rMerge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
[linux-2.6-block.git] / fs / dax.c
CommitLineData
d475c634
MW
1/*
2 * fs/dax.c - Direct Access filesystem code
3 * Copyright (c) 2013-2014 Intel Corporation
4 * Author: Matthew Wilcox <matthew.r.wilcox@intel.com>
5 * Author: Ross Zwisler <ross.zwisler@linux.intel.com>
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 */
16
17#include <linux/atomic.h>
18#include <linux/blkdev.h>
19#include <linux/buffer_head.h>
d77e92e2 20#include <linux/dax.h>
d475c634
MW
21#include <linux/fs.h>
22#include <linux/genhd.h>
f7ca90b1
MW
23#include <linux/highmem.h>
24#include <linux/memcontrol.h>
25#include <linux/mm.h>
d475c634 26#include <linux/mutex.h>
9973c98e 27#include <linux/pagevec.h>
289c6aed 28#include <linux/sched.h>
f361bf4a 29#include <linux/sched/signal.h>
d475c634 30#include <linux/uio.h>
f7ca90b1 31#include <linux/vmstat.h>
34c0fd54 32#include <linux/pfn_t.h>
0e749e54 33#include <linux/sizes.h>
4b4bb46d 34#include <linux/mmu_notifier.h>
a254e568
CH
35#include <linux/iomap.h>
36#include "internal.h"
d475c634 37
282a8e03
RZ
38#define CREATE_TRACE_POINTS
39#include <trace/events/fs_dax.h>
40
ac401cc7
JK
41/* We choose 4096 entries - same as per-zone page wait tables */
42#define DAX_WAIT_TABLE_BITS 12
43#define DAX_WAIT_TABLE_ENTRIES (1 << DAX_WAIT_TABLE_BITS)
44
917f3452
RZ
45/* The 'colour' (ie low bits) within a PMD of a page offset. */
46#define PG_PMD_COLOUR ((PMD_SIZE >> PAGE_SHIFT) - 1)
977fbdcd 47#define PG_PMD_NR (PMD_SIZE >> PAGE_SHIFT)
917f3452 48
ce95ab0f 49static wait_queue_head_t wait_table[DAX_WAIT_TABLE_ENTRIES];
ac401cc7
JK
50
51static int __init init_dax_wait_table(void)
52{
53 int i;
54
55 for (i = 0; i < DAX_WAIT_TABLE_ENTRIES; i++)
56 init_waitqueue_head(wait_table + i);
57 return 0;
58}
59fs_initcall(init_dax_wait_table);
60
527b19d0
RZ
61/*
62 * We use lowest available bit in exceptional entry for locking, one bit for
63 * the entry size (PMD) and two more to tell us if the entry is a zero page or
64 * an empty entry that is just used for locking. In total four special bits.
65 *
66 * If the PMD bit isn't set the entry has size PAGE_SIZE, and if the ZERO_PAGE
67 * and EMPTY bits aren't set the entry is a normal DAX entry with a filesystem
68 * block allocation.
69 */
70#define RADIX_DAX_SHIFT (RADIX_TREE_EXCEPTIONAL_SHIFT + 4)
71#define RADIX_DAX_ENTRY_LOCK (1 << RADIX_TREE_EXCEPTIONAL_SHIFT)
72#define RADIX_DAX_PMD (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 1))
73#define RADIX_DAX_ZERO_PAGE (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 2))
74#define RADIX_DAX_EMPTY (1 << (RADIX_TREE_EXCEPTIONAL_SHIFT + 3))
75
3fe0791c 76static unsigned long dax_radix_pfn(void *entry)
527b19d0
RZ
77{
78 return (unsigned long)entry >> RADIX_DAX_SHIFT;
79}
80
3fe0791c 81static void *dax_radix_locked_entry(unsigned long pfn, unsigned long flags)
527b19d0
RZ
82{
83 return (void *)(RADIX_TREE_EXCEPTIONAL_ENTRY | flags |
3fe0791c 84 (pfn << RADIX_DAX_SHIFT) | RADIX_DAX_ENTRY_LOCK);
527b19d0
RZ
85}
86
87static unsigned int dax_radix_order(void *entry)
88{
89 if ((unsigned long)entry & RADIX_DAX_PMD)
90 return PMD_SHIFT - PAGE_SHIFT;
91 return 0;
92}
93
642261ac 94static int dax_is_pmd_entry(void *entry)
d1a5f2b4 95{
642261ac 96 return (unsigned long)entry & RADIX_DAX_PMD;
d1a5f2b4
DW
97}
98
642261ac 99static int dax_is_pte_entry(void *entry)
d475c634 100{
642261ac 101 return !((unsigned long)entry & RADIX_DAX_PMD);
d475c634
MW
102}
103
642261ac 104static int dax_is_zero_entry(void *entry)
d475c634 105{
91d25ba8 106 return (unsigned long)entry & RADIX_DAX_ZERO_PAGE;
d475c634
MW
107}
108
642261ac 109static int dax_is_empty_entry(void *entry)
b2e0d162 110{
642261ac 111 return (unsigned long)entry & RADIX_DAX_EMPTY;
b2e0d162
DW
112}
113
ac401cc7
JK
114/*
115 * DAX radix tree locking
116 */
117struct exceptional_entry_key {
118 struct address_space *mapping;
63e95b5c 119 pgoff_t entry_start;
ac401cc7
JK
120};
121
122struct wait_exceptional_entry_queue {
ac6424b9 123 wait_queue_entry_t wait;
ac401cc7
JK
124 struct exceptional_entry_key key;
125};
126
63e95b5c
RZ
127static wait_queue_head_t *dax_entry_waitqueue(struct address_space *mapping,
128 pgoff_t index, void *entry, struct exceptional_entry_key *key)
129{
130 unsigned long hash;
131
132 /*
133 * If 'entry' is a PMD, align the 'index' that we use for the wait
134 * queue to the start of that PMD. This ensures that all offsets in
135 * the range covered by the PMD map to the same bit lock.
