Merge branch 'irq-core-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git...
[linux-2.6-block.git] / fs / dax.c
CommitLineData
d475c634
MW
1/*
2 * fs/dax.c - Direct Access filesystem code
3 * Copyright (c) 2013-2014 Intel Corporation
4 * Author: Matthew Wilcox <matthew.r.wilcox@intel.com>
5 * Author: Ross Zwisler <ross.zwisler@linux.intel.com>
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 */
16
17#include <linux/atomic.h>
18#include <linux/blkdev.h>
19#include <linux/buffer_head.h>
d77e92e2 20#include <linux/dax.h>
d475c634
MW
21#include <linux/fs.h>
22#include <linux/genhd.h>
f7ca90b1
MW
23#include <linux/highmem.h>
24#include <linux/memcontrol.h>
25#include <linux/mm.h>
d475c634 26#include <linux/mutex.h>
9973c98e 27#include <linux/pagevec.h>
289c6aed 28#include <linux/sched.h>
f361bf4a 29#include <linux/sched/signal.h>
d475c634 30#include <linux/uio.h>
f7ca90b1 31#include <linux/vmstat.h>
34c0fd54 32#include <linux/pfn_t.h>
0e749e54 33#include <linux/sizes.h>
4b4bb46d 34#include <linux/mmu_notifier.h>
a254e568
CH
35#include <linux/iomap.h>
36#include "internal.h"
d475c634 37
282a8e03
RZ
38#define CREATE_TRACE_POINTS
39#include <trace/events/fs_dax.h>
40
ac401cc7
JK
41/* We choose 4096 entries - same as per-zone page wait tables */
42#define DAX_WAIT_TABLE_BITS 12
43#define DAX_WAIT_TABLE_ENTRIES (1 << DAX_WAIT_TABLE_BITS)
44
917f3452
RZ
45/* The 'colour' (ie low bits) within a PMD of a page offset. */
46#define PG_PMD_COLOUR ((PMD_SIZE >> PAGE_SHIFT) - 1)
977fbdcd 47#define PG_PMD_NR (PMD_SIZE >> PAGE_SHIFT)
917f3452 48
ce95ab0f 49static wait_queue_head_t wait_table[DAX_WAIT_TABLE_ENTRIES];
ac401cc7
JK
50
51static int __init init_dax_wait_table(void)
52{
53 int i;
54
55 for (i = 0; i < DAX_WAIT_TABLE_ENTRIES; i++)
56 init_waitqueue_head(wait_table + i);
57 return 0;
58}
59fs_initcall(init_dax_wait_table);
60
527b19d0
RZ
61/*
62 * We use lowest available bit in exceptional entry for locking, one bit for
63 * the entry size (PMD) and two more to tell us if the entry is a zero page or
64 * an empty entry that is just used for locking. In total four special bits.
65 *
66 * If the PMD bit isn't set the entry has size PAGE_SIZE, and if the ZERO_PAGE
67 * and EMPTY bits aren't set the entry is a normal DAX entry with a filesystem
68 * block allocation.
69 */
70#define RADIX_DAX_SHIFT (RADIX_TREE_EXCEPTIONAL_SHIFT + 4)
71#define RADIX_DAX_ENTRY_LOCK (1 << RADIX_TREE_EXCEPTIONAL_SHIFT)
72#define RADIX_DAX_PMD (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 1))
73#define RADIX_DAX_ZERO_PAGE (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 2))
74#define RADIX_DAX_EMPTY (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 3))
75
3fe0791c 76static unsigned long dax_radix_pfn(void *entry)
527b19d0
RZ
77{
78 return (unsigned long)entry >> RADIX_DAX_SHIFT;
79}
80
3fe0791c 81static void *dax_radix_locked_entry(unsigned long pfn, unsigned long flags)
527b19d0
RZ
82{
83 return (void *)(RADIX_TREE_EXCEPTIONAL_ENTRY | flags |
3fe0791c 84 (pfn << RADIX_DAX_SHIFT) | RADIX_DAX_ENTRY_LOCK);
527b19d0
RZ
85}
86
87static unsigned int dax_radix_order(void *entry)
88{
89 if ((unsigned long)entry & RADIX_DAX_PMD)
90 return PMD_SHIFT - PAGE_SHIFT;
91 return 0;
92}
93
642261ac 94static int dax_is_pmd_entry(void *entry)
d1a5f2b4 95{
642261ac 96 return (unsigned long)entry & RADIX_DAX_PMD;
d1a5f2b4
DW
97}
98
642261ac 99static int dax_is_pte_entry(void *entry)
d475c634 100{
642261ac 101 return !((unsigned long)entry & RADIX_DAX_PMD);
d475c634
MW
102}
103
642261ac 104static int dax_is_zero_entry(void *entry)
d475c634 105{
91d25ba8 106 return (unsigned long)entry & RADIX_DAX_ZERO_PAGE;
d475c634
MW
107}
108
642261ac 109static int dax_is_empty_entry(void *entry)
b2e0d162 110{
642261ac 111 return (unsigned long)entry & RADIX_DAX_EMPTY;
b2e0d162
DW
112}
113
ac401cc7
JK
114/*
115 * DAX radix tree locking
116 */
117struct exceptional_entry_key {
118 struct address_space *mapping;
63e95b5c 119 pgoff_t entry_start;
ac401cc7
JK
120};
121
122struct wait_exceptional_entry_queue {
ac6424b9 123 wait_queue_entry_t wait;
ac401cc7
JK
124 struct exceptional_entry_key key;
125};
126
63e95b5c
RZ
127static wait_queue_head_t *dax_entry_waitqueue(struct address_space *mapping,
128 pgoff_t index, void *entry, struct exceptional_entry_key *key)
129{
130 unsigned long hash;
131
132 /*
133 * If 'entry' is a PMD, align the 'index' that we use for the wait
134 * queue to the start of that PMD. This ensures that all offsets in
135 * the range covered by the PMD map to the same bit lock.
136 */
642261ac 137 if (dax_is_pmd_entry(entry))
917f3452 138 index &= ~PG_PMD_COLOUR;
63e95b5c
RZ
139
140 key->mapping = mapping;
141 key->entry_start = index;
142
143 hash = hash_long((unsigned long)mapping ^ index, DAX_WAIT_TABLE_BITS);
144 return wait_table + hash;
145}
146
ac6424b9 147static int wake_exceptional_entry_func(wait_queue_entry_t *wait, unsigned int mode,
ac401cc7
JK
148 int sync, void *keyp)
149{
150 struct exceptional_entry_key *key = keyp;
151 struct wait_exceptional_entry_queue *ewait =
152 container_of(wait, struct wait_exceptional_entry_queue, wait);
153
154 if (key->mapping != ewait->key.mapping ||
63e95b5c 155 key->entry_start != ewait->key.entry_start)
ac401cc7
JK
156 return 0;
157 return autoremove_wake_function(wait, mode, sync, NULL);
158}
159
e30331ff 160/*
b93b0163
MW
161 * @entry may no longer be the entry at the index in the mapping.
162 * The important information it's conveying is whether the entry at
163 * this index used to be a PMD entry.
e30331ff 164 */
d01ad197 165static void dax_wake_mapping_entry_waiter(struct address_space *mapping,
e30331ff
RZ
166 pgoff_t index, void *entry, bool wake_all)
167{
168 struct exceptional_entry_key key;
169 wait_queue_head_t *wq;
170
171 wq = dax_entry_waitqueue(mapping, index, entry, &key);
172
173 /*
174 * Checking for locked entry and prepare_to_wait_exclusive() happens
b93b0163 175 * under the i_pages lock, ditto for entry handling in our callers.
e30331ff
RZ
176 * So at this point all tasks that could have seen our entry locked
177 * must be in the waitqueue and the following check will see them.
178 */
179 if (waitqueue_active(wq))
180 __wake_up(wq, TASK_NORMAL, wake_all ? 0 : 1, &key);
181}
182
ac401cc7 183/*
b93b0163
MW
184 * Check whether the given slot is locked. Must be called with the i_pages
185 * lock held.
ac401cc7
JK
186 */
187static inline int slot_locked(struct address_space *mapping, void **slot)
188{
189 unsigned long entry = (unsigned long)
b93b0163 190 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
191 return entry & RADIX_DAX_ENTRY_LOCK;
192}
193
194/*
b93b0163 195 * Mark the given slot as locked. Must be called with the i_pages lock held.
ac401cc7
JK
196 */
197static inline void *lock_slot(struct address_space *mapping, void **slot)
198{
199 unsigned long entry = (unsigned long)
b93b0163 200 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
201
202 entry |= RADIX_DAX_ENTRY_LOCK;
b93b0163 203 radix_tree_replace_slot(&mapping->i_pages, slot, (void *)entry);
ac401cc7
JK
204 return (void *)entry;
205}
206
207/*
b93b0163 208 * Mark the given slot as unlocked. Must be called with the i_pages lock held.
ac401cc7
JK
209 */
210static inline void *unlock_slot(struct address_space *mapping, void **slot)
211{
212 unsigned long entry = (unsigned long)
b93b0163 213 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
214
215 entry &= ~(unsigned long)RADIX_DAX_ENTRY_LOCK;
b93b0163 216 radix_tree_replace_slot(&mapping->i_pages, slot, (void *)entry);
ac401cc7
JK
217 return (void *)entry;
218}
219
220/*
221 * Lookup entry in radix tree, wait for it to become unlocked if it is
222 * exceptional entry and return it. The caller must call
223 * put_unlocked_mapping_entry() when he decided not to lock the entry or
224 * put_locked_mapping_entry() when he locked the entry and now wants to
225 * unlock it.
