1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * mm/userfaultfd.c 4 * 5 * Copyright (C) 2015 Red Hat, Inc. 6 */ 7 8 #include <linux/mm.h> 9 #include <linux/sched/signal.h> 10 #include <linux/pagemap.h> 11 #include <linux/rmap.h> 12 #include <linux/swap.h> 13 #include <linux/swapops.h> 14 #include <linux/userfaultfd_k.h> 15 #include <linux/mmu_notifier.h> 16 #include <linux/hugetlb.h> 17 #include <linux/shmem_fs.h> 18 #include <asm/tlbflush.h> 19 #include <asm/tlb.h> 20 #include "internal.h" 21 #include "swap.h" 22 23 static __always_inline 24 bool validate_dst_vma(struct vm_area_struct *dst_vma, unsigned long dst_end) 25 { 26 /* Make sure that the dst range is fully within dst_vma. */ 27 if (dst_end > dst_vma->vm_end) 28 return false; 29 30 /* 31 * Check the vma is registered in uffd, this is required to 32 * enforce the VM_MAYWRITE check done at uffd registration 33 * time. 34 */ 35 if (!dst_vma->vm_userfaultfd_ctx.ctx) 36 return false; 37 38 return true; 39 } 40 41 static __always_inline 42 struct vm_area_struct *find_vma_and_prepare_anon(struct mm_struct *mm, 43 unsigned long addr) 44 { 45 struct vm_area_struct *vma; 46 47 mmap_assert_locked(mm); 48 vma = vma_lookup(mm, addr); 49 if (!vma) 50 vma = ERR_PTR(-ENOENT); 51 else if (!(vma->vm_flags & VM_SHARED) && 52 unlikely(anon_vma_prepare(vma))) 53 vma = ERR_PTR(-ENOMEM); 54 55 return vma; 56 } 57 58 #ifdef CONFIG_PER_VMA_LOCK 59 /* 60 * uffd_lock_vma() - Lookup and lock vma corresponding to @address. 61 * @mm: mm to search vma in. 62 * @address: address that the vma should contain. 63 * 64 * Should be called without holding mmap_lock. 65 * 66 * Return: A locked vma containing @address, -ENOENT if no vma is found, or 67 * -ENOMEM if anon_vma couldn't be allocated. 68 */ 69 static struct vm_area_struct *uffd_lock_vma(struct mm_struct *mm, 70 unsigned long address) 71 { 72 struct vm_area_struct *vma; 73 74 vma = lock_vma_under_rcu(mm, address); 75 if (vma) { 76 /* 77 * We know we're going to need to use anon_vma, so check 78 * that early. 79 */ 80 if (!(vma->vm_flags & VM_SHARED) && unlikely(!vma->anon_vma)) 81 vma_end_read(vma); 82 else 83 return vma; 84 } 85 86 mmap_read_lock(mm); 87 vma = find_vma_and_prepare_anon(mm, address); 88 if (!IS_ERR(vma)) { 89 bool locked = vma_start_read_locked(vma); 90 91 if (!locked) 92 vma = ERR_PTR(-EAGAIN); 93 } 94 95 mmap_read_unlock(mm); 96 return vma; 97 } 98 99 static struct vm_area_struct *uffd_mfill_lock(struct mm_struct *dst_mm, 100 unsigned long dst_start, 101 unsigned long len) 102 { 103 struct vm_area_struct *dst_vma; 104 105 dst_vma = uffd_lock_vma(dst_mm, dst_start); 106 if (IS_ERR(dst_vma) || validate_dst_vma(dst_vma, dst_start + len)) 107 return dst_vma; 108 109 vma_end_read(dst_vma); 110 return ERR_PTR(-ENOENT); 111 } 112 113 static void uffd_mfill_unlock(struct vm_area_struct *vma) 114 { 115 vma_end_read(vma); 116 } 117 118 #else 119 120 static struct vm_area_struct *uffd_mfill_lock(struct mm_struct *dst_mm, 121 unsigned long dst_start, 122 unsigned long len) 123 { 124 struct vm_area_struct *dst_vma; 125 126 mmap_read_lock(dst_mm); 127 dst_vma = find_vma_and_prepare_anon(dst_mm, dst_start); 128 if (IS_ERR(dst_vma)) 129 goto out_unlock; 130 131 if (validate_dst_vma(dst_vma, dst_start + len)) 132 return dst_vma; 133 134 dst_vma = ERR_PTR(-ENOENT); 135 out_unlock: 136 mmap_read_unlock(dst_mm); 137 return dst_vma; 138 } 139 140 static void uffd_mfill_unlock(struct vm_area_struct *vma) 141 { 142 mmap_read_unlock(vma->vm_mm); 143 } 144 #endif 145 146 /* Check if dst_addr is outside of file's size. Must be called with ptl held. */ 147 static bool mfill_file_over_size(struct vm_area_struct *dst_vma, 148 unsigned long dst_addr) 149 { 150 struct inode *inode; 151 pgoff_t offset, max_off; 152 153 if (!dst_vma->vm_file) 154 return false; 155 156 inode = dst_vma->vm_file->f_inode; 157 offset = linear_page_index(dst_vma, dst_addr); 158 max_off = DIV_ROUND_UP(i_size_read(inode), PAGE_SIZE); 159 return offset >= max_off; 160 } 161 162 /* 163 * Install PTEs, to map dst_addr (within dst_vma) to page. 164 * 165 * This function handles both MCOPY_ATOMIC_NORMAL and _CONTINUE for both shmem 166 * and anon, and for both shared and private VMAs. 167 */ 168 int mfill_atomic_install_pte(pmd_t *dst_pmd, 169 struct vm_area_struct *dst_vma, 170 unsigned long dst_addr, struct page *page, 171 bool newly_allocated, uffd_flags_t flags) 172 { 173 int ret; 174 struct mm_struct *dst_mm = dst_vma->vm_mm; 175 pte_t _dst_pte, *dst_pte; 176 bool writable = dst_vma->vm_flags & VM_WRITE; 177 bool vm_shared = dst_vma->vm_flags & VM_SHARED; 178 spinlock_t *ptl; 179 struct folio *folio = page_folio(page); 180 bool page_in_cache = folio_mapping(folio); 181 182 _dst_pte = mk_pte(page, dst_vma->vm_page_prot); 183 _dst_pte = pte_mkdirty(_dst_pte); 184 if (page_in_cache && !vm_shared) 185 writable = false; 186 if (writable) 187 _dst_pte = pte_mkwrite(_dst_pte, dst_vma); 188 if (flags & MFILL_ATOMIC_WP) 189 _dst_pte = pte_mkuffd_wp(_dst_pte); 190 191 ret = -EAGAIN; 192 dst_pte = pte_offset_map_lock(dst_mm, dst_pmd, dst_addr, &ptl); 193 if (!dst_pte) 194 goto out; 195 196 if (mfill_file_over_size(dst_vma, dst_addr)) { 197 ret = -EFAULT; 198 goto out_unlock; 199 } 200 201 ret = -EEXIST; 202 /* 203 * We allow to overwrite a pte marker: consider when both MISSING|WP 204 * registered, we firstly wr-protect a none pte which has no page cache 205 * page backing it, then access the page. 206 */ 207 if (!pte_none_mostly(ptep_get(dst_pte))) 208 goto out_unlock; 209 210 if (page_in_cache) { 211 /* Usually, cache pages are already added to LRU */ 212 if (newly_allocated) 213 folio_add_lru(folio); 214 folio_add_file_rmap_pte(folio, page, dst_vma); 215 } else { 216 folio_add_new_anon_rmap(folio, dst_vma, dst_addr, RMAP_EXCLUSIVE); 217 folio_add_lru_vma(folio, dst_vma); 218 } 219 220 /* 221 * Must happen after rmap, as mm_counter() checks mapping (via 222 * PageAnon()), which is set by __page_set_anon_rmap(). 223 */ 224 inc_mm_counter(dst_mm, mm_counter(folio)); 225 226 set_pte_at(dst_mm, dst_addr, dst_pte, _dst_pte); 227 228 /* No need to invalidate - it was non-present before */ 229 update_mmu_cache(dst_vma, dst_addr, dst_pte); 230 ret = 0; 231 out_unlock: 232 pte_unmap_unlock(dst_pte, ptl); 233 out: 234 return ret; 235 } 236 237 static int mfill_atomic_pte_copy(pmd_t *dst_pmd, 238 struct vm_area_struct *dst_vma, 239 unsigned long dst_addr, 240 unsigned long src_addr, 241 uffd_flags_t flags, 242 struct folio **foliop) 243 { 244 void *kaddr; 245 int ret; 246 struct folio *folio; 247 248 if (!*foliop) { 249 ret = -ENOMEM; 250 folio = vma_alloc_folio(GFP_HIGHUSER_MOVABLE, 0, dst_vma, 251 dst_addr); 252 if (!folio) 253 goto out; 254 255 kaddr = kmap_local_folio(folio, 0); 256 /* 257 * The read mmap_lock is held here. Despite the 258 * mmap_lock being read recursive a deadlock is still 259 * possible if a writer has taken a lock. For example: 260 * 261 * process A thread 1 takes read lock on own mmap_lock 262 * process A thread 2 calls mmap, blocks taking write lock 263 * process B thread 1 takes page fault, read lock on own mmap lock 264 * process B thread 2 calls mmap, blocks taking write lock 265 * process A thread 1 blocks taking read lock on process B 266 * process B thread 1 blocks taking read lock on process A 267 * 268 * Disable page faults to prevent potential deadlock 269 * and retry the copy outside the mmap_lock. 270 */ 271 pagefault_disable(); 272 ret = copy_from_user(kaddr, (const void __user *) src_addr, 273 PAGE_SIZE); 274 pagefault_enable(); 275 kunmap_local(kaddr); 276 277 /* fallback to copy_from_user outside mmap_lock */ 278 if (unlikely(ret)) { 279 ret = -ENOENT; 280 *foliop = folio; 281 /* don't free the page */ 282 goto out; 283 } 284 285 flush_dcache_folio(folio); 286 } else { 287 folio = *foliop; 288 *foliop = NULL; 289 } 290 291 /* 292 * The memory barrier inside __folio_mark_uptodate makes sure that 293 * preceding stores to the page contents become visible before 294 * the set_pte_at() write. 