136 */
642261ac 137 if (dax_is_pmd_entry(entry))
917f3452 138 index &= ~PG_PMD_COLOUR;
63e95b5c
RZ
139
140 key->mapping = mapping;
141 key->entry_start = index;
142
143 hash = hash_long((unsigned long)mapping ^ index, DAX_WAIT_TABLE_BITS);
144 return wait_table + hash;
145}
146
ac6424b9 147static int wake_exceptional_entry_func(wait_queue_entry_t *wait, unsigned int mode,
ac401cc7
JK
148 int sync, void *keyp)
149{
150 struct exceptional_entry_key *key = keyp;
151 struct wait_exceptional_entry_queue *ewait =
152 container_of(wait, struct wait_exceptional_entry_queue, wait);
153
154 if (key->mapping != ewait->key.mapping ||
63e95b5c 155 key->entry_start != ewait->key.entry_start)
ac401cc7
JK
156 return 0;
157 return autoremove_wake_function(wait, mode, sync, NULL);
158}
159
e30331ff 160/*
b93b0163
MW
161 * @entry may no longer be the entry at the index in the mapping.
162 * The important information it's conveying is whether the entry at
163 * this index used to be a PMD entry.
e30331ff 164 */
d01ad197 165static void dax_wake_mapping_entry_waiter(struct address_space *mapping,
e30331ff
RZ
166 pgoff_t index, void *entry, bool wake_all)
167{
168 struct exceptional_entry_key key;
169 wait_queue_head_t *wq;
170
171 wq = dax_entry_waitqueue(mapping, index, entry, &key);
172
173 /*
174 * Checking for locked entry and prepare_to_wait_exclusive() happens
b93b0163 175 * under the i_pages lock, ditto for entry handling in our callers.
e30331ff
RZ
176 * So at this point all tasks that could have seen our entry locked
177 * must be in the waitqueue and the following check will see them.
178 */
179 if (waitqueue_active(wq))
180 __wake_up(wq, TASK_NORMAL, wake_all ? 0 : 1, &key);
181}
182
ac401cc7 183/*
b93b0163
MW
184 * Check whether the given slot is locked. Must be called with the i_pages
185 * lock held.
ac401cc7
JK
186 */
187static inline int slot_locked(struct address_space *mapping, void **slot)
188{
189 unsigned long entry = (unsigned long)
b93b0163 190 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
191 return entry & RADIX_DAX_ENTRY_LOCK;
192}
193
194/*
b93b0163 195 * Mark the given slot as locked. Must be called with the i_pages lock held.
ac401cc7
JK
196 */
197static inline void *lock_slot(struct address_space *mapping, void **slot)
198{
199 unsigned long entry = (unsigned long)
b93b0163 200 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
201
202 entry |= RADIX_DAX_ENTRY_LOCK;
b93b0163 203 radix_tree_replace_slot(&mapping->i_pages, slot, (void *)entry);
ac401cc7
JK
204 return (void *)entry;
205}
206
207/*
b93b0163 208 * Mark the given slot as unlocked. Must be called with the i_pages lock held.
ac401cc7
JK
209 */
210static inline void *unlock_slot(struct address_space *mapping, void **slot)
211{
212 unsigned long entry = (unsigned long)
b93b0163 213 radix_tree_deref_slot_protected(slot, &mapping->i_pages.xa_lock);
ac401cc7
JK
214
215 entry &= ~(unsigned long)RADIX_DAX_ENTRY_LOCK;
b93b0163 216 radix_tree_replace_slot(&mapping->i_pages, slot, (void *)entry);
ac401cc7
JK
217 return (void *)entry;
218}
219
220/*
221 * Lookup entry in radix tree, wait for it to become unlocked if it is
222 * exceptional entry and return it. The caller must call
223 * put_unlocked_mapping_entry() when he decided not to lock the entry or
224 * put_locked_mapping_entry() when he locked the entry and now wants to
225 * unlock it.
226 *
b93b0163 227 * Must be called with the i_pages lock held.
ac401cc7
JK
228 */
229static void *get_unlocked_mapping_entry(struct address_space *mapping,
230 pgoff_t index, void ***slotp)
231{
e3ad61c6 232 void *entry, **slot;
ac401cc7 233 struct wait_exceptional_entry_queue ewait;
63e95b5c 234 wait_queue_head_t *wq;
ac401cc7
JK
235
236 init_wait(&ewait.wait);
237 ewait.wait.func = wake_exceptional_entry_func;
ac401cc7
JK
238
239 for (;;) {
b93b0163 240 entry = __radix_tree_lookup(&mapping->i_pages, index, NULL,
ac401cc7 241 &slot);
91d25ba8
RZ
242 if (!entry ||
243 WARN_ON_ONCE(!radix_tree_exceptional_entry(entry)) ||
ac401cc7
JK
244 !slot_locked(mapping, slot)) {
245 if (slotp)
246 *slotp = slot;
e3ad61c6 247 return entry;
ac401cc7 248 }
63e95b5c
RZ
249
250 wq = dax_entry_waitqueue(mapping, index, entry, &ewait.key);
ac401cc7
JK
251 prepare_to_wait_exclusive(wq, &ewait.wait,
252 TASK_UNINTERRUPTIBLE);
b93b0163 253 xa_unlock_irq(&mapping->i_pages);
ac401cc7
JK
254 schedule();
255 finish_wait(wq, &ewait.wait);
b93b0163 256 xa_lock_irq(&mapping->i_pages);
ac401cc7
JK
257 }
258}
259
b1aa812b
JK
260static void dax_unlock_mapping_entry(struct address_space *mapping,
261 pgoff_t index)
262{
263 void *entry, **slot;
264
b93b0163
MW
265 xa_lock_irq(&mapping->i_pages);
266 entry = __radix_tree_lookup(&mapping->i_pages, index, NULL, &slot);
b1aa812b
JK
267 if (WARN_ON_ONCE(!entry || !radix_tree_exceptional_entry(entry) ||
268 !slot_locked(mapping, slot))) {
b93b0163 269 xa_unlock_irq(&mapping->i_pages);
b1aa812b
JK
270 return;
271 }
272 unlock_slot(mapping, slot);
b93b0163 273 xa_unlock_irq(&mapping->i_pages);
b1aa812b
JK
274 dax_wake_mapping_entry_waiter(mapping, index, entry, false);
275}
276
422476c4 277static void put_locked_mapping_entry(struct address_space *mapping,
91d25ba8 278 pgoff_t index)
422476c4 279{
91d25ba8 280 dax_unlock_mapping_entry(mapping, index);
422476c4
RZ
281}
282
283/*
284 * Called when we are done with radix tree entry we looked up via
285 * get_unlocked_mapping_entry() and which we didn't lock in the end.