226 *
b93b0163 227 * Must be called with the i_pages lock held.
ac401cc7 228 */
c2a7d2a1
DW
229static void *__get_unlocked_mapping_entry(struct address_space *mapping,
230 pgoff_t index, void ***slotp, bool (*wait_fn)(void))
ac401cc7 231{
e3ad61c6 232 void *entry, **slot;
ac401cc7 233 struct wait_exceptional_entry_queue ewait;
63e95b5c 234 wait_queue_head_t *wq;
ac401cc7
JK
235
236 init_wait(&ewait.wait);
237 ewait.wait.func = wake_exceptional_entry_func;
ac401cc7
JK
238
239 for (;;) {
c2a7d2a1
DW
240 bool revalidate;
241
b93b0163 242 entry = __radix_tree_lookup(&mapping->i_pages, index, NULL,
ac401cc7 243 &slot);
91d25ba8
RZ
244 if (!entry ||
245 WARN_ON_ONCE(!radix_tree_exceptional_entry(entry)) ||
ac401cc7
JK
246 !slot_locked(mapping, slot)) {
247 if (slotp)
248 *slotp = slot;
e3ad61c6 249 return entry;
ac401cc7 250 }
63e95b5c
RZ
251
252 wq = dax_entry_waitqueue(mapping, index, entry, &ewait.key);
ac401cc7
JK
253 prepare_to_wait_exclusive(wq, &ewait.wait,
254 TASK_UNINTERRUPTIBLE);
b93b0163 255 xa_unlock_irq(&mapping->i_pages);
c2a7d2a1 256 revalidate = wait_fn();
ac401cc7 257 finish_wait(wq, &ewait.wait);
b93b0163 258 xa_lock_irq(&mapping->i_pages);
c2a7d2a1
DW
259 if (revalidate)
260 return ERR_PTR(-EAGAIN);
ac401cc7
JK
261 }
262}
263
c2a7d2a1
DW
264static bool entry_wait(void)
265{
266 schedule();
267 /*
268 * Never return an ERR_PTR() from
269 * __get_unlocked_mapping_entry(), just keep looping.
270 */
271 return false;
272}
273
274static void *get_unlocked_mapping_entry(struct address_space *mapping,
275 pgoff_t index, void ***slotp)
276{
277 return __get_unlocked_mapping_entry(mapping, index, slotp, entry_wait);
278}
279
280static void unlock_mapping_entry(struct address_space *mapping, pgoff_t index)
b1aa812b
JK
281{
282 void *entry, **slot;
283
b93b0163
MW
284 xa_lock_irq(&mapping->i_pages);
285 entry = __radix_tree_lookup(&mapping->i_pages, index, NULL, &slot);
b1aa812b
JK
286 if (WARN_ON_ONCE(!entry || !radix_tree_exceptional_entry(entry) ||
287 !slot_locked(mapping, slot))) {
b93b0163 288 xa_unlock_irq(&mapping->i_pages);
b1aa812b
JK
289 return;
290 }
291 unlock_slot(mapping, slot);
b93b0163 292 xa_unlock_irq(&mapping->i_pages);
b1aa812b
JK
293 dax_wake_mapping_entry_waiter(mapping, index, entry, false);
294}
295
422476c4 296static void put_locked_mapping_entry(struct address_space *mapping,
91d25ba8 297 pgoff_t index)
422476c4 298{
c2a7d2a1 299 unlock_mapping_entry(mapping, index);
422476c4
RZ
300}
301
302/*
303 * Called when we are done with radix tree entry we looked up via
304 * get_unlocked_mapping_entry() and which we didn't lock in the end.
305 */
306static void put_unlocked_mapping_entry(struct address_space *mapping,
307 pgoff_t index, void *entry)
308{
91d25ba8 309 if (!entry)
422476c4
RZ
310 return;
311
312 /* We have to wake up next waiter for the radix tree entry lock */
313 dax_wake_mapping_entry_waiter(mapping, index, entry, false);
314}
315
d2c997c0
DW
316static unsigned long dax_entry_size(void *entry)
317{
318 if (dax_is_zero_entry(entry))
319 return 0;
320 else if (dax_is_empty_entry(entry))
321 return 0;
322 else if (dax_is_pmd_entry(entry))
323 return PMD_SIZE;
324 else
325 return PAGE_SIZE;
326}
327
328static unsigned long dax_radix_end_pfn(void *entry)
329{
330 return dax_radix_pfn(entry) + dax_entry_size(entry) / PAGE_SIZE;
331}
332
333/*
334 * Iterate through all mapped pfns represented by an entry, i.e. skip
335 * 'empty' and 'zero' entries.
336 */
337#define for_each_mapped_pfn(entry, pfn) \
338 for (pfn = dax_radix_pfn(entry); \
339 pfn < dax_radix_end_pfn(entry); pfn++)
340
73449daf
DW
341/*
342 * TODO: for reflink+dax we need a way to associate a single page with
343 * multiple address_space instances at different linear_page_index()
344 * offsets.
345 */
346static void dax_associate_entry(void *entry, struct address_space *mapping,
347 struct vm_area_struct *vma, unsigned long address)
d2c997c0 348{
73449daf
DW
349 unsigned long size = dax_entry_size(entry), pfn, index;
350 int i = 0;
d2c997c0
DW
351
352 if (IS_ENABLED(CONFIG_FS_DAX_LIMITED))
353 return;
354
73449daf 355 index = linear_page_index(vma, address & ~(size - 1));
d2c997c0
DW
356 for_each_mapped_pfn(entry, pfn) {
357 struct page *page = pfn_to_page(pfn);
358
359 WARN_ON_ONCE(page->mapping);
360 page->mapping = mapping;
73449daf 361 page->index = index + i++;
d2c997c0
DW
362 }
363}
364
365static void dax_disassociate_entry(void *entry, struct address_space *mapping,
366 bool trunc)
367{
368 unsigned long pfn;
369
370 if (IS_ENABLED(CONFIG_FS_DAX_LIMITED))
371 return;
372
373 for_each_mapped_pfn(entry, pfn) {
374 struct page *page = pfn_to_page(pfn);
375
376 WARN_ON_ONCE(trunc && page_ref_count(page) > 1);
377 WARN_ON_ONCE(page->mapping && page->mapping != mapping);
378 page->mapping = NULL;
73449daf 379 page->index = 0;
d2c997c0
DW
380 }
381}
382
5fac7408
DW
383static struct page *dax_busy_page(void *entry)
384{
385 unsigned long pfn;
386
387 for_each_mapped_pfn(entry, pfn) {
388 struct page *page = pfn_to_page(pfn);
389
390 if (page_ref_count(page) > 1)
391 return page;
392 }
393 return NULL;
394}
395
c2a7d2a1
DW
396static bool entry_wait_revalidate(void)
397{
398 rcu_read_unlock();
399 schedule();
400 rcu_read_lock();
401
402 /*
403 * Tell __get_unlocked_mapping_entry() to take a break, we need
404 * to revalidate page->mapping after dropping locks
405 */
406 return true;
407}
408
409bool dax_lock_mapping_entry(struct page *page)
410{
411 pgoff_t index;
412 struct inode *inode;
413 bool did_lock = false;
414 void *entry = NULL, **slot;
415 struct address_space *mapping;
416
417 rcu_read_lock();
418 for (;;) {
419 mapping = READ_ONCE(page->mapping);
420
421 if (!dax_mapping(mapping))
422 break;
423
424 /*
425 * In the device-dax case there's no need to lock, a
426 * struct dev_pagemap pin is sufficient to keep the
427 * inode alive, and we assume we have dev_pagemap pin
428 * otherwise we would not have a valid pfn_to_page()
429 * translation.
430 */
431 inode = mapping->host;
432 if (S_ISCHR(inode->i_mode)) {
433 did_lock = true;
434 break;
435 }
436
437 xa_lock_irq(&mapping->i_pages);
438 if (mapping != page->mapping) {
439 xa_unlock_irq(&mapping->i_pages);
440 continue;
441 }
442 index = page->index;
443
444 entry = __get_unlocked_mapping_entry(mapping, index, &slot,
445 entry_wait_revalidate);
446 if (!entry) {
447 xa_unlock_irq(&mapping->i_pages);
448 break;
449 } else if (IS_ERR(entry)) {
f52afc93 450 xa_unlock_irq(&mapping->i_pages);
c2a7d2a1
DW
451 WARN_ON_ONCE(PTR_ERR(entry) != -EAGAIN);
452 continue;
453 }
454 lock_slot(mapping, slot);
455 did_lock = true;
456 xa_unlock_irq(&mapping->i_pages);
457 break;
458 }
459 rcu_read_unlock();
460
461 return did_lock;
462}
463
464void dax_unlock_mapping_entry(struct page *page)
465{
466 struct address_space *mapping = page->mapping;
467 struct inode *inode = mapping->host;
468
469 if (S_ISCHR(inode->i_mode))
470 return;
471
472 unlock_mapping_entry(mapping, page->index);
473}
474
ac401cc7 475/*
91d25ba8
RZ
476 * Find radix tree entry at given index. If it points to an exceptional entry,
477 * return it with the radix tree entry locked. If the radix tree doesn't
478 * contain given index, create an empty exceptional entry for the index and
479 * return with it locked.
ac401cc7 480 *
642261ac
RZ
481 * When requesting an entry with size RADIX_DAX_PMD, grab_mapping_entry() will
482 * either return that locked entry or will return an error. This error will
91d25ba8
RZ
483 * happen if there are any 4k entries within the 2MiB range that we are
484 * requesting.
642261ac
RZ
485 *
486 * We always favor 4k entries over 2MiB entries. There isn't a flow where we
487 * evict 4k entries in order to 'upgrade' them to a 2MiB entry. A 2MiB
488 * insertion will fail if it finds any 4k entries already in the tree, and a
489 * 4k insertion will cause an existing 2MiB entry to be unmapped and
490 * downgraded to 4k entries. This happens for both 2MiB huge zero pages as
491 * well as 2MiB empty entries.
492 *
493 * The exception to this downgrade path is for 2MiB DAX PMD entries that have
494 * real storage backing them. We will leave these real 2MiB DAX entries in
495 * the tree, and PTE writes will simply dirty the entire 2MiB DAX entry.
496 *
ac401cc7
JK
497 * Note: Unlike filemap_fault() we don't honor FAULT_FLAG_RETRY flags. For
498 * persistent memory the benefit is doubtful. We can add that later if we can
499 * show it helps.