295 */ 296 __folio_mark_uptodate(folio); 297 298 ret = -ENOMEM; 299 if (mem_cgroup_charge(folio, dst_vma->vm_mm, GFP_KERNEL)) 300 goto out_release; 301 302 ret = mfill_atomic_install_pte(dst_pmd, dst_vma, dst_addr, 303 &folio->page, true, flags); 304 if (ret) 305 goto out_release; 306 out: 307 return ret; 308 out_release: 309 folio_put(folio); 310 goto out; 311 } 312 313 static int mfill_atomic_pte_zeroed_folio(pmd_t *dst_pmd, 314 struct vm_area_struct *dst_vma, 315 unsigned long dst_addr) 316 { 317 struct folio *folio; 318 int ret = -ENOMEM; 319 320 folio = vma_alloc_zeroed_movable_folio(dst_vma, dst_addr); 321 if (!folio) 322 return ret; 323 324 if (mem_cgroup_charge(folio, dst_vma->vm_mm, GFP_KERNEL)) 325 goto out_put; 326 327 /* 328 * The memory barrier inside __folio_mark_uptodate makes sure that 329 * zeroing out the folio become visible before mapping the page 330 * using set_pte_at(). See do_anonymous_page(). 331 */ 332 __folio_mark_uptodate(folio); 333 334 ret = mfill_atomic_install_pte(dst_pmd, dst_vma, dst_addr, 335 &folio->page, true, 0); 336 if (ret) 337 goto out_put; 338 339 return 0; 340 out_put: 341 folio_put(folio); 342 return ret; 343 } 344 345 static int mfill_atomic_pte_zeropage(pmd_t *dst_pmd, 346 struct vm_area_struct *dst_vma, 347 unsigned long dst_addr) 348 { 349 pte_t _dst_pte, *dst_pte; 350 spinlock_t *ptl; 351 int ret; 352 353 if (mm_forbids_zeropage(dst_vma->vm_mm)) 354 return mfill_atomic_pte_zeroed_folio(dst_pmd, dst_vma, dst_addr); 355 356 _dst_pte = pte_mkspecial(pfn_pte(my_zero_pfn(dst_addr), 357 dst_vma->vm_page_prot)); 358 ret = -EAGAIN; 359 dst_pte = pte_offset_map_lock(dst_vma->vm_mm, dst_pmd, dst_addr, &ptl); 360 if (!dst_pte) 361 goto out; 362 if (mfill_file_over_size(dst_vma, dst_addr)) { 363 ret = -EFAULT; 364 goto out_unlock; 365 } 366 ret = -EEXIST; 367 if (!pte_none(ptep_get(dst_pte))) 368 goto out_unlock; 369 set_pte_at(dst_vma->vm_mm, dst_addr, dst_pte, _dst_pte); 370 /* No need to invalidate - it was non-present before */ 371 update_mmu_cache(dst_vma, dst_addr, dst_pte); 372 ret = 0; 373 out_unlock: 374 pte_unmap_unlock(dst_pte, ptl); 375 out: 376 return ret; 377 } 378 379 /* Handles UFFDIO_CONTINUE for all shmem VMAs (shared or private). */ 380 static int mfill_atomic_pte_continue(pmd_t *dst_pmd, 381 struct vm_area_struct *dst_vma, 382 unsigned long dst_addr, 383 uffd_flags_t flags) 384 { 385 struct inode *inode = file_inode(dst_vma->vm_file); 386 pgoff_t pgoff = linear_page_index(dst_vma, dst_addr); 387 struct folio *folio; 388 struct page *page; 389 int ret; 390 391 ret = shmem_get_folio(inode, pgoff, 0, &folio, SGP_NOALLOC); 392 /* Our caller expects us to return -EFAULT if we failed to find folio */ 393 if (ret == -ENOENT) 394 ret = -EFAULT; 395 if (ret) 396 goto out; 397 if (!folio) { 398 ret = -EFAULT; 399 goto out; 400 } 401 402 page = folio_file_page(folio, pgoff); 403 if (PageHWPoison(page)) { 404 ret = -EIO; 405 goto out_release; 406 } 407 408 ret = mfill_atomic_install_pte(dst_pmd, dst_vma, dst_addr, 409 page, false, flags); 410 if (ret) 411 goto out_release; 412 413 folio_unlock(folio); 414 ret = 0; 415 out: 416 return ret; 417 out_release: 418 folio_unlock(folio); 419 folio_put(folio); 420 goto out; 421 } 422 423 /* Handles UFFDIO_POISON for all non-hugetlb VMAs. */ 424 static int mfill_atomic_pte_poison(pmd_t *dst_pmd, 425 struct vm_area_struct *dst_vma, 426 unsigned long dst_addr, 427 uffd_flags_t flags) 428 { 429 int ret; 430 struct mm_struct *dst_mm = dst_vma->vm_mm; 431 pte_t _dst_pte, *dst_pte; 432 spinlock_t *ptl; 433 434 _dst_pte = make_pte_marker(PTE_MARKER_POISONED); 435 ret = -EAGAIN; 436 dst_pte = pte_offset_map_lock(dst_mm, dst_pmd, dst_addr, &ptl); 437 if (!dst_pte) 438 goto out; 439 440 if (mfill_file_over_size(dst_vma, dst_addr)) { 441 ret = -EFAULT; 442 goto out_unlock; 443 } 444 445 ret = -EEXIST; 446 /* Refuse to overwrite any PTE, even a PTE marker (e.g. UFFD WP). */ 447 if (!pte_none(ptep_get(dst_pte))) 448 goto out_unlock; 449 450 set_pte_at(dst_mm, dst_addr, dst_pte, _dst_pte); 451 452 /* No need to invalidate - it was non-present before */ 453 update_mmu_cache(dst_vma, dst_addr, dst_pte); 454 ret = 0; 455 out_unlock: 456 pte_unmap_unlock(dst_pte, ptl); 457 out: 458 return ret; 459 } 460 461 static pmd_t *mm_alloc_pmd(struct mm_struct *mm, unsigned long address) 462 { 463 pgd_t *pgd; 464 p4d_t *p4d; 465 pud_t *pud; 466 467 pgd = pgd_offset(mm, address); 468 p4d = p4d_alloc(mm, pgd, address); 469 if (!p4d) 470 return NULL; 471 pud = pud_alloc(mm, p4d, address); 472 if (!pud) 473 return NULL; 474 /* 475 * Note that we didn't run this because the pmd was 476 * missing, the *pmd may be already established and in 477 * turn it may also be a trans_huge_pmd. 478 */ 479 return pmd_alloc(mm, pud, address); 480 } 481 482 #ifdef CONFIG_HUGETLB_PAGE 483 /* 484 * mfill_atomic processing for HUGETLB vmas. Note that this routine is 485 * called with either vma-lock or mmap_lock held, it will release the lock 486 * before returning. 487 */ 488 static __always_inline ssize_t mfill_atomic_hugetlb( 489 struct userfaultfd_ctx *ctx, 490 struct vm_area_struct *dst_vma, 491 unsigned long dst_start, 492 unsigned long src_start, 493 unsigned long len, 494 uffd_flags_t flags) 495 { 496 struct mm_struct *dst_mm = dst_vma->vm_mm; 497 ssize_t err; 498 pte_t *dst_pte; 499 unsigned long src_addr, dst_addr; 500 long copied; 501 struct folio *folio; 502 unsigned long vma_hpagesize; 503 pgoff_t idx; 504 u32 hash; 505 struct address_space *mapping; 506 507 /* 508 * There is no default zero huge page for all huge page sizes as 509 * supported by hugetlb. A PMD_SIZE huge pages may exist as used 510 * by THP. Since we can not reliably insert a zero page, this 511 * feature is not supported. 512 */ 513 if (uffd_flags_mode_is(flags, MFILL_ATOMIC_ZEROPAGE)) { 514 up_read(&ctx->map_changing_lock); 515 uffd_mfill_unlock(dst_vma); 516 return -EINVAL; 517 } 518 519 src_addr = src_start; 520 dst_addr = dst_start; 521 copied = 0; 522 folio = NULL; 523 vma_hpagesize = vma_kernel_pagesize(dst_vma); 524 525 /* 526 * Validate alignment based on huge page size 527 */ 528 err = -EINVAL; 529 if (dst_start & (vma_hpagesize - 1) || len & (vma_hpagesize - 1)) 530 goto out_unlock; 531 532 retry: 533 /* 534 * On routine entry dst_vma is set. If we had to drop mmap_lock and 535 * retry, dst_vma will be set to NULL and we must lookup again. 536 */ 537 if (!dst_vma) { 538 dst_vma = uffd_mfill_lock(dst_mm, dst_start, len); 539 if (IS_ERR(dst_vma)) { 540 err = PTR_ERR(dst_vma); 541 goto out; 542 } 543 544 err = -ENOENT; 545 if (!is_vm_hugetlb_page(dst_vma)) 546 goto out_unlock_vma; 547 548 err = -EINVAL; 549 if (vma_hpagesize != vma_kernel_pagesize(dst_vma)) 550 goto out_unlock_vma; 551 552 /* 553 * If memory mappings are changing because of non-cooperative 554 * operation (e.g. mremap) running in parallel, bail out and 555 * request the user to retry later 556 */ 557 down_read(&ctx->map_changing_lock); 558 err = -EAGAIN; 559 if (atomic_read(&ctx->mmap_changing)) 560 goto out_unlock; 561 } 562 563 while (src_addr < src_start + len) { 564 VM_WARN_ON_ONCE(dst_addr >= dst_start + len); 565 566 /* 567 * Serialize via vma_lock and hugetlb_fault_mutex. 568 * vma_lock ensures the dst_pte remains valid even 569 * in the case of shared pmds. fault mutex prevents 570 * races with other faulting threads. 