Merge branch 'for-4.20/microsoft' into for-linus
[linux-2.6-block.git] / fs / dax.c
CommitLineData
d475c634
MW
1/*
2 * fs/dax.c - Direct Access filesystem code
3 * Copyright (c) 2013-2014 Intel Corporation
4 * Author: Matthew Wilcox <matthew.r.wilcox@intel.com>
5 * Author: Ross Zwisler <ross.zwisler@linux.intel.com>
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 */
16
17#include <linux/atomic.h>
18#include <linux/blkdev.h>
19#include <linux/buffer_head.h>
d77e92e2 20#include <linux/dax.h>
d475c634
MW
21#include <linux/fs.h>
22#include <linux/genhd.h>
f7ca90b1
MW
23#include <linux/highmem.h>
24#include <linux/memcontrol.h>
25#include <linux/mm.h>
d475c634 26#include <linux/mutex.h>
9973c98e 27#include <linux/pagevec.h>
289c6aed 28#include <linux/sched.h>
f361bf4a 29#include <linux/sched/signal.h>
d475c634 30#include <linux/uio.h>
f7ca90b1 31#include <linux/vmstat.h>
34c0fd54 32#include <linux/pfn_t.h>
0e749e54 33#include <linux/sizes.h>
4b4bb46d 34#include <linux/mmu_notifier.h>
a254e568
CH
35#include <linux/iomap.h>
36#include "internal.h"
d475c634 37
282a8e03
RZ
38#define CREATE_TRACE_POINTS
39#include <trace/events/fs_dax.h>
40
ac401cc7
JK
41/* We choose 4096 entries - same as per-zone page wait tables */
42#define DAX_WAIT_TABLE_BITS 12
43#define DAX_WAIT_TABLE_ENTRIES (1 << DAX_WAIT_TABLE_BITS)
44
917f3452
RZ
45/* The 'colour' (ie low bits) within a PMD of a page offset. */
46#define PG_PMD_COLOUR ((PMD_SIZE >> PAGE_SHIFT) - 1)
977fbdcd 47#define PG_PMD_NR (PMD_SIZE >> PAGE_SHIFT)
917f3452 48
ce95ab0f 49static wait_queue_head_t wait_table[DAX_WAIT_TABLE_ENTRIES];
ac401cc7
JK
50
51static int __init init_dax_wait_table(void)
52{
53 int i;
54
55 for (i = 0; i < DAX_WAIT_TABLE_ENTRIES; i++)
56 init_waitqueue_head(wait_table + i);
57 return 0;
58}
59fs_initcall(init_dax_wait_table);
60
527b19d0
RZ
61/*
62 * We use lowest available bit in exceptional entry for locking, one bit for
63 * the entry size (PMD) and two more to tell us if the entry is a zero page or
64 * an empty entry that is just used for locking. In total four special bits.
65 *
66 * If the PMD bit isn't set the entry has size PAGE_SIZE, and if the ZERO_PAGE
67 * and EMPTY bits aren't set the entry is a normal DAX entry with a filesystem
68 * block allocation.
69 */
70#define RADIX_DAX_SHIFT (RADIX_TREE_EXCEPTIONAL_SHIFT + 4)
71#define RADIX_DAX_ENTRY_LOCK (1 << RADIX_TREE_EXCEPTIONAL_SHIFT)
72#define RADIX_DAX_PMD (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 1))
73#define RADIX_DAX_ZERO_PAGE (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 2))
74#define RADIX_DAX_EMPTY (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 3))
75
3fe0791c 76static unsigned long dax_radix_pfn(void *entry)
527b19d0
RZ
77{
78 return (unsigned long)entry >> RADIX_DAX_SHIFT;
79}
80
3fe0791c 81static void *dax_radix_locked_entry(unsigned long pfn, unsigned long flags)
527b19d0
RZ
82{
83 return (void *)(RADIX_TREE_EXCEPTIONAL_ENTRY | flags |
3fe0791c 84 (pfn << RADIX_DAX_SHIFT) | RADIX_DAX_ENTRY_LOCK);
527b19d0
RZ
85}
86
87static unsigned int dax_radix_order(void *entry)
88{
89 if ((unsigned long)entry & RADIX_DAX_PMD)
90 return PMD_SHIFT - PAGE_SHIFT;
91 return 0;
92}
93
642261ac 94static int dax_is_pmd_entry(void *entry)
d1a5f2b4 95{
642261ac 96 return (unsigned long)entry & RADIX_DAX_PMD;
d1a5f2b4
DW
97}
98
642261ac 99static int dax_is_pte_entry(void *entry)
d475c634 100{
642261ac 101 return !((unsigned long)entry & RADIX_DAX_PMD);
d475c634
MW
102}
103
642261ac 104static int dax_is_zero_entry(void *entry)
d475c634 105{
91d25ba8 106 return (unsigned long)entry & RADIX_DAX_ZERO_PAGE;
d475c634
MW
107}
108
642261ac 109static int dax_is_empty_entry(void *entry)
b2e0d162 110{
642261ac 111 return (unsigned long)entry & RADIX_DAX_EMPTY;
b2e0d162
DW
112}
113
ac401cc7
JK
114/*
115 * DAX radix tree locking
116 */
117struct exceptional_entry_key {
118 struct address_space *mapping;
63e95b5c 119 pgoff_t entry_start;
ac401cc7
JK
120};
121
122struct wait_exceptional_entry_queue {
ac6424b9 123 wait_queue_entry_t wait;
ac401cc7
JK
124 struct exceptional_entry_key key;
125};
126
63e95b5c
RZ
127static wait_queue_head_t *dax_entry_waitqueue(struct address_space *mapping,
128 pgoff_t index, void *entry, struct exceptional_entry_key *key)
129{
130 unsigned long hash;
131
132 /*
133 * If 'entry' is a PMD, align the 'index' that we use for the wait
134 * queue to the start of that PMD. This ensures that all offsets in
135 * the range covered by the PMD map to the same bit lock.
136 */
642261ac 137 if (dax_is_pmd_entry(entry))
917f3452 138 index &= ~PG_PMD_COLOUR;
63e95b5c
RZ
139
140 key->mapping = mapping;
141 key->entry_start = index;
142
143 hash = hash_long((unsigned long)mapping ^ index, DAX_WAIT_TABLE_BITS);
144 return wait_table + hash;
145}
146
ac6424b9 147static int wake_exceptional_entry_func(wait_queue_entry_t *wait, unsigned int mode,
ac401cc7
JK
148 int sync, void *keyp)
149{
150 struct exceptional_entry_key *key = keyp;
151 struct wait_exceptional_entry_queue *ewait =
152 container_of(wait, struct wait_exceptional_entry_queue, wait);
153
154 if (key->mapping != ewait->key.mapping ||
63e95b5c 155 key->entry_start != ewait->key.entry_start)
ac401cc7
JK
156 return 0;
157 return autoremove_wake_function(wait, mode, sync, NULL);
158}
159
e30331ff 160/*
b93b0163
MW
161 * @entry may no longer be the entry at the index in the mapping.
162 * The important information it's conveying is whether the entry at
163 * this index used to be a PMD entry.
e30331ff 164 */
d01ad197 165static void dax_wake_mapping_entry_waiter(struct address_space *mapping,
e30331ff
RZ
166 pgoff_t index, void *entry, bool wake_all)
167{
168 struct exceptional_entry_key key;
169 wait_queue_head_t *wq;
170
171 wq = dax_entry_waitqueue(mapping, index, entry, &key);
172
173 /*
174 * Checking for locked entry and prepare_to_wait_exclusive() happens
b93b0163 175 * under the i_pages lock, ditto for entry handling in our callers.
e30331ff
RZ
176 * So at this point all tasks that could have seen our entry locked
177 * must be in the waitqueue and the following check will see them.
178 */
179 if (waitqueue_active(wq))
180 __wake_up(wq, TASK_NORMAL, wake_all ? 0 : 1, &key);
181}
182
ac401cc7 183/*
b93b0163
MW
184 * Check whether the given slot is locked. Must be called with the i_pages
185 * lock held.
ac401cc7
JK
186 */
187static inline int slot_locked(struct address_space *mapping, void **slot)
188{
189 unsigned long entry = (unsigned long)
b93b0163 190 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
191 return entry & RADIX_DAX_ENTRY_LOCK;
192}
193
194/*
b93b0163 195 * Mark the given slot as locked. Must be called with the i_pages lock held.
ac401cc7
JK
196 */
197static inline void *lock_slot(struct address_space *mapping, void **slot)
198{
199 unsigned long entry = (unsigned long)
b93b0163 200 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
201
202 entry |= RADIX_DAX_ENTRY_LOCK;
b93b0163 203 radix_tree_replace_slot(&mapping->i_pages, slot, (void *)entry);
ac401cc7
JK
204 return (void *)entry;
205}
206
207/*
b93b0163 208 * Mark the given slot as unlocked. Must be called with the i_pages lock held.
ac401cc7
JK
209 */
210static inline void *unlock_slot(struct address_space *mapping, void **slot)
211{
212 unsigned long entry = (unsigned long)
b93b0163 213 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
214
215 entry &= ~(unsigned long)RADIX_DAX_ENTRY_LOCK;
b93b0163 216 radix_tree_replace_slot(&mapping->i_pages, slot, (void *)entry);
ac401cc7
JK
217 return (void *)entry;
218}
219
220/*
221 * Lookup entry in radix tree, wait for it to become unlocked if it is
222 * exceptional entry and return it. The caller must call
223 * put_unlocked_mapping_entry() when he decided not to lock the entry or
224 * put_locked_mapping_entry() when he locked the entry and now wants to
225 * unlock it.
