So,
2579 * this is identical to get_user_pages().
2580 *
2581 * This is intended for Case 1 (DIO) in Documentation/vm/pin_user_pages.rst. It
2582 * is NOT intended for Case 2 (RDMA: long-term pins).
2583 */
2584long pin_user_pages(unsigned long start, unsigned long nr_pages,
2585 unsigned int gup_flags, struct page **pages,
2586 struct vm_area_struct **vmas)
2587{
2588 /*
2589 * This is a placeholder, until the pin functionality is activated.
2590 * Until then, just behave like the corresponding get_user_pages*()
2591 * routine.
2592 */
2593 return get_user_pages(start, nr_pages, gup_flags, pages, vmas);
2594}
2595EXPORT_SYMBOL(pin_user_pages);