571 */ 572 idx = linear_page_index(dst_vma, dst_addr); 573 mapping = dst_vma->vm_file->f_mapping; 574 hash = hugetlb_fault_mutex_hash(mapping, idx); 575 mutex_lock(&hugetlb_fault_mutex_table[hash]); 576 hugetlb_vma_lock_read(dst_vma); 577 578 err = -ENOMEM; 579 dst_pte = huge_pte_alloc(dst_mm, dst_vma, dst_addr, vma_hpagesize); 580 if (!dst_pte) { 581 hugetlb_vma_unlock_read(dst_vma); 582 mutex_unlock(&hugetlb_fault_mutex_table[hash]); 583 goto out_unlock; 584 } 585 586 if (!uffd_flags_mode_is(flags, MFILL_ATOMIC_CONTINUE) && 587 !huge_pte_none_mostly(huge_ptep_get(dst_mm, dst_addr, dst_pte))) { 588 err = -EEXIST; 589 hugetlb_vma_unlock_read(dst_vma); 590 mutex_unlock(&hugetlb_fault_mutex_table[hash]); 591 goto out_unlock; 592 } 593 594 err = hugetlb_mfill_atomic_pte(dst_pte, dst_vma, dst_addr, 595 src_addr, flags, &folio); 596 597 hugetlb_vma_unlock_read(dst_vma); 598 mutex_unlock(&hugetlb_fault_mutex_table[hash]); 599 600 cond_resched(); 601 602 if (unlikely(err == -ENOENT)) { 603 up_read(&ctx->map_changing_lock); 604 uffd_mfill_unlock(dst_vma); 605 VM_WARN_ON_ONCE(!folio); 606 607 err = copy_folio_from_user(folio, 608 (const void __user *)src_addr, true); 609 if (unlikely(err)) { 610 err = -EFAULT; 611 goto out; 612 } 613 614 dst_vma = NULL; 615 goto retry; 616 } else 617 VM_WARN_ON_ONCE(folio); 618 619 if (!err) { 620 dst_addr += vma_hpagesize; 621 src_addr += vma_hpagesize; 622 copied += vma_hpagesize; 623 624 if (fatal_signal_pending(current)) 625 err = -EINTR; 626 } 627 if (err) 628 break; 629 } 630 631 out_unlock: 632 up_read(&ctx->map_changing_lock); 633 out_unlock_vma: 634 uffd_mfill_unlock(dst_vma); 635 out: 636 if (folio) 637 folio_put(folio); 638 VM_WARN_ON_ONCE(copied < 0); 639 VM_WARN_ON_ONCE(err > 0); 640 VM_WARN_ON_ONCE(!copied && !err); 641 return copied ? copied : err; 642 } 643 #else /* !CONFIG_HUGETLB_PAGE */ 644 /* fail at build time if gcc attempts to use this */ 645 extern ssize_t mfill_atomic_hugetlb(struct userfaultfd_ctx *ctx, 646 struct vm_area_struct *dst_vma, 647 unsigned long dst_start, 648 unsigned long src_start, 649 unsigned long len, 650 uffd_flags_t flags); 651 #endif /* CONFIG_HUGETLB_PAGE */ 652 653 static __always_inline ssize_t mfill_atomic_pte(pmd_t *dst_pmd, 654 struct vm_area_struct *dst_vma, 655 unsigned long dst_addr, 656 unsigned long src_addr, 657 uffd_flags_t flags, 658 struct folio **foliop) 659 { 660 ssize_t err; 661 662 if (uffd_flags_mode_is(flags, MFILL_ATOMIC_CONTINUE)) { 663 return mfill_atomic_pte_continue(dst_pmd, dst_vma, 664 dst_addr, flags); 665 } else if (uffd_flags_mode_is(flags, MFILL_ATOMIC_POISON)) { 666 return mfill_atomic_pte_poison(dst_pmd, dst_vma, 667 dst_addr, flags); 668 } 669 670 /* 671 * The normal page fault path for a shmem will invoke the 672 * fault, fill the hole in the file and COW it right away. The 673 * result generates plain anonymous memory. So when we are 674 * asked to fill an hole in a MAP_PRIVATE shmem mapping, we'll 675 * generate anonymous memory directly without actually filling 676 * the hole. For the MAP_PRIVATE case the robustness check 677 * only happens in the pagetable (to verify it's still none) 678 * and not in the radix tree. 679 */ 680 if (!(dst_vma->vm_flags & VM_SHARED)) { 681 if (uffd_flags_mode_is(flags, MFILL_ATOMIC_COPY)) 682 err = mfill_atomic_pte_copy(dst_pmd, dst_vma, 683 dst_addr, src_addr, 684 flags, foliop); 685 else 686 err = mfill_atomic_pte_zeropage(dst_pmd, 687 dst_vma, dst_addr); 688 } else { 689 err = shmem_mfill_atomic_pte(dst_pmd, dst_vma, 690 dst_addr, src_addr, 691 flags, foliop); 692 } 693 694 return err; 695 } 696 697 static __always_inline ssize_t mfill_atomic(struct userfaultfd_ctx *ctx, 698 unsigned long dst_start, 699 unsigned long src_start, 700 unsigned long len, 701 uffd_flags_t flags) 702 { 703 struct mm_struct *dst_mm = ctx->mm; 704 struct vm_area_struct *dst_vma; 705 ssize_t err; 706 pmd_t *dst_pmd; 707 unsigned long src_addr, dst_addr; 708 long copied; 709 struct folio *folio; 710 711 /* 712 * Sanitize the command parameters: 713 */ 714 VM_WARN_ON_ONCE(dst_start & ~PAGE_MASK); 715 VM_WARN_ON_ONCE(len & ~PAGE_MASK); 716 717 /* Does the address range wrap, or is the span zero-sized? */ 718 VM_WARN_ON_ONCE(src_start + len <= src_start); 719 VM_WARN_ON_ONCE(dst_start + len <= dst_start); 720 721 src_addr = src_start; 722 dst_addr = dst_start; 723 copied = 0; 724 folio = NULL; 725 retry: 726 /* 727 * Make sure the vma is not shared, that the dst range is 728 * both valid and fully within a single existing vma. 729 */ 730 dst_vma = uffd_mfill_lock(dst_mm, dst_start, len); 731 if (IS_ERR(dst_vma)) { 732 err = PTR_ERR(dst_vma); 733 goto out; 734 } 735 736 /* 737 * If memory mappings are changing because of non-cooperative 738 * operation (e.g. mremap) running in parallel, bail out and 739 * request the user to retry later 740 */ 741 down_read(&ctx->map_changing_lock); 742 err = -EAGAIN; 743 if (atomic_read(&ctx->mmap_changing)) 744 goto out_unlock; 745 746 err = -EINVAL; 747 /* 748 * shmem_zero_setup is invoked in mmap for MAP_ANONYMOUS|MAP_SHARED but 749 * it will overwrite vm_ops, so vma_is_anonymous must return false. 750 */ 751 if (WARN_ON_ONCE(vma_is_anonymous(dst_vma) && 752 dst_vma->vm_flags & VM_SHARED)) 753 goto out_unlock; 754 755 /* 756 * validate 'mode' now that we know the dst_vma: don't allow 757 * a wrprotect copy if the userfaultfd didn't register as WP. 758 */ 759 if ((flags & MFILL_ATOMIC_WP) && !(dst_vma->vm_flags & VM_UFFD_WP)) 760 goto out_unlock; 761 762 /* 763 * If this is a HUGETLB vma, pass off to appropriate routine 764 */ 765 if (is_vm_hugetlb_page(dst_vma)) 766 return mfill_atomic_hugetlb(ctx, dst_vma, dst_start, 767 src_start, len, flags); 768 769 if (!vma_is_anonymous(dst_vma) && !vma_is_shmem(dst_vma)) 770 goto out_unlock; 771 if (!vma_is_shmem(dst_vma) && 772 uffd_flags_mode_is(flags, MFILL_ATOMIC_CONTINUE)) 773 goto out_unlock; 774 775 while (src_addr < src_start + len) { 776 pmd_t dst_pmdval; 777 778 VM_WARN_ON_ONCE(dst_addr >= dst_start + len); 779 780 dst_pmd = mm_alloc_pmd(dst_mm, dst_addr); 781 if (unlikely(!dst_pmd)) { 782 err = -ENOMEM; 783 break; 784 } 785 786 dst_pmdval = pmdp_get_lockless(dst_pmd); 787 if (unlikely(pmd_none(dst_pmdval)) && 788 unlikely(__pte_alloc(dst_mm, dst_pmd))) { 789 err = -ENOMEM; 790 break; 791 } 792 dst_pmdval = pmdp_get_lockless(dst_pmd); 793 /* 794 * If the dst_pmd is THP don't override it and just be strict. 795 * (This includes the case where the PMD used to be THP and 796 * changed back to none after __pte_alloc().) 797 */ 798 if (unlikely(!pmd_present(dst_pmdval) || 799 pmd_trans_huge(dst_pmdval))) { 800 err = -EEXIST; 801 break; 802 } 803 if (unlikely(pmd_bad(dst_pmdval))) { 804 err = -EFAULT; 805 break; 806 } 807 /* 808 * For shmem mappings, khugepaged is allowed to remove page 809 * tables under us; pte_offset_map_lock() will deal with that. 810 */ 811 812 err = mfill_atomic_pte(dst_pmd, dst_vma, dst_addr, 813 src_addr, flags, &folio); 814 cond_resched(); 815 816 if (unlikely(err == -ENOENT)) { 817 void *kaddr; 818 819 up_read(&ctx->map_changing_lock); 820 uffd_mfill_unlock(dst_vma); 821 VM_WARN_ON_ONCE(!folio); 822 823 kaddr = kmap_local_folio(folio, 0); 824 err = copy_from_user(kaddr, 825 (const void __user *) src_addr, 826 PAGE_SIZE); 827 kunmap_local(kaddr); 828 if (unlikely(err)) { 829 err = -EFAULT; 830 goto out; 831 } 832 flush_dcache_folio(folio); 833 goto retry; 834 } else 835 VM_WARN_ON_ONCE(folio); 836 837 if (!err) { 838 dst_addr += PAGE_SIZE; 839 src_addr += PAGE_SIZE; 840 copied += PAGE_SIZE; 841 842 if (fatal_signal_pending(current)) 843 err = -EINTR; 844 } 845 if (err) 846 break; 847 } 848 849 out_unlock: 850 up_read(&ctx->map_changing_lock); 851 uffd_mfill_unlock(dst_vma); 852 out: 853 if (folio) 854 folio_put(folio); 855 VM_WARN_ON_ONCE(copied < 0); 856 VM_WARN_ON_ONCE(err > 0); 857 VM_WARN_ON_ONCE(!copied && !err); 858 return copied ? copied : err; 859 } 860 861 ssize_t mfill_atomic_copy(struct userfaultfd_ctx *ctx, unsigned long dst_start, 862 unsigned long src_start, unsigned long len, 863 uffd_flags_t flags) 864 { 865 return mfill_atomic(ctx, dst_start, src_start, len, 866 uffd_flags_set_mode(flags, MFILL_ATOMIC_COPY)); 867 } 868 869 ssize_t mfill_atomic_zeropage(struct userfaultfd_ctx *ctx, 870 unsigned long start, 871 unsigned long len) 872 { 873 return mfill_atomic(ctx, start, 0, len, 874 uffd_flags_set_mode(0, MFILL_ATOMIC_ZEROPAGE)); 875 } 876 877 ssize_t mfill_atomic_continue(struct userfaultfd_ctx *ctx, unsigned long start, 878 unsigned long len, uffd_flags_t flags) 879 { 880 881 /* 882 * A caller might reasonably assume that UFFDIO_CONTINUE contains an 883 * smp_wmb() to ensure that any writes to the about-to-be-mapped page by 884 * the thread doing the UFFDIO_CONTINUE are guaranteed to be visible to 885 * subsequent loads from the page through the newly mapped address range. 