500 */
642261ac
RZ
501static void *grab_mapping_entry(struct address_space *mapping, pgoff_t index,
502 unsigned long size_flag)
ac401cc7 503{
642261ac 504 bool pmd_downgrade = false; /* splitting 2MiB entry into 4k entries? */
e3ad61c6 505 void *entry, **slot;
ac401cc7
JK
506
507restart:
b93b0163 508 xa_lock_irq(&mapping->i_pages);
e3ad61c6 509 entry = get_unlocked_mapping_entry(mapping, index, &slot);
642261ac 510
91d25ba8
RZ
511 if (WARN_ON_ONCE(entry && !radix_tree_exceptional_entry(entry))) {
512 entry = ERR_PTR(-EIO);
513 goto out_unlock;
514 }
515
642261ac
RZ
516 if (entry) {
517 if (size_flag & RADIX_DAX_PMD) {
91d25ba8 518 if (dax_is_pte_entry(entry)) {
642261ac
RZ
519 put_unlocked_mapping_entry(mapping, index,
520 entry);
521 entry = ERR_PTR(-EEXIST);
522 goto out_unlock;
523 }
524 } else { /* trying to grab a PTE entry */
91d25ba8 525 if (dax_is_pmd_entry(entry) &&
642261ac
RZ
526 (dax_is_zero_entry(entry) ||
527 dax_is_empty_entry(entry))) {
528 pmd_downgrade = true;
529 }
530 }
531 }
532
ac401cc7 533 /* No entry for given index? Make sure radix tree is big enough. */
642261ac 534 if (!entry || pmd_downgrade) {
ac401cc7
JK
535 int err;
536
642261ac
RZ
537 if (pmd_downgrade) {
538 /*
539 * Make sure 'entry' remains valid while we drop
b93b0163 540 * the i_pages lock.
642261ac
RZ
541 */
542 entry = lock_slot(mapping, slot);
543 }
544
b93b0163 545 xa_unlock_irq(&mapping->i_pages);
642261ac
RZ
546 /*
547 * Besides huge zero pages the only other thing that gets
548 * downgraded are empty entries which don't need to be
549 * unmapped.
550 */
551 if (pmd_downgrade && dax_is_zero_entry(entry))
977fbdcd
MW
552 unmap_mapping_pages(mapping, index & ~PG_PMD_COLOUR,
553 PG_PMD_NR, false);
642261ac 554
ac401cc7
JK
555 err = radix_tree_preload(
556 mapping_gfp_mask(mapping) & ~__GFP_HIGHMEM);
0cb80b48
JK
557 if (err) {
558 if (pmd_downgrade)
91d25ba8 559 put_locked_mapping_entry(mapping, index);
ac401cc7 560 return ERR_PTR(err);
0cb80b48 561 }
b93b0163 562 xa_lock_irq(&mapping->i_pages);
642261ac 563
e11f8b7b
RZ
564 if (!entry) {
565 /*
b93b0163 566 * We needed to drop the i_pages lock while calling
e11f8b7b
RZ
567 * radix_tree_preload() and we didn't have an entry to
568 * lock. See if another thread inserted an entry at
569 * our index during this time.
570 */
b93b0163 571 entry = __radix_tree_lookup(&mapping->i_pages, index,
e11f8b7b
RZ
572 NULL, &slot);
573 if (entry) {
574 radix_tree_preload_end();
b93b0163 575 xa_unlock_irq(&mapping->i_pages);
e11f8b7b
RZ
576 goto restart;
577 }
578 }
579
642261ac 580 if (pmd_downgrade) {
d2c997c0 581 dax_disassociate_entry(entry, mapping, false);
b93b0163 582 radix_tree_delete(&mapping->i_pages, index);
642261ac
RZ
583 mapping->nrexceptional--;
584 dax_wake_mapping_entry_waiter(mapping, index, entry,
585 true);
586 }
587
588 entry = dax_radix_locked_entry(0, size_flag | RADIX_DAX_EMPTY);
589
b93b0163 590 err = __radix_tree_insert(&mapping->i_pages, index,
642261ac 591 dax_radix_order(entry), entry);
ac401cc7
JK
592 radix_tree_preload_end();
593 if (err) {
b93b0163 594 xa_unlock_irq(&mapping->i_pages);
642261ac 595 /*
e11f8b7b
RZ
596 * Our insertion of a DAX entry failed, most likely
597 * because we were inserting a PMD entry and it
598 * collided with a PTE sized entry at a different
599 * index in the PMD range. We haven't inserted
600 * anything into the radix tree and have no waiters to
601 * wake.
642261ac 602 */
ac401cc7
JK
603 return ERR_PTR(err);
604 }
605 /* Good, we have inserted empty locked entry into the tree. */
606 mapping->nrexceptional++;
b93b0163 607 xa_unlock_irq(&mapping->i_pages);
e3ad61c6 608 return entry;
ac401cc7 609 }
e3ad61c6 610 entry = lock_slot(mapping, slot);
642261ac 611 out_unlock:
b93b0163 612 xa_unlock_irq(&mapping->i_pages);
e3ad61c6 613 return entry;
ac401cc7
JK
614}
615
5fac7408
DW
616/**
617 * dax_layout_busy_page - find first pinned page in @mapping
618 * @mapping: address space to scan for a page with ref count > 1
619 *
620 * DAX requires ZONE_DEVICE mapped pages. These pages are never
621 * 'onlined' to the page allocator so they are considered idle when
622 * page->count == 1. A filesystem uses this interface to determine if
623 * any page in the mapping is busy, i.e. for DMA, or other
624 * get_user_pages() usages.
625 *
626 * It is expected that the filesystem is holding locks to block the
627 * establishment of new mappings in this address_space. I.e. it expects
628 * to be able to run unmap_mapping_range() and subsequently not race
629 * mapping_mapped() becoming true.
630 */
631struct page *dax_layout_busy_page(struct address_space *mapping)
632{
633 pgoff_t indices[PAGEVEC_SIZE];
634 struct page *page = NULL;
635 struct pagevec pvec;
636 pgoff_t index, end;
637 unsigned i;
638
639 /*
640 * In the 'limited' case get_user_pages() for dax is disabled.
641 */
642 if (IS_ENABLED(CONFIG_FS_DAX_LIMITED))
643 return NULL;
644
645 if (!dax_mapping(mapping) || !mapping_mapped(mapping))
646 return NULL;
647
648 pagevec_init(&pvec);
649 index = 0;
650 end = -1;
651
652 /*
653 * If we race get_user_pages_fast() here either we'll see the
654 * elevated page count in the pagevec_lookup and wait, or
655 * get_user_pages_fast() will see that the page it took a reference
656 * against is no longer mapped in the page tables and bail to the
657 * get_user_pages() slow path. The slow path is protected by
658 * pte_lock() and pmd_lock(). New references are not taken without
659 * holding those locks, and unmap_mapping_range() will not zero the
660 * pte or pmd without holding the respective lock, so we are
661 * guaranteed to either see new references or prevent new
662 * references from being established.
663 */
664 unmap_mapping_range(mapping, 0, 0, 1);
665
666 while (index < end && pagevec_lookup_entries(&pvec, mapping, index,
667 min(end - index, (pgoff_t)PAGEVEC_SIZE),
668 indices)) {
d7782145
DW
669 pgoff_t nr_pages = 1;
670
5fac7408
DW
671 for (i = 0; i < pagevec_count(&pvec); i++) {
672 struct page *pvec_ent = pvec.pages[i];
673 void *entry;
674
675 index = indices[i];
676 if (index >= end)
677 break;
678
cdbf8897
RZ
679 if (WARN_ON_ONCE(
680 !radix_tree_exceptional_entry(pvec_ent)))
5fac7408
DW
681 continue;
682
683 xa_lock_irq(&mapping->i_pages);
684 entry = get_unlocked_mapping_entry(mapping, index, NULL);
d7782145 685 if (entry) {
5fac7408 686 page = dax_busy_page(entry);
d7782145
DW
687 /*
688 * Account for multi-order entries at
689 * the end of the pagevec.
690 */
691 if (i + 1 >= pagevec_count(&pvec))
692 nr_pages = 1UL << dax_radix_order(entry);
693 }
5fac7408
DW
694 put_unlocked_mapping_entry(mapping, index, entry);
695 xa_unlock_irq(&mapping->i_pages);
696 if (page)
697 break;
698 }
cdbf8897
RZ
699
700 /*
701 * We don't expect normal struct page entries to exist in our
702 * tree, but we keep these pagevec calls so that this code is
703 * consistent with the common pattern for handling pagevecs
704 * throughout the kernel.
705 */
5fac7408
DW
706 pagevec_remove_exceptionals(&pvec);
707 pagevec_release(&pvec);
d7782145 708 index += nr_pages;
5fac7408
DW
709
710 if (page)
711 break;
712 }
713 return page;
714}
715EXPORT_SYMBOL_GPL(dax_layout_busy_page);
716
c6dcf52c
JK
717static int __dax_invalidate_mapping_entry(struct address_space *mapping,
718 pgoff_t index, bool trunc)
719{
720 int ret = 0;
721 void *entry;
b93b0163 722 struct radix_tree_root *pages = &mapping->i_pages;
c6dcf52c 723
b93b0163 724 xa_lock_irq(pages);
c6dcf52c 725 entry = get_unlocked_mapping_entry(mapping, index, NULL);
91d25ba8 726 if (!entry || WARN_ON_ONCE(!radix_tree_exceptional_entry(entry)))
c6dcf52c
JK
727 goto out;
728 if (!trunc &&
b93b0163
MW
729 (radix_tree_tag_get(pages, index, PAGECACHE_TAG_DIRTY) ||
730 radix_tree_tag_get(pages, index, PAGECACHE_TAG_TOWRITE)))
c6dcf52c 731 goto out;
d2c997c0 732 dax_disassociate_entry(entry, mapping, trunc);
b93b0163 733 radix_tree_delete(pages, index);
c6dcf52c
JK
734 mapping->nrexceptional--;
735 ret = 1;
736out:
737 put_unlocked_mapping_entry(mapping, index, entry);
b93b0163 738 xa_unlock_irq(pages);
c6dcf52c
JK
739 return ret;
740}
ac401cc7
JK
741/*
742 * Delete exceptional DAX entry at @index from @mapping. Wait for radix tree
743 * entry to get unlocked before deleting it.
744 */
745int dax_delete_mapping_entry(struct address_space *mapping, pgoff_t index)
746{
c6dcf52c 747 int ret = __dax_invalidate_mapping_entry(mapping, index, true);
ac401cc7 748
ac401cc7
JK
749 /*
750 * This gets called from truncate / punch_hole path. As such, the caller
751 * must hold locks protecting against concurrent modifications of the
752 * radix tree (usually fs-private i_mmap_sem for writing). Since the
753 * caller has seen exceptional entry for this index, we better find it
754 * at that index as well...