226 *
b93b0163 227 * Must be called with the i_pages lock held.
ac401cc7 228 */
c2a7d2a1
DW
229static void *__get_unlocked_mapping_entry(struct address_space *mapping,
230 pgoff_t index, void ***slotp, bool (*wait_fn)(void))
ac401cc7 231{
e3ad61c6 232 void *entry, **slot;
ac401cc7 233 struct wait_exceptional_entry_queue ewait;
63e95b5c 234 wait_queue_head_t *wq;
ac401cc7
JK
235
236 init_wait(&ewait.wait);
237 ewait.wait.func = wake_exceptional_entry_func;
ac401cc7
JK
238
239 for (;;) {
c2a7d2a1
DW
240 bool revalidate;
241
b93b0163 242 entry = __radix_tree_lookup(&mapping->i_pages, index, NULL,
ac401cc7 243 &slot);
91d25ba8
RZ
244 if (!entry ||
245 WARN_ON_ONCE(!radix_tree_exceptional_entry(entry)) ||
ac401cc7
JK
246 !slot_locked(mapping, slot)) {
247 if (slotp)
248 *slotp = slot;
e3ad61c6 249 return entry;
ac401cc7 250 }
63e95b5c
RZ
251
252 wq = dax_entry_waitqueue(mapping, index, entry, &ewait.key);
ac401cc7
JK
253 prepare_to_wait_exclusive(wq, &ewait.wait,
254 TASK_UNINTERRUPTIBLE);
b93b0163 255 xa_unlock_irq(&mapping->i_pages);
c2a7d2a1 256 revalidate = wait_fn();
ac401cc7 257 finish_wait(wq, &ewait.wait);
b93b0163 258 xa_lock_irq(&mapping->i_pages);
c2a7d2a1
DW
259 if (revalidate)
260 return ERR_PTR(-EAGAIN);
ac401cc7
JK
261 }
262}
263
c2a7d2a1
DW
264static bool entry_wait(void)
265{
266 schedule();
267 /*
268 * Never return an ERR_PTR() from
269 * __get_unlocked_mapping_entry(), just keep looping.
270 */
271 return false;
272}
273
274static void *get_unlocked_mapping_entry(struct address_space *mapping,
275 pgoff_t index, void ***slotp)
276{
277 return __get_unlocked_mapping_entry(mapping, index, slotp, entry_wait);
278}
279
280static void unlock_mapping_entry(struct address_space *mapping, pgoff_t index)
b1aa812b
JK
281{
282 void *entry, **slot;
283
b93b0163
MW
284 xa_lock_irq(&mapping->i_pages);
285 entry = __radix_tree_lookup(&mapping->i_pages, index, NULL, &slot);
b1aa812b
JK
286 if (WARN_ON_ONCE(!entry || !radix_tree_exceptional_entry(entry) ||
287 !slot_locked(mapping, slot))) {
b93b0163 288 xa_unlock_irq(&mapping->i_pages);
b1aa812b
JK
289 return;
290 }
291 unlock_slot(mapping, slot);
b93b0163 292 xa_unlock_irq(&mapping->i_pages);
b1aa812b
JK
293 dax_wake_mapping_entry_waiter(mapping, index, entry, false);
294}
295
422476c4 296static void put_locked_mapping_entry(struct address_space *mapping,
91d25ba8 297 pgoff_t index)
422476c4 298{
c2a7d2a1 299 unlock_mapping_entry(mapping, index);
422476c4
RZ
300}
301
302/*
303 * Called when we are done with radix tree entry we looked up via
304 * get_unlocked_mapping_entry() and which we didn't lock in the end.
305 */
306static void put_unlocked_mapping_entry(struct address_space *mapping,
307 pgoff_t index, void *entry)
308{
91d25ba8 309 if (!entry)
422476c4
RZ
310 return;
311
312 /* We have to wake up next waiter for the radix tree entry lock */
313 dax_wake_mapping_entry_waiter(mapping, index, entry, false);
314}
315
d2c997c0
DW
316static unsigned long dax_entry_size(void *entry)
317{
318 if (dax_is_zero_entry(entry))
319 return 0;
320 else if (dax_is_empty_entry(entry))
321 return 0;
322 else if (dax_is_pmd_entry(entry))
323 return PMD_SIZE;
324 else
325 return PAGE_SIZE;
326}
327
328static unsigned long dax_radix_end_pfn(void *entry)
329{
330 return dax_radix_pfn(entry) + dax_entry_size(entry) / PAGE_SIZE;
331}
332
333/*
334 * Iterate through all mapped pfns represented by an entry, i.e. skip
335 * 'empty' and 'zero' entries.
336 */
337#define for_each_mapped_pfn(entry, pfn) \
338 for (pfn = dax_radix_pfn(entry); \
339 pfn < dax_radix_end_pfn(entry); pfn++)
340
73449daf
DW
341/*
342 * TODO: for reflink+dax we need a way to associate a single page with
343 * multiple address_space instances at different linear_page_index()
344 * offsets.
345 */
346static void dax_associate_entry(void *entry, struct address_space *mapping,
347 struct vm_area_struct *vma, unsigned long address)
d2c997c0 348{
73449daf
DW
349 unsigned long size = dax_entry_size(entry), pfn, index;
350 int i = 0;
d2c997c0
DW
351
352 if (IS_ENABLED(CONFIG_FS_DAX_LIMITED))
353 return;
354
73449daf 355 index = linear_page_index(vma, address & ~(size - 1));
d2c997c0
DW
356 for_each_mapped_pfn(entry, pfn) {
357 struct page *page = pfn_to_page(pfn);
358
359 WARN_ON_ONCE(page->mapping);
360 page->mapping = mapping;
73449daf 361 page->index = index + i++;
d2c997c0
DW
362 }
363}
364
365static void dax_disassociate_entry(void *entry, struct address_space *mapping,
366 bool trunc)
367{
368 unsigned long pfn;
369
370 if (IS_ENABLED(CONFIG_FS_DAX_LIMITED))
371 return;
372
373 for_each_mapped_pfn(entry, pfn) {
374 struct page *page = pfn_to_page(pfn);
375
376 WARN_ON_ONCE(trunc && page_ref_count(page) > 1);
377 WARN_ON_ONCE(page->mapping && page->mapping != mapping);
378 page->mapping = NULL;
73449daf 379 page->index = 0;
d2c997c0
DW
380 }
381}
382
5fac7408
DW
383static struct page *dax_busy_page(void *entry)
384{
385 unsigned long pfn;
386
387 for_each_mapped_pfn(entry, pfn) {
388 struct page *page = pfn_to_page(pfn);
389
390 if (page_ref_count(page) > 1)
391 return page;
392 }
393 return NULL;
394}
395
c2a7d2a1
DW
396static bool entry_wait_revalidate(void)
397{
398 rcu_read_unlock();
399 schedule();
400 rcu_read_lock();
401
402 /*
403 * Tell __get_unlocked_mapping_entry() to take a break, we need
404 * to revalidate page->mapping after dropping locks
405 */
406 return true;
407}
408
409bool dax_lock_mapping_entry(struct page *page)
410{
411 pgoff_t index;
412 struct inode *inode;
413 bool did_lock = false;
414 void *entry = NULL, **slot;
415 struct address_space *mapping;
416
417 rcu_read_lock();
418 for (;;) {
419 mapping = READ_ONCE(page->mapping);
420
421 if (!dax_mapping(mapping))
422 break;
423
424 /*
425 * In the device-dax case there's no need to lock, a
426 * struct dev_pagemap pin is sufficient to keep the
427 * inode alive, and we assume we have dev_pagemap pin
428 * otherwise we would not have a valid pfn_to_page()
429 * translation.
430 */
431 inode = mapping->host;
432 if (S_ISCHR(inode->i_mode)) {
433 did_lock = true;
434 break;
435 }
436
437 xa_lock_irq(&mapping->i_pages);
438 if (mapping != page->mapping) {
439 xa_unlock_irq(&mapping->i_pages);
440 continue;
441 }
442 index = page->index;
443
444 entry = __get_unlocked_mapping_entry(mapping, index, &slot,
445 entry_wait_revalidate);
446 if (!entry) {
447 xa_unlock_irq(&mapping->i_pages);
448 break;
449 } else if (IS_ERR(entry)) {
f52afc93 450 xa_unlock_irq(&mapping->i_pages);
c2a7d2a1
DW
451 WARN_ON_ONCE(PTR_ERR(entry) != -EAGAIN);
452 continue;
453 }
454 lock_slot(mapping, slot);
455 did_lock = true;
456 xa_unlock_irq(&mapping->i_pages);
457 break;
458 }
459 rcu_read_unlock();
460
461 return did_lock;
462}
463
464void dax_unlock_mapping_entry(struct page *page)
465{
466 struct address_space *mapping = page->mapping;
467 struct inode *inode = mapping->host;
468
469 if (S_ISCHR(inode->i_mode))
470 return;
471
472 unlock_mapping_entry(mapping, page->index);
473}
474
ac401cc7 475/*
91d25ba8
RZ
476 * Find radix tree entry at given index. If it points to an exceptional entry,
477 * return it with the radix tree entry locked. If the radix tree doesn't
478 * contain given index, create an empty exceptional entry for the index and
479 * return with it locked.
ac401cc7 480 *
642261ac
RZ
481 * When requesting an entry with size RADIX_DAX_PMD, grab_mapping_entry() will
482 * either return that locked entry or will return an error. This error will
91d25ba8
RZ
483 * happen if there are any 4k entries within the 2MiB range that we are
484 * requesting.
642261ac
RZ
485 *
486 * We always favor 4k entries over 2MiB entries. There isn't a flow where we
487 * evict 4k entries in order to 'upgrade' them to a 2MiB entry. A 2MiB
488 * insertion will fail if it finds any 4k entries already in the tree, and a
489 * 4k insertion will cause an existing 2MiB entry to be unmapped and
490 * downgraded to 4k entries. This happens for both 2MiB huge zero pages as
491 * well as 2MiB empty entries.
492 *
493 * The exception to this downgrade path is for 2MiB DAX PMD entries that have
494 * real storage backing them. We will leave these real 2MiB DAX entries in
495 * the tree, and PTE writes will simply dirty the entire 2MiB DAX entry.
496 *
ac401cc7
JK
497 * Note: Unlike filemap_fault() we don't honor FAULT_FLAG_RETRY flags. For
498 * persistent memory the benefit is doubtful. We can add that later if we can
499 * show it helps.
