1 // SPDX-License-Identifier: GPL-2.0-only 2 /* 3 * mm/userfaultfd.c 4 * 5 * Copyright (C) 2015 Red Hat, Inc. 6 */ 7 8 #include <linux/mm.h> 9 #include <linux/sched/signal.h> 10 #include <linux/pagemap.h> 11 #include <linux/rmap.h> 12 #include <linux/swap.h> 13 #include <linux/swapops.h> 14 #include <linux/userfaultfd_k.h> 15 #include <linux/mmu_notifier.h> 16 #include <linux/hugetlb.h> 17 #include <linux/shmem_fs.h> 18 #include <asm/tlbflush.h> 19 #include <asm/tlb.h> 20 #include "internal.h" 21 #include "swap.h" 22 23 static __always_inline 24 bool validate_dst_vma(struct vm_area_struct *dst_vma, unsigned long dst_end) 25 { 26 /* Make sure that the dst range is fully within dst_vma. */ 27 if (dst_end > dst_vma->vm_end) 28 return false; 29 30 /* 31 * Check the vma is registered in uffd, this is required to 32 * enforce the VM_MAYWRITE check done at uffd registration 33 * time. 34 */ 35 if (!dst_vma->vm_userfaultfd_ctx.ctx) 36 return false; 37 38 return true; 39 } 40 41 static __always_inline 42 struct vm_area_struct *find_vma_and_prepare_anon(struct mm_struct *mm, 43 unsigned long addr) 44 { 45 struct vm_area_struct *vma; 46 47 mmap_assert_locked(mm); 48 vma = vma_lookup(mm, addr); 49 if (!vma) 50 vma = ERR_PTR(-ENOENT); 51 else if (!(vma->vm_flags & VM_SHARED) && 52 unlikely(anon_vma_prepare(vma))) 53 vma = ERR_PTR(-ENOMEM); 54 55 return vma; 56 } 57 58 #ifdef CONFIG_PER_VMA_LOCK 59 /* 60 * uffd_lock_vma() - Lookup and lock vma corresponding to @address. 61 * @mm: mm to search vma in. 62 * @address: address that the vma should contain. 63 * 64 * Should be called without holding mmap_lock. 65 * 66 * Return: A locked vma containing @address, -ENOENT if no vma is found, or 67 * -ENOMEM if anon_vma couldn't be allocated. 68 */ 69 static struct vm_area_struct *uffd_lock_vma(struct mm_struct *mm, 70 unsigned long address) 71 { 72 struct vm_area_struct *vma; 73 74 vma = lock_vma_under_rcu(mm, address); 75 if (vma) { 76 /* 77 * We know we're going to need to use anon_vma, so check 78 * that early. 79 */ 80 if (!(vma->vm_flags & VM_SHARED) && unlikely(!vma->anon_vma)) 81 vma_end_read(vma); 82 else 83 return vma; 84 } 85 86 mmap_read_lock(mm); 87 vma = find_vma_and_prepare_anon(mm, address); 88 if (!IS_ERR(vma)) { 89 bool locked = vma_start_read_locked(vma); 90 91 if (!locked) 92 vma = ERR_PTR(-EAGAIN); 93 } 94 95 mmap_read_unlock(mm); 96 return vma; 97 } 98 99 static struct vm_area_struct *uffd_mfill_lock(struct mm_struct *dst_mm, 100 unsigned long dst_start, 101 unsigned long len) 102 { 103 struct vm_area_struct *dst_vma; 104 105 dst_vma = uffd_lock_vma(dst_mm, dst_start); 106 if (IS_ERR(dst_vma) || validate_dst_vma(dst_vma, dst_start + len)) 107 return dst_vma; 108 109 vma_end_read(dst_vma); 110 return ERR_PTR(-ENOENT); 111 } 112 113 static void uffd_mfill_unlock(struct vm_area_struct *vma) 114 { 115 vma_end_read(vma); 116 } 117 118 #else 119 120 static struct vm_area_struct *uffd_mfill_lock(struct mm_struct *dst_mm, 121 unsigned long dst_start, 122 unsigned long len) 123 { 124 struct vm_area_struct *dst_vma; 125 126 mmap_read_lock(dst_mm); 127 dst_vma = find_vma_and_prepare_anon(dst_mm, dst_start); 128 if (IS_ERR(dst_vma)) 129 goto out_unlock; 130 131 if (validate_dst_vma(dst_vma, dst_start + len)) 132 return dst_vma; 133 134 dst_vma = ERR_PTR(-ENOENT); 135 out_unlock: 136 mmap_read_unlock(dst_mm); 137 return dst_vma; 138 } 139 140 static void uffd_mfill_unlock(struct vm_area_struct *vma) 141 { 142 mmap_read_unlock(vma->vm_mm); 143 } 144 #endif 145 146 /* Check if dst_addr is outside of file's size. Must be called with ptl held. */ 147 static bool mfill_file_over_size(struct vm_area_struct *dst_vma, 148 unsigned long dst_addr) 149 { 150 struct inode *inode; 151 pgoff_t offset, max_off; 152 153 if (!dst_vma->vm_file) 154 return false; 155 156 inode = dst_vma->vm_file->f_inode; 157 offset = linear_page_index(dst_vma, dst_addr); 158 max_off = DIV_ROUND_UP(i_size_read(inode), PAGE_SIZE); 159 return offset >= max_off; 160 } 161 162 /* 163 * Install PTEs, to map dst_addr (within dst_vma) to page. 164 * 165 * This function handles both MCOPY_ATOMIC_NORMAL and _CONTINUE for both shmem 166 * and anon, and for both shared and private VMAs. 167 */ 168 int mfill_atomic_install_pte(pmd_t *dst_pmd, 169 struct vm_area_struct *dst_vma, 170 unsigned long dst_addr, struct page *page, 171 bool newly_allocated, uffd_flags_t flags) 172 { 173 int ret; 174 struct mm_struct *dst_mm = dst_vma->vm_mm; 175 pte_t _dst_pte, *dst_pte; 176 bool writable = dst_vma->vm_flags & VM_WRITE; 177 bool vm_shared = dst_vma->vm_flags & VM_SHARED; 178 spinlock_t *ptl; 179 struct folio *folio = page_folio(page); 180 bool page_in_cache = folio_mapping(folio); 181 182 _dst_pte = mk_pte(page, dst_vma->vm_page_prot); 183 _dst_pte = pte_mkdirty(_dst_pte); 184 if (page_in_cache && !vm_shared) 185 writable = false; 186 if (writable) 187 _dst_pte = pte_mkwrite(_dst_pte, dst_vma); 188 if (flags & MFILL_ATOMIC_WP) 189 _dst_pte = pte_mkuffd_wp(_dst_pte); 190 191 ret = -EAGAIN; 192 dst_pte = pte_offset_map_lock(dst_mm, dst_pmd, dst_addr, &ptl); 193 if (!dst_pte) 194 goto out; 195 196 if (mfill_file_over_size(dst_vma, dst_addr)) { 197 ret = -EFAULT; 198 goto out_unlock; 199 } 200 201 ret = -EEXIST; 202 /* 203 * We allow to overwrite a pte marker: consider when both MISSING|WP 204 * registered, we firstly wr-protect a none pte which has no page cache 205 * page backing it, then access the page. 206 */ 207 if (!pte_none_mostly(ptep_get(dst_pte))) 208 goto out_unlock; 209 210 if (page_in_cache) { 211 /* Usually, cache pages are already added to LRU */ 212 if (newly_allocated) 213 folio_add_lru(folio); 214 folio_add_file_rmap_pte(folio, page, dst_vma); 215 } else { 216 folio_add_new_anon_rmap(folio, dst_vma, dst_addr, RMAP_EXCLUSIVE); 217 folio_add_lru_vma(folio, dst_vma); 218 } 219 220 /* 221 * Must happen after rmap, as mm_counter() checks mapping (via 222 * PageAnon()), which is set by __page_set_anon_rmap(). 223 */ 224 inc_mm_counter(dst_mm, mm_counter(folio)); 225 226 set_pte_at(dst_mm, dst_addr, dst_pte, _dst_pte); 227 228 /* No need to invalidate - it was non-present before */ 229 update_mmu_cache(dst_vma, dst_addr, dst_pte); 230 ret = 0; 231 out_unlock: 232 pte_unmap_unlock(dst_pte, ptl); 233 out: 234 return ret; 235 } 236 237 static int mfill_atomic_pte_copy(pmd_t *dst_pmd, 238 struct vm_area_struct *dst_vma, 239 unsigned long dst_addr, 240 unsigned long src_addr, 241 uffd_flags_t flags, 242 struct folio **foliop) 243 { 244 void *kaddr; 245 int ret; 246 struct folio *folio; 247 248 if (!*foliop) { 249 ret = -ENOMEM; 250 folio = vma_alloc_folio(GFP_HIGHUSER_MOVABLE, 0, dst_vma, 251 dst_addr); 252 if (!folio) 253 goto out; 254 255 kaddr = kmap_local_folio(folio, 0); 256 /* 257 * The read mmap_lock is held here. Despite the 258 * mmap_lock being read recursive a deadlock is still 259 * possible if a writer has taken a lock. For example: 260 * 261 * process A thread 1 takes read lock on own mmap_lock 262 * process A thread 2 calls mmap, blocks taking write lock 263 * process B thread 1 takes page fault, read lock on own mmap lock 264 * process B thread 2 calls mmap, blocks taking write lock 265 * process A thread 1 blocks taking read lock on process B 266 * process B thread 1 blocks taking read lock on process A 267 * 268 * Disable page faults to prevent potential deadlock 269 * and retry the copy outside the mmap_lock. 270 */ 271 pagefault_disable(); 272 ret = copy_from_user(kaddr, (const void __user *) src_addr, 273 PAGE_SIZE); 274 pagefault_enable(); 275 kunmap_local(kaddr); 276 277 /* fallback to copy_from_user outside mmap_lock */ 278 if (unlikely(ret)) { 279 ret = -ENOENT; 280 *foliop = folio; 281 /* don't free the page */ 282 goto out; 283 } 284 285 flush_dcache_folio(folio); 286 } else { 287 folio = *foliop; 288 *foliop = NULL; 289 } 290 291 /* 292 * The memory barrier inside __folio_mark_uptodate makes sure that 293 * preceding stores to the page contents become visible before 294 * the set_pte_at() write. 