755 */
c6dcf52c
JK
756 WARN_ON_ONCE(!ret);
757 return ret;
758}
759
c6dcf52c
JK
760/*
761 * Invalidate exceptional DAX entry if it is clean.
762 */
763int dax_invalidate_mapping_entry_sync(struct address_space *mapping,
764 pgoff_t index)
765{
766 return __dax_invalidate_mapping_entry(mapping, index, false);
ac401cc7
JK
767}
768
cccbce67
DW
769static int copy_user_dax(struct block_device *bdev, struct dax_device *dax_dev,
770 sector_t sector, size_t size, struct page *to,
771 unsigned long vaddr)
f7ca90b1 772{
cccbce67
DW
773 void *vto, *kaddr;
774 pgoff_t pgoff;
cccbce67
DW
775 long rc;
776 int id;
777
778 rc = bdev_dax_pgoff(bdev, sector, size, &pgoff);
779 if (rc)
780 return rc;
781
782 id = dax_read_lock();
86ed913b 783 rc = dax_direct_access(dax_dev, pgoff, PHYS_PFN(size), &kaddr, NULL);
cccbce67
DW
784 if (rc < 0) {
785 dax_read_unlock(id);
786 return rc;
787 }
f7ca90b1 788 vto = kmap_atomic(to);
cccbce67 789 copy_user_page(vto, (void __force *)kaddr, vaddr, to);
f7ca90b1 790 kunmap_atomic(vto);
cccbce67 791 dax_read_unlock(id);
f7ca90b1
MW
792 return 0;
793}
794
642261ac
RZ
795/*
796 * By this point grab_mapping_entry() has ensured that we have a locked entry
797 * of the appropriate size so we don't have to worry about downgrading PMDs to
798 * PTEs. If we happen to be trying to insert a PTE and there is a PMD
799 * already in the tree, we will skip the insertion and just dirty the PMD as
800 * appropriate.
801 */
ac401cc7
JK
802static void *dax_insert_mapping_entry(struct address_space *mapping,
803 struct vm_fault *vmf,
3fe0791c 804 void *entry, pfn_t pfn_t,
f5b7b748 805 unsigned long flags, bool dirty)
9973c98e 806{
b93b0163 807 struct radix_tree_root *pages = &mapping->i_pages;
3fe0791c 808 unsigned long pfn = pfn_t_to_pfn(pfn_t);
ac401cc7 809 pgoff_t index = vmf->pgoff;
3fe0791c 810 void *new_entry;
9973c98e 811
f5b7b748 812 if (dirty)
d2b2a28e 813 __mark_inode_dirty(mapping->host, I_DIRTY_PAGES);
9973c98e 814
91d25ba8
RZ
815 if (dax_is_zero_entry(entry) && !(flags & RADIX_DAX_ZERO_PAGE)) {
816 /* we are replacing a zero page with block mapping */
817 if (dax_is_pmd_entry(entry))
977fbdcd
MW
818 unmap_mapping_pages(mapping, index & ~PG_PMD_COLOUR,
819 PG_PMD_NR, false);
91d25ba8 820 else /* pte entry */
977fbdcd 821 unmap_mapping_pages(mapping, vmf->pgoff, 1, false);
9973c98e
RZ
822 }
823
b93b0163 824 xa_lock_irq(pages);
3fe0791c 825 new_entry = dax_radix_locked_entry(pfn, flags);
d2c997c0
DW
826 if (dax_entry_size(entry) != dax_entry_size(new_entry)) {
827 dax_disassociate_entry(entry, mapping, false);
73449daf 828 dax_associate_entry(new_entry, mapping, vmf->vma, vmf->address);
d2c997c0 829 }
642261ac 830
91d25ba8 831 if (dax_is_zero_entry(entry) || dax_is_empty_entry(entry)) {
642261ac
RZ
832 /*
833 * Only swap our new entry into the radix tree if the current
834 * entry is a zero page or an empty entry. If a normal PTE or
835 * PMD entry is already in the tree, we leave it alone. This
836 * means that if we are trying to insert a PTE and the
837 * existing entry is a PMD, we will just leave the PMD in the
838 * tree and dirty it if necessary.
839 */
f7942430 840 struct radix_tree_node *node;
ac401cc7
JK
841 void **slot;
842 void *ret;
9973c98e 843
b93b0163 844 ret = __radix_tree_lookup(pages, index, &node, &slot);
ac401cc7 845 WARN_ON_ONCE(ret != entry);
b93b0163 846 __radix_tree_replace(pages, node, slot,
c7df8ad2 847 new_entry, NULL);
91d25ba8 848 entry = new_entry;
9973c98e 849 }
91d25ba8 850
f5b7b748 851 if (dirty)
b93b0163 852 radix_tree_tag_set(pages, index, PAGECACHE_TAG_DIRTY);
91d25ba8 853
b93b0163 854 xa_unlock_irq(pages);
91d25ba8 855 return entry;
9973c98e
RZ
856}
857
4b4bb46d
JK
858static inline unsigned long
859pgoff_address(pgoff_t pgoff, struct vm_area_struct *vma)
860{
861 unsigned long address;
862
863 address = vma->vm_start + ((pgoff - vma->vm_pgoff) << PAGE_SHIFT);
864 VM_BUG_ON_VMA(address < vma->vm_start || address >= vma->vm_end, vma);
865 return address;
866}
867
868/* Walk all mappings of a given index of a file and writeprotect them */
869static void dax_mapping_entry_mkclean(struct address_space *mapping,
870 pgoff_t index, unsigned long pfn)
871{
872 struct vm_area_struct *vma;
f729c8c9
RZ
873 pte_t pte, *ptep = NULL;
874 pmd_t *pmdp = NULL;
4b4bb46d 875 spinlock_t *ptl;
4b4bb46d
JK
876
877 i_mmap_lock_read(mapping);
878 vma_interval_tree_foreach(vma, &mapping->i_mmap, index, index) {
a4d1a885 879 unsigned long address, start, end;
4b4bb46d
JK
880
881 cond_resched();
882
883 if (!(vma->vm_flags & VM_SHARED))
884 continue;
885
886 address = pgoff_address(index, vma);
a4d1a885
JG
887
888 /*
889 * Note because we provide start/end to follow_pte_pmd it will
890 * call mmu_notifier_invalidate_range_start() on our behalf
891 * before taking any lock.
892 */
893 if (follow_pte_pmd(vma->vm_mm, address, &start, &end, &ptep, &pmdp, &ptl))
4b4bb46d 894 continue;
4b4bb46d 895
0f10851e
JG
896 /*
897 * No need to call mmu_notifier_invalidate_range() as we are
898 * downgrading page table protection not changing it to point
899 * to a new page.
900 *
ad56b738 901 * See Documentation/vm/mmu_notifier.rst
0f10851e 902 */
f729c8c9
RZ
903 if (pmdp) {
904#ifdef CONFIG_FS_DAX_PMD
905 pmd_t pmd;
906
907 if (pfn != pmd_pfn(*pmdp))
908 goto unlock_pmd;
f6f37321 909 if (!pmd_dirty(*pmdp) && !pmd_write(*pmdp))
f729c8c9
RZ
910 goto unlock_pmd;
911
912 flush_cache_page(vma, address, pfn);
913 pmd = pmdp_huge_clear_flush(vma, address, pmdp);
914 pmd = pmd_wrprotect(pmd);
915 pmd = pmd_mkclean(pmd);
916 set_pmd_at(vma->vm_mm, address, pmdp, pmd);
f729c8c9 917unlock_pmd:
f729c8c9 918#endif
ee190ca6 919 spin_unlock(ptl);
f729c8c9
RZ
920 } else {
921 if (pfn != pte_pfn(*ptep))
922 goto unlock_pte;
923 if (!pte_dirty(*ptep) && !pte_write(*ptep))
924 goto unlock_pte;
925
926 flush_cache_page(vma, address, pfn);
927 pte = ptep_clear_flush(vma, address, ptep);
928 pte = pte_wrprotect(pte);
929 pte = pte_mkclean(pte);
930 set_pte_at(vma->vm_mm, address, ptep, pte);
f729c8c9
RZ
931unlock_pte:
932 pte_unmap_unlock(ptep, ptl);
933 }
4b4bb46d 934
a4d1a885 935 mmu_notifier_invalidate_range_end(vma->vm_mm, start, end);
4b4bb46d
JK
936 }
937 i_mmap_unlock_read(mapping);
938}
939
3fe0791c
DW
940static int dax_writeback_one(struct dax_device *dax_dev,
941 struct address_space *mapping, pgoff_t index, void *entry)
9973c98e 942{
b93b0163 943 struct radix_tree_root *pages = &mapping->i_pages;
3fe0791c
DW
944 void *entry2, **slot;
945 unsigned long pfn;
946 long ret = 0;
cccbce67 947 size_t size;
9973c98e 948
9973c98e 949 /*
a6abc2c0
JK
950 * A page got tagged dirty in DAX mapping? Something is seriously
951 * wrong.
9973c98e 952 */
a6abc2c0
JK
953 if (WARN_ON(!radix_tree_exceptional_entry(entry)))
954 return -EIO;
9973c98e 955
b93b0163 956 xa_lock_irq(pages);
a6abc2c0
JK
957 entry2 = get_unlocked_mapping_entry(mapping, index, &slot);
958 /* Entry got punched out / reallocated? */
91d25ba8 959 if (!entry2 || WARN_ON_ONCE(!radix_tree_exceptional_entry(entry2)))
a6abc2c0
JK
960 goto put_unlocked;
961 /*
962 * Entry got reallocated elsewhere? No need to writeback. We have to
3fe0791c 963 * compare pfns as we must not bail out due to difference in lockbit
a6abc2c0
JK
964 * or entry type.