886 */ 887 smp_wmb(); 888 889 return mfill_atomic(ctx, start, 0, len, 890 uffd_flags_set_mode(flags, MFILL_ATOMIC_CONTINUE)); 891 } 892 893 ssize_t mfill_atomic_poison(struct userfaultfd_ctx *ctx, unsigned long start, 894 unsigned long len, uffd_flags_t flags) 895 { 896 return mfill_atomic(ctx, start, 0, len, 897 uffd_flags_set_mode(flags, MFILL_ATOMIC_POISON)); 898 } 899 900 long uffd_wp_range(struct vm_area_struct *dst_vma, 901 unsigned long start, unsigned long len, bool enable_wp) 902 { 903 unsigned int mm_cp_flags; 904 struct mmu_gather tlb; 905 long ret; 906 907 VM_WARN_ONCE(start < dst_vma->vm_start || start + len > dst_vma->vm_end, 908 "The address range exceeds VMA boundary.\n"); 909 if (enable_wp) 910 mm_cp_flags = MM_CP_UFFD_WP; 911 else 912 mm_cp_flags = MM_CP_UFFD_WP_RESOLVE; 913 914 /* 915 * vma->vm_page_prot already reflects that uffd-wp is enabled for this 916 * VMA (see userfaultfd_set_vm_flags()) and that all PTEs are supposed 917 * to be write-protected as default whenever protection changes. 918 * Try upgrading write permissions manually. 919 */ 920 if (!enable_wp && vma_wants_manual_pte_write_upgrade(dst_vma)) 921 mm_cp_flags |= MM_CP_TRY_CHANGE_WRITABLE; 922 tlb_gather_mmu(&tlb, dst_vma->vm_mm); 923 ret = change_protection(&tlb, dst_vma, start, start + len, mm_cp_flags); 924 tlb_finish_mmu(&tlb); 925 926 return ret; 927 } 928 929 int mwriteprotect_range(struct userfaultfd_ctx *ctx, unsigned long start, 930 unsigned long len, bool enable_wp) 931 { 932 struct mm_struct *dst_mm = ctx->mm; 933 unsigned long end = start + len; 934 unsigned long _start, _end; 935 struct vm_area_struct *dst_vma; 936 unsigned long page_mask; 937 long err; 938 VMA_ITERATOR(vmi, dst_mm, start); 939 940 /* 941 * Sanitize the command parameters: 942 */ 943 VM_WARN_ON_ONCE(start & ~PAGE_MASK); 944 VM_WARN_ON_ONCE(len & ~PAGE_MASK); 945 946 /* Does the address range wrap, or is the span zero-sized? */ 947 VM_WARN_ON_ONCE(start + len <= start); 948 949 mmap_read_lock(dst_mm); 950 951 /* 952 * If memory mappings are changing because of non-cooperative 953 * operation (e.g. mremap) running in parallel, bail out and 954 * request the user to retry later 955 */ 956 down_read(&ctx->map_changing_lock); 957 err = -EAGAIN; 958 if (atomic_read(&ctx->mmap_changing)) 959 goto out_unlock; 960 961 err = -ENOENT; 962 for_each_vma_range(vmi, dst_vma, end) { 963 964 if (!userfaultfd_wp(dst_vma)) { 965 err = -ENOENT; 966 break; 967 } 968 969 if (is_vm_hugetlb_page(dst_vma)) { 970 err = -EINVAL; 971 page_mask = vma_kernel_pagesize(dst_vma) - 1; 972 if ((start & page_mask) || (len & page_mask)) 973 break; 974 } 975 976 _start = max(dst_vma->vm_start, start); 977 _end = min(dst_vma->vm_end, end); 978 979 err = uffd_wp_range(dst_vma, _start, _end - _start, enable_wp); 980 981 /* Return 0 on success, <0 on failures */ 982 if (err < 0) 983 break; 984 err = 0; 985 } 986 out_unlock: 987 up_read(&ctx->map_changing_lock); 988 mmap_read_unlock(dst_mm); 989 return err; 990 } 991 992 993 void double_pt_lock(spinlock_t *ptl1, 994 spinlock_t *ptl2) 995 __acquires(ptl1) 996 __acquires(ptl2) 997 { 998 if (ptl1 > ptl2) 999 swap(ptl1, ptl2); 1000 /* lock in virtual address order to avoid lock inversion */ 1001 spin_lock(ptl1); 1002 if (ptl1 != ptl2) 1003 spin_lock_nested(ptl2, SINGLE_DEPTH_NESTING); 1004 else 1005 __acquire(ptl2); 1006 } 1007 1008 void double_pt_unlock(spinlock_t *ptl1, 1009 spinlock_t *ptl2) 1010 __releases(ptl1) 1011 __releases(ptl2) 1012 { 1013 spin_unlock(ptl1); 1014 if (ptl1 != ptl2) 1015 spin_unlock(ptl2); 1016 else 1017 __release(ptl2); 1018 } 1019 1020 static inline bool is_pte_pages_stable(pte_t *dst_pte, pte_t *src_pte, 1021 pte_t orig_dst_pte, pte_t orig_src_pte, 1022 pmd_t *dst_pmd, pmd_t dst_pmdval) 1023 { 1024 return pte_same(ptep_get(src_pte), orig_src_pte) && 1025 pte_same(ptep_get(dst_pte), orig_dst_pte) && 1026 pmd_same(dst_pmdval, pmdp_get_lockless(dst_pmd)); 1027 } 1028 1029 /* 1030 * Checks if the two ptes and the corresponding folio are eligible for batched 1031 * move. If so, then returns pointer to the locked folio. Otherwise, returns NULL. 1032 * 1033 * NOTE: folio's reference is not required as the whole operation is within 1034 * PTL's critical section. 1035 */ 1036 static struct folio *check_ptes_for_batched_move(struct vm_area_struct *src_vma, 1037 unsigned long src_addr, 1038 pte_t *src_pte, pte_t *dst_pte) 1039 { 1040 pte_t orig_dst_pte, orig_src_pte; 1041 struct folio *folio; 1042 1043 orig_dst_pte = ptep_get(dst_pte); 1044 if (!pte_none(orig_dst_pte)) 1045 return NULL; 1046 1047 orig_src_pte = ptep_get(src_pte); 1048 if (!pte_present(orig_src_pte) || is_zero_pfn(pte_pfn(orig_src_pte))) 1049 return NULL; 1050 1051 folio = vm_normal_folio(src_vma, src_addr, orig_src_pte); 1052 if (!folio || !folio_trylock(folio)) 1053 return NULL; 1054 if (!PageAnonExclusive(&folio->page) || folio_test_large(folio)) { 1055 folio_unlock(folio); 1056 return NULL; 1057 } 1058 return folio; 1059 } 1060 1061 /* 1062 * Moves src folios to dst in a batch as long as they are not large, and can 1063 * successfully take the lock via folio_trylock(). 1064 */ 1065 static long move_present_ptes(struct mm_struct *mm, 1066 struct vm_area_struct *dst_vma, 1067 struct vm_area_struct *src_vma, 1068 unsigned long dst_addr, unsigned long src_addr, 1069 pte_t *dst_pte, pte_t *src_pte, 1070 pte_t orig_dst_pte, pte_t orig_src_pte, 1071 pmd_t *dst_pmd, pmd_t dst_pmdval, 1072 spinlock_t *dst_ptl, spinlock_t *src_ptl, 1073 struct folio **first_src_folio, unsigned long len) 1074 { 1075 int err = 0; 1076 struct folio *src_folio = *first_src_folio; 1077 unsigned long src_start = src_addr; 1078 unsigned long src_end; 1079 1080 len = pmd_addr_end(dst_addr, dst_addr + len) - dst_addr; 1081 src_end = pmd_addr_end(src_addr, src_addr + len); 1082 flush_cache_range(src_vma, src_addr, src_end); 1083 double_pt_lock(dst_ptl, src_ptl); 1084 1085 if (!is_pte_pages_stable(dst_pte, src_pte, orig_dst_pte, orig_src_pte, 1086 dst_pmd, dst_pmdval)) { 1087 err = -EAGAIN; 1088 goto out; 1089 } 1090 if (folio_test_large(src_folio) || 1091 folio_maybe_dma_pinned(src_folio) || 1092 !PageAnonExclusive(&src_folio->page)) { 1093 err = -EBUSY; 1094 goto out; 1095 } 1096 /* It's safe to drop the reference now as the page-table is holding one. */ 1097 folio_put(*first_src_folio); 1098 *first_src_folio = NULL; 1099 arch_enter_lazy_mmu_mode(); 1100 1101 while (true) { 1102 orig_src_pte = ptep_get_and_clear(mm, src_addr, src_pte); 1103 /* Folio got pinned from under us. Put it back and fail the move. */ 1104 if (folio_maybe_dma_pinned(src_folio)) { 1105 set_pte_at(mm, src_addr, src_pte, orig_src_pte); 1106 err = -EBUSY; 1107 break; 1108 } 1109 1110 folio_move_anon_rmap(src_folio, dst_vma); 1111 src_folio->index = linear_page_index(dst_vma, dst_addr); 1112 1113 orig_dst_pte = folio_mk_pte(src_folio, dst_vma->vm_page_prot); 1114 /* Set soft dirty bit so userspace can notice the pte was moved */ 1115 #ifdef CONFIG_MEM_SOFT_DIRTY 1116 orig_dst_pte = pte_mksoft_dirty(orig_dst_pte); 1117 #endif 1118 if (pte_dirty(orig_src_pte)) 1119 