295 */ 296 __folio_mark_uptodate(folio); 297 298 ret = -ENOMEM; 299 if (mem_cgroup_charge(folio, dst_vma->vm_mm, GFP_KERNEL)) 300 goto out_release; 301 302 ret = mfill_atomic_install_pte(dst_pmd, dst_vma, dst_addr, 303 &folio->page, true, flags); 304 if (ret) 305 goto out_release; 306 out: 307 return ret; 308 out_release: 309 folio_put(folio); 310 goto out; 311 } 312 313 static int mfill_atomic_pte_zeroed_folio(pmd_t *dst_pmd, 314 struct vm_area_struct *dst_vma, 315 unsigned long dst_addr) 316 { 317 struct folio *folio; 318 int ret = -ENOMEM; 319 320 folio = vma_alloc_zeroed_movable_folio(dst_vma, dst_addr); 321 if (!folio) 322 return ret; 323 324 if (mem_cgroup_charge(folio, dst_vma->vm_mm, GFP_KERNEL)) 325 goto out_put; 326 327 /* 328 * The memory barrier inside __folio_mark_uptodate makes sure that 329 * zeroing out the folio become visible before mapping the page 330 * using set_pte_at(). See do_anonymous_page(). 331 */ 332 __folio_mark_uptodate(folio); 333 334 ret = mfill_atomic_install_pte(dst_pmd, dst_vma, dst_addr, 335 &folio->page, true, 0); 336 if (ret) 337 goto out_put; 338 339 return 0; 340 out_put: 341 folio_put(folio); 342 return ret; 343 } 344 345 static int mfill_atomic_pte_zeropage(pmd_t *dst_pmd, 346 struct vm_area_struct *dst_vma, 347 unsigned long dst_addr) 348 { 349 pte_t _dst_pte, *dst_pte; 350 spinlock_t *ptl; 351 int ret; 352 353 if (mm_forbids_zeropage(dst_vma->vm_mm)) 354 return mfill_atomic_pte_zeroed_folio(dst_pmd, dst_vma, dst_addr); 355 356 _dst_pte = pte_mkspecial(pfn_pte(my_zero_pfn(dst_addr), 357 dst_vma->vm_page_prot)); 358 ret = -EAGAIN; 359 dst_pte = pte_offset_map_lock(dst_vma->vm_mm, dst_pmd, dst_addr, &ptl); 360 if (!dst_pte) 361 goto out; 362 if (mfill_file_over_size(dst_vma, dst_addr)) { 363 ret = -EFAULT; 364 goto out_unlock; 365 } 366 ret = -EEXIST; 367 if (!pte_none(ptep_get(dst_pte))) 368 goto out_unlock; 369 set_pte_at(dst_vma->vm_mm, dst_addr, dst_pte, _dst_pte); 370 /* No need to invalidate - it was non-present before */ 371 update_mmu_cache(dst_vma, dst_addr, dst_pte); 372 ret = 0; 373 out_unlock: 374 pte_unmap_unlock(dst_pte, ptl); 375 out: 376 return ret; 377 } 378 379 /* Handles UFFDIO_CONTINUE for all shmem VMAs (shared or private). */ 380 static int mfill_atomic_pte_continue(pmd_t *dst_pmd, 381 struct vm_area_struct *dst_vma, 382 unsigned long dst_addr, 383 uffd_flags_t flags) 384 { 385 struct inode *inode = file_inode(dst_vma->vm_file); 386 pgoff_t pgoff = linear_page_index(dst_vma, dst_addr); 387 struct folio *folio; 388 struct page *page; 389 int ret; 390 391 ret = shmem_get_folio(inode, pgoff, 0, &folio, SGP_NOALLOC); 392 /* Our caller expects us to return -EFAULT if we failed to find folio */ 393 if (ret == -ENOENT) 394 ret = -EFAULT; 395 if (ret) 396 goto out; 397 if (!folio) { 398 ret = -EFAULT; 399 goto out; 400 } 401 402 page = folio_file_page(folio, pgoff); 403 if (PageHWPoison(page)) { 404 ret = -EIO; 405 goto out_release; 406 } 407 408 ret = mfill_atomic_install_pte(dst_pmd, dst_vma, dst_addr, 409 page, false, flags); 410 if (ret) 411 goto out_release; 412 413 folio_unlock(folio); 414 ret = 0; 415 out: 416 return ret; 417 out_release: 418 folio_unlock(folio); 419 folio_put(folio); 420 goto out; 421 } 422 423 /* Handles UFFDIO_POISON for all non-hugetlb VMAs. */ 424 static int mfill_atomic_pte_poison(pmd_t *dst_pmd, 425 struct vm_area_struct *dst_vma, 426 unsigned long dst_addr, 427 uffd_flags_t flags) 428 { 429 int ret; 430 struct mm_struct *dst_mm = dst_vma->vm_mm; 431 pte_t _dst_pte, *dst_pte; 432 spinlock_t *ptl; 433 434 _dst_pte = make_pte_marker(PTE_MARKER_POISONED); 435 ret = -EAGAIN; 436 dst_pte = pte_offset_map_lock(dst_mm, dst_pmd, dst_addr, &ptl); 437 if (!dst_pte) 438 goto out; 439 440 if (mfill_file_over_size(dst_vma, dst_addr)) { 441 ret = -EFAULT; 442 goto out_unlock; 443 } 444 445 ret = -EEXIST; 446 /* Refuse to overwrite any PTE, even a PTE marker (e.g. UFFD WP). */ 447 if (!pte_none(ptep_get(dst_pte))) 448 goto out_unlock; 449 450 set_pte_at(dst_mm, dst_addr, dst_pte, _dst_pte); 451 452 /* No need to invalidate - it was non-present before */ 453 update_mmu_cache(dst_vma, dst_addr, dst_pte); 454 ret = 0; 455 out_unlock: 456 pte_unmap_unlock(dst_pte, ptl); 457 out: 458 return ret; 459 } 460 461 static pmd_t *mm_alloc_pmd(struct mm_struct *mm, unsigned long address) 462 { 463 pgd_t *pgd; 464 p4d_t *p4d; 465 pud_t *pud; 466 467 pgd = pgd_offset(mm, address); 468 p4d = p4d_alloc(mm, pgd, address); 469 if (!p4d) 470 return NULL; 471 pud = pud_alloc(mm, p4d, address); 472 if (!pud) 473 return NULL; 474 /* 475 * Note that we didn't run this because the pmd was 476 * missing, the *pmd may be already established and in 477 * turn it may also be a trans_huge_pmd. 478 */ 479 return pmd_alloc(mm, pud, address); 480 } 481 482 #ifdef CONFIG_HUGETLB_PAGE 483 /* 484 * mfill_atomic processing for HUGETLB vmas. Note that this routine is 485 * called with either vma-lock or mmap_lock held, it will release the lock 486 * before returning. 487 */ 488 static __always_inline ssize_t mfill_atomic_hugetlb( 489 struct userfaultfd_ctx *ctx, 490 struct vm_area_struct *dst_vma, 491 unsigned long dst_start, 492 unsigned long src_start, 493 unsigned long len, 494 uffd_flags_t flags) 495 { 496 struct mm_struct *dst_mm = dst_vma->vm_mm; 497 ssize_t err; 498 pte_t *dst_pte; 499 unsigned long src_addr, dst_addr; 500 long copied; 501 struct folio *folio; 502 unsigned long vma_hpagesize; 503 pgoff_t idx; 504 u32 hash; 505 struct address_space *mapping; 506 507 /* 508 * There is no default zero huge page for all huge page sizes as 509 * supported by hugetlb. A PMD_SIZE huge pages may exist as used 510 * by THP. Since we can not reliably insert a zero page, this 511 * feature is not supported. 512 */ 513 if (uffd_flags_mode_is(flags, MFILL_ATOMIC_ZEROPAGE)) { 514 up_read(&ctx->map_changing_lock); 515 uffd_mfill_unlock(dst_vma); 516 return -EINVAL; 517 } 518 519 src_addr = src_start; 520 dst_addr = dst_start; 521 copied = 0; 522 folio = NULL; 523 vma_hpagesize = vma_kernel_pagesize(dst_vma); 524 525 /* 526 * Validate alignment based on huge page size 527 */ 528 err = -EINVAL; 529 if (dst_start & (vma_hpagesize - 1) || len & (vma_hpagesize - 1)) 530 goto out_unlock; 531 532 retry: 533 /* 534 * On routine entry dst_vma is set. If we had to drop mmap_lock and 535 * retry, dst_vma will be set to NULL and we must lookup again. 536 */ 537 if (!dst_vma) { 538 dst_vma = uffd_mfill_lock(dst_mm, dst_start, len); 539 if (IS_ERR(dst_vma)) { 540 err = PTR_ERR(dst_vma); 541 goto out; 542 } 543 544 err = -ENOENT; 545 if (!is_vm_hugetlb_page(dst_vma)) 546 goto out_unlock_vma; 547 548 err = -EINVAL; 549 if (vma_hpagesize != vma_kernel_pagesize(dst_vma)) 550 goto out_unlock_vma; 551 552 /* 553 * If memory mappings are changing because of non-cooperative 554 * operation (e.g. mremap) running in parallel, bail out and 555 * request the user to retry later 556 */ 557 down_read(&ctx->map_changing_lock); 558 err = -EAGAIN; 559 if (atomic_read(&ctx->mmap_changing)) 560 goto out_unlock; 561 } 562 563 while (src_addr < src_start + len) { 564 BUG_ON(dst_addr >= dst_start + len); 565 566 /* 567 * Serialize via vma_lock and hugetlb_fault_mutex. 