965 */
3fe0791c 966 if (dax_radix_pfn(entry2) != dax_radix_pfn(entry))
a6abc2c0 967 goto put_unlocked;
642261ac
RZ
968 if (WARN_ON_ONCE(dax_is_empty_entry(entry) ||
969 dax_is_zero_entry(entry))) {
9973c98e 970 ret = -EIO;
a6abc2c0 971 goto put_unlocked;
9973c98e
RZ
972 }
973
a6abc2c0 974 /* Another fsync thread may have already written back this entry */
b93b0163 975 if (!radix_tree_tag_get(pages, index, PAGECACHE_TAG_TOWRITE))
a6abc2c0
JK
976 goto put_unlocked;
977 /* Lock the entry to serialize with page faults */
978 entry = lock_slot(mapping, slot);
979 /*
980 * We can clear the tag now but we have to be careful so that concurrent
981 * dax_writeback_one() calls for the same index cannot finish before we
982 * actually flush the caches. This is achieved as the calls will look
b93b0163
MW
983 * at the entry only under the i_pages lock and once they do that
984 * they will see the entry locked and wait for it to unlock.
a6abc2c0 985 */
b93b0163
MW
986 radix_tree_tag_clear(pages, index, PAGECACHE_TAG_TOWRITE);
987 xa_unlock_irq(pages);
a6abc2c0 988
642261ac
RZ
989 /*
990 * Even if dax_writeback_mapping_range() was given a wbc->range_start
991 * in the middle of a PMD, the 'index' we are given will be aligned to
3fe0791c
DW
992 * the start index of the PMD, as will the pfn we pull from 'entry'.
993 * This allows us to flush for PMD_SIZE and not have to worry about
994 * partial PMD writebacks.
642261ac 995 */
3fe0791c 996 pfn = dax_radix_pfn(entry);
cccbce67
DW
997 size = PAGE_SIZE << dax_radix_order(entry);
998
3fe0791c
DW
999 dax_mapping_entry_mkclean(mapping, index, pfn);
1000 dax_flush(dax_dev, page_address(pfn_to_page(pfn)), size);
4b4bb46d
JK
1001 /*
1002 * After we have flushed the cache, we can clear the dirty tag. There
1003 * cannot be new dirty data in the pfn after the flush has completed as
1004 * the pfn mappings are writeprotected and fault waits for mapping
1005 * entry lock.
1006 */
b93b0163
MW
1007 xa_lock_irq(pages);
1008 radix_tree_tag_clear(pages, index, PAGECACHE_TAG_DIRTY);
1009 xa_unlock_irq(pages);
f9bc3a07 1010 trace_dax_writeback_one(mapping->host, index, size >> PAGE_SHIFT);
91d25ba8 1011 put_locked_mapping_entry(mapping, index);
9973c98e
RZ
1012 return ret;
1013
a6abc2c0
JK
1014 put_unlocked:
1015 put_unlocked_mapping_entry(mapping, index, entry2);
b93b0163 1016 xa_unlock_irq(pages);
9973c98e
RZ
1017 return ret;
1018}
1019
1020/*
1021 * Flush the mapping to the persistent domain within the byte range of [start,
1022 * end]. This is required by data integrity operations to ensure file data is
1023 * on persistent storage prior to completion of the operation.
1024 */
7f6d5b52
RZ
1025int dax_writeback_mapping_range(struct address_space *mapping,
1026 struct block_device *bdev, struct writeback_control *wbc)
9973c98e
RZ
1027{
1028 struct inode *inode = mapping->host;
642261ac 1029 pgoff_t start_index, end_index;
9973c98e 1030 pgoff_t indices[PAGEVEC_SIZE];
cccbce67 1031 struct dax_device *dax_dev;
9973c98e
RZ
1032 struct pagevec pvec;
1033 bool done = false;
1034 int i, ret = 0;
9973c98e
RZ
1035
1036 if (WARN_ON_ONCE(inode->i_blkbits != PAGE_SHIFT))
1037 return -EIO;
1038
7f6d5b52
RZ
1039 if (!mapping->nrexceptional || wbc->sync_mode != WB_SYNC_ALL)
1040 return 0;
1041
cccbce67
DW
1042 dax_dev = dax_get_by_host(bdev->bd_disk->disk_name);
1043 if (!dax_dev)
1044 return -EIO;
1045
09cbfeaf
KS
1046 start_index = wbc->range_start >> PAGE_SHIFT;
1047 end_index = wbc->range_end >> PAGE_SHIFT;
9973c98e 1048
d14a3f48
RZ
1049 trace_dax_writeback_range(inode, start_index, end_index);
1050
9973c98e
RZ
1051 tag_pages_for_writeback(mapping, start_index, end_index);
1052
86679820 1053 pagevec_init(&pvec);
9973c98e
RZ
1054 while (!done) {
1055 pvec.nr = find_get_entries_tag(mapping, start_index,
1056 PAGECACHE_TAG_TOWRITE, PAGEVEC_SIZE,
1057 pvec.pages, indices);
1058
1059 if (pvec.nr == 0)
1060 break;
1061
1062 for (i = 0; i < pvec.nr; i++) {
1063 if (indices[i] > end_index) {
1064 done = true;
1065 break;
1066 }
1067
3fe0791c
DW
1068 ret = dax_writeback_one(dax_dev, mapping, indices[i],
1069 pvec.pages[i]);
819ec6b9
JL
1070 if (ret < 0) {
1071 mapping_set_error(mapping, ret);
d14a3f48 1072 goto out;
819ec6b9 1073 }
9973c98e 1074 }
1eb643d0 1075 start_index = indices[pvec.nr - 1] + 1;
9973c98e 1076 }
d14a3f48 1077out:
cccbce67 1078 put_dax(dax_dev);
d14a3f48
RZ
1079 trace_dax_writeback_range_done(inode, start_index, end_index);
1080 return (ret < 0 ? ret : 0);
9973c98e
RZ
1081}
1082EXPORT_SYMBOL_GPL(dax_writeback_mapping_range);
1083
31a6f1a6 1084static sector_t dax_iomap_sector(struct iomap *iomap, loff_t pos)
f7ca90b1 1085{
a3841f94 1086 return (iomap->addr + (pos & PAGE_MASK) - iomap->offset) >> 9;
31a6f1a6
JK
1087}
1088
5e161e40
JK
1089static int dax_iomap_pfn(struct iomap *iomap, loff_t pos, size_t size,
1090 pfn_t *pfnp)
f7ca90b1 1091{
31a6f1a6 1092 const sector_t sector = dax_iomap_sector(iomap, pos);
cccbce67
DW
1093 pgoff_t pgoff;
1094 int id, rc;
5e161e40 1095 long length;
f7ca90b1 1096
5e161e40 1097 rc = bdev_dax_pgoff(iomap->bdev, sector, size, &pgoff);
cccbce67
DW
1098 if (rc)
1099 return rc;
cccbce67 1100 id = dax_read_lock();
5e161e40 1101 length = dax_direct_access(iomap->dax_dev, pgoff, PHYS_PFN(size),
86ed913b 1102 NULL, pfnp);
5e161e40
JK
1103 if (length < 0) {
1104 rc = length;
1105 goto out;
cccbce67 1106 }
5e161e40
JK
1107 rc = -EINVAL;
1108 if (PFN_PHYS(length) < size)
1109 goto out;
1110 if (pfn_t_to_pfn(*pfnp) & (PHYS_PFN(size)-1))
1111 goto out;
1112 /* For larger pages we need devmap */
1113 if (length > 1 && !pfn_t_devmap(*pfnp))
1114 goto out;
1115 rc = 0;
1116out:
cccbce67 1117 dax_read_unlock(id);
5e161e40 1118 return rc;
0e3b210c 1119}
0e3b210c 1120
e30331ff 1121/*
91d25ba8
RZ
1122 * The user has performed a load from a hole in the file. Allocating a new
1123 * page in the file would cause excessive storage usage for workloads with
1124 * sparse files. Instead we insert a read-only mapping of the 4k zero page.
1125 * If this page is ever written to we will re-fault and change the mapping to
1126 * point to real DAX storage instead.
e30331ff 1127 */
ab77dab4 1128static vm_fault_t dax_load_hole(struct address_space *mapping, void *entry,
e30331ff
RZ
1129 struct vm_fault *vmf)
1130{
1131 struct inode *inode = mapping->host;
91d25ba8 1132 unsigned long vaddr = vmf->address;
b90ca5cc
MW
1133 pfn_t pfn = pfn_to_pfn_t(my_zero_pfn(vaddr));
1134 vm_fault_t ret;
e30331ff 1135
cc4a90ac
MW
1136 dax_insert_mapping_entry(mapping, vmf, entry, pfn, RADIX_DAX_ZERO_PAGE,
1137 false);
ab77dab4 1138 ret = vmf_insert_mixed(vmf->vma, vaddr, pfn);
e30331ff
RZ
1139 trace_dax_load_hole(inode, vmf, ret);
1140 return ret;
1141}
1142
4b0228fa
VV
1143static bool dax_range_is_aligned(struct block_device *bdev,
1144 unsigned int offset, unsigned int length)
1145{
1146 unsigned short sector_size = bdev_logical_block_size(bdev);
1147
1148 if (!IS_ALIGNED(offset, sector_size))
1149 return false;
1150 if (!IS_ALIGNED(length, sector_size))
1151 return false;
1152
1153 return true;
1154}
1155
cccbce67
DW
1156int __dax_zero_page_range(struct block_device *bdev,
1157 struct dax_device *dax_dev, sector_t sector,
1158 unsigned int offset, unsigned int size)
679c8bd3 1159{
cccbce67
DW
1160 if (dax_range_is_aligned(bdev, offset, size)) {
1161 sector_t start_sector = sector + (offset >> 9);
4b0228fa
VV
1162
1163 return blkdev_issue_zeroout(bdev, start_sector,
53ef7d0e 1164 size >> 9, GFP_NOFS, 0);
4b0228fa 1165 } else {
cccbce67
DW
1166 pgoff_t pgoff;
1167 long rc, id;
1168 void *kaddr;
cccbce67 1169
e84b83b9 1170 rc = bdev_dax_pgoff(bdev, sector, PAGE_SIZE, &pgoff);
cccbce67
DW
1171 if (rc)
1172 return rc;
1173
1174 id = dax_read_lock();
86ed913b 1175 rc = dax_direct_access(dax_dev, pgoff, 1, &kaddr, NULL);
cccbce67
DW
1176 if (rc < 0) {
1177 dax_read_unlock(id);
1178 return rc;
1179 }
81f55870 1180 memset(kaddr + offset, 0, size);
c3ca015f 1181 dax_flush(dax_dev, kaddr + offset, size);
cccbce67 1182 dax_read_unlock(id);
4b0228fa 1183 }
679c8bd3
CH
1184 return 0;
1185}
1186EXPORT_SYMBOL_GPL(__dax_zero_page_range);
1187
a254e568 1188static loff_t
11c59c92 1189dax_iomap_actor(struct inode *inode, loff_t pos, loff_t length, void *data,
a254e568
CH
1190 struct iomap *iomap)
1191{
cccbce67
DW
1192 struct block_device *bdev = iomap->bdev;
1193 struct dax_device *dax_dev = iomap->dax_dev;
a254e568
CH
1194 struct iov_iter *iter = data;
1195 loff_t end = pos + length, done = 0;
1196 ssize_t ret = 0;
a77d4786 1197 size_t xfer;
cccbce67 1198 int id;
a254e568
CH
1199
1200 if (iov_iter_rw(iter) == READ) {
1201 end = min(end, i_size_read(inode));
1202 if (pos >= end)
1203 return 0;
1204
1205 if (iomap->type == IOMAP_HOLE || iomap->type == IOMAP_UNWRITTEN)
1206 return iov_iter_zero(min(length, end - pos), iter);
1207 }
1208
1209 if (WARN_ON_ONCE(iomap->type != IOMAP_MAPPED))
1210 return -EIO;
1211
e3fce68c
JK
1212 /*
1213 * Write can allocate block for an area which has a hole page mapped
1214 * into page tables. We have to tear down these mappings so that data
1215 * written by write(2) is visible in mmap.