500 */
642261ac
RZ
501static void *grab_mapping_entry(struct address_space *mapping, pgoff_t index,
502 unsigned long size_flag)
ac401cc7 503{
642261ac 504 bool pmd_downgrade = false; /* splitting 2MiB entry into 4k entries? */
e3ad61c6 505 void *entry, **slot;
ac401cc7
JK
506
507restart:
b93b0163 508 xa_lock_irq(&mapping->i_pages);
e3ad61c6 509 entry = get_unlocked_mapping_entry(mapping, index, &slot);
642261ac 510
91d25ba8
RZ
511 if (WARN_ON_ONCE(entry && !radix_tree_exceptional_entry(entry))) {
512 entry = ERR_PTR(-EIO);
513 goto out_unlock;
514 }
515
642261ac
RZ
516 if (entry) {
517 if (size_flag & RADIX_DAX_PMD) {
91d25ba8 518 if (dax_is_pte_entry(entry)) {
642261ac
RZ
519 put_unlocked_mapping_entry(mapping, index,
520 entry);
521 entry = ERR_PTR(-EEXIST);
522 goto out_unlock;
523 }
524 } else { /* trying to grab a PTE entry */
91d25ba8 525 if (dax_is_pmd_entry(entry) &&
642261ac
RZ
526 (dax_is_zero_entry(entry) ||
527 dax_is_empty_entry(entry))) {
528 pmd_downgrade = true;
529 }
530 }
531 }
532
ac401cc7 533 /* No entry for given index? Make sure radix tree is big enough. */
642261ac 534 if (!entry || pmd_downgrade) {
ac401cc7
JK
535 int err;
536
642261ac
RZ
537 if (pmd_downgrade) {
538 /*
539 * Make sure 'entry' remains valid while we drop
b93b0163 540 * the i_pages lock.
642261ac
RZ
541 */
542 entry = lock_slot(mapping, slot);
543 }
544
b93b0163 545 xa_unlock_irq(&mapping->i_pages);
642261ac
RZ
546 /*
547 * Besides huge zero pages the only other thing that gets
548 * downgraded are empty entries which don't need to be
549 * unmapped.
550 */
551 if (pmd_downgrade && dax_is_zero_entry(entry))
977fbdcd
MW
552 unmap_mapping_pages(mapping, index & ~PG_PMD_COLOUR,
553 PG_PMD_NR, false);
642261ac 554
ac401cc7
JK
555 err = radix_tree_preload(
556 mapping_gfp_mask(mapping) & ~__GFP_HIGHMEM);
0cb80b48
JK
557 if (err) {
558 if (pmd_downgrade)
91d25ba8 559 put_locked_mapping_entry(mapping, index);
ac401cc7 560 return ERR_PTR(err);
0cb80b48 561 }
b93b0163 562 xa_lock_irq(&mapping->i_pages);
642261ac 563
e11f8b7b
RZ
564 if (!entry) {
565 /*
b93b0163 566 * We needed to drop the i_pages lock while calling
e11f8b7b
RZ
567 * radix_tree_preload() and we didn't have an entry to
568 * lock. See if another thread inserted an entry at
569 * our index during this time.
570 */
b93b0163 571 entry = __radix_tree_lookup(&mapping->i_pages, index,
e11f8b7b
RZ
572 NULL, &slot);
573 if (entry) {
574 radix_tree_preload_end();
b93b0163 575 xa_unlock_irq(&mapping->i_pages);
e11f8b7b
RZ
576 goto restart;
577 }
578 }
579
642261ac 580 if (pmd_downgrade) {
d2c997c0 581 dax_disassociate_entry(entry, mapping, false);
b93b0163 582 radix_tree_delete(&mapping->i_pages, index);
642261ac
RZ
583 mapping->nrexceptional--;
584 dax_wake_mapping_entry_waiter(mapping, index, entry,
585 true);
586 }
587
588 entry = dax_radix_locked_entry(0, size_flag | RADIX_DAX_EMPTY);
589
b93b0163 590 err = __radix_tree_insert(&mapping->i_pages, index,
642261ac 591 dax_radix_order(entry), entry);
ac401cc7
JK
592 radix_tree_preload_end();
593 if (err) {
b93b0163 594 xa_unlock_irq(&mapping->i_pages);
642261ac 595 /*
e11f8b7b
RZ
596 * Our insertion of a DAX entry failed, most likely
597 * because we were inserting a PMD entry and it
598 * collided with a PTE sized entry at a different
599 * index in the PMD range. We haven't inserted
600 * anything into the radix tree and have no waiters to
601 * wake.
642261ac 602 */
ac401cc7
JK
603 return ERR_PTR(err);
604 }
605 /* Good, we have inserted empty locked entry into the tree. */
606 mapping->nrexceptional++;
b93b0163 607 xa_unlock_irq(&mapping->i_pages);
e3ad61c6 608 return entry;
ac401cc7 609 }
e3ad61c6 610 entry = lock_slot(mapping, slot);
642261ac 611 out_unlock:
b93b0163 612 xa_unlock_irq(&mapping->i_pages);
e3ad61c6 613 return entry;
ac401cc7
JK
614}
615
5fac7408
DW
616/**
617 * dax_layout_busy_page - find first pinned page in @mapping
618 * @mapping: address space to scan for a page with ref count > 1
619 *
620 * DAX requires ZONE_DEVICE mapped pages. These pages are never
621 * 'onlined' to the page allocator so they are considered idle when
622 * page->count == 1. A filesystem uses this interface to determine if
623 * any page in the mapping is busy, i.e. for DMA, or other
624 * get_user_pages() usages.
625 *
626 * It is expected that the filesystem is holding locks to block the
627 * establishment of new mappings in this address_space. I.e. it expects
628 * to be able to run unmap_mapping_range() and subsequently not race
629 * mapping_mapped() becoming true.
630 */
631struct page *dax_layout_busy_page(struct address_space *mapping)
632{
633 pgoff_t indices[PAGEVEC_SIZE];
634 struct page *page = NULL;
635 struct pagevec pvec;
636 pgoff_t index, end;
637 unsigned i;
638
639 /*
640 * In the 'limited' case get_user_pages() for dax is disabled.
641 */
642 if (IS_ENABLED(CONFIG_FS_DAX_LIMITED))
643 return NULL;
644
645 if (!dax_mapping(mapping) || !mapping_mapped(mapping))
646 return NULL;
647
648 pagevec_init(&pvec);
649 index = 0;
650 end = -1;
651
652 /*
653 * If we race get_user_pages_fast() here either we'll see the
654 * elevated page count in the pagevec_lookup and wait, or
655 * get_user_pages_fast() will see that the page it took a reference
656 * against is no longer mapped in the page tables and bail to the
657 * get_user_pages() slow path. The slow path is protected by
658 * pte_lock() and pmd_lock(). New references are not taken without
659 * holding those locks, and unmap_mapping_range() will not zero the
660 * pte or pmd without holding the respective lock, so we are
661 * guaranteed to either see new references or prevent new
662 * references from being established.
663 */
664 unmap_mapping_range(mapping, 0, 0, 1);
665
666 while (index < end && pagevec_lookup_entries(&pvec, mapping, index,
667 min(end - index, (pgoff_t)PAGEVEC_SIZE),
668 indices)) {
669 for (i = 0; i < pagevec_count(&pvec); i++) {
670 struct page *pvec_ent = pvec.pages[i];
671 void *entry;
672
673 index = indices[i];
674 if (index >= end)
675 break;
676
cdbf8897
RZ
677 if (WARN_ON_ONCE(
678 !radix_tree_exceptional_entry(pvec_ent)))
5fac7408
DW
679 continue;
680
681 xa_lock_irq(&mapping->i_pages);
682 entry = get_unlocked_mapping_entry(mapping, index, NULL);
683 if (entry)
684 page = dax_busy_page(entry);
685 put_unlocked_mapping_entry(mapping, index, entry);
686 xa_unlock_irq(&mapping->i_pages);
687 if (page)
688 break;
689 }
cdbf8897
RZ
690
691 /*
692 * We don't expect normal struct page entries to exist in our
693 * tree, but we keep these pagevec calls so that this code is
694 * consistent with the common pattern for handling pagevecs
695 * throughout the kernel.
696 */
5fac7408
DW
697 pagevec_remove_exceptionals(&pvec);
698 pagevec_release(&pvec);
699 index++;
700
701 if (page)
702 break;
703 }
704 return page;
705}
706EXPORT_SYMBOL_GPL(dax_layout_busy_page);
707
c6dcf52c
JK
708static int __dax_invalidate_mapping_entry(struct address_space *mapping,
709 pgoff_t index, bool trunc)
710{
711 int ret = 0;
712 void *entry;
b93b0163 713 struct radix_tree_root *pages = &mapping->i_pages;
c6dcf52c 714
b93b0163 715 xa_lock_irq(pages);
c6dcf52c 716 entry = get_unlocked_mapping_entry(mapping, index, NULL);
91d25ba8 717 if (!entry || WARN_ON_ONCE(!radix_tree_exceptional_entry(entry)))
c6dcf52c
JK
718 goto out;
719 if (!trunc &&
b93b0163
MW
720 (radix_tree_tag_get(pages, index, PAGECACHE_TAG_DIRTY) ||
721 radix_tree_tag_get(pages, index, PAGECACHE_TAG_TOWRITE)))
c6dcf52c 722 goto out;
d2c997c0 723 dax_disassociate_entry(entry, mapping, trunc);
b93b0163 724 radix_tree_delete(pages, index);
c6dcf52c
JK
725 mapping->nrexceptional--;
726 ret = 1;
727out:
728 put_unlocked_mapping_entry(mapping, index, entry);
b93b0163 729 xa_unlock_irq(pages);
c6dcf52c
JK
730 return ret;
731}
ac401cc7
JK
732/*
733 * Delete exceptional DAX entry at @index from @mapping. Wait for radix tree
734 * entry to get unlocked before deleting it.
735 */
736int dax_delete_mapping_entry(struct address_space *mapping, pgoff_t index)
737{
c6dcf52c 738 int ret = __dax_invalidate_mapping_entry(mapping, index, true);
ac401cc7 739
ac401cc7
JK
740 /*
741 * This gets called from truncate / punch_hole path. As such, the caller
742 * must hold locks protecting against concurrent modifications of the
743 * radix tree (usually fs-private i_mmap_sem for writing). Since the
744 * caller has seen exceptional entry for this index, we better find it
745 * at that index as well...