568 * vma_lock ensures the dst_pte remains valid even 569 * in the case of shared pmds. fault mutex prevents 570 * races with other faulting threads. 571 */ 572 idx = linear_page_index(dst_vma, dst_addr); 573 mapping = dst_vma->vm_file->f_mapping; 574 hash = hugetlb_fault_mutex_hash(mapping, idx); 575 mutex_lock(&hugetlb_fault_mutex_table[hash]); 576 hugetlb_vma_lock_read(dst_vma); 577 578 err = -ENOMEM; 579 dst_pte = huge_pte_alloc(dst_mm, dst_vma, dst_addr, vma_hpagesize); 580 if (!dst_pte) { 581 hugetlb_vma_unlock_read(dst_vma); 582 mutex_unlock(&hugetlb_fault_mutex_table[hash]); 583 goto out_unlock; 584 } 585 586 if (!uffd_flags_mode_is(flags, MFILL_ATOMIC_CONTINUE) && 587 !huge_pte_none_mostly(huge_ptep_get(dst_mm, dst_addr, dst_pte))) { 588 err = -EEXIST; 589 hugetlb_vma_unlock_read(dst_vma); 590 mutex_unlock(&hugetlb_fault_mutex_table[hash]); 591 goto out_unlock; 592 } 593 594 err = hugetlb_mfill_atomic_pte(dst_pte, dst_vma, dst_addr, 595 src_addr, flags, &folio); 596 597 hugetlb_vma_unlock_read(dst_vma); 598 mutex_unlock(&hugetlb_fault_mutex_table[hash]); 599 600 cond_resched(); 601 602 if (unlikely(err == -ENOENT)) { 603 up_read(&ctx->map_changing_lock); 604 uffd_mfill_unlock(dst_vma); 605 BUG_ON(!folio); 606 607 err = copy_folio_from_user(folio, 608 (const void __user *)src_addr, true); 609 if (unlikely(err)) { 610 err = -EFAULT; 611 goto out; 612 } 613 614 dst_vma = NULL; 615 goto retry; 616 } else 617 BUG_ON(folio); 618 619 if (!err) { 620 dst_addr += vma_hpagesize; 621 src_addr += vma_hpagesize; 622 copied += vma_hpagesize; 623 624 if (fatal_signal_pending(current)) 625 err = -EINTR; 626 } 627 if (err) 628 break; 629 } 630 631 out_unlock: 632 up_read(&ctx->map_changing_lock); 633 out_unlock_vma: 634 uffd_mfill_unlock(dst_vma); 635 out: 636 if (folio) 637 folio_put(folio); 638 BUG_ON(copied < 0); 639 BUG_ON(err > 0); 640 BUG_ON(!copied && !err); 641 return copied ? copied : err; 642 } 643 #else /* !CONFIG_HUGETLB_PAGE */ 644 /* fail at build time if gcc attempts to use this */ 645 extern ssize_t mfill_atomic_hugetlb(struct userfaultfd_ctx *ctx, 646 struct vm_area_struct *dst_vma, 647 unsigned long dst_start, 648 unsigned long src_start, 649 unsigned long len, 650 uffd_flags_t flags); 651 #endif /* CONFIG_HUGETLB_PAGE */ 652 653 static __always_inline ssize_t mfill_atomic_pte(pmd_t *dst_pmd, 654 struct vm_area_struct *dst_vma, 655 unsigned long dst_addr, 656 unsigned long src_addr, 657 uffd_flags_t flags, 658 struct folio **foliop) 659 { 660 ssize_t err; 661 662 if (uffd_flags_mode_is(flags, MFILL_ATOMIC_CONTINUE)) { 663 return mfill_atomic_pte_continue(dst_pmd, dst_vma, 664 dst_addr, flags); 665 } else if (uffd_flags_mode_is(flags, MFILL_ATOMIC_POISON)) { 666 return mfill_atomic_pte_poison(dst_pmd, dst_vma, 667 dst_addr, flags); 668 } 669 670 /* 671 * The normal page fault path for a shmem will invoke the 672 * fault, fill the hole in the file and COW it right away. The 673 * result generates plain anonymous memory. So when we are 674 * asked to fill an hole in a MAP_PRIVATE shmem mapping, we'll 675 * generate anonymous memory directly without actually filling 676 * the hole. For the MAP_PRIVATE case the robustness check 677 * only happens in the pagetable (to verify it's still none) 678 * and not in the radix tree. 679 */ 680 if (!(dst_vma->vm_flags & VM_SHARED)) { 681 if (uffd_flags_mode_is(flags, MFILL_ATOMIC_COPY)) 682 err = mfill_atomic_pte_copy(dst_pmd, dst_vma, 683 dst_addr, src_addr, 684 flags, foliop); 685 else 686 err = mfill_atomic_pte_zeropage(dst_pmd, 687 dst_vma, dst_addr); 688 } else { 689 err = shmem_mfill_atomic_pte(dst_pmd, dst_vma, 690 dst_addr, src_addr, 691 flags, foliop); 692 } 693 694 return err; 695 } 696 697 static __always_inline ssize_t mfill_atomic(struct userfaultfd_ctx *ctx, 698 unsigned long dst_start, 699 unsigned long src_start, 700 unsigned long len, 701 uffd_flags_t flags) 702 { 703 struct mm_struct *dst_mm = ctx->mm; 704 struct vm_area_struct *dst_vma; 705 ssize_t err; 706 pmd_t *dst_pmd; 707 unsigned long src_addr, dst_addr; 708 long copied; 709 struct folio *folio; 710 711 /* 712 * Sanitize the command parameters: 713 */ 714 BUG_ON(dst_start & ~PAGE_MASK); 715 BUG_ON(len & ~PAGE_MASK); 716 717 /* Does the address range wrap, or is the span zero-sized? */ 718 BUG_ON(src_start + len <= src_start); 719 BUG_ON(dst_start + len <= dst_start); 720 721 src_addr = src_start; 722 dst_addr = dst_start; 723 copied = 0; 724 folio = NULL; 725 retry: 726 /* 727 * Make sure the vma is not shared, that the dst range is 728 * both valid and fully within a single existing vma. 729 */ 730 dst_vma = uffd_mfill_lock(dst_mm, dst_start, len); 731 if (IS_ERR(dst_vma)) { 732 err = PTR_ERR(dst_vma); 733 goto out; 734 } 735 736 /* 737 * If memory mappings are changing because of non-cooperative 738 * operation (e.g. mremap) running in parallel, bail out and 739 * request the user to retry later 740 */ 741 down_read(&ctx->map_changing_lock); 742 err = -EAGAIN; 743 if (atomic_read(&ctx->mmap_changing)) 744 goto out_unlock; 745 746 err = -EINVAL; 747 /* 748 * shmem_zero_setup is invoked in mmap for MAP_ANONYMOUS|MAP_SHARED but 749 * it will overwrite vm_ops, so vma_is_anonymous must return false. 750 */ 751 if (WARN_ON_ONCE(vma_is_anonymous(dst_vma) && 752 dst_vma->vm_flags & VM_SHARED)) 753 goto out_unlock; 754 755 /* 756 * validate 'mode' now that we know the dst_vma: don't allow 757 * a wrprotect copy if the userfaultfd didn't register as WP. 758 */ 759 if ((flags & MFILL_ATOMIC_WP) && !(dst_vma->vm_flags & VM_UFFD_WP)) 760 goto out_unlock; 761 762 /* 763 * If this is a HUGETLB vma, pass off to appropriate routine 764 */ 765 if (is_vm_hugetlb_page(dst_vma)) 766 return mfill_atomic_hugetlb(ctx, dst_vma, dst_start, 767 src_start, len, flags); 768 769 if (!vma_is_anonymous(dst_vma) && !vma_is_shmem(dst_vma)) 770 goto out_unlock; 771 if (!vma_is_shmem(dst_vma) && 772 uffd_flags_mode_is(flags, MFILL_ATOMIC_CONTINUE)) 773 goto out_unlock; 774 775 while (src_addr < src_start + len) { 776 pmd_t dst_pmdval; 777 778 BUG_ON(dst_addr >= dst_start + len); 779 780 dst_pmd = mm_alloc_pmd(dst_mm, dst_addr); 781 if (unlikely(!dst_pmd)) { 782 err = -ENOMEM; 783 break; 784 } 785 786 dst_pmdval = pmdp_get_lockless(dst_pmd); 787 if (unlikely(pmd_none(dst_pmdval)) && 788 unlikely(__pte_alloc(dst_mm, dst_pmd))) { 789 err = -ENOMEM; 790 break; 791 } 792 dst_pmdval = pmdp_get_lockless(dst_pmd); 793 /* 794 * If the dst_pmd is THP don't override it and just be strict. 795 * (This includes the case where the PMD used to be THP and 796 * changed back to none after __pte_alloc().) 