1216 */
cd656375 1217 if (iomap->flags & IOMAP_F_NEW) {
e3fce68c
JK
1218 invalidate_inode_pages2_range(inode->i_mapping,
1219 pos >> PAGE_SHIFT,
1220 (end - 1) >> PAGE_SHIFT);
1221 }
1222
cccbce67 1223 id = dax_read_lock();
a254e568
CH
1224 while (pos < end) {
1225 unsigned offset = pos & (PAGE_SIZE - 1);
cccbce67
DW
1226 const size_t size = ALIGN(length + offset, PAGE_SIZE);
1227 const sector_t sector = dax_iomap_sector(iomap, pos);
a254e568 1228 ssize_t map_len;
cccbce67
DW
1229 pgoff_t pgoff;
1230 void *kaddr;
a254e568 1231
d1908f52
MH
1232 if (fatal_signal_pending(current)) {
1233 ret = -EINTR;
1234 break;
1235 }
1236
cccbce67
DW
1237 ret = bdev_dax_pgoff(bdev, sector, size, &pgoff);
1238 if (ret)
1239 break;
1240
1241 map_len = dax_direct_access(dax_dev, pgoff, PHYS_PFN(size),
86ed913b 1242 &kaddr, NULL);
a254e568
CH
1243 if (map_len < 0) {
1244 ret = map_len;
1245 break;
1246 }
1247
cccbce67
DW
1248 map_len = PFN_PHYS(map_len);
1249 kaddr += offset;
a254e568
CH
1250 map_len -= offset;
1251 if (map_len > end - pos)
1252 map_len = end - pos;
1253
a2e050f5
RZ
1254 /*
1255 * The userspace address for the memory copy has already been
1256 * validated via access_ok() in either vfs_read() or
1257 * vfs_write(), depending on which operation we are doing.
1258 */
a254e568 1259 if (iov_iter_rw(iter) == WRITE)
a77d4786 1260 xfer = dax_copy_from_iter(dax_dev, pgoff, kaddr,
fec53774 1261 map_len, iter);
a254e568 1262 else
a77d4786 1263 xfer = dax_copy_to_iter(dax_dev, pgoff, kaddr,
b3a9a0c3 1264 map_len, iter);
a254e568 1265
a77d4786
DW
1266 pos += xfer;
1267 length -= xfer;
1268 done += xfer;
1269
1270 if (xfer == 0)
1271 ret = -EFAULT;
1272 if (xfer < map_len)
1273 break;
a254e568 1274 }
cccbce67 1275 dax_read_unlock(id);
a254e568
CH
1276
1277 return done ? done : ret;
1278}
1279
1280/**
11c59c92 1281 * dax_iomap_rw - Perform I/O to a DAX file
a254e568
CH
1282 * @iocb: The control block for this I/O
1283 * @iter: The addresses to do I/O from or to
1284 * @ops: iomap ops passed from the file system
1285 *
1286 * This function performs read and write operations to directly mapped
1287 * persistent memory. The callers needs to take care of read/write exclusion
1288 * and evicting any page cache pages in the region under I/O.
1289 */
1290ssize_t
11c59c92 1291dax_iomap_rw(struct kiocb *iocb, struct iov_iter *iter,
8ff6daa1 1292 const struct iomap_ops *ops)
a254e568
CH
1293{
1294 struct address_space *mapping = iocb->ki_filp->f_mapping;
1295 struct inode *inode = mapping->host;
1296 loff_t pos = iocb->ki_pos, ret = 0, done = 0;
1297 unsigned flags = 0;
1298
168316db
CH
1299 if (iov_iter_rw(iter) == WRITE) {
1300 lockdep_assert_held_exclusive(&inode->i_rwsem);
a254e568 1301 flags |= IOMAP_WRITE;
168316db
CH
1302 } else {
1303 lockdep_assert_held(&inode->i_rwsem);
1304 }
a254e568 1305
a254e568
CH
1306 while (iov_iter_count(iter)) {
1307 ret = iomap_apply(inode, pos, iov_iter_count(iter), flags, ops,
11c59c92 1308 iter, dax_iomap_actor);
a254e568
CH
1309 if (ret <= 0)
1310 break;
1311 pos += ret;
1312 done += ret;
1313 }
1314
1315 iocb->ki_pos += done;
1316 return done ? done : ret;
1317}
11c59c92 1318EXPORT_SYMBOL_GPL(dax_iomap_rw);
a7d73fe6 1319
ab77dab4 1320static vm_fault_t dax_fault_return(int error)
9f141d6e
JK
1321{
1322 if (error == 0)
1323 return VM_FAULT_NOPAGE;
1324 if (error == -ENOMEM)
1325 return VM_FAULT_OOM;
1326 return VM_FAULT_SIGBUS;
1327}
1328
aaa422c4
DW
1329/*
1330 * MAP_SYNC on a dax mapping guarantees dirty metadata is
1331 * flushed on write-faults (non-cow), but not read-faults.
1332 */
1333static bool dax_fault_is_synchronous(unsigned long flags,
1334 struct vm_area_struct *vma, struct iomap *iomap)
1335{
1336 return (flags & IOMAP_WRITE) && (vma->vm_flags & VM_SYNC)
1337 && (iomap->flags & IOMAP_F_DIRTY);
1338}
1339
ab77dab4 1340static vm_fault_t dax_iomap_pte_fault(struct vm_fault *vmf, pfn_t *pfnp,
c0b24625 1341 int *iomap_errp, const struct iomap_ops *ops)
a7d73fe6 1342{
a0987ad5
JK
1343 struct vm_area_struct *vma = vmf->vma;
1344 struct address_space *mapping = vma->vm_file->f_mapping;
a7d73fe6 1345 struct inode *inode = mapping->host;
1a29d85e 1346 unsigned long vaddr = vmf->address;
a7d73fe6 1347 loff_t pos = (loff_t)vmf->pgoff << PAGE_SHIFT;
a7d73fe6 1348 struct iomap iomap = { 0 };
9484ab1b 1349 unsigned flags = IOMAP_FAULT;
a7d73fe6 1350 int error, major = 0;
d2c43ef1 1351 bool write = vmf->flags & FAULT_FLAG_WRITE;
caa51d26 1352 bool sync;
ab77dab4 1353 vm_fault_t ret = 0;
a7d73fe6 1354 void *entry;
1b5a1cb2 1355 pfn_t pfn;
a7d73fe6 1356
ab77dab4 1357 trace_dax_pte_fault(inode, vmf, ret);
a7d73fe6
CH
1358 /*
1359 * Check whether offset isn't beyond end of file now. Caller is supposed
1360 * to hold locks serializing us with truncate / punch hole so this is
1361 * a reliable test.
1362 */
a9c42b33 1363 if (pos >= i_size_read(inode)) {
ab77dab4 1364 ret = VM_FAULT_SIGBUS;
a9c42b33
RZ
1365 goto out;
1366 }
a7d73fe6 1367
d2c43ef1 1368 if (write && !vmf->cow_page)
a7d73fe6
CH
1369 flags |= IOMAP_WRITE;
1370
13e451fd
JK
1371 entry = grab_mapping_entry(mapping, vmf->pgoff, 0);
1372 if (IS_ERR(entry)) {
ab77dab4 1373 ret = dax_fault_return(PTR_ERR(entry));
13e451fd
JK
1374 goto out;
1375 }
1376
e2093926
RZ
1377 /*
1378 * It is possible, particularly with mixed reads & writes to private
1379 * mappings, that we have raced with a PMD fault that overlaps with
1380 * the PTE we need to set up. If so just return and the fault will be
1381 * retried.
1382 */
1383 if (pmd_trans_huge(*vmf->pmd) || pmd_devmap(*vmf->pmd)) {
ab77dab4 1384 ret = VM_FAULT_NOPAGE;
e2093926
RZ
1385 goto unlock_entry;
1386 }
1387
a7d73fe6
CH
1388 /*
1389 * Note that we don't bother to use iomap_apply here: DAX required
1390 * the file system block size to be equal the page size, which means
1391 * that we never have to deal with more than a single extent here.