286 */
287static void put_unlocked_mapping_entry(struct address_space *mapping,
288 pgoff_t index, void *entry)
289{
91d25ba8 290 if (!entry)
422476c4
RZ
291 return;
292
293 /* We have to wake up next waiter for the radix tree entry lock */
294 dax_wake_mapping_entry_waiter(mapping, index, entry, false);
295}
296
d2c997c0
DW
297static unsigned long dax_entry_size(void *entry)
298{
299 if (dax_is_zero_entry(entry))
300 return 0;
301 else if (dax_is_empty_entry(entry))
302 return 0;
303 else if (dax_is_pmd_entry(entry))
304 return PMD_SIZE;
305 else
306 return PAGE_SIZE;
307}
308
309static unsigned long dax_radix_end_pfn(void *entry)
310{
311 return dax_radix_pfn(entry) + dax_entry_size(entry) / PAGE_SIZE;
312}
313
314/*
315 * Iterate through all mapped pfns represented by an entry, i.e. skip
316 * 'empty' and 'zero' entries.
317 */
318#define for_each_mapped_pfn(entry, pfn) \
319 for (pfn = dax_radix_pfn(entry); \
320 pfn < dax_radix_end_pfn(entry); pfn++)
321
322static void dax_associate_entry(void *entry, struct address_space *mapping)
323{
324 unsigned long pfn;
325
326 if (IS_ENABLED(CONFIG_FS_DAX_LIMITED))
327 return;
328
329 for_each_mapped_pfn(entry, pfn) {
330 struct page *page = pfn_to_page(pfn);
331
332 WARN_ON_ONCE(page->mapping);
333 page->mapping = mapping;
334 }
335}
336
337static void dax_disassociate_entry(void *entry, struct address_space *mapping,
338 bool trunc)
339{
340 unsigned long pfn;
341
342 if (IS_ENABLED(CONFIG_FS_DAX_LIMITED))
343 return;
344
345 for_each_mapped_pfn(entry, pfn) {
346 struct page *page = pfn_to_page(pfn);
347
348 WARN_ON_ONCE(trunc && page_ref_count(page) > 1);
349 WARN_ON_ONCE(page->mapping && page->mapping != mapping);
350 page->mapping = NULL;
351 }
352}
353
ac401cc7 354/*
91d25ba8
RZ
355 * Find radix tree entry at given index. If it points to an exceptional entry,
356 * return it with the radix tree entry locked. If the radix tree doesn't
357 * contain given index, create an empty exceptional entry for the index and
358 * return with it locked.
ac401cc7 359 *
642261ac
RZ
360 * When requesting an entry with size RADIX_DAX_PMD, grab_mapping_entry() will
361 * either return that locked entry or will return an error. This error will
91d25ba8
RZ
362 * happen if there are any 4k entries within the 2MiB range that we are
363 * requesting.
642261ac
RZ
364 *
365 * We always favor 4k entries over 2MiB entries. There isn't a flow where we
366 * evict 4k entries in order to 'upgrade' them to a 2MiB entry. A 2MiB
367 * insertion will fail if it finds any 4k entries already in the tree, and a
368 * 4k insertion will cause an existing 2MiB entry to be unmapped and
369 * downgraded to 4k entries. This happens for both 2MiB huge zero pages as
370 * well as 2MiB empty entries.
371 *
372 * The exception to this downgrade path is for 2MiB DAX PMD entries that have
373 * real storage backing them. We will leave these real 2MiB DAX entries in
374 * the tree, and PTE writes will simply dirty the entire 2MiB DAX entry.
375 *
ac401cc7
JK
376 * Note: Unlike filemap_fault() we don't honor FAULT_FLAG_RETRY flags. For
377 * persistent memory the benefit is doubtful. We can add that later if we can
378 * show it helps.
379 */
642261ac
RZ
380static void *grab_mapping_entry(struct address_space *mapping, pgoff_t index,
381 unsigned long size_flag)
ac401cc7 382{
642261ac 383 bool pmd_downgrade = false; /* splitting 2MiB entry into 4k entries? */
e3ad61c6 384 void *entry, **slot;
ac401cc7
JK
385
386restart:
b93b0163 387 xa_lock_irq(&mapping->i_pages);
e3ad61c6 388 entry = get_unlocked_mapping_entry(mapping, index, &slot);
642261ac 389
91d25ba8
RZ
390 if (WARN_ON_ONCE(entry && !radix_tree_exceptional_entry(entry))) {
391 entry = ERR_PTR(-EIO);
392 goto out_unlock;
393 }
394
642261ac
RZ
395 if (entry) {
396 if (size_flag & RADIX_DAX_PMD) {
91d25ba8 397 if (dax_is_pte_entry(entry)) {
642261ac
RZ
398 put_unlocked_mapping_entry(mapping, index,
399 entry);
400 entry = ERR_PTR(-EEXIST);
401 goto out_unlock;
402 }
403 } else { /* trying to grab a PTE entry */
91d25ba8 404 if (dax_is_pmd_entry(entry) &&
642261ac
RZ
405 (dax_is_zero_entry(entry) ||
406 dax_is_empty_entry(entry))) {
407 pmd_downgrade = true;
408 }
409 }
410 }
411
ac401cc7 412 /* No entry for given index? Make sure radix tree is big enough. */
642261ac 413 if (!entry || pmd_downgrade) {
ac401cc7
JK
414 int err;
415
642261ac
RZ
416 if (pmd_downgrade) {
417 /*
418 * Make sure 'entry' remains valid while we drop
b93b0163 419 * the i_pages lock.
642261ac
RZ
420 */
421 entry = lock_slot(mapping, slot);
422 }
423
b93b0163 424 xa_unlock_irq(&mapping->i_pages);
642261ac
RZ
425 /*
426 * Besides huge zero pages the only other thing that gets
427 * downgraded are empty entries which don't need to be
428 * unmapped.
429 */
430 if (pmd_downgrade && dax_is_zero_entry(entry))
977fbdcd
MW
431 unmap_mapping_pages(mapping, index & ~PG_PMD_COLOUR,
432 PG_PMD_NR, false);
642261ac 433
ac401cc7
JK
434 err = radix_tree_preload(
435 mapping_gfp_mask(mapping) & ~__GFP_HIGHMEM);
0cb80b48
JK
436 if (err) {
437 if (pmd_downgrade)
91d25ba8 438 put_locked_mapping_entry(mapping, index);
ac401cc7 439 return ERR_PTR(err);
0cb80b48 440 }
b93b0163 441 xa_lock_irq(&mapping->i_pages);
642261ac 442
e11f8b7b
RZ
443 if (!entry) {
444 /*
b93b0163 445 * We needed to drop the i_pages lock while calling
e11f8b7b
RZ
446 * radix_tree_preload() and we didn't have an entry to
447 * lock. See if another thread inserted an entry at
448 * our index during this time.