797 */ 798 if (unlikely(!pmd_present(dst_pmdval) || pmd_trans_huge(dst_pmdval) || 799 pmd_devmap(dst_pmdval))) { 800 err = -EEXIST; 801 break; 802 } 803 if (unlikely(pmd_bad(dst_pmdval))) { 804 err = -EFAULT; 805 break; 806 } 807 /* 808 * For shmem mappings, khugepaged is allowed to remove page 809 * tables under us; pte_offset_map_lock() will deal with that. 810 */ 811 812 err = mfill_atomic_pte(dst_pmd, dst_vma, dst_addr, 813 src_addr, flags, &folio); 814 cond_resched(); 815 816 if (unlikely(err == -ENOENT)) { 817 void *kaddr; 818 819 up_read(&ctx->map_changing_lock); 820 uffd_mfill_unlock(dst_vma); 821 BUG_ON(!folio); 822 823 kaddr = kmap_local_folio(folio, 0); 824 err = copy_from_user(kaddr, 825 (const void __user *) src_addr, 826 PAGE_SIZE); 827 kunmap_local(kaddr); 828 if (unlikely(err)) { 829 err = -EFAULT; 830 goto out; 831 } 832 flush_dcache_folio(folio); 833 goto retry; 834 } else 835 BUG_ON(folio); 836 837 if (!err) { 838 dst_addr += PAGE_SIZE; 839 src_addr += PAGE_SIZE; 840 copied += PAGE_SIZE; 841 842 if (fatal_signal_pending(current)) 843 err = -EINTR; 844 } 845 if (err) 846 break; 847 } 848 849 out_unlock: 850 up_read(&ctx->map_changing_lock); 851 uffd_mfill_unlock(dst_vma); 852 out: 853 if (folio) 854 folio_put(folio); 855 BUG_ON(copied < 0); 856 BUG_ON(err > 0); 857 BUG_ON(!copied && !err); 858 return copied ? copied : err; 859 } 860 861 ssize_t mfill_atomic_copy(struct userfaultfd_ctx *ctx, unsigned long dst_start, 862 unsigned long src_start, unsigned long len, 863 uffd_flags_t flags) 864 { 865 return mfill_atomic(ctx, dst_start, src_start, len, 866 uffd_flags_set_mode(flags, MFILL_ATOMIC_COPY)); 867 } 868 869 ssize_t mfill_atomic_zeropage(struct userfaultfd_ctx *ctx, 870 unsigned long start, 871 unsigned long len) 872 { 873 return mfill_atomic(ctx, start, 0, len, 874 uffd_flags_set_mode(0, MFILL_ATOMIC_ZEROPAGE)); 875 } 876 877 ssize_t mfill_atomic_continue(struct userfaultfd_ctx *ctx, unsigned long start, 878 unsigned long len, uffd_flags_t flags) 879 { 880 881 /* 882 * A caller might reasonably assume that UFFDIO_CONTINUE contains an 883 * smp_wmb() to ensure that any writes to the about-to-be-mapped page by 884 * the thread doing the UFFDIO_CONTINUE are guaranteed to be visible to 885 * subsequent loads from the page through the newly mapped address range. 886 */ 887 smp_wmb(); 888 889 return mfill_atomic(ctx, start, 0, len, 890 uffd_flags_set_mode(flags, MFILL_ATOMIC_CONTINUE)); 891 } 892 893 ssize_t mfill_atomic_poison(struct userfaultfd_ctx *ctx, unsigned long start, 894 unsigned long len, uffd_flags_t flags) 895 { 896 return mfill_atomic(ctx, start, 0, len, 897 uffd_flags_set_mode(flags, MFILL_ATOMIC_POISON)); 898 } 899 900 long uffd_wp_range(struct vm_area_struct *dst_vma, 901 unsigned long start, unsigned long len, bool enable_wp) 902 { 903 unsigned int mm_cp_flags; 904 struct mmu_gather tlb; 905 long ret; 906 907 VM_WARN_ONCE(start < dst_vma->vm_start || start + len > dst_vma->vm_end, 908 "The address range exceeds VMA boundary.\n"); 909 if (enable_wp) 910 mm_cp_flags = MM_CP_UFFD_WP; 911 else 912 mm_cp_flags = MM_CP_UFFD_WP_RESOLVE; 913 914 /* 915 * vma->vm_page_prot already reflects that uffd-wp is enabled for this 916 * VMA (see userfaultfd_set_vm_flags()) and that all PTEs are supposed 917 * to be write-protected as default whenever protection changes. 918 * Try upgrading write permissions manually. 919 */ 920 if (!enable_wp && vma_wants_manual_pte_write_upgrade(dst_vma)) 921 mm_cp_flags |= MM_CP_TRY_CHANGE_WRITABLE; 922 tlb_gather_mmu(&tlb, dst_vma->vm_mm); 923 ret = change_protection(&tlb, dst_vma, start, start + len, mm_cp_flags); 924 tlb_finish_mmu(&tlb); 925 926 return ret; 927 } 928 929 int mwriteprotect_range(struct userfaultfd_ctx *ctx, unsigned long start, 930 unsigned long len, bool enable_wp) 931 { 932 struct mm_struct *dst_mm = ctx->mm; 933 unsigned long end = start + len; 934 unsigned long _start, _end; 935 struct vm_area_struct *dst_vma; 936 unsigned long page_mask; 937 long err; 938 VMA_ITERATOR(vmi, dst_mm, start); 939 940 /* 941 * Sanitize the command parameters: 942 */ 943 BUG_ON(start & ~PAGE_MASK); 944 BUG_ON(len & ~PAGE_MASK); 945 946 /* Does the address range wrap, or is the span zero-sized? */ 947 BUG_ON(start + len <= start); 948 949 mmap_read_lock(dst_mm); 950 951 /* 952 * If memory mappings are changing because of non-cooperative 953 * operation (e.g. mremap) running in parallel, bail out and 954 * request the user to retry later 955 */ 956 down_read(&ctx->map_changing_lock); 957 err = -EAGAIN; 958 if (atomic_read(&ctx->mmap_changing)) 959 goto out_unlock; 960 961 err = -ENOENT; 962 for_each_vma_range(vmi, dst_vma, end) { 963 964 if (!userfaultfd_wp(dst_vma)) { 965 err = -ENOENT; 966 break; 967 } 968 969 if (is_vm_hugetlb_page(dst_vma)) { 970 err = -EINVAL; 971 page_mask = vma_kernel_pagesize(dst_vma) - 1; 972 if ((start & page_mask) || (len & page_mask)) 973 break; 974 } 975 976 _start = max(dst_vma->vm_start, start); 977 _end = min(dst_vma->vm_end, end); 978 979 err = uffd_wp_range(dst_vma, _start, _end - _start, enable_wp); 980 981 /* Return 0 on success, <0 on failures */ 982 if (err < 0) 983 break; 984 err = 0; 985 } 986 out_unlock: 987 up_read(&ctx->map_changing_lock); 988 mmap_read_unlock(dst_mm); 989 return err; 990 } 991 992 993 void double_pt_lock(spinlock_t *ptl1, 994 spinlock_t *ptl2) 995 __acquires(ptl1) 996 __acquires(ptl2) 997 { 998 if (ptl1 > ptl2) 999 swap(ptl1, ptl2); 1000 /* lock in virtual address order to avoid lock inversion */ 1001 spin_lock(ptl1); 1002 if (ptl1 != ptl2) 1003 spin_lock_nested(ptl2, SINGLE_DEPTH_NESTING); 1004 else 1005 __acquire(ptl2); 1006 } 1007 1008 void double_pt_unlock(spinlock_t *ptl1, 1009 spinlock_t *ptl2) 1010 __releases(ptl1) 1011 __releases(ptl2) 1012 { 1013 spin_unlock(ptl1); 1014 if (ptl1 != ptl2) 1015 spin_unlock(ptl2); 1016 else 1017 __release(ptl2); 1018 } 1019 1020 static inline bool is_pte_pages_stable(pte_t *dst_pte, pte_t *src_pte, 1021 pte_t orig_dst_pte, pte_t orig_src_pte, 1022 pmd_t *dst_pmd, pmd_t dst_pmdval) 1023 { 1024 return pte_same(ptep_get(src_pte), orig_src_pte) && 1025 pte_same(ptep_get(dst_pte), orig_dst_pte) && 1026 pmd_same(dst_pmdval, pmdp_get_lockless(dst_pmd)); 1027 } 1028 1029 static int move_present_pte(struct mm_struct *mm, 1030 struct vm_area_struct *dst_vma, 1031 struct vm_area_struct *src_vma, 1032 unsigned long dst_addr, unsigned long src_addr, 1033 pte_t *dst_pte, pte_t *src_pte, 1034 pte_t orig_dst_pte, pte_t orig_src_pte, 1035 pmd_t *dst_pmd, pmd_t dst_pmdval, 1036 spinlock_t *dst_ptl, spinlock_t *src_ptl, 1037 struct folio *src_folio) 1038 { 1039 int err = 0; 1040 1041 double_pt_lock(dst_ptl, src_ptl); 1042 1043 if (!is_pte_pages_stable(dst_pte, src_pte, orig_dst_pte, orig_src_pte, 1044 dst_pmd, dst_pmdval)) { 1045 err = -EAGAIN; 1046 goto out; 1047 } 1048 if (folio_test_large(src_folio) || 1049 folio_maybe_dma_pinned(src_folio) || 1050 !PageAnonExclusive(&src_folio->page)) { 1051 err = -EBUSY; 1052 goto out; 1053 } 1054 1055 orig_src_pte = ptep_clear_flush(src_vma, src_addr, src_pte); 1056 /* Folio got pinned from under us. Put it back and fail the move. */ 1057 if (folio_maybe_dma_pinned(src_folio)) { 1058 set_pte_at(mm, src_addr, src_pte, orig_src_pte); 1059 err = -EBUSY; 1060 goto out; 1061 } 1062 1063 folio_move_anon_rmap(src_folio, dst_vma); 1064 src_folio->index = linear_page_index(dst_vma, dst_addr); 1065 1066 orig_dst_pte = folio_mk_pte(src_folio, dst_vma->vm_page_prot); 1067 /* Set soft dirty bit so userspace can notice the pte was moved */ 1068 #ifdef CONFIG_MEM_SOFT_DIRTY 1069 orig_dst_pte = pte_mksoft_dirty(orig_dst_pte); 1070 #endif 1071 if (pte_dirty(orig_src_pte)) 1072 orig_dst_pte = pte_mkdirty(orig_dst_pte); 1073 orig_dst_pte = pte_mkwrite(orig_dst_pte, dst_vma); 1074 1075 set_pte_at(mm, dst_addr, dst_pte, orig_dst_pte); 1076 out: 1077 double_pt_unlock(dst_ptl, src_ptl); 1078 return err; 1079 } 1080 1081 static int move_swap_pte(struct mm_struct *mm, struct vm_area_struct *dst_vma, 1082 unsigned long dst_addr, unsigned long src_addr, 1083 pte_t *dst_pte, pte_t *src_pte, 1084 pte_t orig_dst_pte, pte_t orig_src_pte, 1085 pmd_t *dst_pmd, pmd_t dst_pmdval, 1086 