orig_dst_pte = pte_mkdirty(orig_dst_pte); 1120 orig_dst_pte = pte_mkwrite(orig_dst_pte, dst_vma); 1121 set_pte_at(mm, dst_addr, dst_pte, orig_dst_pte); 1122 1123 src_addr += PAGE_SIZE; 1124 if (src_addr == src_end) 1125 break; 1126 dst_addr += PAGE_SIZE; 1127 dst_pte++; 1128 src_pte++; 1129 1130 folio_unlock(src_folio); 1131 src_folio = check_ptes_for_batched_move(src_vma, src_addr, 1132 src_pte, dst_pte); 1133 if (!src_folio) 1134 break; 1135 } 1136 1137 arch_leave_lazy_mmu_mode(); 1138 if (src_addr > src_start) 1139 flush_tlb_range(src_vma, src_start, src_addr); 1140 1141 if (src_folio) 1142 folio_unlock(src_folio); 1143 out: 1144 double_pt_unlock(dst_ptl, src_ptl); 1145 return src_addr > src_start ? src_addr - src_start : err; 1146 } 1147 1148 static int move_swap_pte(struct mm_struct *mm, struct vm_area_struct *dst_vma, 1149 unsigned long dst_addr, unsigned long src_addr, 1150 pte_t *dst_pte, pte_t *src_pte, 1151 pte_t orig_dst_pte, pte_t orig_src_pte, 1152 pmd_t *dst_pmd, pmd_t dst_pmdval, 1153 spinlock_t *dst_ptl, spinlock_t *src_ptl, 1154 struct folio *src_folio, 1155 struct swap_info_struct *si, swp_entry_t entry) 1156 { 1157 /* 1158 * Check if the folio still belongs to the target swap entry after 1159 * acquiring the lock. Folio can be freed in the swap cache while 1160 * not locked. 1161 */ 1162 if (src_folio && unlikely(!folio_test_swapcache(src_folio) || 1163 entry.val != src_folio->swap.val)) 1164 return -EAGAIN; 1165 1166 double_pt_lock(dst_ptl, src_ptl); 1167 1168 if (!is_pte_pages_stable(dst_pte, src_pte, orig_dst_pte, orig_src_pte, 1169 dst_pmd, dst_pmdval)) { 1170 double_pt_unlock(dst_ptl, src_ptl); 1171 return -EAGAIN; 1172 } 1173 1174 /* 1175 * The src_folio resides in the swapcache, requiring an update to its 1176 * index and mapping to align with the dst_vma, where a swap-in may 1177 * occur and hit the swapcache after moving the PTE. 1178 */ 1179 if (src_folio) { 1180 folio_move_anon_rmap(src_folio, dst_vma); 1181 src_folio->index = linear_page_index(dst_vma, dst_addr); 1182 } else { 1183 /* 1184 * Check if the swap entry is cached after acquiring the src_pte 1185 * lock. Otherwise, we might miss a newly loaded swap cache folio. 1186 * 1187 * Check swap_map directly to minimize overhead, READ_ONCE is sufficient. 1188 * We are trying to catch newly added swap cache, the only possible case is 1189 * when a folio is swapped in and out again staying in swap cache, using the 1190 * same entry before the PTE check above. The PTL is acquired and released 1191 * twice, each time after updating the swap_map's flag. So holding 1192 * the PTL here ensures we see the updated value. False positive is possible, 1193 * e.g. SWP_SYNCHRONOUS_IO swapin may set the flag without touching the 1194 * cache, or during the tiny synchronization window between swap cache and 1195 * swap_map, but it will be gone very quickly, worst result is retry jitters. 1196 */ 1197 if (READ_ONCE(si->swap_map[swp_offset(entry)]) & SWAP_HAS_CACHE) { 1198 double_pt_unlock(dst_ptl, src_ptl); 1199 return -EAGAIN; 1200 } 1201 } 1202 1203 orig_src_pte = ptep_get_and_clear(mm, src_addr, src_pte); 1204 #ifdef CONFIG_MEM_SOFT_DIRTY 1205 orig_src_pte = pte_swp_mksoft_dirty(orig_src_pte); 1206 #endif 1207 set_pte_at(mm, dst_addr, dst_pte, orig_src_pte); 1208 double_pt_unlock(dst_ptl, src_ptl); 1209 1210 return PAGE_SIZE; 1211 } 1212 1213 static int move_zeropage_pte(struct mm_struct *mm, 1214 struct vm_area_struct *dst_vma, 1215 struct vm_area_struct *src_vma, 1216 unsigned long dst_addr, unsigned long src_addr, 1217 pte_t *dst_pte, pte_t *src_pte, 1218 pte_t orig_dst_pte, pte_t orig_src_pte, 1219 pmd_t *dst_pmd, pmd_t dst_pmdval, 1220 spinlock_t *dst_ptl, spinlock_t *src_ptl) 1221 { 1222 pte_t zero_pte; 1223 1224 double_pt_lock(dst_ptl, src_ptl); 1225 if (!is_pte_pages_stable(dst_pte, src_pte, orig_dst_pte, orig_src_pte, 1226 dst_pmd, dst_pmdval)) { 1227 double_pt_unlock(dst_ptl, src_ptl); 1228 return -EAGAIN; 1229 } 1230 1231 zero_pte = pte_mkspecial(pfn_pte(my_zero_pfn(dst_addr), 1232 dst_vma->vm_page_prot)); 1233 ptep_clear_flush(src_vma, src_addr, src_pte); 1234 set_pte_at(mm, dst_addr, dst_pte, zero_pte); 1235 double_pt_unlock(dst_ptl, src_ptl); 1236 1237 return PAGE_SIZE; 1238 } 1239 1240 1241 /* 1242 * The mmap_lock for reading is held by the caller. Just move the page(s) 1243 * from src_pmd to dst_pmd if possible, and return number of bytes moved. 1244 * On failure, an error code is returned. 1245 */ 1246 static long move_pages_ptes(struct mm_struct *mm, pmd_t *dst_pmd, pmd_t *src_pmd, 1247 struct vm_area_struct *dst_vma, 1248 struct vm_area_struct *src_vma, 1249 unsigned long dst_addr, unsigned long src_addr, 1250 unsigned long len, __u64 mode) 1251 { 1252 swp_entry_t entry; 1253 struct swap_info_struct *si = NULL; 1254 pte_t orig_src_pte, orig_dst_pte; 1255 pte_t src_folio_pte; 1256 spinlock_t *src_ptl, *dst_ptl; 1257 pte_t *src_pte = NULL; 1258 pte_t *dst_pte = NULL; 1259 pmd_t dummy_pmdval; 1260 pmd_t dst_pmdval; 1261 struct folio *src_folio = NULL; 1262 struct mmu_notifier_range range; 1263 long ret = 0; 1264 1265 mmu_notifier_range_init(&range, MMU_NOTIFY_CLEAR, 0, mm, 1266 src_addr, src_addr + len); 1267 mmu_notifier_invalidate_range_start(&range); 1268 retry: 1269 /* 1270 * Use the maywrite version to indicate that dst_pte will be modified, 1271 * since dst_pte needs to be none, the subsequent pte_same() check 1272 * cannot prevent the dst_pte page from being freed concurrently, so we 1273 * also need to abtain dst_pmdval and recheck pmd_same() later. 1274 */ 1275 dst_pte = pte_offset_map_rw_nolock(mm, dst_pmd, dst_addr, &dst_pmdval, 1276 &dst_ptl); 1277 1278 /* Retry if a huge pmd materialized from under us */ 1279 if (unlikely(!dst_pte)) { 1280 ret = -EAGAIN; 1281 goto out; 1282 } 1283 1284 /* 1285 * Unlike dst_pte, the subsequent pte_same() check can ensure the 1286 * stability of the src_pte page, so there is no need to get pmdval, 1287 * just pass a dummy variable to it. 1288 */ 1289 src_pte = pte_offset_map_rw_nolock(mm, src_pmd, src_addr, &dummy_pmdval, 1290 &src_ptl); 1291 1292 /* 1293 * We held the mmap_lock for reading so MADV_DONTNEED 1294 * can zap transparent huge pages under us, or the 1295 * transparent huge page fault can establish new 1296 * transparent huge pages under us. 1297 */ 1298 if (unlikely(!src_pte)) { 1299 ret = -EAGAIN; 1300 goto out; 1301 } 1302 1303 /* Sanity checks before the operation */ 1304 if (pmd_none(*dst_pmd) || pmd_none(*src_pmd) || 1305 pmd_trans_huge(*dst_pmd) || pmd_trans_huge(*src_pmd)) { 1306 ret = -EINVAL; 1307 goto out; 1308 } 1309 1310 spin_lock(dst_ptl); 1311 orig_dst_pte = ptep_get(dst_pte); 1312 spin_unlock(dst_ptl); 1313 if (!pte_none(orig_dst_pte)) { 1314 ret = -EEXIST; 1315 goto out; 1316 } 1317 1318 spin_lock(src_ptl); 1319 orig_src_pte = ptep_get(src_pte); 1320 spin_unlock(src_ptl); 1321 if (pte_none(orig_src_pte)) { 1322 if (!(mode & UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES)) 1323 ret = -ENOENT; 1324 else /* nothing to do to move a hole */ 1325 ret = PAGE_SIZE; 1326 goto out; 1327 } 1328 1329 /* If PTE changed after we locked the folio them start over */ 1330 if (src_folio && unlikely(!pte_same(src_folio_pte, orig_src_pte))) { 1331 ret = -EAGAIN; 1332 goto out; 1333 } 1334 1335 if (pte_present(orig_src_pte)) { 1336 if (is_zero_pfn(pte_pfn(orig_src_pte))) { 1337 ret = move_zeropage_pte(mm, dst_vma, src_vma, 1338 dst_addr, src_addr, dst_pte, src_pte, 1339 orig_dst_pte, orig_src_pte, 1340 dst_pmd, dst_pmdval, dst_ptl, src_ptl); 1341 goto out; 1342 } 1343 1344 /* 1345 * Pin and lock source folio. Since we are in RCU read section, 1346 * we can't block, so on contention have to unmap the ptes, 1347 * obtain the lock and retry. 