1392 */
1393 error = ops->iomap_begin(inode, pos, PAGE_SIZE, flags, &iomap);
c0b24625
JK
1394 if (iomap_errp)
1395 *iomap_errp = error;
a9c42b33 1396 if (error) {
ab77dab4 1397 ret = dax_fault_return(error);
13e451fd 1398 goto unlock_entry;
a9c42b33 1399 }
a7d73fe6 1400 if (WARN_ON_ONCE(iomap.offset + iomap.length < pos + PAGE_SIZE)) {
13e451fd
JK
1401 error = -EIO; /* fs corruption? */
1402 goto error_finish_iomap;
a7d73fe6
CH
1403 }
1404
a7d73fe6 1405 if (vmf->cow_page) {
31a6f1a6
JK
1406 sector_t sector = dax_iomap_sector(&iomap, pos);
1407
a7d73fe6
CH
1408 switch (iomap.type) {
1409 case IOMAP_HOLE:
1410 case IOMAP_UNWRITTEN:
1411 clear_user_highpage(vmf->cow_page, vaddr);
1412 break;
1413 case IOMAP_MAPPED:
cccbce67
DW
1414 error = copy_user_dax(iomap.bdev, iomap.dax_dev,
1415 sector, PAGE_SIZE, vmf->cow_page, vaddr);
a7d73fe6
CH
1416 break;
1417 default:
1418 WARN_ON_ONCE(1);
1419 error = -EIO;
1420 break;
1421 }
1422
1423 if (error)
13e451fd 1424 goto error_finish_iomap;
b1aa812b
JK
1425
1426 __SetPageUptodate(vmf->cow_page);
ab77dab4
SJ
1427 ret = finish_fault(vmf);
1428 if (!ret)
1429 ret = VM_FAULT_DONE_COW;
13e451fd 1430 goto finish_iomap;
a7d73fe6
CH
1431 }
1432
aaa422c4 1433 sync = dax_fault_is_synchronous(flags, vma, &iomap);
caa51d26 1434
a7d73fe6
CH
1435 switch (iomap.type) {
1436 case IOMAP_MAPPED:
1437 if (iomap.flags & IOMAP_F_NEW) {
1438 count_vm_event(PGMAJFAULT);
a0987ad5 1439 count_memcg_event_mm(vma->vm_mm, PGMAJFAULT);
a7d73fe6
CH
1440 major = VM_FAULT_MAJOR;
1441 }
1b5a1cb2
JK
1442 error = dax_iomap_pfn(&iomap, pos, PAGE_SIZE, &pfn);
1443 if (error < 0)
1444 goto error_finish_iomap;
1445
3fe0791c 1446 entry = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
caa51d26 1447 0, write && !sync);
1b5a1cb2 1448
caa51d26
JK
1449 /*
1450 * If we are doing synchronous page fault and inode needs fsync,
1451 * we can insert PTE into page tables only after that happens.
1452 * Skip insertion for now and return the pfn so that caller can
1453 * insert it after fsync is done.
1454 */
1455 if (sync) {
1456 if (WARN_ON_ONCE(!pfnp)) {
1457 error = -EIO;
1458 goto error_finish_iomap;
1459 }
1460 *pfnp = pfn;
ab77dab4 1461 ret = VM_FAULT_NEEDDSYNC | major;
caa51d26
JK
1462 goto finish_iomap;
1463 }
1b5a1cb2
JK
1464 trace_dax_insert_mapping(inode, vmf, entry);
1465 if (write)
ab77dab4 1466 ret = vmf_insert_mixed_mkwrite(vma, vaddr, pfn);
1b5a1cb2 1467 else
ab77dab4 1468 ret = vmf_insert_mixed(vma, vaddr, pfn);
1b5a1cb2 1469
ab77dab4 1470 goto finish_iomap;
a7d73fe6
CH
1471 case IOMAP_UNWRITTEN:
1472 case IOMAP_HOLE:
d2c43ef1 1473 if (!write) {
ab77dab4 1474 ret = dax_load_hole(mapping, entry, vmf);
13e451fd 1475 goto finish_iomap;
1550290b 1476 }
a7d73fe6
CH
1477 /*FALLTHRU*/
1478 default:
1479 WARN_ON_ONCE(1);
1480 error = -EIO;
1481 break;
1482 }
1483
13e451fd 1484 error_finish_iomap:
ab77dab4 1485 ret = dax_fault_return(error);
9f141d6e
JK
1486 finish_iomap:
1487 if (ops->iomap_end) {
1488 int copied = PAGE_SIZE;
1489
ab77dab4 1490 if (ret & VM_FAULT_ERROR)
9f141d6e
JK
1491 copied = 0;
1492 /*
1493 * The fault is done by now and there's no way back (other
1494 * thread may be already happily using PTE we have installed).
1495 * Just ignore error from ->iomap_end since we cannot do much
1496 * with it.
1497 */
1498 ops->iomap_end(inode, pos, PAGE_SIZE, copied, flags, &iomap);
1550290b 1499 }
13e451fd 1500 unlock_entry:
91d25ba8 1501 put_locked_mapping_entry(mapping, vmf->pgoff);
13e451fd 1502 out:
ab77dab4
SJ
1503 trace_dax_pte_fault_done(inode, vmf, ret);
1504 return ret | major;
a7d73fe6 1505}
642261ac
RZ
1506
1507#ifdef CONFIG_FS_DAX_PMD
ab77dab4 1508static vm_fault_t dax_pmd_load_hole(struct vm_fault *vmf, struct iomap *iomap,
91d25ba8 1509 void *entry)
642261ac 1510{
f4200391
DJ
1511 struct address_space *mapping = vmf->vma->vm_file->f_mapping;
1512 unsigned long pmd_addr = vmf->address & PMD_MASK;
653b2ea3 1513 struct inode *inode = mapping->host;
642261ac 1514 struct page *zero_page;
653b2ea3 1515 void *ret = NULL;
642261ac
RZ
1516 spinlock_t *ptl;
1517 pmd_t pmd_entry;
3fe0791c 1518 pfn_t pfn;
642261ac 1519
f4200391 1520 zero_page = mm_get_huge_zero_page(vmf->vma->vm_mm);
642261ac
RZ
1521
1522 if (unlikely(!zero_page))
653b2ea3 1523 goto fallback;
642261ac 1524
3fe0791c
DW
1525 pfn = page_to_pfn_t(zero_page);
1526 ret = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
f5b7b748 1527 RADIX_DAX_PMD | RADIX_DAX_ZERO_PAGE, false);
642261ac 1528
f4200391
DJ
1529 ptl = pmd_lock(vmf->vma->vm_mm, vmf->pmd);
1530 if (!pmd_none(*(vmf->pmd))) {
642261ac 1531 spin_unlock(ptl);
653b2ea3 1532 goto fallback;
642261ac
RZ
1533 }
1534
f4200391 1535 pmd_entry = mk_pmd(zero_page, vmf->vma->vm_page_prot);
642261ac 1536 pmd_entry = pmd_mkhuge(pmd_entry);
f4200391 1537 set_pmd_at(vmf->vma->vm_mm, pmd_addr, vmf->pmd, pmd_entry);
642261ac 1538 spin_unlock(ptl);
f4200391 1539 trace_dax_pmd_load_hole(inode, vmf, zero_page, ret);
642261ac 1540 return VM_FAULT_NOPAGE;
653b2ea3
RZ
1541
1542fallback:
f4200391 1543 trace_dax_pmd_load_hole_fallback(inode, vmf, zero_page, ret);
653b2ea3 1544 return VM_FAULT_FALLBACK;
642261ac
RZ
1545}
1546
ab77dab4 1547static vm_fault_t dax_iomap_pmd_fault(struct vm_fault *vmf, pfn_t *pfnp,
a2d58167 1548 const struct iomap_ops *ops)
642261ac 1549{
f4200391 1550 struct vm_area_struct *vma = vmf->vma;
642261ac 1551 struct address_space *mapping = vma->vm_file->f_mapping;
d8a849e1
DJ
1552 unsigned long pmd_addr = vmf->address & PMD_MASK;
1553 bool write = vmf->flags & FAULT_FLAG_WRITE;
caa51d26 1554 bool sync;
9484ab1b 1555 unsigned int iomap_flags = (write ? IOMAP_WRITE : 0) | IOMAP_FAULT;
642261ac 1556 struct inode *inode = mapping->host;
ab77dab4 1557 vm_fault_t result = VM_FAULT_FALLBACK;
642261ac
RZ
1558 struct iomap iomap = { 0 };
1559 pgoff_t max_pgoff, pgoff;
642261ac
RZ
1560 void *entry;
1561 loff_t pos;
1562 int error;
302a5e31 1563 pfn_t pfn;
642261ac 1564
282a8e03
RZ
1565 /*
1566 * Check whether offset isn't beyond end of file now. Caller is
1567 * supposed to hold locks serializing us with truncate / punch hole so
1568 * this is a reliable test.
1569 */
1570 pgoff = linear_page_index(vma, pmd_addr);
957ac8c4 1571 max_pgoff = DIV_ROUND_UP(i_size_read(inode), PAGE_SIZE);
282a8e03 1572
f4200391 1573 trace_dax_pmd_fault(inode, vmf, max_pgoff, 0);
282a8e03 1574
fffa281b
RZ
1575 /*
1576 * Make sure that the faulting address's PMD offset (color) matches
1577 * the PMD offset from the start of the file. This is necessary so
1578 * that a PMD range in the page table overlaps exactly with a PMD
1579 * range in the radix tree.
1580 */
1581 if ((vmf->pgoff & PG_PMD_COLOUR) !=
1582 ((vmf->address >> PAGE_SHIFT) & PG_PMD_COLOUR))
1583 goto fallback;
1584
642261ac
RZ
1585 /* Fall back to PTEs if we're going to COW */
1586 if (write && !(vma->vm_flags & VM_SHARED))
1587 goto fallback;
1588
1589 /* If the PMD would extend outside the VMA */
1590 if (pmd_addr < vma->vm_start)
1591 goto fallback;
1592 if ((pmd_addr + PMD_SIZE) > vma->vm_end)
1593 goto fallback;
1594
957ac8c4 1595 if (pgoff >= max_pgoff) {
282a8e03
RZ
1596 result = VM_FAULT_SIGBUS;
1597 goto out;
1598 }
642261ac
RZ
1599
1600 /* If the PMD would extend beyond the file size */
957ac8c4 1601 if ((pgoff | PG_PMD_COLOUR) >= max_pgoff)
642261ac
RZ
1602 goto fallback;
1603
876f2946 1604 /*
91d25ba8
RZ
1605 * grab_mapping_entry() will make sure we get a 2MiB empty entry, a
1606 * 2MiB zero page entry or a DAX PMD. If it can't (because a 4k page
1607 * is already in the tree, for instance), it will return -EEXIST and
1608 * we just fall back to 4k entries.