spinlock_t *dst_ptl, spinlock_t *src_ptl, 1087 struct folio *src_folio) 1088 { 1089 double_pt_lock(dst_ptl, src_ptl); 1090 1091 if (!is_pte_pages_stable(dst_pte, src_pte, orig_dst_pte, orig_src_pte, 1092 dst_pmd, dst_pmdval)) { 1093 double_pt_unlock(dst_ptl, src_ptl); 1094 return -EAGAIN; 1095 } 1096 1097 /* 1098 * The src_folio resides in the swapcache, requiring an update to its 1099 * index and mapping to align with the dst_vma, where a swap-in may 1100 * occur and hit the swapcache after moving the PTE. 1101 */ 1102 if (src_folio) { 1103 folio_move_anon_rmap(src_folio, dst_vma); 1104 src_folio->index = linear_page_index(dst_vma, dst_addr); 1105 } 1106 1107 orig_src_pte = ptep_get_and_clear(mm, src_addr, src_pte); 1108 #ifdef CONFIG_MEM_SOFT_DIRTY 1109 orig_src_pte = pte_swp_mksoft_dirty(orig_src_pte); 1110 #endif 1111 set_pte_at(mm, dst_addr, dst_pte, orig_src_pte); 1112 double_pt_unlock(dst_ptl, src_ptl); 1113 1114 return 0; 1115 } 1116 1117 static int move_zeropage_pte(struct mm_struct *mm, 1118 struct vm_area_struct *dst_vma, 1119 struct vm_area_struct *src_vma, 1120 unsigned long dst_addr, unsigned long src_addr, 1121 pte_t *dst_pte, pte_t *src_pte, 1122 pte_t orig_dst_pte, pte_t orig_src_pte, 1123 pmd_t *dst_pmd, pmd_t dst_pmdval, 1124 spinlock_t *dst_ptl, spinlock_t *src_ptl) 1125 { 1126 pte_t zero_pte; 1127 1128 double_pt_lock(dst_ptl, src_ptl); 1129 if (!is_pte_pages_stable(dst_pte, src_pte, orig_dst_pte, orig_src_pte, 1130 dst_pmd, dst_pmdval)) { 1131 double_pt_unlock(dst_ptl, src_ptl); 1132 return -EAGAIN; 1133 } 1134 1135 zero_pte = pte_mkspecial(pfn_pte(my_zero_pfn(dst_addr), 1136 dst_vma->vm_page_prot)); 1137 ptep_clear_flush(src_vma, src_addr, src_pte); 1138 set_pte_at(mm, dst_addr, dst_pte, zero_pte); 1139 double_pt_unlock(dst_ptl, src_ptl); 1140 1141 return 0; 1142 } 1143 1144 1145 /* 1146 * The mmap_lock for reading is held by the caller. Just move the page 1147 * from src_pmd to dst_pmd if possible, and return true if succeeded 1148 * in moving the page. 1149 */ 1150 static int move_pages_pte(struct mm_struct *mm, pmd_t *dst_pmd, pmd_t *src_pmd, 1151 struct vm_area_struct *dst_vma, 1152 struct vm_area_struct *src_vma, 1153 unsigned long dst_addr, unsigned long src_addr, 1154 __u64 mode) 1155 { 1156 swp_entry_t entry; 1157 struct swap_info_struct *si = NULL; 1158 pte_t orig_src_pte, orig_dst_pte; 1159 pte_t src_folio_pte; 1160 spinlock_t *src_ptl, *dst_ptl; 1161 pte_t *src_pte = NULL; 1162 pte_t *dst_pte = NULL; 1163 pmd_t dummy_pmdval; 1164 pmd_t dst_pmdval; 1165 struct folio *src_folio = NULL; 1166 struct anon_vma *src_anon_vma = NULL; 1167 struct mmu_notifier_range range; 1168 int err = 0; 1169 1170 flush_cache_range(src_vma, src_addr, src_addr + PAGE_SIZE); 1171 mmu_notifier_range_init(&range, MMU_NOTIFY_CLEAR, 0, mm, 1172 src_addr, src_addr + PAGE_SIZE); 1173 mmu_notifier_invalidate_range_start(&range); 1174 retry: 1175 /* 1176 * Use the maywrite version to indicate that dst_pte will be modified, 1177 * since dst_pte needs to be none, the subsequent pte_same() check 1178 * cannot prevent the dst_pte page from being freed concurrently, so we 1179 * also need to abtain dst_pmdval and recheck pmd_same() later. 1180 */ 1181 dst_pte = pte_offset_map_rw_nolock(mm, dst_pmd, dst_addr, &dst_pmdval, 1182 &dst_ptl); 1183 1184 /* Retry if a huge pmd materialized from under us */ 1185 if (unlikely(!dst_pte)) { 1186 err = -EAGAIN; 1187 goto out; 1188 } 1189 1190 /* 1191 * Unlike dst_pte, the subsequent pte_same() check can ensure the 1192 * stability of the src_pte page, so there is no need to get pmdval, 1193 * just pass a dummy variable to it. 1194 */ 1195 src_pte = pte_offset_map_rw_nolock(mm, src_pmd, src_addr, &dummy_pmdval, 1196 &src_ptl); 1197 1198 /* 1199 * We held the mmap_lock for reading so MADV_DONTNEED 1200 * can zap transparent huge pages under us, or the 1201 * transparent huge page fault can establish new 1202 * transparent huge pages under us. 1203 */ 1204 if (unlikely(!src_pte)) { 1205 err = -EAGAIN; 1206 goto out; 1207 } 1208 1209 /* Sanity checks before the operation */ 1210 if (pmd_none(*dst_pmd) || pmd_none(*src_pmd) || 1211 pmd_trans_huge(*dst_pmd) || pmd_trans_huge(*src_pmd)) { 1212 err = -EINVAL; 1213 goto out; 1214 } 1215 1216 spin_lock(dst_ptl); 1217 orig_dst_pte = ptep_get(dst_pte); 1218 spin_unlock(dst_ptl); 1219 if (!pte_none(orig_dst_pte)) { 1220 err = -EEXIST; 1221 goto out; 1222 } 1223 1224 spin_lock(src_ptl); 1225 orig_src_pte = ptep_get(src_pte); 1226 spin_unlock(src_ptl); 1227 if (pte_none(orig_src_pte)) { 1228 if (!(mode & UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES)) 1229 err = -ENOENT; 1230 else /* nothing to do to move a hole */ 1231 err = 0; 1232 goto out; 1233 } 1234 1235 /* If PTE changed after we locked the folio them start over */ 1236 if (src_folio && unlikely(!pte_same(src_folio_pte, orig_src_pte))) { 1237 err = -EAGAIN; 1238 goto out; 1239 } 1240 1241 if (pte_present(orig_src_pte)) { 1242 if (is_zero_pfn(pte_pfn(orig_src_pte))) { 1243 err = move_zeropage_pte(mm, dst_vma, src_vma, 1244 dst_addr, src_addr, dst_pte, src_pte, 1245 orig_dst_pte, orig_src_pte, 1246 dst_pmd, dst_pmdval, dst_ptl, src_ptl); 1247 goto out; 1248 } 1249 1250 /* 1251 * Pin and lock both source folio and anon_vma. Since we are in 1252 * RCU read section, we can't block, so on contention have to 1253 * unmap the ptes, obtain the lock and retry. 1254 */ 1255 if (!src_folio) { 1256 struct folio *folio; 1257 bool locked; 1258 1259 /* 1260 * Pin the page while holding the lock to be sure the 1261 * page isn't freed under us 1262 */ 1263 spin_lock(src_ptl); 1264 if (!pte_same(orig_src_pte, ptep_get(src_pte))) { 1265 spin_unlock(src_ptl); 1266 err = -EAGAIN; 1267 goto out; 1268 } 1269 1270 folio = vm_normal_folio(src_vma, src_addr, orig_src_pte); 1271 if (!folio || !PageAnonExclusive(&folio->page)) { 1272 spin_unlock(src_ptl); 1273 err = -EBUSY; 1274 goto out; 1275 } 1276 1277 locked = folio_trylock(folio); 1278 /* 1279 * We avoid waiting for folio lock with a raised 1280 * refcount for large folios because extra refcounts 1281 * will result in split_folio() failing later and 1282 * retrying. If multiple tasks are trying to move a 1283 * large folio we can end up livelocking. 1284 */ 1285 if (!locked && folio_test_large(folio)) { 1286 spin_unlock(src_ptl); 1287 err = -EAGAIN; 1288 goto out; 1289 } 1290 1291 folio_get(folio); 1292 src_folio = folio; 1293 src_folio_pte = orig_src_pte; 1294 spin_unlock(src_ptl); 1295 1296 if (!locked) { 1297 pte_unmap(src_pte); 1298 pte_unmap(dst_pte); 1299 src_pte = dst_pte = NULL; 1300 /* now we can block and wait */ 1301 folio_lock(src_folio); 1302 goto retry; 1303 } 1304 1305 if (WARN_ON_ONCE(!folio_test_anon(src_folio))) { 1306 err = -EBUSY; 1307 goto out; 1308 } 1309 } 1310 1311 /* at this point we have src_folio locked */ 1312 if (folio_test_large(src_folio)) { 1313 /* split_folio() can block */ 1314 pte_unmap(src_pte); 1315 pte_unmap(dst_pte); 1316 src_pte = dst_pte = NULL; 1317 err = split_folio(src_folio); 1318 if (err) 1319 goto out; 1320 /* have to reacquire the folio after it got split */ 1321 folio_unlock(src_folio); 1322 folio_put(src_folio); 1323 src_folio = NULL; 1324 goto retry; 1325 } 1326 1327 if (!src_anon_vma) { 1328 /* 1329 * folio_referenced walks the anon_vma chain 1330 * without the folio lock. Serialize against it with 1331 * the anon_vma lock, the folio lock is not enough. 