1348 */ 1349 if (!src_folio) { 1350 struct folio *folio; 1351 bool locked; 1352 1353 /* 1354 * Pin the page while holding the lock to be sure the 1355 * page isn't freed under us 1356 */ 1357 spin_lock(src_ptl); 1358 if (!pte_same(orig_src_pte, ptep_get(src_pte))) { 1359 spin_unlock(src_ptl); 1360 ret = -EAGAIN; 1361 goto out; 1362 } 1363 1364 folio = vm_normal_folio(src_vma, src_addr, orig_src_pte); 1365 if (!folio || !PageAnonExclusive(&folio->page)) { 1366 spin_unlock(src_ptl); 1367 ret = -EBUSY; 1368 goto out; 1369 } 1370 1371 locked = folio_trylock(folio); 1372 /* 1373 * We avoid waiting for folio lock with a raised 1374 * refcount for large folios because extra refcounts 1375 * will result in split_folio() failing later and 1376 * retrying. If multiple tasks are trying to move a 1377 * large folio we can end up livelocking. 1378 */ 1379 if (!locked && folio_test_large(folio)) { 1380 spin_unlock(src_ptl); 1381 ret = -EAGAIN; 1382 goto out; 1383 } 1384 1385 folio_get(folio); 1386 src_folio = folio; 1387 src_folio_pte = orig_src_pte; 1388 spin_unlock(src_ptl); 1389 1390 if (!locked) { 1391 pte_unmap(src_pte); 1392 pte_unmap(dst_pte); 1393 src_pte = dst_pte = NULL; 1394 /* now we can block and wait */ 1395 folio_lock(src_folio); 1396 goto retry; 1397 } 1398 1399 if (WARN_ON_ONCE(!folio_test_anon(src_folio))) { 1400 ret = -EBUSY; 1401 goto out; 1402 } 1403 } 1404 1405 /* at this point we have src_folio locked */ 1406 if (folio_test_large(src_folio)) { 1407 /* split_folio() can block */ 1408 pte_unmap(src_pte); 1409 pte_unmap(dst_pte); 1410 src_pte = dst_pte = NULL; 1411 ret = split_folio(src_folio); 1412 if (ret) 1413 goto out; 1414 /* have to reacquire the folio after it got split */ 1415 folio_unlock(src_folio); 1416 folio_put(src_folio); 1417 src_folio = NULL; 1418 goto retry; 1419 } 1420 1421 ret = move_present_ptes(mm, dst_vma, src_vma, 1422 dst_addr, src_addr, dst_pte, src_pte, 1423 orig_dst_pte, orig_src_pte, dst_pmd, 1424 dst_pmdval, dst_ptl, src_ptl, &src_folio, 1425 len); 1426 } else { 1427 struct folio *folio = NULL; 1428 1429 entry = pte_to_swp_entry(orig_src_pte); 1430 if (non_swap_entry(entry)) { 1431 if (is_migration_entry(entry)) { 1432 pte_unmap(src_pte); 1433 pte_unmap(dst_pte); 1434 src_pte = dst_pte = NULL; 1435 migration_entry_wait(mm, src_pmd, src_addr); 1436 ret = -EAGAIN; 1437 } else 1438 ret = -EFAULT; 1439 goto out; 1440 } 1441 1442 if (!pte_swp_exclusive(orig_src_pte)) { 1443 ret = -EBUSY; 1444 goto out; 1445 } 1446 1447 si = get_swap_device(entry); 1448 if (unlikely(!si)) { 1449 ret = -EAGAIN; 1450 goto out; 1451 } 1452 /* 1453 * Verify the existence of the swapcache. If present, the folio's 1454 * index and mapping must be updated even when the PTE is a swap 1455 * entry. The anon_vma lock is not taken during this process since 1456 * the folio has already been unmapped, and the swap entry is 1457 * exclusive, preventing rmap walks. 1458 * 1459 * For large folios, return -EBUSY immediately, as split_folio() 1460 * also returns -EBUSY when attempting to split unmapped large 1461 * folios in the swapcache. This issue needs to be resolved 1462 * separately to allow proper handling. 1463 */ 1464 if (!src_folio) 1465 folio = swap_cache_get_folio(entry); 1466 if (folio) { 1467 if (folio_test_large(folio)) { 1468 ret = -EBUSY; 1469 folio_put(folio); 1470 goto out; 1471 } 1472 src_folio = folio; 1473 src_folio_pte = orig_src_pte; 1474 if (!folio_trylock(src_folio)) { 1475 pte_unmap(src_pte); 1476 pte_unmap(dst_pte); 1477 src_pte = dst_pte = NULL; 1478 put_swap_device(si); 1479 si = NULL; 1480 /* now we can block and wait */ 1481 folio_lock(src_folio); 1482 goto retry; 1483 } 1484 } 1485 ret = move_swap_pte(mm, dst_vma, dst_addr, src_addr, dst_pte, src_pte, 1486 orig_dst_pte, orig_src_pte, dst_pmd, dst_pmdval, 1487 dst_ptl, src_ptl, src_folio, si, entry); 1488 } 1489 1490 out: 1491 if (src_folio) { 1492 folio_unlock(src_folio); 1493 folio_put(src_folio); 1494 } 1495 /* 1496 * Unmap in reverse order (LIFO) to maintain proper kmap_local 1497 * index ordering when CONFIG_HIGHPTE is enabled. We mapped dst_pte 1498 * first, then src_pte, so we must unmap src_pte first, then dst_pte. 1499 */ 1500 if (src_pte) 1501 pte_unmap(src_pte); 1502 if (dst_pte) 1503 pte_unmap(dst_pte); 1504 mmu_notifier_invalidate_range_end(&range); 1505 if (si) 1506 put_swap_device(si); 1507 1508 return ret; 1509 } 1510 1511 #ifdef CONFIG_TRANSPARENT_HUGEPAGE 1512 static inline bool move_splits_huge_pmd(unsigned long dst_addr, 1513 unsigned long src_addr, 1514 unsigned long src_end) 1515 { 1516 return (src_addr & ~HPAGE_PMD_MASK) || (dst_addr & ~HPAGE_PMD_MASK) || 1517 src_end - src_addr < HPAGE_PMD_SIZE; 1518 } 1519 #else 1520 static inline bool move_splits_huge_pmd(unsigned long dst_addr, 1521 unsigned long src_addr, 1522 unsigned long src_end) 1523 { 1524 /* This is unreachable anyway, just to avoid warnings when HPAGE_PMD_SIZE==0 */ 1525 return false; 1526 } 1527 #endif 1528 1529 static inline bool vma_move_compatible(struct vm_area_struct *vma) 1530 { 1531 return !(vma->vm_flags & (VM_PFNMAP | VM_IO | VM_HUGETLB | 1532 VM_MIXEDMAP | VM_SHADOW_STACK)); 1533 } 1534 1535 static int validate_move_areas(struct userfaultfd_ctx *ctx, 1536 struct vm_area_struct *src_vma, 1537 struct vm_area_struct *dst_vma) 1538 { 1539 /* Only allow moving if both have the same access and protection */ 1540 if ((src_vma->vm_flags & VM_ACCESS_FLAGS) != (dst_vma->vm_flags & VM_ACCESS_FLAGS) || 1541 pgprot_val(src_vma->vm_page_prot) != pgprot_val(dst_vma->vm_page_prot)) 1542 return -EINVAL; 1543 1544 /* Only allow moving if both are mlocked or both aren't */ 1545 if ((src_vma->vm_flags & VM_LOCKED) != (dst_vma->vm_flags & VM_LOCKED)) 1546 return -EINVAL; 1547 1548 /* 1549 * For now, we keep it simple and only move between writable VMAs. 1550 * Access flags are equal, therefore checking only the source is enough. 1551 */ 1552 if (!(src_vma->vm_flags & VM_WRITE)) 1553 return -EINVAL; 1554 1555 /* Check if vma flags indicate content which can be moved */ 1556 if (!vma_move_compatible(src_vma) || !vma_move_compatible(dst_vma)) 1557 return -EINVAL; 1558 1559 /* Ensure dst_vma is registered in uffd we are operating on */ 1560 if (!dst_vma->vm_userfaultfd_ctx.ctx || 1561 dst_vma->vm_userfaultfd_ctx.ctx != ctx) 1562 return -EINVAL; 1563 1564 /* Only allow moving across anonymous vmas */ 1565 if (!vma_is_anonymous(src_vma) || !vma_is_anonymous(dst_vma)) 1566 return -EINVAL; 1567 1568 return 0; 1569 } 1570 1571 static __always_inline 1572 int find_vmas_mm_locked(struct mm_struct *mm, 1573 unsigned long dst_start, 1574 unsigned long src_start, 1575 struct vm_area_struct **dst_vmap, 1576 struct vm_area_struct **src_vmap) 1577 { 1578 struct vm_area_struct *vma; 1579 1580 mmap_assert_locked(mm); 1581 vma = find_vma_and_prepare_anon(mm, dst_start); 1582 if (IS_ERR(vma)) 1583 return PTR_ERR(vma); 1584 1585 *dst_vmap = vma; 1586 /* Skip finding src_vma if src_start is in dst_vma */ 1587 if (src_start >= vma->vm_start && src_start < vma->vm_end) 1588 goto out_success; 1589 1590 vma = vma_lookup(mm, src_start); 1591 if (!vma) 1592 return -ENOENT; 1593 out_success: 1594 *src_vmap = vma; 1595 return 0; 1596 } 1597 1598 #ifdef CONFIG_PER_VMA_LOCK 1599 static int uffd_move_lock(struct mm_struct *mm, 1600 unsigned long dst_start, 1601 unsigned long src_start, 1602 struct vm_area_struct **dst_vmap, 1603 struct vm_area_struct **src_vmap) 1604 { 1605 struct vm_area_struct *vma; 1606 int err; 1607 1608 vma = uffd_lock_vma(mm, dst_start); 1609 if (IS_ERR(vma)) 1610 return PTR_ERR(vma); 1611 1612 *dst_vmap = vma; 1613 /* 1614 * Skip finding src_vma if src_start is in dst_vma. This also ensures 1615 * that we don't lock the same vma twice. 