746 */
c6dcf52c
JK
747 WARN_ON_ONCE(!ret);
748 return ret;
749}
750
c6dcf52c
JK
751/*
752 * Invalidate exceptional DAX entry if it is clean.
753 */
754int dax_invalidate_mapping_entry_sync(struct address_space *mapping,
755 pgoff_t index)
756{
757 return __dax_invalidate_mapping_entry(mapping, index, false);
ac401cc7
JK
758}
759
cccbce67
DW
760static int copy_user_dax(struct block_device *bdev, struct dax_device *dax_dev,
761 sector_t sector, size_t size, struct page *to,
762 unsigned long vaddr)
f7ca90b1 763{
cccbce67
DW
764 void *vto, *kaddr;
765 pgoff_t pgoff;
cccbce67
DW
766 long rc;
767 int id;
768
769 rc = bdev_dax_pgoff(bdev, sector, size, &pgoff);
770 if (rc)
771 return rc;
772
773 id = dax_read_lock();
86ed913b 774 rc = dax_direct_access(dax_dev, pgoff, PHYS_PFN(size), &kaddr, NULL);
cccbce67
DW
775 if (rc < 0) {
776 dax_read_unlock(id);
777 return rc;
778 }
f7ca90b1 779 vto = kmap_atomic(to);
cccbce67 780 copy_user_page(vto, (void __force *)kaddr, vaddr, to);
f7ca90b1 781 kunmap_atomic(vto);
cccbce67 782 dax_read_unlock(id);
f7ca90b1
MW
783 return 0;
784}
785
642261ac
RZ
786/*
787 * By this point grab_mapping_entry() has ensured that we have a locked entry
788 * of the appropriate size so we don't have to worry about downgrading PMDs to
789 * PTEs. If we happen to be trying to insert a PTE and there is a PMD
790 * already in the tree, we will skip the insertion and just dirty the PMD as
791 * appropriate.
792 */
ac401cc7
JK
793static void *dax_insert_mapping_entry(struct address_space *mapping,
794 struct vm_fault *vmf,
3fe0791c 795 void *entry, pfn_t pfn_t,
f5b7b748 796 unsigned long flags, bool dirty)
9973c98e 797{
b93b0163 798 struct radix_tree_root *pages = &mapping->i_pages;
3fe0791c 799 unsigned long pfn = pfn_t_to_pfn(pfn_t);
ac401cc7 800 pgoff_t index = vmf->pgoff;
3fe0791c 801 void *new_entry;
9973c98e 802
f5b7b748 803 if (dirty)
d2b2a28e 804 __mark_inode_dirty(mapping->host, I_DIRTY_PAGES);
9973c98e 805
91d25ba8
RZ
806 if (dax_is_zero_entry(entry) && !(flags & RADIX_DAX_ZERO_PAGE)) {
807 /* we are replacing a zero page with block mapping */
808 if (dax_is_pmd_entry(entry))
977fbdcd
MW
809 unmap_mapping_pages(mapping, index & ~PG_PMD_COLOUR,
810 PG_PMD_NR, false);
91d25ba8 811 else /* pte entry */
977fbdcd 812 unmap_mapping_pages(mapping, vmf->pgoff, 1, false);
9973c98e
RZ
813 }
814
b93b0163 815 xa_lock_irq(pages);
3fe0791c 816 new_entry = dax_radix_locked_entry(pfn, flags);
d2c997c0
DW
817 if (dax_entry_size(entry) != dax_entry_size(new_entry)) {
818 dax_disassociate_entry(entry, mapping, false);
73449daf 819 dax_associate_entry(new_entry, mapping, vmf->vma, vmf->address);
d2c997c0 820 }
642261ac 821
91d25ba8 822 if (dax_is_zero_entry(entry) || dax_is_empty_entry(entry)) {
642261ac
RZ
823 /*
824 * Only swap our new entry into the radix tree if the current
825 * entry is a zero page or an empty entry. If a normal PTE or
826 * PMD entry is already in the tree, we leave it alone. This
827 * means that if we are trying to insert a PTE and the
828 * existing entry is a PMD, we will just leave the PMD in the
829 * tree and dirty it if necessary.
830 */
f7942430 831 struct radix_tree_node *node;
ac401cc7
JK
832 void **slot;
833 void *ret;
9973c98e 834
b93b0163 835 ret = __radix_tree_lookup(pages, index, &node, &slot);
ac401cc7 836 WARN_ON_ONCE(ret != entry);
b93b0163 837 __radix_tree_replace(pages, node, slot,
c7df8ad2 838 new_entry, NULL);
91d25ba8 839 entry = new_entry;
9973c98e 840 }
91d25ba8 841
f5b7b748 842 if (dirty)
b93b0163 843 radix_tree_tag_set(pages, index, PAGECACHE_TAG_DIRTY);
91d25ba8 844
b93b0163 845 xa_unlock_irq(pages);
91d25ba8 846 return entry;
9973c98e
RZ
847}
848
4b4bb46d
JK
849static inline unsigned long
850pgoff_address(pgoff_t pgoff, struct vm_area_struct *vma)
851{
852 unsigned long address;
853
854 address = vma->vm_start + ((pgoff - vma->vm_pgoff) << PAGE_SHIFT);
855 VM_BUG_ON_VMA(address < vma->vm_start || address >= vma->vm_end, vma);
856 return address;
857}
858
859/* Walk all mappings of a given index of a file and writeprotect them */
860static void dax_mapping_entry_mkclean(struct address_space *mapping,
861 pgoff_t index, unsigned long pfn)
862{
863 struct vm_area_struct *vma;
f729c8c9
RZ
864 pte_t pte, *ptep = NULL;
865 pmd_t *pmdp = NULL;
4b4bb46d 866 spinlock_t *ptl;
4b4bb46d
JK
867
868 i_mmap_lock_read(mapping);
869 vma_interval_tree_foreach(vma, &mapping->i_mmap, index, index) {
a4d1a885 870 unsigned long address, start, end;
4b4bb46d
JK
871
872 cond_resched();
873
874 if (!(vma->vm_flags & VM_SHARED))
875 continue;
876
877 address = pgoff_address(index, vma);
a4d1a885
JG
878
879 /*
880 * Note because we provide start/end to follow_pte_pmd it will
881 * call mmu_notifier_invalidate_range_start() on our behalf
882 * before taking any lock.
883 */
884 if (follow_pte_pmd(vma->vm_mm, address, &start, &end, &ptep, &pmdp, &ptl))
4b4bb46d 885 continue;
4b4bb46d 886
0f10851e
JG
887 /*
888 * No need to call mmu_notifier_invalidate_range() as we are
889 * downgrading page table protection not changing it to point
890 * to a new page.
891 *
ad56b738 892 * See Documentation/vm/mmu_notifier.rst
0f10851e 893 */
f729c8c9
RZ
894 if (pmdp) {
895#ifdef CONFIG_FS_DAX_PMD
896 pmd_t pmd;
897
898 if (pfn != pmd_pfn(*pmdp))
899 goto unlock_pmd;
f6f37321 900 if (!pmd_dirty(*pmdp) && !pmd_write(*pmdp))
f729c8c9
RZ
901 goto unlock_pmd;
902
903 flush_cache_page(vma, address, pfn);
904 pmd = pmdp_huge_clear_flush(vma, address, pmdp);
905 pmd = pmd_wrprotect(pmd);
906 pmd = pmd_mkclean(pmd);
907 set_pmd_at(vma->vm_mm, address, pmdp, pmd);
f729c8c9 908unlock_pmd:
f729c8c9 909#endif
ee190ca6 910 spin_unlock(ptl);
f729c8c9
RZ
911 } else {
912 if (pfn != pte_pfn(*ptep))
913 goto unlock_pte;
914 if (!pte_dirty(*ptep) && !pte_write(*ptep))
915 goto unlock_pte;
916
917 flush_cache_page(vma, address, pfn);
918 pte = ptep_clear_flush(vma, address, ptep);
919 pte = pte_wrprotect(pte);
920 pte = pte_mkclean(pte);
921 set_pte_at(vma->vm_mm, address, ptep, pte);
f729c8c9
RZ
922unlock_pte:
923 pte_unmap_unlock(ptep, ptl);
924 }
4b4bb46d 925
a4d1a885 926 mmu_notifier_invalidate_range_end(vma->vm_mm, start, end);
4b4bb46d
JK
927 }
928 i_mmap_unlock_read(mapping);
929}
930
3fe0791c
DW
931static int dax_writeback_one(struct dax_device *dax_dev,
932 struct address_space *mapping, pgoff_t index, void *entry)
9973c98e 933{
b93b0163 934 struct radix_tree_root *pages = &mapping->i_pages;
3fe0791c
DW
935 void *entry2, **slot;
936 unsigned long pfn;
937 long ret = 0;
cccbce67 938 size_t size;
9973c98e 939
9973c98e 940 /*
a6abc2c0
JK
941 * A page got tagged dirty in DAX mapping? Something is seriously
942 * wrong.
9973c98e 943 */
a6abc2c0
JK
944 if (WARN_ON(!radix_tree_exceptional_entry(entry)))
945 return -EIO;
9973c98e 946
b93b0163 947 xa_lock_irq(pages);
a6abc2c0
JK
948 entry2 = get_unlocked_mapping_entry(mapping, index, &slot);
949 /* Entry got punched out / reallocated? */
91d25ba8 950 if (!entry2 || WARN_ON_ONCE(!radix_tree_exceptional_entry(entry2)))
a6abc2c0
JK
951 goto put_unlocked;
952 /*
953 * Entry got reallocated elsewhere? No need to writeback. We have to
3fe0791c 954 * compare pfns as we must not bail out due to difference in lockbit
a6abc2c0
JK
955 * or entry type.