1332 */ 1333 src_anon_vma = folio_get_anon_vma(src_folio); 1334 if (!src_anon_vma) { 1335 /* page was unmapped from under us */ 1336 err = -EAGAIN; 1337 goto out; 1338 } 1339 if (!anon_vma_trylock_write(src_anon_vma)) { 1340 pte_unmap(src_pte); 1341 pte_unmap(dst_pte); 1342 src_pte = dst_pte = NULL; 1343 /* now we can block and wait */ 1344 anon_vma_lock_write(src_anon_vma); 1345 goto retry; 1346 } 1347 } 1348 1349 err = move_present_pte(mm, dst_vma, src_vma, 1350 dst_addr, src_addr, dst_pte, src_pte, 1351 orig_dst_pte, orig_src_pte, dst_pmd, 1352 dst_pmdval, dst_ptl, src_ptl, src_folio); 1353 } else { 1354 struct folio *folio = NULL; 1355 1356 entry = pte_to_swp_entry(orig_src_pte); 1357 if (non_swap_entry(entry)) { 1358 if (is_migration_entry(entry)) { 1359 pte_unmap(src_pte); 1360 pte_unmap(dst_pte); 1361 src_pte = dst_pte = NULL; 1362 migration_entry_wait(mm, src_pmd, src_addr); 1363 err = -EAGAIN; 1364 } else 1365 err = -EFAULT; 1366 goto out; 1367 } 1368 1369 if (!pte_swp_exclusive(orig_src_pte)) { 1370 err = -EBUSY; 1371 goto out; 1372 } 1373 1374 si = get_swap_device(entry); 1375 if (unlikely(!si)) { 1376 err = -EAGAIN; 1377 goto out; 1378 } 1379 /* 1380 * Verify the existence of the swapcache. If present, the folio's 1381 * index and mapping must be updated even when the PTE is a swap 1382 * entry. The anon_vma lock is not taken during this process since 1383 * the folio has already been unmapped, and the swap entry is 1384 * exclusive, preventing rmap walks. 1385 * 1386 * For large folios, return -EBUSY immediately, as split_folio() 1387 * also returns -EBUSY when attempting to split unmapped large 1388 * folios in the swapcache. This issue needs to be resolved 1389 * separately to allow proper handling. 1390 */ 1391 if (!src_folio) 1392 folio = filemap_get_folio(swap_address_space(entry), 1393 swap_cache_index(entry)); 1394 if (!IS_ERR_OR_NULL(folio)) { 1395 if (folio_test_large(folio)) { 1396 err = -EBUSY; 1397 folio_put(folio); 1398 goto out; 1399 } 1400 src_folio = folio; 1401 src_folio_pte = orig_src_pte; 1402 if (!folio_trylock(src_folio)) { 1403 pte_unmap(src_pte); 1404 pte_unmap(dst_pte); 1405 src_pte = dst_pte = NULL; 1406 put_swap_device(si); 1407 si = NULL; 1408 /* now we can block and wait */ 1409 folio_lock(src_folio); 1410 goto retry; 1411 } 1412 } 1413 err = move_swap_pte(mm, dst_vma, dst_addr, src_addr, dst_pte, src_pte, 1414 orig_dst_pte, orig_src_pte, dst_pmd, dst_pmdval, 1415 dst_ptl, src_ptl, src_folio); 1416 } 1417 1418 out: 1419 if (src_anon_vma) { 1420 anon_vma_unlock_write(src_anon_vma); 1421 put_anon_vma(src_anon_vma); 1422 } 1423 if (src_folio) { 1424 folio_unlock(src_folio); 1425 folio_put(src_folio); 1426 } 1427 if (dst_pte) 1428 pte_unmap(dst_pte); 1429 if (src_pte) 1430 pte_unmap(src_pte); 1431 mmu_notifier_invalidate_range_end(&range); 1432 if (si) 1433 put_swap_device(si); 1434 1435 return err; 1436 } 1437 1438 #ifdef CONFIG_TRANSPARENT_HUGEPAGE 1439 static inline bool move_splits_huge_pmd(unsigned long dst_addr, 1440 unsigned long src_addr, 1441 unsigned long src_end) 1442 { 1443 return (src_addr & ~HPAGE_PMD_MASK) || (dst_addr & ~HPAGE_PMD_MASK) || 1444 src_end - src_addr < HPAGE_PMD_SIZE; 1445 } 1446 #else 1447 static inline bool move_splits_huge_pmd(unsigned long dst_addr, 1448 unsigned long src_addr, 1449 unsigned long src_end) 1450 { 1451 /* This is unreachable anyway, just to avoid warnings when HPAGE_PMD_SIZE==0 */ 1452 return false; 1453 } 1454 #endif 1455 1456 static inline bool vma_move_compatible(struct vm_area_struct *vma) 1457 { 1458 return !(vma->vm_flags & (VM_PFNMAP | VM_IO | VM_HUGETLB | 1459 VM_MIXEDMAP | VM_SHADOW_STACK)); 1460 } 1461 1462 static int validate_move_areas(struct userfaultfd_ctx *ctx, 1463 struct vm_area_struct *src_vma, 1464 struct vm_area_struct *dst_vma) 1465 { 1466 /* Only allow moving if both have the same access and protection */ 1467 if ((src_vma->vm_flags & VM_ACCESS_FLAGS) != (dst_vma->vm_flags & VM_ACCESS_FLAGS) || 1468 pgprot_val(src_vma->vm_page_prot) != pgprot_val(dst_vma->vm_page_prot)) 1469 return -EINVAL; 1470 1471 /* Only allow moving if both are mlocked or both aren't */ 1472 if ((src_vma->vm_flags & VM_LOCKED) != (dst_vma->vm_flags & VM_LOCKED)) 1473 return -EINVAL; 1474 1475 /* 1476 * For now, we keep it simple and only move between writable VMAs. 1477 * Access flags are equal, therefore cheching only the source is enough. 1478 */ 1479 if (!(src_vma->vm_flags & VM_WRITE)) 1480 return -EINVAL; 1481 1482 /* Check if vma flags indicate content which can be moved */ 1483 if (!vma_move_compatible(src_vma) || !vma_move_compatible(dst_vma)) 1484 return -EINVAL; 1485 1486 /* Ensure dst_vma is registered in uffd we are operating on */ 1487 if (!dst_vma->vm_userfaultfd_ctx.ctx || 1488 dst_vma->vm_userfaultfd_ctx.ctx != ctx) 1489 return -EINVAL; 1490 1491 /* Only allow moving across anonymous vmas */ 1492 if (!vma_is_anonymous(src_vma) || !vma_is_anonymous(dst_vma)) 1493 return -EINVAL; 1494 1495 return 0; 1496 } 1497 1498 static __always_inline 1499 int find_vmas_mm_locked(struct mm_struct *mm, 1500 unsigned long dst_start, 1501 unsigned long src_start, 1502 struct vm_area_struct **dst_vmap, 1503 struct vm_area_struct **src_vmap) 1504 { 1505 struct vm_area_struct *vma; 1506 1507 mmap_assert_locked(mm); 1508 vma = find_vma_and_prepare_anon(mm, dst_start); 1509 if (IS_ERR(vma)) 1510 return PTR_ERR(vma); 1511 1512 *dst_vmap = vma; 1513 /* Skip finding src_vma if src_start is in dst_vma */ 1514 if (src_start >= vma->vm_start && src_start < vma->vm_end) 1515 goto out_success; 1516 1517 vma = vma_lookup(mm, src_start); 1518 if (!vma) 1519 return -ENOENT; 1520 out_success: 1521 *src_vmap = vma; 1522 return 0; 1523 } 1524 1525 #ifdef CONFIG_PER_VMA_LOCK 1526 static int uffd_move_lock(struct mm_struct *mm, 1527 unsigned long dst_start, 1528 unsigned long src_start, 1529 struct vm_area_struct **dst_vmap, 1530 struct vm_area_struct **src_vmap) 1531 { 1532 struct vm_area_struct *vma; 1533 int err; 1534 1535 vma = uffd_lock_vma(mm, dst_start); 1536 if (IS_ERR(vma)) 1537 return PTR_ERR(vma); 1538 1539 *dst_vmap = vma; 1540 /* 1541 * Skip finding src_vma if src_start is in dst_vma. This also ensures 1542 * that we don't lock the same vma twice. 1543 */ 1544 if (src_start >= vma->vm_start && src_start < vma->vm_end) { 1545 *src_vmap = vma; 1546 return 0; 1547 } 1548 1549 /* 1550 * Using uffd_lock_vma() to get src_vma can lead to following deadlock: 1551 * 1552 * Thread1 Thread2 1553 * ------- ------- 1554 * vma_start_read(dst_vma) 1555 * mmap_write_lock(mm) 1556 * vma_start_write(src_vma) 1557 * vma_start_read(src_vma) 1558 * mmap_read_lock(mm) 1559 * vma_start_write(dst_vma) 1560 */ 1561 *src_vmap = lock_vma_under_rcu(mm, src_start); 1562 if (likely(*src_vmap)) 1563 return 0; 1564 1565 /* Undo any locking and retry in mmap_lock critical section */ 1566 vma_end_read(*dst_vmap); 1567 1568 mmap_read_lock(mm); 1569 err = find_vmas_mm_locked(mm, dst_start, src_start, dst_vmap, src_vmap); 1570 if (err) 1571 goto out; 1572 1573 if (!vma_start_read_locked(*dst_vmap)) { 1574 err = -EAGAIN; 1575 goto out; 1576 } 1577 1578 /* Nothing further to do if both vmas are locked. */ 1579 if (*dst_vmap == *src_vmap) 1580 goto out; 1581 1582 if (!vma_start_read_locked_nested(*src_vmap, SINGLE_DEPTH_NESTING)) { 1583 /* Undo dst_vmap locking if src_vmap failed to lock */ 1584 vma_end_read(*dst_vmap); 1585 err = -EAGAIN; 1586 } 1587 out: 1588 mmap_read_unlock(mm); 1589 return err; 1590 } 1591 1592 static void uffd_move_unlock(struct vm_area_struct *dst_vma, 1593 struct vm_area_struct *src_vma) 1594 { 