449 */
b93b0163 450 entry = __radix_tree_lookup(&mapping->i_pages, index,
e11f8b7b
RZ
451 NULL, &slot);
452 if (entry) {
453 radix_tree_preload_end();
b93b0163 454 xa_unlock_irq(&mapping->i_pages);
e11f8b7b
RZ
455 goto restart;
456 }
457 }
458
642261ac 459 if (pmd_downgrade) {
d2c997c0 460 dax_disassociate_entry(entry, mapping, false);
b93b0163 461 radix_tree_delete(&mapping->i_pages, index);
642261ac
RZ
462 mapping->nrexceptional--;
463 dax_wake_mapping_entry_waiter(mapping, index, entry,
464 true);
465 }
466
467 entry = dax_radix_locked_entry(0, size_flag | RADIX_DAX_EMPTY);
468
b93b0163 469 err = __radix_tree_insert(&mapping->i_pages, index,
642261ac 470 dax_radix_order(entry), entry);
ac401cc7
JK
471 radix_tree_preload_end();
472 if (err) {
b93b0163 473 xa_unlock_irq(&mapping->i_pages);
642261ac 474 /*
e11f8b7b
RZ
475 * Our insertion of a DAX entry failed, most likely
476 * because we were inserting a PMD entry and it
477 * collided with a PTE sized entry at a different
478 * index in the PMD range. We haven't inserted
479 * anything into the radix tree and have no waiters to
480 * wake.
642261ac 481 */
ac401cc7
JK
482 return ERR_PTR(err);
483 }
484 /* Good, we have inserted empty locked entry into the tree. */
485 mapping->nrexceptional++;
b93b0163 486 xa_unlock_irq(&mapping->i_pages);
e3ad61c6 487 return entry;
ac401cc7 488 }
e3ad61c6 489 entry = lock_slot(mapping, slot);
642261ac 490 out_unlock:
b93b0163 491 xa_unlock_irq(&mapping->i_pages);
e3ad61c6 492 return entry;
ac401cc7
JK
493}
494
c6dcf52c
JK
495static int __dax_invalidate_mapping_entry(struct address_space *mapping,
496 pgoff_t index, bool trunc)
497{
498 int ret = 0;
499 void *entry;
b93b0163 500 struct radix_tree_root *pages = &mapping->i_pages;
c6dcf52c 501
b93b0163 502 xa_lock_irq(pages);
c6dcf52c 503 entry = get_unlocked_mapping_entry(mapping, index, NULL);
91d25ba8 504 if (!entry || WARN_ON_ONCE(!radix_tree_exceptional_entry(entry)))
c6dcf52c
JK
505 goto out;
506 if (!trunc &&
b93b0163
MW
507 (radix_tree_tag_get(pages, index, PAGECACHE_TAG_DIRTY) ||
508 radix_tree_tag_get(pages, index, PAGECACHE_TAG_TOWRITE)))
c6dcf52c 509 goto out;
d2c997c0 510 dax_disassociate_entry(entry, mapping, trunc);
b93b0163 511 radix_tree_delete(pages, index);
c6dcf52c
JK
512 mapping->nrexceptional--;
513 ret = 1;
514out:
515 put_unlocked_mapping_entry(mapping, index, entry);
b93b0163 516 xa_unlock_irq(pages);
c6dcf52c
JK
517 return ret;
518}
ac401cc7
JK
519/*
520 * Delete exceptional DAX entry at @index from @mapping. Wait for radix tree
521 * entry to get unlocked before deleting it.
522 */
523int dax_delete_mapping_entry(struct address_space *mapping, pgoff_t index)
524{
c6dcf52c 525 int ret = __dax_invalidate_mapping_entry(mapping, index, true);
ac401cc7 526
ac401cc7
JK
527 /*
528 * This gets called from truncate / punch_hole path. As such, the caller
529 * must hold locks protecting against concurrent modifications of the
530 * radix tree (usually fs-private i_mmap_sem for writing). Since the
531 * caller has seen exceptional entry for this index, we better find it
532 * at that index as well...
533 */
c6dcf52c
JK
534 WARN_ON_ONCE(!ret);
535 return ret;
536}
537
c6dcf52c
JK
538/*
539 * Invalidate exceptional DAX entry if it is clean.
540 */
541int dax_invalidate_mapping_entry_sync(struct address_space *mapping,
542 pgoff_t index)
543{
544 return __dax_invalidate_mapping_entry(mapping, index, false);
ac401cc7
JK
545}
546
cccbce67
DW
547static int copy_user_dax(struct block_device *bdev, struct dax_device *dax_dev,
548 sector_t sector, size_t size, struct page *to,
549 unsigned long vaddr)
f7ca90b1 550{
cccbce67
DW
551 void *vto, *kaddr;
552 pgoff_t pgoff;
553 pfn_t pfn;
554 long rc;
555 int id;
556
557 rc = bdev_dax_pgoff(bdev, sector, size, &pgoff);
558 if (rc)
559 return rc;
560
561 id = dax_read_lock();
562 rc = dax_direct_access(dax_dev, pgoff, PHYS_PFN(size), &kaddr, &pfn);
563 if (rc < 0) {
564 dax_read_unlock(id);
565 return rc;
566 }
f7ca90b1 567 vto = kmap_atomic(to);
cccbce67 568 copy_user_page(vto, (void __force *)kaddr, vaddr, to);
f7ca90b1 569 kunmap_atomic(vto);
cccbce67 570 dax_read_unlock(id);
f7ca90b1
MW
571 return 0;
572}
573
642261ac
RZ
574/*
575 * By this point grab_mapping_entry() has ensured that we have a locked entry
576 * of the appropriate size so we don't have to worry about downgrading PMDs to
577 * PTEs. If we happen to be trying to insert a PTE and there is a PMD
578 * already in the tree, we will skip the insertion and just dirty the PMD as
579 * appropriate.