876f2946
RZ
1609 */
1610 entry = grab_mapping_entry(mapping, pgoff, RADIX_DAX_PMD);
1611 if (IS_ERR(entry))
1612 goto fallback;
1613
e2093926
RZ
1614 /*
1615 * It is possible, particularly with mixed reads & writes to private
1616 * mappings, that we have raced with a PTE fault that overlaps with
1617 * the PMD we need to set up. If so just return and the fault will be
1618 * retried.
1619 */
1620 if (!pmd_none(*vmf->pmd) && !pmd_trans_huge(*vmf->pmd) &&
1621 !pmd_devmap(*vmf->pmd)) {
1622 result = 0;
1623 goto unlock_entry;
1624 }
1625
642261ac
RZ
1626 /*
1627 * Note that we don't use iomap_apply here. We aren't doing I/O, only
1628 * setting up a mapping, so really we're using iomap_begin() as a way
1629 * to look up our filesystem block.
1630 */
1631 pos = (loff_t)pgoff << PAGE_SHIFT;
1632 error = ops->iomap_begin(inode, pos, PMD_SIZE, iomap_flags, &iomap);
1633 if (error)
876f2946 1634 goto unlock_entry;
9f141d6e 1635
642261ac
RZ
1636 if (iomap.offset + iomap.length < pos + PMD_SIZE)
1637 goto finish_iomap;
1638
aaa422c4 1639 sync = dax_fault_is_synchronous(iomap_flags, vma, &iomap);
caa51d26 1640
642261ac
RZ
1641 switch (iomap.type) {
1642 case IOMAP_MAPPED:
302a5e31
JK
1643 error = dax_iomap_pfn(&iomap, pos, PMD_SIZE, &pfn);
1644 if (error < 0)
1645 goto finish_iomap;
1646
3fe0791c 1647 entry = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
caa51d26 1648 RADIX_DAX_PMD, write && !sync);
302a5e31 1649
caa51d26
JK
1650 /*
1651 * If we are doing synchronous page fault and inode needs fsync,
1652 * we can insert PMD into page tables only after that happens.
1653 * Skip insertion for now and return the pfn so that caller can
1654 * insert it after fsync is done.
1655 */
1656 if (sync) {
1657 if (WARN_ON_ONCE(!pfnp))
1658 goto finish_iomap;
1659 *pfnp = pfn;
1660 result = VM_FAULT_NEEDDSYNC;
1661 goto finish_iomap;
1662 }
1663
302a5e31
JK
1664 trace_dax_pmd_insert_mapping(inode, vmf, PMD_SIZE, pfn, entry);
1665 result = vmf_insert_pfn_pmd(vma, vmf->address, vmf->pmd, pfn,
1666 write);
642261ac
RZ
1667 break;
1668 case IOMAP_UNWRITTEN:
1669 case IOMAP_HOLE:
1670 if (WARN_ON_ONCE(write))
876f2946 1671 break;
91d25ba8 1672 result = dax_pmd_load_hole(vmf, &iomap, entry);
642261ac
RZ
1673 break;
1674 default:
1675 WARN_ON_ONCE(1);
1676 break;
1677 }
1678
1679 finish_iomap:
1680 if (ops->iomap_end) {
9f141d6e
JK
1681 int copied = PMD_SIZE;
1682
1683 if (result == VM_FAULT_FALLBACK)
1684 copied = 0;
1685 /*
1686 * The fault is done by now and there's no way back (other
1687 * thread may be already happily using PMD we have installed).
1688 * Just ignore error from ->iomap_end since we cannot do much
1689 * with it.
1690 */
1691 ops->iomap_end(inode, pos, PMD_SIZE, copied, iomap_flags,
1692 &iomap);
642261ac 1693 }
876f2946 1694 unlock_entry:
91d25ba8 1695 put_locked_mapping_entry(mapping, pgoff);
642261ac
RZ
1696 fallback:
1697 if (result == VM_FAULT_FALLBACK) {
d8a849e1 1698 split_huge_pmd(vma, vmf->pmd, vmf->address);
642261ac
RZ
1699 count_vm_event(THP_FAULT_FALLBACK);
1700 }
282a8e03 1701out:
f4200391 1702 trace_dax_pmd_fault_done(inode, vmf, max_pgoff, result);
642261ac
RZ
1703 return result;
1704}
a2d58167 1705#else
ab77dab4 1706static vm_fault_t dax_iomap_pmd_fault(struct vm_fault *vmf, pfn_t *pfnp,
01cddfe9 1707 const struct iomap_ops *ops)
a2d58167
DJ
1708{
1709 return VM_FAULT_FALLBACK;
1710}
642261ac 1711#endif /* CONFIG_FS_DAX_PMD */
a2d58167
DJ
1712
1713/**
1714 * dax_iomap_fault - handle a page fault on a DAX file
1715 * @vmf: The description of the fault
cec04e8c 1716 * @pe_size: Size of the page to fault in
9a0dd422 1717 * @pfnp: PFN to insert for synchronous faults if fsync is required
c0b24625 1718 * @iomap_errp: Storage for detailed error code in case of error
cec04e8c 1719 * @ops: Iomap ops passed from the file system
a2d58167
DJ
1720 *
1721 * When a page fault occurs, filesystems may call this helper in
1722 * their fault handler for DAX files. dax_iomap_fault() assumes the caller
1723 * has done all the necessary locking for page fault to proceed
1724 * successfully.
1725 */
ab77dab4 1726vm_fault_t dax_iomap_fault(struct vm_fault *vmf, enum page_entry_size pe_size,
c0b24625 1727 pfn_t *pfnp, int *iomap_errp, const struct iomap_ops *ops)
a2d58167 1728{
c791ace1
DJ
1729 switch (pe_size) {
1730 case PE_SIZE_PTE:
c0b24625 1731 return dax_iomap_pte_fault(vmf, pfnp, iomap_errp, ops);
c791ace1 1732 case PE_SIZE_PMD:
9a0dd422 1733 return dax_iomap_pmd_fault(vmf, pfnp, ops);
a2d58167
DJ
1734 default:
1735 return VM_FAULT_FALLBACK;
1736 }
1737}
1738EXPORT_SYMBOL_GPL(dax_iomap_fault);
71eab6df
JK
1739
1740/**
1741 * dax_insert_pfn_mkwrite - insert PTE or PMD entry into page tables
1742 * @vmf: The description of the fault
1743 * @pe_size: Size of entry to be inserted
1744 * @pfn: PFN to insert
1745 *
1746 * This function inserts writeable PTE or PMD entry into page tables for mmaped
1747 * DAX file. It takes care of marking corresponding radix tree entry as dirty
1748 * as well.
1749 */
ab77dab4 1750static vm_fault_t dax_insert_pfn_mkwrite(struct vm_fault *vmf,
71eab6df
JK
1751 enum page_entry_size pe_size,
1752 pfn_t pfn)
1753{
1754 struct address_space *mapping = vmf->vma->vm_file->f_mapping;
1755 void *entry, **slot;
1756 pgoff_t index = vmf->pgoff;
ab77dab4 1757 vm_fault_t ret;
71eab6df 1758
b93b0163 1759 xa_lock_irq(&mapping->i_pages);
71eab6df
JK
1760 entry = get_unlocked_mapping_entry(mapping, index, &slot);
1761 /* Did we race with someone splitting entry or so? */
1762 if (!entry ||
1763 (pe_size == PE_SIZE_PTE && !dax_is_pte_entry(entry)) ||
1764 (pe_size == PE_SIZE_PMD && !dax_is_pmd_entry(entry))) {
1765 put_unlocked_mapping_entry(mapping, index, entry);
b93b0163 1766 xa_unlock_irq(&mapping->i_pages);
71eab6df
JK
1767 trace_dax_insert_pfn_mkwrite_no_entry(mapping->host, vmf,
1768 VM_FAULT_NOPAGE);
1769 return VM_FAULT_NOPAGE;
1770 }
b93b0163 1771 radix_tree_tag_set(&mapping->i_pages, index, PAGECACHE_TAG_DIRTY);
71eab6df 1772 entry = lock_slot(mapping, slot);
b93b0163 1773 xa_unlock_irq(&mapping->i_pages);
71eab6df
JK
1774 switch (pe_size) {
1775 case PE_SIZE_PTE:
ab77dab4 1776 ret = vmf_insert_mixed_mkwrite(vmf->vma, vmf->address, pfn);
71eab6df
JK
1777 break;
1778#ifdef CONFIG_FS_DAX_PMD
1779 case PE_SIZE_PMD:
ab77dab4 1780 ret = vmf_insert_pfn_pmd(vmf->vma, vmf->address, vmf->pmd,
71eab6df
JK
1781 pfn, true);
1782 break;
1783#endif
1784 default:
ab77dab4 1785 ret = VM_FAULT_FALLBACK;
71eab6df
JK
1786 }
1787 put_locked_mapping_entry(mapping, index);
ab77dab4
SJ
1788 trace_dax_insert_pfn_mkwrite(mapping->host, vmf, ret);
1789 return ret;
71eab6df
JK
1790}
1791
1792/**
1793 * dax_finish_sync_fault - finish synchronous page fault
1794 * @vmf: The description of the fault
1795 * @pe_size: Size of entry to be inserted
1796 * @pfn: PFN to insert
1797 *
1798 * This function ensures that the file range touched by the page fault is
1799 * stored persistently on the media and handles inserting of appropriate page
1800 * table entry.
1801 */
ab77dab4
SJ
1802vm_fault_t dax_finish_sync_fault(struct vm_fault *vmf,
1803 enum page_entry_size pe_size, pfn_t pfn)
71eab6df
JK
1804{
1805 int err;
1806 loff_t start = ((loff_t)vmf->pgoff) << PAGE_SHIFT;
1807 size_t len = 0;
1808
1809 if (pe_size == PE_SIZE_PTE)
1810 len = PAGE_SIZE;
1811 else if (pe_size == PE_SIZE_PMD)
1812 len = PMD_SIZE;
1813 else
1814 WARN_ON_ONCE(1);
1815 err = vfs_fsync_range(vmf->vma->vm_file, start, start + len - 1, 1);
1816 if (err)
1817 return VM_FAULT_SIGBUS;
1818 return dax_insert_pfn_mkwrite(vmf, pe_size, pfn);
1819}
1820EXPORT_SYMBOL_GPL(dax_finish_sync_fault);