1595 vma_end_read(src_vma); 1596 if (src_vma != dst_vma) 1597 vma_end_read(dst_vma); 1598 } 1599 1600 #else 1601 1602 static int uffd_move_lock(struct mm_struct *mm, 1603 unsigned long dst_start, 1604 unsigned long src_start, 1605 struct vm_area_struct **dst_vmap, 1606 struct vm_area_struct **src_vmap) 1607 { 1608 int err; 1609 1610 mmap_read_lock(mm); 1611 err = find_vmas_mm_locked(mm, dst_start, src_start, dst_vmap, src_vmap); 1612 if (err) 1613 mmap_read_unlock(mm); 1614 return err; 1615 } 1616 1617 static void uffd_move_unlock(struct vm_area_struct *dst_vma, 1618 struct vm_area_struct *src_vma) 1619 { 1620 mmap_assert_locked(src_vma->vm_mm); 1621 mmap_read_unlock(dst_vma->vm_mm); 1622 } 1623 #endif 1624 1625 /** 1626 * move_pages - move arbitrary anonymous pages of an existing vma 1627 * @ctx: pointer to the userfaultfd context 1628 * @dst_start: start of the destination virtual memory range 1629 * @src_start: start of the source virtual memory range 1630 * @len: length of the virtual memory range 1631 * @mode: flags from uffdio_move.mode 1632 * 1633 * It will either use the mmap_lock in read mode or per-vma locks 1634 * 1635 * move_pages() remaps arbitrary anonymous pages atomically in zero 1636 * copy. It only works on non shared anonymous pages because those can 1637 * be relocated without generating non linear anon_vmas in the rmap 1638 * code. 1639 * 1640 * It provides a zero copy mechanism to handle userspace page faults. 1641 * The source vma pages should have mapcount == 1, which can be 1642 * enforced by using madvise(MADV_DONTFORK) on src vma. 1643 * 1644 * The thread receiving the page during the userland page fault 1645 * will receive the faulting page in the source vma through the network, 1646 * storage or any other I/O device (MADV_DONTFORK in the source vma 1647 * avoids move_pages() to fail with -EBUSY if the process forks before 1648 * move_pages() is called), then it will call move_pages() to map the 1649 * page in the faulting address in the destination vma. 1650 * 1651 * This userfaultfd command works purely via pagetables, so it's the 1652 * most efficient way to move physical non shared anonymous pages 1653 * across different virtual addresses. Unlike mremap()/mmap()/munmap() 1654 * it does not create any new vmas. The mapping in the destination 1655 * address is atomic. 1656 * 1657 * It only works if the vma protection bits are identical from the 1658 * source and destination vma. 1659 * 1660 * It can remap non shared anonymous pages within the same vma too. 1661 * 1662 * If the source virtual memory range has any unmapped holes, or if 1663 * the destination virtual memory range is not a whole unmapped hole, 1664 * move_pages() will fail respectively with -ENOENT or -EEXIST. This 1665 * provides a very strict behavior to avoid any chance of memory 1666 * corruption going unnoticed if there are userland race conditions. 1667 * Only one thread should resolve the userland page fault at any given 1668 * time for any given faulting address. This means that if two threads 1669 * try to both call move_pages() on the same destination address at the 1670 * same time, the second thread will get an explicit error from this 1671 * command. 1672 * 1673 * The command retval will return "len" is successful. The command 1674 * however can be interrupted by fatal signals or errors. If 1675 * interrupted it will return the number of bytes successfully 1676 * remapped before the interruption if any, or the negative error if 1677 * none. It will never return zero. Either it will return an error or 1678 * an amount of bytes successfully moved. If the retval reports a 1679 * "short" remap, the move_pages() command should be repeated by 1680 * userland with src+retval, dst+reval, len-retval if it wants to know 1681 * about the error that interrupted it. 1682 * 1683 * The UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES flag can be specified to 1684 * prevent -ENOENT errors to materialize if there are holes in the 1685 * source virtual range that is being remapped. The holes will be 1686 * accounted as successfully remapped in the retval of the 1687 * command. This is mostly useful to remap hugepage naturally aligned 1688 * virtual regions without knowing if there are transparent hugepage 1689 * in the regions or not, but preventing the risk of having to split 1690 * the hugepmd during the remap. 1691 * 1692 * If there's any rmap walk that is taking the anon_vma locks without 1693 * first obtaining the folio lock (the only current instance is 1694 * folio_referenced), they will have to verify if the folio->mapping 1695 * has changed after taking the anon_vma lock. If it changed they 1696 * should release the lock and retry obtaining a new anon_vma, because 1697 * it means the anon_vma was changed by move_pages() before the lock 1698 * could be obtained. This is the only additional complexity added to 1699 * the rmap code to provide this anonymous page remapping functionality. 1700 */ 1701 ssize_t move_pages(struct userfaultfd_ctx *ctx, unsigned long dst_start, 1702 unsigned long src_start, unsigned long len, __u64 mode) 1703 { 1704 struct mm_struct *mm = ctx->mm; 1705 struct vm_area_struct *src_vma, *dst_vma; 1706 unsigned long src_addr, dst_addr; 1707 pmd_t *src_pmd, *dst_pmd; 1708 long err = -EINVAL; 1709 ssize_t moved = 0; 1710 1711 /* Sanitize the command parameters. */ 1712 if (WARN_ON_ONCE(src_start & ~PAGE_MASK) || 1713 WARN_ON_ONCE(dst_start & ~PAGE_MASK) || 1714 WARN_ON_ONCE(len & ~PAGE_MASK)) 1715 goto out; 1716 1717 /* Does the address range wrap, or is the span zero-sized? */ 1718 if (WARN_ON_ONCE(src_start + len <= src_start) || 1719 WARN_ON_ONCE(dst_start + len <= dst_start)) 1720 goto out; 1721 1722 err = uffd_move_lock(mm, dst_start, src_start, &dst_vma, &src_vma); 1723 if (err) 1724 goto out; 1725 1726 /* Re-check after taking map_changing_lock */ 1727 err = -EAGAIN; 1728 down_read(&ctx->map_changing_lock); 1729 if (likely(atomic_read(&ctx->mmap_changing))) 1730 goto out_unlock; 1731 /* 1732 * Make sure the vma is not shared, that the src and dst remap 1733 * ranges are both valid and fully within a single existing 1734 * vma. 1735 */ 1736 err = -EINVAL; 1737 if (src_vma->vm_flags & VM_SHARED) 1738 goto out_unlock; 1739 if (src_start + len > src_vma->vm_end) 1740 goto out_unlock; 1741 1742 if (dst_vma->vm_flags & VM_SHARED) 1743 goto out_unlock; 1744 if (dst_start + len > dst_vma->vm_end) 1745 goto out_unlock; 1746 1747 err = validate_move_areas(ctx, src_vma, dst_vma); 1748 if (err) 1749 goto out_unlock; 1750 1751 for (src_addr = src_start, dst_addr = dst_start; 1752 src_addr < src_start + len;) { 1753 spinlock_t *ptl; 1754 pmd_t dst_pmdval; 1755 unsigned long step_size; 1756 1757 /* 1758 * Below works because anonymous area would not have a 1759 * transparent huge PUD. If file-backed support is added, 1760 * that case would need to be handled here. 1761 */ 1762 src_pmd = mm_find_pmd(mm, src_addr); 1763 if (unlikely(!src_pmd)) { 1764 if (!