580 */
ac401cc7
JK
581static void *dax_insert_mapping_entry(struct address_space *mapping,
582 struct vm_fault *vmf,
3fe0791c 583 void *entry, pfn_t pfn_t,
f5b7b748 584 unsigned long flags, bool dirty)
9973c98e 585{
b93b0163 586 struct radix_tree_root *pages = &mapping->i_pages;
3fe0791c 587 unsigned long pfn = pfn_t_to_pfn(pfn_t);
ac401cc7 588 pgoff_t index = vmf->pgoff;
3fe0791c 589 void *new_entry;
9973c98e 590
f5b7b748 591 if (dirty)
d2b2a28e 592 __mark_inode_dirty(mapping->host, I_DIRTY_PAGES);
9973c98e 593
91d25ba8
RZ
594 if (dax_is_zero_entry(entry) && !(flags & RADIX_DAX_ZERO_PAGE)) {
595 /* we are replacing a zero page with block mapping */
596 if (dax_is_pmd_entry(entry))
977fbdcd
MW
597 unmap_mapping_pages(mapping, index & ~PG_PMD_COLOUR,
598 PG_PMD_NR, false);
91d25ba8 599 else /* pte entry */
977fbdcd 600 unmap_mapping_pages(mapping, vmf->pgoff, 1, false);
9973c98e
RZ
601 }
602
b93b0163 603 xa_lock_irq(pages);
3fe0791c 604 new_entry = dax_radix_locked_entry(pfn, flags);
d2c997c0
DW
605 if (dax_entry_size(entry) != dax_entry_size(new_entry)) {
606 dax_disassociate_entry(entry, mapping, false);
607 dax_associate_entry(new_entry, mapping);
608 }
642261ac 609
91d25ba8 610 if (dax_is_zero_entry(entry) || dax_is_empty_entry(entry)) {
642261ac
RZ
611 /*
612 * Only swap our new entry into the radix tree if the current
613 * entry is a zero page or an empty entry. If a normal PTE or
614 * PMD entry is already in the tree, we leave it alone. This
615 * means that if we are trying to insert a PTE and the
616 * existing entry is a PMD, we will just leave the PMD in the
617 * tree and dirty it if necessary.
618 */
f7942430 619 struct radix_tree_node *node;
ac401cc7
JK
620 void **slot;
621 void *ret;
9973c98e 622
b93b0163 623 ret = __radix_tree_lookup(pages, index, &node, &slot);
ac401cc7 624 WARN_ON_ONCE(ret != entry);
b93b0163 625 __radix_tree_replace(pages, node, slot,
c7df8ad2 626 new_entry, NULL);
91d25ba8 627 entry = new_entry;
9973c98e 628 }
91d25ba8 629
f5b7b748 630 if (dirty)
b93b0163 631 radix_tree_tag_set(pages, index, PAGECACHE_TAG_DIRTY);
91d25ba8 632
b93b0163 633 xa_unlock_irq(pages);
91d25ba8 634 return entry;
9973c98e
RZ
635}
636
4b4bb46d
JK
637static inline unsigned long
638pgoff_address(pgoff_t pgoff, struct vm_area_struct *vma)
639{
640 unsigned long address;
641
642 address = vma->vm_start + ((pgoff - vma->vm_pgoff) << PAGE_SHIFT);
643 VM_BUG_ON_VMA(address < vma->vm_start || address >= vma->vm_end, vma);
644 return address;
645}
646
647/* Walk all mappings of a given index of a file and writeprotect them */
648static void dax_mapping_entry_mkclean(struct address_space *mapping,
649 pgoff_t index, unsigned long pfn)
650{
651 struct vm_area_struct *vma;
f729c8c9
RZ
652 pte_t pte, *ptep = NULL;
653 pmd_t *pmdp = NULL;
4b4bb46d 654 spinlock_t *ptl;
4b4bb46d
JK
655
656 i_mmap_lock_read(mapping);
657 vma_interval_tree_foreach(vma, &mapping->i_mmap, index, index) {
a4d1a885 658 unsigned long address, start, end;
4b4bb46d
JK
659
660 cond_resched();
661
662 if (!(vma->vm_flags & VM_SHARED))
663 continue;
664
665 address = pgoff_address(index, vma);
a4d1a885
JG
666
667 /*
668 * Note because we provide start/end to follow_pte_pmd it will
669 * call mmu_notifier_invalidate_range_start() on our behalf
670 * before taking any lock.
671 */
672 if (follow_pte_pmd(vma->vm_mm, address, &start, &end, &ptep, &pmdp, &ptl))
4b4bb46d 673 continue;
4b4bb46d 674
0f10851e
JG
675 /*
676 * No need to call mmu_notifier_invalidate_range() as we are
677 * downgrading page table protection not changing it to point
678 * to a new page.
679 *
680 * See Documentation/vm/mmu_notifier.txt
681 */
f729c8c9
RZ
682 if (pmdp) {
683#ifdef CONFIG_FS_DAX_PMD
684 pmd_t pmd;
685
686 if (pfn != pmd_pfn(*pmdp))
687 goto unlock_pmd;
f6f37321 688 if (!pmd_dirty(*pmdp) && !pmd_write(*pmdp))
f729c8c9
RZ
689 goto unlock_pmd;
690
691 flush_cache_page(vma, address, pfn);
692 pmd = pmdp_huge_clear_flush(vma, address, pmdp);
693 pmd = pmd_wrprotect(pmd);
694 pmd = pmd_mkclean(pmd);
695 set_pmd_at(vma->vm_mm, address, pmdp, pmd);
f729c8c9 696unlock_pmd:
f729c8c9 697#endif
ee190ca6 698 spin_unlock(ptl);
f729c8c9
RZ
699 } else {
700 if (pfn != pte_pfn(*ptep))
701 goto unlock_pte;
702 if (!pte_dirty(*ptep) && !pte_write(*ptep))
703 goto unlock_pte;
704
705 flush_cache_page(vma, address, pfn);
706 pte = ptep_clear_flush(vma, address, ptep);
707 pte = pte_wrprotect(pte);
708 pte = pte_mkclean(pte);
709 set_pte_at(vma->vm_mm, address, ptep, pte);
f729c8c9
RZ
710unlock_pte:
711 pte_unmap_unlock(ptep, ptl);
712 }
4b4bb46d 713
a4d1a885 714 mmu_notifier_invalidate_range_end(vma->vm_mm, start, end);
4b4bb46d
JK
715 }
716 i_mmap_unlock_read(mapping);
717}
718
3fe0791c
DW
719static int dax_writeback_one(struct dax_device *dax_dev,
720 struct address_space *mapping, pgoff_t index, void *entry)
9973c98e 721{
b93b0163 722 struct radix_tree_root *pages = &mapping->i_pages;
3fe0791c
DW
723 void *entry2, **slot;
724 unsigned long pfn;
725 long ret = 0;
cccbce67 726 size_t size;
9973c98e 727
9973c98e 728 /*
a6abc2c0
JK
729 * A page got tagged dirty in DAX mapping? Something is seriously
730 * wrong.