956 */
3fe0791c 957 if (dax_radix_pfn(entry2) != dax_radix_pfn(entry))
a6abc2c0 958 goto put_unlocked;
642261ac
RZ
959 if (WARN_ON_ONCE(dax_is_empty_entry(entry) ||
960 dax_is_zero_entry(entry))) {
9973c98e 961 ret = -EIO;
a6abc2c0 962 goto put_unlocked;
9973c98e
RZ
963 }
964
a6abc2c0 965 /* Another fsync thread may have already written back this entry */
b93b0163 966 if (!radix_tree_tag_get(pages, index, PAGECACHE_TAG_TOWRITE))
a6abc2c0
JK
967 goto put_unlocked;
968 /* Lock the entry to serialize with page faults */
969 entry = lock_slot(mapping, slot);
970 /*
971 * We can clear the tag now but we have to be careful so that concurrent
972 * dax_writeback_one() calls for the same index cannot finish before we
973 * actually flush the caches. This is achieved as the calls will look
b93b0163
MW
974 * at the entry only under the i_pages lock and once they do that
975 * they will see the entry locked and wait for it to unlock.
a6abc2c0 976 */
b93b0163
MW
977 radix_tree_tag_clear(pages, index, PAGECACHE_TAG_TOWRITE);
978 xa_unlock_irq(pages);
a6abc2c0 979
642261ac
RZ
980 /*
981 * Even if dax_writeback_mapping_range() was given a wbc->range_start
982 * in the middle of a PMD, the 'index' we are given will be aligned to
3fe0791c
DW
983 * the start index of the PMD, as will the pfn we pull from 'entry'.
984 * This allows us to flush for PMD_SIZE and not have to worry about
985 * partial PMD writebacks.
642261ac 986 */
3fe0791c 987 pfn = dax_radix_pfn(entry);
cccbce67
DW
988 size = PAGE_SIZE << dax_radix_order(entry);
989
3fe0791c
DW
990 dax_mapping_entry_mkclean(mapping, index, pfn);
991 dax_flush(dax_dev, page_address(pfn_to_page(pfn)), size);
4b4bb46d
JK
992 /*
993 * After we have flushed the cache, we can clear the dirty tag. There
994 * cannot be new dirty data in the pfn after the flush has completed as
995 * the pfn mappings are writeprotected and fault waits for mapping
996 * entry lock.
997 */
b93b0163
MW
998 xa_lock_irq(pages);
999 radix_tree_tag_clear(pages, index, PAGECACHE_TAG_DIRTY);
1000 xa_unlock_irq(pages);
f9bc3a07 1001 trace_dax_writeback_one(mapping->host, index, size >> PAGE_SHIFT);
91d25ba8 1002 put_locked_mapping_entry(mapping, index);
9973c98e
RZ
1003 return ret;
1004
a6abc2c0
JK
1005 put_unlocked:
1006 put_unlocked_mapping_entry(mapping, index, entry2);
b93b0163 1007 xa_unlock_irq(pages);
9973c98e
RZ
1008 return ret;
1009}
1010
1011/*
1012 * Flush the mapping to the persistent domain within the byte range of [start,
1013 * end]. This is required by data integrity operations to ensure file data is
1014 * on persistent storage prior to completion of the operation.
1015 */
7f6d5b52
RZ
1016int dax_writeback_mapping_range(struct address_space *mapping,
1017 struct block_device *bdev, struct writeback_control *wbc)
9973c98e
RZ
1018{
1019 struct inode *inode = mapping->host;
642261ac 1020 pgoff_t start_index, end_index;
9973c98e 1021 pgoff_t indices[PAGEVEC_SIZE];
cccbce67 1022 struct dax_device *dax_dev;
9973c98e
RZ
1023 struct pagevec pvec;
1024 bool done = false;
1025 int i, ret = 0;
9973c98e
RZ
1026
1027 if (WARN_ON_ONCE(inode->i_blkbits != PAGE_SHIFT))
1028 return -EIO;
1029
7f6d5b52
RZ
1030 if (!mapping->nrexceptional || wbc->sync_mode != WB_SYNC_ALL)
1031 return 0;
1032
cccbce67
DW
1033 dax_dev = dax_get_by_host(bdev->bd_disk->disk_name);
1034 if (!dax_dev)
1035 return -EIO;
1036
09cbfeaf
KS
1037 start_index = wbc->range_start >> PAGE_SHIFT;
1038 end_index = wbc->range_end >> PAGE_SHIFT;
9973c98e 1039
d14a3f48
RZ
1040 trace_dax_writeback_range(inode, start_index, end_index);
1041
9973c98e
RZ
1042 tag_pages_for_writeback(mapping, start_index, end_index);
1043
86679820 1044 pagevec_init(&pvec);
9973c98e
RZ
1045 while (!done) {
1046 pvec.nr = find_get_entries_tag(mapping, start_index,
1047 PAGECACHE_TAG_TOWRITE, PAGEVEC_SIZE,
1048 pvec.pages, indices);
1049
1050 if (pvec.nr == 0)
1051 break;
1052
1053 for (i = 0; i < pvec.nr; i++) {
1054 if (indices[i] > end_index) {
1055 done = true;
1056 break;
1057 }
1058
3fe0791c
DW
1059 ret = dax_writeback_one(dax_dev, mapping, indices[i],
1060 pvec.pages[i]);
819ec6b9
JL
1061 if (ret < 0) {
1062 mapping_set_error(mapping, ret);
d14a3f48 1063 goto out;
819ec6b9 1064 }
9973c98e 1065 }
1eb643d0 1066 start_index = indices[pvec.nr - 1] + 1;
9973c98e 1067 }
d14a3f48 1068out:
cccbce67 1069 put_dax(dax_dev);
d14a3f48
RZ
1070 trace_dax_writeback_range_done(inode, start_index, end_index);
1071 return (ret < 0 ? ret : 0);
9973c98e
RZ
1072}
1073EXPORT_SYMBOL_GPL(dax_writeback_mapping_range);
1074
31a6f1a6 1075static sector_t dax_iomap_sector(struct iomap *iomap, loff_t pos)
f7ca90b1 1076{
a3841f94 1077 return (iomap->addr + (pos & PAGE_MASK) - iomap->offset) >> 9;
31a6f1a6
JK
1078}
1079
5e161e40
JK
1080static int dax_iomap_pfn(struct iomap *iomap, loff_t pos, size_t size,
1081 pfn_t *pfnp)
f7ca90b1 1082{
31a6f1a6 1083 const sector_t sector = dax_iomap_sector(iomap, pos);
cccbce67
DW
1084 pgoff_t pgoff;
1085 int id, rc;
5e161e40 1086 long length;
f7ca90b1 1087
5e161e40 1088 rc = bdev_dax_pgoff(iomap->bdev, sector, size, &pgoff);
cccbce67
DW
1089 if (rc)
1090 return rc;
cccbce67 1091 id = dax_read_lock();
5e161e40 1092 length = dax_direct_access(iomap->dax_dev, pgoff, PHYS_PFN(size),
86ed913b 1093 NULL, pfnp);
5e161e40
JK
1094 if (length < 0) {
1095 rc = length;
1096 goto out;
cccbce67 1097 }
5e161e40
JK
1098 rc = -EINVAL;
1099 if (PFN_PHYS(length) < size)
1100 goto out;
1101 if (pfn_t_to_pfn(*pfnp) & (PHYS_PFN(size)-1))
1102 goto out;
1103 /* For larger pages we need devmap */
1104 if (length > 1 && !pfn_t_devmap(*pfnp))
1105 goto out;
1106 rc = 0;
1107out:
cccbce67 1108 dax_read_unlock(id);
5e161e40 1109 return rc;
0e3b210c 1110}
0e3b210c 1111
e30331ff 1112/*
91d25ba8
RZ
1113 * The user has performed a load from a hole in the file. Allocating a new
1114 * page in the file would cause excessive storage usage for workloads with
1115 * sparse files. Instead we insert a read-only mapping of the 4k zero page.
1116 * If this page is ever written to we will re-fault and change the mapping to
1117 * point to real DAX storage instead.
e30331ff 1118 */
ab77dab4 1119static vm_fault_t dax_load_hole(struct address_space *mapping, void *entry,
e30331ff
RZ
1120 struct vm_fault *vmf)
1121{
1122 struct inode *inode = mapping->host;
91d25ba8 1123 unsigned long vaddr = vmf->address;
b90ca5cc
MW
1124 pfn_t pfn = pfn_to_pfn_t(my_zero_pfn(vaddr));
1125 vm_fault_t ret;
e30331ff 1126
cc4a90ac
MW
1127 dax_insert_mapping_entry(mapping, vmf, entry, pfn, RADIX_DAX_ZERO_PAGE,
1128 false);
ab77dab4 1129 ret = vmf_insert_mixed(vmf->vma, vaddr, pfn);
e30331ff
RZ
1130 trace_dax_load_hole(inode, vmf, ret);
1131 return ret;
1132}
1133
4b0228fa
VV
1134static bool dax_range_is_aligned(struct block_device *bdev,
1135 unsigned int offset, unsigned int length)
1136{
1137 unsigned short sector_size = bdev_logical_block_size(bdev);
1138
1139 if (!IS_ALIGNED(offset, sector_size))
1140 return false;
1141 if (!IS_ALIGNED(length, sector_size))
1142 return false;
1143
1144 return true;
1145}
1146
cccbce67
DW
1147int __dax_zero_page_range(struct block_device *bdev,
1148 struct dax_device *dax_dev, sector_t sector,
1149 unsigned int offset, unsigned int size)
679c8bd3 1150{
cccbce67
DW
1151 if (dax_range_is_aligned(bdev, offset, size)) {
1152 sector_t start_sector = sector + (offset >> 9);
4b0228fa
VV
1153
1154 return blkdev_issue_zeroout(bdev, start_sector,
53ef7d0e 1155 size >> 9, GFP_NOFS, 0);
4b0228fa 1156 } else {
cccbce67
DW
1157 pgoff_t pgoff;
1158 long rc, id;
1159 void *kaddr;
cccbce67 1160
e84b83b9 1161 rc = bdev_dax_pgoff(bdev, sector, PAGE_SIZE, &pgoff);
cccbce67
DW
1162 if (rc)
1163 return rc;
1164
1165 id = dax_read_lock();
86ed913b 1166 rc = dax_direct_access(dax_dev, pgoff, 1, &kaddr, NULL);
cccbce67
DW
1167 if (rc < 0) {
1168 dax_read_unlock(id);
1169 return rc;
1170 }
81f55870 1171 memset(kaddr + offset, 0, size);
c3ca015f 1172 dax_flush(dax_dev, kaddr + offset, size);
cccbce67 1173 dax_read_unlock(id);
4b0228fa 1174 }
679c8bd3
CH
1175 return 0;
1176}
1177EXPORT_SYMBOL_GPL(__dax_zero_page_range);
1178
a254e568 1179static loff_t
11c59c92 1180dax_iomap_actor(struct inode *inode, loff_t pos, loff_t length, void *data,
a254e568
CH
1181 struct iomap *iomap)
1182{
cccbce67
DW
1183 struct block_device *bdev = iomap->bdev;
1184 struct dax_device *dax_dev = iomap->dax_dev;
a254e568
CH
1185 struct iov_iter *iter = data;
1186 loff_t end = pos + length, done = 0;
1187 ssize_t ret = 0;
a77d4786 1188 size_t xfer;
cccbce67 1189 int id;
a254e568
CH
1190
1191 if (iov_iter_rw(iter) == READ) {
1192 end = min(end, i_size_read(inode));
1193 if (pos >= end)
1194 return 0;
1195
1196 if (iomap->type == IOMAP_HOLE || iomap->type == IOMAP_UNWRITTEN)
1197 return iov_iter_zero(min(length, end - pos), iter);
1198 }
1199
1200 if (WARN_ON_ONCE(iomap->type != IOMAP_MAPPED))
1201 return -EIO;
1202
e3fce68c
JK
1203 /*
1204 * Write can allocate block for an area which has a hole page mapped
1205 * into page tables. We have to tear down these mappings so that data
1206 * written by write(2) is visible in mmap.