1616 */ 1617 if (src_start >= vma->vm_start && src_start < vma->vm_end) { 1618 *src_vmap = vma; 1619 return 0; 1620 } 1621 1622 /* 1623 * Using uffd_lock_vma() to get src_vma can lead to following deadlock: 1624 * 1625 * Thread1 Thread2 1626 * ------- ------- 1627 * vma_start_read(dst_vma) 1628 * mmap_write_lock(mm) 1629 * vma_start_write(src_vma) 1630 * vma_start_read(src_vma) 1631 * mmap_read_lock(mm) 1632 * vma_start_write(dst_vma) 1633 */ 1634 *src_vmap = lock_vma_under_rcu(mm, src_start); 1635 if (likely(*src_vmap)) 1636 return 0; 1637 1638 /* Undo any locking and retry in mmap_lock critical section */ 1639 vma_end_read(*dst_vmap); 1640 1641 mmap_read_lock(mm); 1642 err = find_vmas_mm_locked(mm, dst_start, src_start, dst_vmap, src_vmap); 1643 if (err) 1644 goto out; 1645 1646 if (!vma_start_read_locked(*dst_vmap)) { 1647 err = -EAGAIN; 1648 goto out; 1649 } 1650 1651 /* Nothing further to do if both vmas are locked. */ 1652 if (*dst_vmap == *src_vmap) 1653 goto out; 1654 1655 if (!vma_start_read_locked_nested(*src_vmap, SINGLE_DEPTH_NESTING)) { 1656 /* Undo dst_vmap locking if src_vmap failed to lock */ 1657 vma_end_read(*dst_vmap); 1658 err = -EAGAIN; 1659 } 1660 out: 1661 mmap_read_unlock(mm); 1662 return err; 1663 } 1664 1665 static void uffd_move_unlock(struct vm_area_struct *dst_vma, 1666 struct vm_area_struct *src_vma) 1667 { 1668 vma_end_read(src_vma); 1669 if (src_vma != dst_vma) 1670 vma_end_read(dst_vma); 1671 } 1672 1673 #else 1674 1675 static int uffd_move_lock(struct mm_struct *mm, 1676 unsigned long dst_start, 1677 unsigned long src_start, 1678 struct vm_area_struct **dst_vmap, 1679 struct vm_area_struct **src_vmap) 1680 { 1681 int err; 1682 1683 mmap_read_lock(mm); 1684 err = find_vmas_mm_locked(mm, dst_start, src_start, dst_vmap, src_vmap); 1685 if (err) 1686 mmap_read_unlock(mm); 1687 return err; 1688 } 1689 1690 static void uffd_move_unlock(struct vm_area_struct *dst_vma, 1691 struct vm_area_struct *src_vma) 1692 { 1693 mmap_assert_locked(src_vma->vm_mm); 1694 mmap_read_unlock(dst_vma->vm_mm); 1695 } 1696 #endif 1697 1698 /** 1699 * move_pages - move arbitrary anonymous pages of an existing vma 1700 * @ctx: pointer to the userfaultfd context 1701 * @dst_start: start of the destination virtual memory range 1702 * @src_start: start of the source virtual memory range 1703 * @len: length of the virtual memory range 1704 * @mode: flags from uffdio_move.mode 1705 * 1706 * It will either use the mmap_lock in read mode or per-vma locks 1707 * 1708 * move_pages() remaps arbitrary anonymous pages atomically in zero 1709 * copy. It only works on non shared anonymous pages because those can 1710 * be relocated without generating non linear anon_vmas in the rmap 1711 * code. 1712 * 1713 * It provides a zero copy mechanism to handle userspace page faults. 1714 * The source vma pages should have mapcount == 1, which can be 1715 * enforced by using madvise(MADV_DONTFORK) on src vma. 1716 * 1717 * The thread receiving the page during the userland page fault 1718 * will receive the faulting page in the source vma through the network, 1719 * storage or any other I/O device (MADV_DONTFORK in the source vma 1720 * avoids move_pages() to fail with -EBUSY if the process forks before 1721 * move_pages() is called), then it will call move_pages() to map the 1722 * page in the faulting address in the destination vma. 1723 * 1724 * This userfaultfd command works purely via pagetables, so it's the 1725 * most efficient way to move physical non shared anonymous pages 1726 * across different virtual addresses. Unlike mremap()/mmap()/munmap() 1727 * it does not create any new vmas. The mapping in the destination 1728 * address is atomic. 1729 * 1730 * It only works if the vma protection bits are identical from the 1731 * source and destination vma. 1732 * 1733 * It can remap non shared anonymous pages within the same vma too. 1734 * 1735 * If the source virtual memory range has any unmapped holes, or if 1736 * the destination virtual memory range is not a whole unmapped hole, 1737 * move_pages() will fail respectively with -ENOENT or -EEXIST. This 1738 * provides a very strict behavior to avoid any chance of memory 1739 * corruption going unnoticed if there are userland race conditions. 1740 * Only one thread should resolve the userland page fault at any given 1741 * time for any given faulting address. This means that if two threads 1742 * try to both call move_pages() on the same destination address at the 1743 * same time, the second thread will get an explicit error from this 1744 * command. 1745 * 1746 * The command retval will return "len" is successful. The command 1747 * however can be interrupted by fatal signals or errors. If 1748 * interrupted it will return the number of bytes successfully 1749 * remapped before the interruption if any, or the negative error if 1750 * none. It will never return zero. Either it will return an error or 1751 * an amount of bytes successfully moved. If the retval reports a 1752 * "short" remap, the move_pages() command should be repeated by 1753 * userland with src+retval, dst+reval, len-retval if it wants to know 1754 * about the error that interrupted it. 1755 * 1756 * The UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES flag can be specified to 1757 * prevent -ENOENT errors to materialize if there are holes in the 1758 * source virtual range that is being remapped. The holes will be 1759 * accounted as successfully remapped in the retval of the 1760 * command. This is mostly useful to remap hugepage naturally aligned 1761 * virtual regions without knowing if there are transparent hugepage 1762 * in the regions or not, but preventing the risk of having to split 1763 * the hugepmd during the remap. 1764 */ 1765 ssize_t move_pages(struct userfaultfd_ctx *ctx, unsigned long dst_start, 1766 unsigned long src_start, unsigned long len, __u64 mode) 1767 { 1768 struct mm_struct *mm = ctx->mm; 1769 struct vm_area_struct *src_vma, *dst_vma; 1770 unsigned long src_addr, dst_addr, src_end; 1771 pmd_t *src_pmd, *dst_pmd; 1772 long err = -EINVAL; 1773 ssize_t moved = 0; 1774 1775 /* Sanitize the command parameters. */ 1776 VM_WARN_ON_ONCE(src_start & ~PAGE_MASK); 1777 VM_WARN_ON_ONCE(dst_start & ~PAGE_MASK); 1778 VM_WARN_ON_ONCE(len & ~PAGE_MASK); 1779 1780 /* Does the address range wrap, or is the span zero-sized? */ 1781 VM_WARN_ON_ONCE(src_start + len < src_start); 1782 VM_WARN_ON_ONCE(dst_start + len < dst_start); 1783 1784 err = uffd_move_lock(mm, dst_start, src_start, &dst_vma, &src_vma); 1785 if (err) 1786 goto out; 1787 1788 /* Re-check after taking map_changing_lock */ 1789 err = -EAGAIN; 1790 down_read(&ctx->map_changing_lock); 1791 if (likely(atomic_read(&ctx->mmap_changing))) 1792 goto out_unlock; 1793 /* 1794 * Make sure the vma is not shared, that the src and dst remap 1795 * ranges are both valid and fully within a single existing 1796 * vma. 1797 */ 1798 err = -EINVAL; 1799 if (src_vma->vm_flags & VM_SHARED) 1800 goto out_unlock; 1801 if (src_start + len > src_vma->vm_end) 1802 goto out_unlock; 1803 1804 if (dst_vma->vm_flags & VM_SHARED) 1805 goto out_unlock; 1806 if (dst_start + len > dst_vma->vm_end) 1807 goto out_unlock; 1808 1809 err = validate_move_areas(ctx, src_vma, dst_vma); 1810 if (err) 1811 goto out_unlock; 1812 1813 for (src_addr = src_start, dst_addr = dst_start, src_end = src_start + len; 1814 src_addr < src_end;) { 1815 spinlock_t *ptl; 1816 pmd_t dst_pmdval; 1817 unsigned long step_size; 1818 1819 /* 1820 * Below works because anonymous area would not have a 1821 * transparent huge PUD. If file-backed support is added, 1822 * that case would need to be handled here. 1823 */ 1824 src_pmd = mm_find_pmd(mm, src_addr); 1825 if (unlikely(!src_pmd)) { 1826 if (!