(mode & UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES)) { 1765 err = -ENOENT; 1766 break; 1767 } 1768 src_pmd = mm_alloc_pmd(mm, src_addr); 1769 if (unlikely(!src_pmd)) { 1770 err = -ENOMEM; 1771 break; 1772 } 1773 } 1774 dst_pmd = mm_alloc_pmd(mm, dst_addr); 1775 if (unlikely(!dst_pmd)) { 1776 err = -ENOMEM; 1777 break; 1778 } 1779 1780 dst_pmdval = pmdp_get_lockless(dst_pmd); 1781 /* 1782 * If the dst_pmd is mapped as THP don't override it and just 1783 * be strict. If dst_pmd changes into TPH after this check, the 1784 * move_pages_huge_pmd() will detect the change and retry 1785 * while move_pages_pte() will detect the change and fail. 1786 */ 1787 if (unlikely(pmd_trans_huge(dst_pmdval))) { 1788 err = -EEXIST; 1789 break; 1790 } 1791 1792 ptl = pmd_trans_huge_lock(src_pmd, src_vma); 1793 if (ptl) { 1794 if (pmd_devmap(*src_pmd)) { 1795 spin_unlock(ptl); 1796 err = -ENOENT; 1797 break; 1798 } 1799 1800 /* Check if we can move the pmd without splitting it. */ 1801 if (move_splits_huge_pmd(dst_addr, src_addr, src_start + len) || 1802 !pmd_none(dst_pmdval)) { 1803 struct folio *folio = pmd_folio(*src_pmd); 1804 1805 if (!folio || (!is_huge_zero_folio(folio) && 1806 !PageAnonExclusive(&folio->page))) { 1807 spin_unlock(ptl); 1808 err = -EBUSY; 1809 break; 1810 } 1811 1812 spin_unlock(ptl); 1813 split_huge_pmd(src_vma, src_pmd, src_addr); 1814 /* The folio will be split by move_pages_pte() */ 1815 continue; 1816 } 1817 1818 err = move_pages_huge_pmd(mm, dst_pmd, src_pmd, 1819 dst_pmdval, dst_vma, src_vma, 1820 dst_addr, src_addr); 1821 step_size = HPAGE_PMD_SIZE; 1822 } else { 1823 if (pmd_none(*src_pmd)) { 1824 if (!(mode & UFFDIO_MOVE_MODE_ALLOW_SRC_HOLES)) { 1825 err = -ENOENT; 1826 break; 1827 } 1828 if (unlikely(__pte_alloc(mm, src_pmd))) { 1829 err = -ENOMEM; 1830 break; 1831 } 1832 } 1833 1834 if (unlikely(pte_alloc(mm, dst_pmd))) { 1835 err = -ENOMEM; 1836 break; 1837 } 1838 1839 err = move_pages_pte(mm, dst_pmd, src_pmd, 1840 dst_vma, src_vma, 1841 dst_addr, src_addr, mode); 1842 step_size = PAGE_SIZE; 1843 } 1844 1845 cond_resched(); 1846 1847 if (fatal_signal_pending(current)) { 1848 /* Do not override an error */ 1849 if (!err || err == -EAGAIN) 1850 err = -EINTR; 1851 break; 1852 } 1853 1854 if (err) { 1855 if (err == -EAGAIN) 1856 continue; 1857 break; 1858 } 1859 1860 /* Proceed to the next page */ 1861 dst_addr += step_size; 1862 src_addr += step_size; 1863 moved += step_size; 1864 } 1865 1866 out_unlock: 1867 up_read(&ctx->map_changing_lock); 1868 uffd_move_unlock(dst_vma, src_vma); 1869 out: 1870 VM_WARN_ON(moved < 0); 1871 VM_WARN_ON(err > 0); 1872 VM_WARN_ON(!moved && !err); 1873 return moved ? moved : err; 1874 } 1875 1876 static void userfaultfd_set_vm_flags(struct vm_area_struct *vma, 1877 vm_flags_t flags) 1878 { 1879 const bool uffd_wp_changed = (vma->vm_flags ^ flags) & VM_UFFD_WP; 1880 1881 vm_flags_reset(vma, flags); 1882 /* 1883 * For shared mappings, we want to enable writenotify while 1884 * userfaultfd-wp is enabled (see vma_wants_writenotify()). We'll simply 1885 * recalculate vma->vm_page_prot whenever userfaultfd-wp changes. 1886 */ 1887 if ((vma->vm_flags & VM_SHARED) && uffd_wp_changed) 1888 vma_set_page_prot(vma); 1889 } 1890 1891 static void userfaultfd_set_ctx(struct vm_area_struct *vma, 1892 struct userfaultfd_ctx *ctx, 1893 unsigned long flags) 1894 { 1895 vma_start_write(vma); 1896 vma->vm_userfaultfd_ctx = (struct vm_userfaultfd_ctx){ctx}; 1897 userfaultfd_set_vm_flags(vma, 1898 (vma->vm_flags & ~__VM_UFFD_FLAGS) | flags); 1899 } 1900 1901 void userfaultfd_reset_ctx(struct vm_area_struct *vma) 1902 { 1903 userfaultfd_set_ctx(vma, NULL, 0); 1904 } 1905 1906 struct vm_area_struct *userfaultfd_clear_vma(struct vma_iterator *vmi, 1907 struct vm_area_struct *prev, 1908 struct vm_area_struct *vma, 1909 unsigned long start, 1910 unsigned long end) 1911 { 1912 struct vm_area_struct *ret; 1913 bool give_up_on_oom = false; 1914 1915 /* 1916 * If we are modifying only and not splitting, just give up on the merge 1917 * if OOM prevents us from merging successfully. 1918 */ 1919 if (start == vma->vm_start && end == vma->vm_end) 1920 give_up_on_oom = true; 1921 1922 /* Reset ptes for the whole vma range if wr-protected */ 1923 if (userfaultfd_wp(vma)) 1924 uffd_wp_range(vma, start, end - start, false); 1925 1926 ret = vma_modify_flags_uffd(vmi, prev, vma, start, end, 1927 vma->vm_flags & ~__VM_UFFD_FLAGS, 1928 NULL_VM_UFFD_CTX, give_up_on_oom); 1929 1930 /* 1931 * In the vma_merge() successful mprotect-like case 8: 1932 * the next vma was merged into the current one and 1933 * the current one has not been updated yet. 1934 */ 1935 if (!IS_ERR(ret)) 1936 userfaultfd_reset_ctx(ret); 1937 1938 return ret; 1939 } 1940 1941 /* Assumes mmap write lock taken, and mm_struct pinned. */ 1942 int userfaultfd_register_range(struct userfaultfd_ctx *ctx, 1943 struct vm_area_struct *vma, 1944 unsigned long vm_flags, 1945 unsigned long start, unsigned long end, 1946 bool wp_async) 1947 { 1948 VMA_ITERATOR(vmi, ctx->mm, start); 1949 struct vm_area_struct *prev = vma_prev(&vmi); 1950 unsigned long vma_end; 1951 unsigned long new_flags; 1952 1953 if (vma->vm_start < start) 1954 prev = vma; 1955 1956 for_each_vma_range(vmi, vma, end) { 1957 cond_resched(); 1958 1959 BUG_ON(!vma_can_userfault(vma, vm_flags, wp_async)); 1960 BUG_ON(vma->vm_userfaultfd_ctx.ctx && 1961 vma->vm_userfaultfd_ctx.ctx != ctx); 1962 WARN_ON(!(vma->vm_flags & VM_MAYWRITE)); 1963 1964 /* 1965 * Nothing to do: this vma is already registered into this 1966 * userfaultfd and with the right tracking mode too. 1967 */ 1968 if (vma->vm_userfaultfd_ctx.ctx == ctx && 1969 (vma->vm_flags & vm_flags) == vm_flags) 1970 goto skip; 1971 1972 if (vma->vm_start > start) 1973 start = vma->vm_start; 1974 vma_end = min(end, vma->vm_end); 1975 1976 new_flags = (vma->vm_flags & ~__VM_UFFD_FLAGS) | vm_flags; 1977 vma = vma_modify_flags_uffd(&vmi, prev, vma, start, vma_end, 1978 new_flags, 1979 (struct vm_userfaultfd_ctx){ctx}, 1980 /* give_up_on_oom = */false); 1981 if (IS_ERR(vma)) 1982 return PTR_ERR(vma); 1983 1984 /* 1985 * In the vma_merge() successful mprotect-like case 8: 1986 * the next vma was merged into the current one and 1987 * the current one has not been updated yet. 1988 */ 1989 userfaultfd_set_ctx(vma, ctx, vm_flags); 1990 1991 if (is_vm_hugetlb_page(vma) && uffd_disable_huge_pmd_share(vma)) 1992 hugetlb_unshare_all_pmds(vma); 1993 1994 skip: 1995 prev = vma; 1996 start = vma->vm_end; 1997 } 1998 1999 return 0; 2000 } 2001 2002 void userfaultfd_release_new(struct userfaultfd_ctx *ctx) 2003 { 2004 struct mm_struct *mm = ctx->mm; 2005 struct vm_area_struct *vma; 2006 VMA_ITERATOR(vmi, mm, 0); 2007 2008 /* the various vma->vm_userfaultfd_ctx still points to it */ 2009 mmap_write_lock(mm); 2010 for_each_vma(vmi, vma) { 2011 if (vma->vm_userfaultfd_ctx.ctx == ctx) 2012 userfaultfd_reset_ctx(vma); 2013 } 2014 mmap_write_unlock(mm); 2015 } 2016 2017 void userfaultfd_release_all(struct mm_struct *mm, 2018 struct userfaultfd_ctx *ctx) 2019 { 2020 struct vm_area_struct *vma, *prev; 2021 VMA_ITERATOR(vmi, mm, 0); 2022 2023 if (!mmget_not_zero(mm)) 2024 return; 2025 2026 /* 2027 * Flush page faults out of all CPUs. NOTE: all page faults 2028 * must be retried without returning VM_FAULT_SIGBUS if 2029 * userfaultfd_ctx_get() succeeds but vma->vma_userfault_ctx 2030 * changes while handle_userfault released the mmap_lock. So 2031 * it's critical that released is set to true (above), before 2032 * taking the mmap_lock for writing. 2033 */ 2034 mmap_write_lock(mm); 2035 prev = NULL; 2036 for_each_vma(vmi, vma) { 2037 cond_resched(); 2038 BUG_ON(!!vma->vm_userfaultfd_ctx.ctx ^ 2039 !!(vma->vm_flags & __VM_UFFD_FLAGS)); 2040 if (vma->vm_userfaultfd_ctx.ctx != ctx) { 2041 prev = vma; 2042 continue; 2043 } 2044 2045 vma = userfaultfd_clear_vma(&vmi, prev, vma, 2046 vma->vm_start, vma->vm_end); 2047 prev = vma; 2048 } 2049 mmap_write_unlock(mm); 2050 mmput(mm); 2051 } 2052