9973c98e 731 */
a6abc2c0
JK
732 if (WARN_ON(!radix_tree_exceptional_entry(entry)))
733 return -EIO;
9973c98e 734
b93b0163 735 xa_lock_irq(pages);
a6abc2c0
JK
736 entry2 = get_unlocked_mapping_entry(mapping, index, &slot);
737 /* Entry got punched out / reallocated? */
91d25ba8 738 if (!entry2 || WARN_ON_ONCE(!radix_tree_exceptional_entry(entry2)))
a6abc2c0
JK
739 goto put_unlocked;
740 /*
741 * Entry got reallocated elsewhere? No need to writeback. We have to
3fe0791c 742 * compare pfns as we must not bail out due to difference in lockbit
a6abc2c0
JK
743 * or entry type.
744 */
3fe0791c 745 if (dax_radix_pfn(entry2) != dax_radix_pfn(entry))
a6abc2c0 746 goto put_unlocked;
642261ac
RZ
747 if (WARN_ON_ONCE(dax_is_empty_entry(entry) ||
748 dax_is_zero_entry(entry))) {
9973c98e 749 ret = -EIO;
a6abc2c0 750 goto put_unlocked;
9973c98e
RZ
751 }
752
a6abc2c0 753 /* Another fsync thread may have already written back this entry */
b93b0163 754 if (!radix_tree_tag_get(pages, index, PAGECACHE_TAG_TOWRITE))
a6abc2c0
JK
755 goto put_unlocked;
756 /* Lock the entry to serialize with page faults */
757 entry = lock_slot(mapping, slot);
758 /*
759 * We can clear the tag now but we have to be careful so that concurrent
760 * dax_writeback_one() calls for the same index cannot finish before we
761 * actually flush the caches. This is achieved as the calls will look
b93b0163
MW
762 * at the entry only under the i_pages lock and once they do that
763 * they will see the entry locked and wait for it to unlock.
a6abc2c0 764 */
b93b0163
MW
765 radix_tree_tag_clear(pages, index, PAGECACHE_TAG_TOWRITE);
766 xa_unlock_irq(pages);
a6abc2c0 767
642261ac
RZ
768 /*
769 * Even if dax_writeback_mapping_range() was given a wbc->range_start
770 * in the middle of a PMD, the 'index' we are given will be aligned to
3fe0791c
DW
771 * the start index of the PMD, as will the pfn we pull from 'entry'.
772 * This allows us to flush for PMD_SIZE and not have to worry about
773 * partial PMD writebacks.
642261ac 774 */
3fe0791c 775 pfn = dax_radix_pfn(entry);
cccbce67
DW
776 size = PAGE_SIZE << dax_radix_order(entry);
777
3fe0791c
DW
778 dax_mapping_entry_mkclean(mapping, index, pfn);
779 dax_flush(dax_dev, page_address(pfn_to_page(pfn)), size);
4b4bb46d
JK
780 /*
781 * After we have flushed the cache, we can clear the dirty tag. There
782 * cannot be new dirty data in the pfn after the flush has completed as
783 * the pfn mappings are writeprotected and fault waits for mapping
784 * entry lock.
785 */
b93b0163
MW
786 xa_lock_irq(pages);
787 radix_tree_tag_clear(pages, index, PAGECACHE_TAG_DIRTY);
788 xa_unlock_irq(pages);
f9bc3a07 789 trace_dax_writeback_one(mapping->host, index, size >> PAGE_SHIFT);
91d25ba8 790 put_locked_mapping_entry(mapping, index);
9973c98e
RZ
791 return ret;
792
a6abc2c0
JK
793 put_unlocked:
794 put_unlocked_mapping_entry(mapping, index, entry2);
b93b0163 795 xa_unlock_irq(pages);
9973c98e
RZ
796 return ret;
797}
798
799/*
800 * Flush the mapping to the persistent domain within the byte range of [start,
801 * end]. This is required by data integrity operations to ensure file data is
802 * on persistent storage prior to completion of the operation.
803 */
7f6d5b52
RZ
804int dax_writeback_mapping_range(struct address_space *mapping,
805 struct block_device *bdev, struct writeback_control *wbc)
9973c98e
RZ
806{
807 struct inode *inode = mapping->host;
642261ac 808 pgoff_t start_index, end_index;
9973c98e 809 pgoff_t indices[PAGEVEC_SIZE];
cccbce67 810 struct dax_device *dax_dev;
9973c98e
RZ
811 struct pagevec pvec;
812 bool done = false;
813 int i, ret = 0;
9973c98e
RZ
814
815 if (WARN_ON_ONCE(inode->i_blkbits != PAGE_SHIFT))
816 return -EIO;
817
7f6d5b52
RZ
818 if (!mapping->nrexceptional || wbc->sync_mode != WB_SYNC_ALL)
819 return 0;
820
cccbce67
DW
821 dax_dev = dax_get_by_host(bdev->bd_disk->disk_name);
822 if (!dax_dev)
823 return -EIO;
824
09cbfeaf
KS
825 start_index = wbc->range_start >> PAGE_SHIFT;
826 end_index = wbc->range_end >> PAGE_SHIFT;
9973c98e 827
d14a3f48
RZ
828 trace_dax_writeback_range(inode, start_index, end_index);
829
9973c98e
RZ
830 tag_pages_for_writeback(mapping, start_index, end_index);
831
86679820 832 pagevec_init(&pvec);
9973c98e
RZ
833 while (!done) {
834 pvec.nr = find_get_entries_tag(mapping, start_index,
835 PAGECACHE_TAG_TOWRITE, PAGEVEC_SIZE,
836 pvec.pages, indices);
837
838 if (pvec.nr == 0)
839 break;
840
841 for (i = 0; i < pvec.nr; i++) {
842 if (indices[i] > end_index) {
843 done = true;
844 break;
845 }
846
3fe0791c
DW
847 ret = dax_writeback_one(dax_dev, mapping, indices[i],
848 pvec.pages[i]);
819ec6b9
JL
849 if (ret < 0) {
850 mapping_set_error(mapping, ret);
d14a3f48 851 goto out;
819ec6b9 852 }
9973c98e 853 }
1eb643d0 854 start_index = indices[pvec.nr - 1] + 1;
9973c98e 855 }
d14a3f48 856out:
cccbce67 857 put_dax(dax_dev);
d14a3f48
RZ