(mode & UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES)) { 1827 err = -ENOENT; 1828 break; 1829 } 1830 src_pmd = mm_alloc_pmd(mm, src_addr); 1831 if (unlikely(!src_pmd)) { 1832 err = -ENOMEM; 1833 break; 1834 } 1835 } 1836 dst_pmd = mm_alloc_pmd(mm, dst_addr); 1837 if (unlikely(!dst_pmd)) { 1838 err = -ENOMEM; 1839 break; 1840 } 1841 1842 dst_pmdval = pmdp_get_lockless(dst_pmd); 1843 /* 1844 * If the dst_pmd is mapped as THP don't override it and just 1845 * be strict. If dst_pmd changes into TPH after this check, the 1846 * move_pages_huge_pmd() will detect the change and retry 1847 * while move_pages_pte() will detect the change and fail. 1848 */ 1849 if (unlikely(pmd_trans_huge(dst_pmdval))) { 1850 err = -EEXIST; 1851 break; 1852 } 1853 1854 ptl = pmd_trans_huge_lock(src_pmd, src_vma); 1855 if (ptl) { 1856 /* Check if we can move the pmd without splitting it. */ 1857 if (move_splits_huge_pmd(dst_addr, src_addr, src_start + len) || 1858 !pmd_none(dst_pmdval)) { 1859 /* Can be a migration entry */ 1860 if (pmd_present(*src_pmd)) { 1861 struct folio *folio = pmd_folio(*src_pmd); 1862 1863 if (!is_huge_zero_folio(folio) && 1864 !PageAnonExclusive(&folio->page)) { 1865 spin_unlock(ptl); 1866 err = -EBUSY; 1867 break; 1868 } 1869 } 1870 1871 spin_unlock(ptl); 1872 split_huge_pmd(src_vma, src_pmd, src_addr); 1873 /* The folio will be split by move_pages_pte() */ 1874 continue; 1875 } 1876 1877 err = move_pages_huge_pmd(mm, dst_pmd, src_pmd, 1878 dst_pmdval, dst_vma, src_vma, 1879 dst_addr, src_addr); 1880 step_size = HPAGE_PMD_SIZE; 1881 } else { 1882 long ret; 1883 1884 if (pmd_none(*src_pmd)) { 1885 if (!(mode & UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES)) { 1886 err = -ENOENT; 1887 break; 1888 } 1889 if (unlikely(__pte_alloc(mm, src_pmd))) { 1890 err = -ENOMEM; 1891 break; 1892 } 1893 } 1894 1895 if (unlikely(pte_alloc(mm, dst_pmd))) { 1896 err = -ENOMEM; 1897 break; 1898 } 1899 1900 ret = move_pages_ptes(mm, dst_pmd, src_pmd, 1901 dst_vma, src_vma, dst_addr, 1902 src_addr, src_end - src_addr, mode); 1903 if (ret < 0) 1904 err = ret; 1905 else 1906 step_size = ret; 1907 } 1908 1909 cond_resched(); 1910 1911 if (fatal_signal_pending(current)) { 1912 /* Do not override an error */ 1913 if (!err || err == -EAGAIN) 1914 err = -EINTR; 1915 break; 1916 } 1917 1918 if (err) { 1919 if (err == -EAGAIN) 1920 continue; 1921 break; 1922 } 1923 1924 /* Proceed to the next page */ 1925 dst_addr += step_size; 1926 src_addr += step_size; 1927 moved += step_size; 1928 } 1929 1930 out_unlock: 1931 up_read(&ctx->map_changing_lock); 1932 uffd_move_unlock(dst_vma, src_vma); 1933 out: 1934 VM_WARN_ON_ONCE(moved < 0); 1935 VM_WARN_ON_ONCE(err > 0); 1936 VM_WARN_ON_ONCE(!moved && !err); 1937 return moved ? moved : err; 1938 } 1939 1940 static void userfaultfd_set_vm_flags(struct vm_area_struct *vma, 1941 vm_flags_t vm_flags) 1942 { 1943 const bool uffd_wp_changed = (vma->vm_flags ^ vm_flags) & VM_UFFD_WP; 1944 1945 vm_flags_reset(vma, vm_flags); 1946 /* 1947 * For shared mappings, we want to enable writenotify while 1948 * userfaultfd-wp is enabled (see vma_wants_writenotify()). We'll simply 1949 * recalculate vma->vm_page_prot whenever userfaultfd-wp changes. 1950 */ 1951 if ((vma->vm_flags & VM_SHARED) && uffd_wp_changed) 1952 vma_set_page_prot(vma); 1953 } 1954 1955 static void userfaultfd_set_ctx(struct vm_area_struct *vma, 1956 struct userfaultfd_ctx *ctx, 1957 vm_flags_t vm_flags) 1958 { 1959 vma_start_write(vma); 1960 vma->vm_userfaultfd_ctx = (struct vm_userfaultfd_ctx){ctx}; 1961 userfaultfd_set_vm_flags(vma, 1962 (vma->vm_flags & ~__VM_UFFD_FLAGS) | vm_flags); 1963 } 1964 1965 void userfaultfd_reset_ctx(struct vm_area_struct *vma) 1966 { 1967 userfaultfd_set_ctx(vma, NULL, 0); 1968 } 1969 1970 struct vm_area_struct *userfaultfd_clear_vma(struct vma_iterator *vmi, 1971 struct vm_area_struct *prev, 1972 struct vm_area_struct *vma, 1973 unsigned long start, 1974 unsigned long end) 1975 { 1976 struct vm_area_struct *ret; 1977 bool give_up_on_oom = false; 1978 1979 /* 1980 * If we are modifying only and not splitting, just give up on the merge 1981 * if OOM prevents us from merging successfully. 1982 */ 1983 if (start == vma->vm_start && end == vma->vm_end) 1984 give_up_on_oom = true; 1985 1986 /* Reset ptes for the whole vma range if wr-protected */ 1987 if (userfaultfd_wp(vma)) 1988 uffd_wp_range(vma, start, end - start, false); 1989 1990 ret = vma_modify_flags_uffd(vmi, prev, vma, start, end, 1991 vma->vm_flags & ~__VM_UFFD_FLAGS, 1992 NULL_VM_UFFD_CTX, give_up_on_oom); 1993 1994 /* 1995 * In the vma_merge() successful mprotect-like case 8: 1996 * the next vma was merged into the current one and 1997 * the current one has not been updated yet. 1998 */ 1999 if (!IS_ERR(ret)) 2000 userfaultfd_reset_ctx(ret); 2001 2002 return ret; 2003 } 2004 2005 /* Assumes mmap write lock taken, and mm_struct pinned. */ 2006 int userfaultfd_register_range(struct userfaultfd_ctx *ctx, 2007 struct vm_area_struct *vma, 2008 vm_flags_t vm_flags, 2009 unsigned long start, unsigned long end, 2010 bool wp_async) 2011 { 2012 VMA_ITERATOR(vmi, ctx->mm, start); 2013 struct vm_area_struct *prev = vma_prev(&vmi); 2014 unsigned long vma_end; 2015 vm_flags_t new_flags; 2016 2017 if (vma->vm_start < start) 2018 prev = vma; 2019 2020 for_each_vma_range(vmi, vma, end) { 2021 cond_resched(); 2022 2023 VM_WARN_ON_ONCE(!vma_can_userfault(vma, vm_flags, wp_async)); 2024 VM_WARN_ON_ONCE(vma->vm_userfaultfd_ctx.ctx && 2025 vma->vm_userfaultfd_ctx.ctx != ctx); 2026 VM_WARN_ON_ONCE(!(vma->vm_flags & VM_MAYWRITE)); 2027 2028 /* 2029 * Nothing to do: this vma is already registered into this 2030 * userfaultfd and with the right tracking mode too. 2031 */ 2032 if (vma->vm_userfaultfd_ctx.ctx == ctx && 2033 (vma->vm_flags & vm_flags) == vm_flags) 2034 goto skip; 2035 2036 if (vma->vm_start > start) 2037 start = vma->vm_start; 2038 vma_end = min(end, vma->vm_end); 2039 2040 new_flags = (vma->vm_flags & ~__VM_UFFD_FLAGS) | vm_flags; 2041 vma = vma_modify_flags_uffd(&vmi, prev, vma, start, vma_end, 2042 new_flags, 2043 (struct vm_userfaultfd_ctx){ctx}, 2044 /* give_up_on_oom = */false); 2045 if (IS_ERR(vma)) 2046 return PTR_ERR(vma); 2047 2048 /* 2049 * In the vma_merge() successful mprotect-like case 8: 2050 * the next vma was merged into the current one and 2051 * the current one has not been updated yet. 2052 */ 2053 userfaultfd_set_ctx(vma, ctx, vm_flags); 2054 2055 if (is_vm_hugetlb_page(vma) && uffd_disable_huge_pmd_share(vma)) 2056 hugetlb_unshare_all_pmds(vma); 2057 2058 skip: 2059 prev = vma; 2060 start = vma->vm_end; 2061 } 2062 2063 return 0; 2064 } 2065 2066 void userfaultfd_release_new(struct userfaultfd_ctx *ctx) 2067 { 2068 struct mm_struct *mm = ctx->mm; 2069 struct vm_area_struct *vma; 2070 VMA_ITERATOR(vmi, mm, 0); 2071 2072 /* the various vma->vm_userfaultfd_ctx still points to it */ 2073 mmap_write_lock(mm); 2074 for_each_vma(vmi, vma) { 2075 if (vma->vm_userfaultfd_ctx.ctx == ctx) 2076 userfaultfd_reset_ctx(vma); 2077 } 2078 mmap_write_unlock(mm); 2079 } 2080 2081 void userfaultfd_release_all(struct mm_struct *mm, 2082 struct userfaultfd_ctx *ctx) 2083 { 2084 struct vm_area_struct *vma, *prev; 2085 VMA_ITERATOR(vmi, mm, 0); 2086 2087 if (!mmget_not_zero(mm)) 2088 return; 2089 2090 /* 2091 * Flush page faults out of all CPUs. NOTE: all page faults 2092 * must be retried without returning VM_FAULT_SIGBUS if 2093 * userfaultfd_ctx_get() succeeds but vma->vma_userfault_ctx 2094 * changes while handle_userfault released the mmap_lock. So 2095 * it's critical that released is set to true (above), before 2096 * taking the mmap_lock for writing. 2097 */ 2098 mmap_write_lock(mm); 2099 prev = NULL; 2100 for_each_vma(vmi, vma) { 2101 cond_resched(); 2102 VM_WARN_ON_ONCE(!!vma->vm_userfaultfd_ctx.ctx ^ 2103 !!(vma->vm_flags & __VM_UFFD_FLAGS)); 2104 if (vma->vm_userfaultfd_ctx.ctx != ctx) { 2105 prev = vma; 2106 continue; 2107 } 2108 2109 vma = userfaultfd_clear_vma(&vmi, prev, vma, 2110 vma->vm_start, vma->vm_end); 2111 prev = vma; 2112 } 2113 mmap_write_unlock(mm); 2114 mmput(mm); 2115 } 2116