1207 */
cd656375 1208 if (iomap->flags & IOMAP_F_NEW) {
e3fce68c
JK
1209 invalidate_inode_pages2_range(inode->i_mapping,
1210 pos >> PAGE_SHIFT,
1211 (end - 1) >> PAGE_SHIFT);
1212 }
1213
cccbce67 1214 id = dax_read_lock();
a254e568
CH
1215 while (pos < end) {
1216 unsigned offset = pos & (PAGE_SIZE - 1);
cccbce67
DW
1217 const size_t size = ALIGN(length + offset, PAGE_SIZE);
1218 const sector_t sector = dax_iomap_sector(iomap, pos);
a254e568 1219 ssize_t map_len;
cccbce67
DW
1220 pgoff_t pgoff;
1221 void *kaddr;
a254e568 1222
d1908f52
MH
1223 if (fatal_signal_pending(current)) {
1224 ret = -EINTR;
1225 break;
1226 }
1227
cccbce67
DW
1228 ret = bdev_dax_pgoff(bdev, sector, size, &pgoff);
1229 if (ret)
1230 break;
1231
1232 map_len = dax_direct_access(dax_dev, pgoff, PHYS_PFN(size),
86ed913b 1233 &kaddr, NULL);
a254e568
CH
1234 if (map_len < 0) {
1235 ret = map_len;
1236 break;
1237 }
1238
cccbce67
DW
1239 map_len = PFN_PHYS(map_len);
1240 kaddr += offset;
a254e568
CH
1241 map_len -= offset;
1242 if (map_len > end - pos)
1243 map_len = end - pos;
1244
a2e050f5
RZ
1245 /*
1246 * The userspace address for the memory copy has already been
1247 * validated via access_ok() in either vfs_read() or
1248 * vfs_write(), depending on which operation we are doing.
1249 */
a254e568 1250 if (iov_iter_rw(iter) == WRITE)
a77d4786 1251 xfer = dax_copy_from_iter(dax_dev, pgoff, kaddr,
fec53774 1252 map_len, iter);
a254e568 1253 else
a77d4786 1254 xfer = dax_copy_to_iter(dax_dev, pgoff, kaddr,
b3a9a0c3 1255 map_len, iter);
a254e568 1256
a77d4786
DW
1257 pos += xfer;
1258 length -= xfer;
1259 done += xfer;
1260
1261 if (xfer == 0)
1262 ret = -EFAULT;
1263 if (xfer < map_len)
1264 break;
a254e568 1265 }
cccbce67 1266 dax_read_unlock(id);
a254e568
CH
1267
1268 return done ? done : ret;
1269}
1270
1271/**
11c59c92 1272 * dax_iomap_rw - Perform I/O to a DAX file
a254e568
CH
1273 * @iocb: The control block for this I/O
1274 * @iter: The addresses to do I/O from or to
1275 * @ops: iomap ops passed from the file system
1276 *
1277 * This function performs read and write operations to directly mapped
1278 * persistent memory. The callers needs to take care of read/write exclusion
1279 * and evicting any page cache pages in the region under I/O.
1280 */
1281ssize_t
11c59c92 1282dax_iomap_rw(struct kiocb *iocb, struct iov_iter *iter,
8ff6daa1 1283 const struct iomap_ops *ops)
a254e568
CH
1284{
1285 struct address_space *mapping = iocb->ki_filp->f_mapping;
1286 struct inode *inode = mapping->host;
1287 loff_t pos = iocb->ki_pos, ret = 0, done = 0;
1288 unsigned flags = 0;
1289
168316db
CH
1290 if (iov_iter_rw(iter) == WRITE) {
1291 lockdep_assert_held_exclusive(&inode->i_rwsem);
a254e568 1292 flags |= IOMAP_WRITE;
168316db
CH
1293 } else {
1294 lockdep_assert_held(&inode->i_rwsem);
1295 }
a254e568 1296
a254e568
CH
1297 while (iov_iter_count(iter)) {
1298 ret = iomap_apply(inode, pos, iov_iter_count(iter), flags, ops,
11c59c92 1299 iter, dax_iomap_actor);
a254e568
CH
1300 if (ret <= 0)
1301 break;
1302 pos += ret;
1303 done += ret;
1304 }
1305
1306 iocb->ki_pos += done;
1307 return done ? done : ret;
1308}
11c59c92 1309EXPORT_SYMBOL_GPL(dax_iomap_rw);
a7d73fe6 1310
ab77dab4 1311static vm_fault_t dax_fault_return(int error)
9f141d6e
JK
1312{
1313 if (error == 0)
1314 return VM_FAULT_NOPAGE;
1315 if (error == -ENOMEM)
1316 return VM_FAULT_OOM;
1317 return VM_FAULT_SIGBUS;
1318}
1319
aaa422c4
DW
1320/*
1321 * MAP_SYNC on a dax mapping guarantees dirty metadata is
1322 * flushed on write-faults (non-cow), but not read-faults.
1323 */
1324static bool dax_fault_is_synchronous(unsigned long flags,
1325 struct vm_area_struct *vma, struct iomap *iomap)
1326{
1327 return (flags & IOMAP_WRITE) && (vma->vm_flags & VM_SYNC)
1328 && (iomap->flags & IOMAP_F_DIRTY);
1329}
1330
ab77dab4 1331static vm_fault_t dax_iomap_pte_fault(struct vm_fault *vmf, pfn_t *pfnp,
c0b24625 1332 int *iomap_errp, const struct iomap_ops *ops)
a7d73fe6 1333{
a0987ad5
JK
1334 struct vm_area_struct *vma = vmf->vma;
1335 struct address_space *mapping = vma->vm_file->f_mapping;
a7d73fe6 1336 struct inode *inode = mapping->host;
1a29d85e 1337 unsigned long vaddr = vmf->address;
a7d73fe6 1338 loff_t pos = (loff_t)vmf->pgoff << PAGE_SHIFT;
a7d73fe6 1339 struct iomap iomap = { 0 };
9484ab1b 1340 unsigned flags = IOMAP_FAULT;
a7d73fe6 1341 int error, major = 0;
d2c43ef1 1342 bool write = vmf->flags & FAULT_FLAG_WRITE;
caa51d26 1343 bool sync;
ab77dab4 1344 vm_fault_t ret = 0;
a7d73fe6 1345 void *entry;
1b5a1cb2 1346 pfn_t pfn;
a7d73fe6 1347
ab77dab4 1348 trace_dax_pte_fault(inode, vmf, ret);
a7d73fe6
CH
1349 /*
1350 * Check whether offset isn't beyond end of file now. Caller is supposed
1351 * to hold locks serializing us with truncate / punch hole so this is
1352 * a reliable test.
1353 */
a9c42b33 1354 if (pos >= i_size_read(inode)) {
ab77dab4 1355 ret = VM_FAULT_SIGBUS;
a9c42b33
RZ
1356 goto out;
1357 }
a7d73fe6 1358
d2c43ef1 1359 if (write && !vmf->cow_page)
a7d73fe6
CH
1360 flags |= IOMAP_WRITE;
1361
13e451fd
JK
1362 entry = grab_mapping_entry(mapping, vmf->pgoff, 0);
1363 if (IS_ERR(entry)) {
ab77dab4 1364 ret = dax_fault_return(PTR_ERR(entry));
13e451fd
JK
1365 goto out;
1366 }
1367
e2093926
RZ
1368 /*
1369 * It is possible, particularly with mixed reads & writes to private
1370 * mappings, that we have raced with a PMD fault that overlaps with
1371 * the PTE we need to set up. If so just return and the fault will be
1372 * retried.
1373 */
1374 if (pmd_trans_huge(*vmf->pmd) || pmd_devmap(*vmf->pmd)) {
ab77dab4 1375 ret = VM_FAULT_NOPAGE;
e2093926
RZ
1376 goto unlock_entry;
1377 }
1378
a7d73fe6
CH
1379 /*
1380 * Note that we don't bother to use iomap_apply here: DAX required
1381 * the file system block size to be equal the page size, which means
1382 * that we never have to deal with more than a single extent here.