858 trace_dax_writeback_range_done(inode, start_index, end_index);
859 return (ret < 0 ? ret : 0);
9973c98e
RZ
860}
861EXPORT_SYMBOL_GPL(dax_writeback_mapping_range);
862
31a6f1a6 863static sector_t dax_iomap_sector(struct iomap *iomap, loff_t pos)
f7ca90b1 864{
a3841f94 865 return (iomap->addr + (pos & PAGE_MASK) - iomap->offset) >> 9;
31a6f1a6
JK
866}
867
5e161e40
JK
868static int dax_iomap_pfn(struct iomap *iomap, loff_t pos, size_t size,
869 pfn_t *pfnp)
f7ca90b1 870{
31a6f1a6 871 const sector_t sector = dax_iomap_sector(iomap, pos);
cccbce67 872 pgoff_t pgoff;
5e161e40 873 void *kaddr;
cccbce67 874 int id, rc;
5e161e40 875 long length;
f7ca90b1 876
5e161e40 877 rc = bdev_dax_pgoff(iomap->bdev, sector, size, &pgoff);
cccbce67
DW
878 if (rc)
879 return rc;
cccbce67 880 id = dax_read_lock();
5e161e40
JK
881 length = dax_direct_access(iomap->dax_dev, pgoff, PHYS_PFN(size),
882 &kaddr, pfnp);
883 if (length < 0) {
884 rc = length;
885 goto out;
cccbce67 886 }
5e161e40
JK
887 rc = -EINVAL;
888 if (PFN_PHYS(length) < size)
889 goto out;
890 if (pfn_t_to_pfn(*pfnp) & (PHYS_PFN(size)-1))
891 goto out;
892 /* For larger pages we need devmap */
893 if (length > 1 && !pfn_t_devmap(*pfnp))
894 goto out;
895 rc = 0;
896out:
cccbce67 897 dax_read_unlock(id);
5e161e40 898 return rc;
0e3b210c 899}
0e3b210c 900
e30331ff 901/*
91d25ba8
RZ
902 * The user has performed a load from a hole in the file. Allocating a new
903 * page in the file would cause excessive storage usage for workloads with
904 * sparse files. Instead we insert a read-only mapping of the 4k zero page.
905 * If this page is ever written to we will re-fault and change the mapping to
906 * point to real DAX storage instead.
e30331ff 907 */
91d25ba8 908static int dax_load_hole(struct address_space *mapping, void *entry,
e30331ff
RZ
909 struct vm_fault *vmf)
910{
911 struct inode *inode = mapping->host;
91d25ba8
RZ
912 unsigned long vaddr = vmf->address;
913 int ret = VM_FAULT_NOPAGE;
914 struct page *zero_page;
915 void *entry2;
3fe0791c 916 pfn_t pfn;
e30331ff 917
91d25ba8
RZ
918 zero_page = ZERO_PAGE(0);
919 if (unlikely(!zero_page)) {
e30331ff
RZ
920 ret = VM_FAULT_OOM;
921 goto out;
922 }
923
3fe0791c
DW
924 pfn = page_to_pfn_t(zero_page);
925 entry2 = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
f5b7b748 926 RADIX_DAX_ZERO_PAGE, false);
91d25ba8
RZ
927 if (IS_ERR(entry2)) {
928 ret = VM_FAULT_SIGBUS;
929 goto out;
e30331ff 930 }
91d25ba8 931
3fe0791c 932 vm_insert_mixed(vmf->vma, vaddr, pfn);
e30331ff
RZ
933out:
934 trace_dax_load_hole(inode, vmf, ret);
935 return ret;
936}
937
4b0228fa
VV
938static bool dax_range_is_aligned(struct block_device *bdev,
939 unsigned int offset, unsigned int length)
940{
941 unsigned short sector_size = bdev_logical_block_size(bdev);
942
943 if (!IS_ALIGNED(offset, sector_size))
944 return false;
945 if (!IS_ALIGNED(length, sector_size))
946 return false;
947
948 return true;
949}
950
cccbce67
DW
951int __dax_zero_page_range(struct block_device *bdev,
952 struct dax_device *dax_dev, sector_t sector,
953 unsigned int offset, unsigned int size)
679c8bd3 954{
cccbce67
DW
955 if (dax_range_is_aligned(bdev, offset, size)) {
956 sector_t start_sector = sector + (offset >> 9);
4b0228fa
VV
957
958 return blkdev_issue_zeroout(bdev, start_sector,
53ef7d0e 959 size >> 9, GFP_NOFS, 0);
4b0228fa 960 } else {
cccbce67
DW
961 pgoff_t pgoff;
962 long rc, id;
963 void *kaddr;
964 pfn_t pfn;
965
e84b83b9 966 rc = bdev_dax_pgoff(bdev, sector, PAGE_SIZE, &pgoff);
cccbce67
DW
967 if (rc)
968 return rc;
969
970 id = dax_read_lock();
e84b83b9 971 rc = dax_direct_access(dax_dev, pgoff, 1, &kaddr,
cccbce67
DW
972 &pfn);
973 if (rc < 0) {
974 dax_read_unlock(id);
975 return rc;
976 }
81f55870 977 memset(kaddr + offset, 0, size);
c3ca015f 978 dax_flush(dax_dev, kaddr + offset, size);
cccbce67 979 dax_read_unlock(id);
4b0228fa 980 }
679c8bd3
CH
981 return 0;
982}
983EXPORT_SYMBOL_GPL(__dax_zero_page_range);
984
a254e568 985static loff_t
11c59c92 986dax_iomap_actor(struct inode *inode, loff_t pos, loff_t length, void *data,
a254e568
CH
987 struct iomap *iomap)
988{
cccbce67
DW
989 struct block_device *bdev = iomap->bdev;
990 struct dax_device *dax_dev = iomap->dax_dev;
a254e568
CH
991 struct iov_iter *iter = data;
992 loff_t end = pos + length, done = 0;
993 ssize_t ret = 0;
cccbce67 994 int id;
a254e568
CH
995
996 if (iov_iter_rw(iter) == READ) {
997 end = min(end, i_size_read(inode));
998 if (pos >= end)
999 return 0;
1000
1001 if (iomap->type == IOMAP_HOLE || iomap->type == IOMAP_UNWRITTEN)
1002 return iov_iter_zero(min(length, end - pos), iter);
1003 }
1004
1005 if (WARN_ON_ONCE(iomap->type != IOMAP_MAPPED))
1006 return -EIO;
1007
e3fce68c
JK
1008 /*
1009 * Write can allocate block for an area which has a hole page mapped
1010 * into page tables. We have to tear down these mappings so that data
1011 * written by write(2) is visible in mmap.