1383 */
1384 error = ops->iomap_begin(inode, pos, PAGE_SIZE, flags, &iomap);
c0b24625
JK
1385 if (iomap_errp)
1386 *iomap_errp = error;
a9c42b33 1387 if (error) {
ab77dab4 1388 ret = dax_fault_return(error);
13e451fd 1389 goto unlock_entry;
a9c42b33 1390 }
a7d73fe6 1391 if (WARN_ON_ONCE(iomap.offset + iomap.length < pos + PAGE_SIZE)) {
13e451fd
JK
1392 error = -EIO; /* fs corruption? */
1393 goto error_finish_iomap;
a7d73fe6
CH
1394 }
1395
a7d73fe6 1396 if (vmf->cow_page) {
31a6f1a6
JK
1397 sector_t sector = dax_iomap_sector(&iomap, pos);
1398
a7d73fe6
CH
1399 switch (iomap.type) {
1400 case IOMAP_HOLE:
1401 case IOMAP_UNWRITTEN:
1402 clear_user_highpage(vmf->cow_page, vaddr);
1403 break;
1404 case IOMAP_MAPPED:
cccbce67
DW
1405 error = copy_user_dax(iomap.bdev, iomap.dax_dev,
1406 sector, PAGE_SIZE, vmf->cow_page, vaddr);
a7d73fe6
CH
1407 break;
1408 default:
1409 WARN_ON_ONCE(1);
1410 error = -EIO;
1411 break;
1412 }
1413
1414 if (error)
13e451fd 1415 goto error_finish_iomap;
b1aa812b
JK
1416
1417 __SetPageUptodate(vmf->cow_page);
ab77dab4
SJ
1418 ret = finish_fault(vmf);
1419 if (!ret)
1420 ret = VM_FAULT_DONE_COW;
13e451fd 1421 goto finish_iomap;
a7d73fe6
CH
1422 }
1423
aaa422c4 1424 sync = dax_fault_is_synchronous(flags, vma, &iomap);
caa51d26 1425
a7d73fe6
CH
1426 switch (iomap.type) {
1427 case IOMAP_MAPPED:
1428 if (iomap.flags & IOMAP_F_NEW) {
1429 count_vm_event(PGMAJFAULT);
a0987ad5 1430 count_memcg_event_mm(vma->vm_mm, PGMAJFAULT);
a7d73fe6
CH
1431 major = VM_FAULT_MAJOR;
1432 }
1b5a1cb2
JK
1433 error = dax_iomap_pfn(&iomap, pos, PAGE_SIZE, &pfn);
1434 if (error < 0)
1435 goto error_finish_iomap;
1436
3fe0791c 1437 entry = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
caa51d26 1438 0, write && !sync);
1b5a1cb2 1439
caa51d26
JK
1440 /*
1441 * If we are doing synchronous page fault and inode needs fsync,
1442 * we can insert PTE into page tables only after that happens.
1443 * Skip insertion for now and return the pfn so that caller can
1444 * insert it after fsync is done.
1445 */
1446 if (sync) {
1447 if (WARN_ON_ONCE(!pfnp)) {
1448 error = -EIO;
1449 goto error_finish_iomap;
1450 }
1451 *pfnp = pfn;
ab77dab4 1452 ret = VM_FAULT_NEEDDSYNC | major;
caa51d26
JK
1453 goto finish_iomap;
1454 }
1b5a1cb2
JK
1455 trace_dax_insert_mapping(inode, vmf, entry);
1456 if (write)
ab77dab4 1457 ret = vmf_insert_mixed_mkwrite(vma, vaddr, pfn);
1b5a1cb2 1458 else
ab77dab4 1459 ret = vmf_insert_mixed(vma, vaddr, pfn);
1b5a1cb2 1460
ab77dab4 1461 goto finish_iomap;
a7d73fe6
CH
1462 case IOMAP_UNWRITTEN:
1463 case IOMAP_HOLE:
d2c43ef1 1464 if (!write) {
ab77dab4 1465 ret = dax_load_hole(mapping, entry, vmf);
13e451fd 1466 goto finish_iomap;
1550290b 1467 }
a7d73fe6
CH
1468 /*FALLTHRU*/
1469 default:
1470 WARN_ON_ONCE(1);
1471 error = -EIO;
1472 break;
1473 }
1474
13e451fd 1475 error_finish_iomap:
ab77dab4 1476 ret = dax_fault_return(error);
9f141d6e
JK
1477 finish_iomap:
1478 if (ops->iomap_end) {
1479 int copied = PAGE_SIZE;
1480
ab77dab4 1481 if (ret & VM_FAULT_ERROR)
9f141d6e
JK
1482 copied = 0;
1483 /*
1484 * The fault is done by now and there's no way back (other
1485 * thread may be already happily using PTE we have installed).
1486 * Just ignore error from ->iomap_end since we cannot do much
1487 * with it.
1488 */
1489 ops->iomap_end(inode, pos, PAGE_SIZE, copied, flags, &iomap);
1550290b 1490 }
13e451fd 1491 unlock_entry:
91d25ba8 1492 put_locked_mapping_entry(mapping, vmf->pgoff);
13e451fd 1493 out:
ab77dab4
SJ
1494 trace_dax_pte_fault_done(inode, vmf, ret);
1495 return ret | major;
a7d73fe6 1496}
642261ac
RZ
1497
1498#ifdef CONFIG_FS_DAX_PMD
ab77dab4 1499static vm_fault_t dax_pmd_load_hole(struct vm_fault *vmf, struct iomap *iomap,
91d25ba8 1500 void *entry)
642261ac 1501{
f4200391
DJ
1502 struct address_space *mapping = vmf->vma->vm_file->f_mapping;
1503 unsigned long pmd_addr = vmf->address & PMD_MASK;
653b2ea3 1504 struct inode *inode = mapping->host;
642261ac 1505 struct page *zero_page;
653b2ea3 1506 void *ret = NULL;
642261ac
RZ
1507 spinlock_t *ptl;
1508 pmd_t pmd_entry;
3fe0791c 1509 pfn_t pfn;
642261ac 1510
f4200391 1511 zero_page = mm_get_huge_zero_page(vmf->vma->vm_mm);
642261ac
RZ
1512
1513 if (unlikely(!zero_page))
653b2ea3 1514 goto fallback;
642261ac 1515
3fe0791c
DW
1516 pfn = page_to_pfn_t(zero_page);
1517 ret = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
f5b7b748 1518 RADIX_DAX_PMD | RADIX_DAX_ZERO_PAGE, false);
642261ac 1519
f4200391
DJ
1520 ptl = pmd_lock(vmf->vma->vm_mm, vmf->pmd);
1521 if (!pmd_none(*(vmf->pmd))) {
642261ac 1522 spin_unlock(ptl);
653b2ea3 1523 goto fallback;
642261ac
RZ
1524 }
1525
f4200391 1526 pmd_entry = mk_pmd(zero_page, vmf->vma->vm_page_prot);
642261ac 1527 pmd_entry = pmd_mkhuge(pmd_entry);
f4200391 1528 set_pmd_at(vmf->vma->vm_mm, pmd_addr, vmf->pmd, pmd_entry);
642261ac 1529 spin_unlock(ptl);
f4200391 1530 trace_dax_pmd_load_hole(inode, vmf, zero_page, ret);
642261ac 1531 return VM_FAULT_NOPAGE;
653b2ea3
RZ
1532
1533fallback:
f4200391 1534 trace_dax_pmd_load_hole_fallback(inode, vmf, zero_page, ret);
653b2ea3 1535 return VM_FAULT_FALLBACK;
642261ac
RZ
1536}
1537
ab77dab4 1538static vm_fault_t dax_iomap_pmd_fault(struct vm_fault *vmf, pfn_t *pfnp,
a2d58167 1539 const struct iomap_ops *ops)
642261ac 1540{
f4200391 1541 struct vm_area_struct *vma = vmf->vma;
642261ac 1542 struct address_space *mapping = vma->vm_file->f_mapping;
d8a849e1
DJ
1543 unsigned long pmd_addr = vmf->address & PMD_MASK;
1544 bool write = vmf->flags & FAULT_FLAG_WRITE;
caa51d26 1545 bool sync;
9484ab1b 1546 unsigned int iomap_flags = (write ? IOMAP_WRITE : 0) | IOMAP_FAULT;
642261ac 1547 struct inode *inode = mapping->host;
ab77dab4 1548 vm_fault_t result = VM_FAULT_FALLBACK;
642261ac
RZ
1549 struct iomap iomap = { 0 };
1550 pgoff_t max_pgoff, pgoff;
642261ac
RZ
1551 void *entry;
1552 loff_t pos;
1553 int error;
302a5e31 1554 pfn_t pfn;
642261ac 1555
282a8e03
RZ
1556 /*
1557 * Check whether offset isn't beyond end of file now. Caller is
1558 * supposed to hold locks serializing us with truncate / punch hole so
1559 * this is a reliable test.
1560 */
1561 pgoff = linear_page_index(vma, pmd_addr);
957ac8c4 1562 max_pgoff = DIV_ROUND_UP(i_size_read(inode), PAGE_SIZE);
282a8e03 1563
f4200391 1564 trace_dax_pmd_fault(inode, vmf, max_pgoff, 0);
282a8e03 1565
fffa281b
RZ
1566 /*
1567 * Make sure that the faulting address's PMD offset (color) matches
1568 * the PMD offset from the start of the file. This is necessary so
1569 * that a PMD range in the page table overlaps exactly with a PMD
1570 * range in the radix tree.
1571 */
1572 if ((vmf->pgoff & PG_PMD_COLOUR) !=
1573 ((vmf->address >> PAGE_SHIFT) & PG_PMD_COLOUR))
1574 goto fallback;
1575
642261ac
RZ
1576 /* Fall back to PTEs if we're going to COW */
1577 if (write && !(vma->vm_flags & VM_SHARED))
1578 goto fallback;
1579
1580 /* If the PMD would extend outside the VMA */
1581 if (pmd_addr < vma->vm_start)
1582 goto fallback;
1583 if ((pmd_addr + PMD_SIZE) > vma->vm_end)
1584 goto fallback;
1585
957ac8c4 1586 if (pgoff >= max_pgoff) {
282a8e03
RZ
1587 result = VM_FAULT_SIGBUS;
1588 goto out;
1589 }
642261ac
RZ
1590
1591 /* If the PMD would extend beyond the file size */
957ac8c4 1592 if ((pgoff | PG_PMD_COLOUR) >= max_pgoff)
642261ac
RZ
1593 goto fallback;
1594
876f2946 1595 /*
91d25ba8
RZ
1596 * grab_mapping_entry() will make sure we get a 2MiB empty entry, a
1597 * 2MiB zero page entry or a DAX PMD. If it can't (because a 4k page
1598 * is already in the tree, for instance), it will return -EEXIST and
1599 * we just fall back to 4k entries.
876f2946
RZ
1600 */
1601 entry = grab_mapping_entry(mapping, pgoff, RADIX_DAX_PMD);
1602 if (IS_ERR(entry))
1603 goto fallback;
1604
e2093926
RZ
1605 /*
1606 * It is possible, particularly with mixed reads & writes to private
1607 * mappings, that we have raced with a PTE fault that overlaps with
1608 * the PMD we need to set up. If so just return and the fault will be
1609 * retried.
1610 */
1611 if (!pmd_none(*vmf->pmd) && !pmd_trans_huge(*vmf->pmd) &&
1612 !pmd_devmap(*vmf->pmd)) {
1613 result = 0;
1614 goto unlock_entry;
1615 }
1616
642261ac
RZ
1617 /*
1618 * Note that we don't use iomap_apply here. We aren't doing I/O, only
1619 * setting up a mapping, so really we're using iomap_begin() as a way
1620 * to look up our filesystem block.
1621 */
1622 pos = (loff_t)pgoff << PAGE_SHIFT;
1623 error = ops->iomap_begin(inode, pos, PMD_SIZE, iomap_flags, &iomap);
1624 if (error)
876f2946 1625 goto unlock_entry;
9f141d6e 1626
642261ac
RZ
1627 if (iomap.offset + iomap.length < pos + PMD_SIZE)
1628 goto finish_iomap;
1629
aaa422c4 1630 sync = dax_fault_is_synchronous(iomap_flags, vma, &iomap);
caa51d26 1631
642261ac
RZ
1632 switch (iomap.type) {
1633 case IOMAP_MAPPED:
302a5e31
JK
1634 error = dax_iomap_pfn(&iomap, pos, PMD_SIZE, &pfn);
1635 if (error < 0)
1636 goto finish_iomap;
1637
3fe0791c 1638 entry = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
caa51d26 1639 RADIX_DAX_PMD, write && !sync);
302a5e31 1640
caa51d26
JK
1641 /*
1642 * If we are doing synchronous page fault and inode needs fsync,
1643 * we can insert PMD into page tables only after that happens.
1644 * Skip insertion for now and return the pfn so that caller can
1645 * insert it after fsync is done.
1646 */
1647 if (sync) {
1648 if (WARN_ON_ONCE(!pfnp))
1649 goto finish_iomap;
1650 *pfnp = pfn;
1651 result = VM_FAULT_NEEDDSYNC;
1652 goto finish_iomap;
1653 }
1654
302a5e31
JK
1655 trace_dax_pmd_insert_mapping(inode, vmf, PMD_SIZE, pfn, entry);
1656 result = vmf_insert_pfn_pmd(vma, vmf->address, vmf->pmd, pfn,
1657 write);
642261ac
RZ
1658 break;
1659 case IOMAP_UNWRITTEN:
1660 case IOMAP_HOLE:
1661 if (WARN_ON_ONCE(write))
876f2946 1662 break;
91d25ba8 1663 result = dax_pmd_load_hole(vmf, &iomap, entry);
642261ac
RZ
1664 break;
1665 default:
1666 WARN_ON_ONCE(1);
1667 break;
1668 }
1669
1670 finish_iomap:
1671 if (ops->iomap_end) {
9f141d6e
JK
1672 int copied = PMD_SIZE;
1673
1674 if (result == VM_FAULT_FALLBACK)
1675 copied = 0;
1676 /*
1677 * The fault is done by now and there's no way back (other
1678 * thread may be already happily using PMD we have installed).
1679 * Just ignore error from ->iomap_end since we cannot do much
1680 * with it.
1681 */
1682 ops->iomap_end(inode, pos, PMD_SIZE, copied, iomap_flags,
1683 &iomap);
642261ac 1684 }
876f2946 1685 unlock_entry:
91d25ba8 1686 put_locked_mapping_entry(mapping, pgoff);
642261ac
RZ
1687 fallback:
1688 if (result == VM_FAULT_FALLBACK) {
d8a849e1 1689 split_huge_pmd(vma, vmf->pmd, vmf->address);
642261ac
RZ
1690 count_vm_event(THP_FAULT_FALLBACK);
1691 }
282a8e03 1692out:
f4200391 1693 trace_dax_pmd_fault_done(inode, vmf, max_pgoff, result);
642261ac
RZ
1694 return result;
1695}
a2d58167 1696#else
ab77dab4 1697static vm_fault_t dax_iomap_pmd_fault(struct vm_fault *vmf, pfn_t *pfnp,
01cddfe9 1698 const struct iomap_ops *ops)
a2d58167
DJ
1699{
1700 return VM_FAULT_FALLBACK;
1701}
642261ac 1702#endif /* CONFIG_FS_DAX_PMD */
a2d58167
DJ
1703
1704/**
1705 * dax_iomap_fault - handle a page fault on a DAX file
1706 * @vmf: The description of the fault
cec04e8c 1707 * @pe_size: Size of the page to fault in
9a0dd422 1708 * @pfnp: PFN to insert for synchronous faults if fsync is required
c0b24625 1709 * @iomap_errp: Storage for detailed error code in case of error
cec04e8c 1710 * @ops: Iomap ops passed from the file system
a2d58167
DJ
1711 *
1712 * When a page fault occurs, filesystems may call this helper in
1713 * their fault handler for DAX files. dax_iomap_fault() assumes the caller
1714 * has done all the necessary locking for page fault to proceed
1715 * successfully.
1716 */
ab77dab4 1717vm_fault_t dax_iomap_fault(struct vm_fault *vmf, enum page_entry_size pe_size,
c0b24625 1718 pfn_t *pfnp, int *iomap_errp, const struct iomap_ops *ops)
a2d58167 1719{
c791ace1
DJ
1720 switch (pe_size) {
1721 case PE_SIZE_PTE:
c0b24625 1722 return dax_iomap_pte_fault(vmf, pfnp, iomap_errp, ops);
c791ace1 1723 case PE_SIZE_PMD:
9a0dd422 1724 return dax_iomap_pmd_fault(vmf, pfnp, ops);
a2d58167
DJ
1725 default:
1726 return VM_FAULT_FALLBACK;
1727 }
1728}
1729EXPORT_SYMBOL_GPL(dax_iomap_fault);
71eab6df
JK
1730
1731/**
1732 * dax_insert_pfn_mkwrite - insert PTE or PMD entry into page tables
1733 * @vmf: The description of the fault
1734 * @pe_size: Size of entry to be inserted
1735 * @pfn: PFN to insert
1736 *
1737 * This function inserts writeable PTE or PMD entry into page tables for mmaped
1738 * DAX file. It takes care of marking corresponding radix tree entry as dirty
1739 * as well.
1740 */
ab77dab4 1741static vm_fault_t dax_insert_pfn_mkwrite(struct vm_fault *vmf,
71eab6df
JK
1742 enum page_entry_size pe_size,
1743 pfn_t pfn)
1744{
1745 struct address_space *mapping = vmf->vma->vm_file->f_mapping;
1746 void *entry, **slot;
1747 pgoff_t index = vmf->pgoff;
ab77dab4 1748 vm_fault_t ret;
71eab6df 1749
b93b0163 1750 xa_lock_irq(&mapping->i_pages);
71eab6df
JK
1751 entry = get_unlocked_mapping_entry(mapping, index, &slot);
1752 /* Did we race with someone splitting entry or so? */
1753 if (!entry ||
1754 (pe_size == PE_SIZE_PTE && !dax_is_pte_entry(entry)) ||
1755 (pe_size == PE_SIZE_PMD && !dax_is_pmd_entry(entry))) {
1756 put_unlocked_mapping_entry(mapping, index, entry);
b93b0163 1757 xa_unlock_irq(&mapping->i_pages);
71eab6df
JK
1758 trace_dax_insert_pfn_mkwrite_no_entry(mapping->host, vmf,
1759 VM_FAULT_NOPAGE);
1760 return VM_FAULT_NOPAGE;
1761 }
b93b0163 1762 radix_tree_tag_set(&mapping->i_pages, index, PAGECACHE_TAG_DIRTY);
71eab6df 1763 entry = lock_slot(mapping, slot);
b93b0163 1764 xa_unlock_irq(&mapping->i_pages);
71eab6df
JK
1765 switch (pe_size) {
1766 case PE_SIZE_PTE:
ab77dab4 1767 ret = vmf_insert_mixed_mkwrite(vmf->vma, vmf->address, pfn);
71eab6df
JK
1768 break;
1769#ifdef CONFIG_FS_DAX_PMD
1770 case PE_SIZE_PMD:
ab77dab4 1771 ret = vmf_insert_pfn_pmd(vmf->vma, vmf->address, vmf->pmd,
71eab6df
JK
1772 pfn, true);
1773 break;
1774#endif
1775 default:
ab77dab4 1776 ret = VM_FAULT_FALLBACK;
71eab6df
JK
1777 }
1778 put_locked_mapping_entry(mapping, index);
ab77dab4
SJ
1779 trace_dax_insert_pfn_mkwrite(mapping->host, vmf, ret);
1780 return ret;
71eab6df
JK
1781}
1782
1783/**
1784 * dax_finish_sync_fault - finish synchronous page fault
1785 * @vmf: The description of the fault
1786 * @pe_size: Size of entry to be inserted
1787 * @pfn: PFN to insert
1788 *
1789 * This function ensures that the file range touched by the page fault is
1790 * stored persistently on the media and handles inserting of appropriate page
1791 * table entry.
1792 */
ab77dab4
SJ
1793vm_fault_t dax_finish_sync_fault(struct vm_fault *vmf,
1794 enum page_entry_size pe_size, pfn_t pfn)
71eab6df
JK
1795{
1796 int err;
1797 loff_t start = ((loff_t)vmf->pgoff) << PAGE_SHIFT;
1798 size_t len = 0;
1799
1800 if (pe_size == PE_SIZE_PTE)
1801 len = PAGE_SIZE;
1802 else if (pe_size == PE_SIZE_PMD)
1803 len = PMD_SIZE;
1804 else
1805 WARN_ON_ONCE(1);
1806 err = vfs_fsync_range(vmf->vma->vm_file, start, start + len - 1, 1);
1807 if (err)
1808 return VM_FAULT_SIGBUS;
1809 return dax_insert_pfn_mkwrite(vmf, pe_size, pfn);
1810}
1811EXPORT_SYMBOL_GPL(dax_finish_sync_fault);