1012 */
cd656375 1013 if (iomap->flags & IOMAP_F_NEW) {
e3fce68c
JK
1014 invalidate_inode_pages2_range(inode->i_mapping,
1015 pos >> PAGE_SHIFT,
1016 (end - 1) >> PAGE_SHIFT);
1017 }
1018
cccbce67 1019 id = dax_read_lock();
a254e568
CH
1020 while (pos < end) {
1021 unsigned offset = pos & (PAGE_SIZE - 1);
cccbce67
DW
1022 const size_t size = ALIGN(length + offset, PAGE_SIZE);
1023 const sector_t sector = dax_iomap_sector(iomap, pos);
a254e568 1024 ssize_t map_len;
cccbce67
DW
1025 pgoff_t pgoff;
1026 void *kaddr;
1027 pfn_t pfn;
a254e568 1028
d1908f52
MH
1029 if (fatal_signal_pending(current)) {
1030 ret = -EINTR;
1031 break;
1032 }
1033
cccbce67
DW
1034 ret = bdev_dax_pgoff(bdev, sector, size, &pgoff);
1035 if (ret)
1036 break;
1037
1038 map_len = dax_direct_access(dax_dev, pgoff, PHYS_PFN(size),
1039 &kaddr, &pfn);
a254e568
CH
1040 if (map_len < 0) {
1041 ret = map_len;
1042 break;
1043 }
1044
cccbce67
DW
1045 map_len = PFN_PHYS(map_len);
1046 kaddr += offset;
a254e568
CH
1047 map_len -= offset;
1048 if (map_len > end - pos)
1049 map_len = end - pos;
1050
a2e050f5
RZ
1051 /*
1052 * The userspace address for the memory copy has already been
1053 * validated via access_ok() in either vfs_read() or
1054 * vfs_write(), depending on which operation we are doing.
1055 */
a254e568 1056 if (iov_iter_rw(iter) == WRITE)
fec53774
DW
1057 map_len = dax_copy_from_iter(dax_dev, pgoff, kaddr,
1058 map_len, iter);
a254e568 1059 else
cccbce67 1060 map_len = copy_to_iter(kaddr, map_len, iter);
a254e568
CH
1061 if (map_len <= 0) {
1062 ret = map_len ? map_len : -EFAULT;
1063 break;
1064 }
1065
1066 pos += map_len;
1067 length -= map_len;
1068 done += map_len;
1069 }
cccbce67 1070 dax_read_unlock(id);
a254e568
CH
1071
1072 return done ? done : ret;
1073}
1074
1075/**
11c59c92 1076 * dax_iomap_rw - Perform I/O to a DAX file
a254e568
CH
1077 * @iocb: The control block for this I/O
1078 * @iter: The addresses to do I/O from or to
1079 * @ops: iomap ops passed from the file system
1080 *
1081 * This function performs read and write operations to directly mapped
1082 * persistent memory. The callers needs to take care of read/write exclusion
1083 * and evicting any page cache pages in the region under I/O.
1084 */
1085ssize_t
11c59c92 1086dax_iomap_rw(struct kiocb *iocb, struct iov_iter *iter,
8ff6daa1 1087 const struct iomap_ops *ops)
a254e568
CH
1088{
1089 struct address_space *mapping = iocb->ki_filp->f_mapping;
1090 struct inode *inode = mapping->host;
1091 loff_t pos = iocb->ki_pos, ret = 0, done = 0;
1092 unsigned flags = 0;
1093
168316db
CH
1094 if (iov_iter_rw(iter) == WRITE) {
1095 lockdep_assert_held_exclusive(&inode->i_rwsem);
a254e568 1096 flags |= IOMAP_WRITE;
168316db
CH
1097 } else {
1098 lockdep_assert_held(&inode->i_rwsem);
1099 }
a254e568 1100
a254e568
CH
1101 while (iov_iter_count(iter)) {
1102 ret = iomap_apply(inode, pos, iov_iter_count(iter), flags, ops,
11c59c92 1103 iter, dax_iomap_actor);
a254e568
CH
1104 if (ret <= 0)
1105 break;
1106 pos += ret;
1107 done += ret;
1108 }
1109
1110 iocb->ki_pos += done;
1111 return done ? done : ret;
1112}
11c59c92 1113EXPORT_SYMBOL_GPL(dax_iomap_rw);
a7d73fe6 1114
9f141d6e
JK
1115static int dax_fault_return(int error)
1116{
1117 if (error == 0)
1118 return VM_FAULT_NOPAGE;
1119 if (error == -ENOMEM)
1120 return VM_FAULT_OOM;
1121 return VM_FAULT_SIGBUS;
1122}
1123
aaa422c4
DW
1124/*
1125 * MAP_SYNC on a dax mapping guarantees dirty metadata is
1126 * flushed on write-faults (non-cow), but not read-faults.
1127 */
1128static bool dax_fault_is_synchronous(unsigned long flags,
1129 struct vm_area_struct *vma, struct iomap *iomap)
1130{
1131 return (flags & IOMAP_WRITE) && (vma->vm_flags & VM_SYNC)
1132 && (iomap->flags & IOMAP_F_DIRTY);
1133}
1134
9a0dd422 1135static int dax_iomap_pte_fault(struct vm_fault *vmf, pfn_t *pfnp,
c0b24625 1136 int *iomap_errp, const struct iomap_ops *ops)
a7d73fe6 1137{
a0987ad5
JK
1138 struct vm_area_struct *vma = vmf->vma;
1139 struct address_space *mapping = vma->vm_file->f_mapping;
a7d73fe6 1140 struct inode *inode = mapping->host;
1a29d85e 1141 unsigned long vaddr = vmf->address;
a7d73fe6 1142 loff_t pos = (loff_t)vmf->pgoff << PAGE_SHIFT;
a7d73fe6 1143 struct iomap iomap = { 0 };
9484ab1b 1144 unsigned flags = IOMAP_FAULT;
a7d73fe6 1145 int error, major = 0;
d2c43ef1 1146 bool write = vmf->flags & FAULT_FLAG_WRITE;
caa51d26 1147 bool sync;
b1aa812b 1148 int vmf_ret = 0;
a7d73fe6 1149 void *entry;
1b5a1cb2 1150 pfn_t pfn;
a7d73fe6 1151
a9c42b33 1152 trace_dax_pte_fault(inode, vmf, vmf_ret);
a7d73fe6
CH
1153 /*
1154 * Check whether offset isn't beyond end of file now. Caller is supposed
1155 * to hold locks serializing us with truncate / punch hole so this is
1156 * a reliable test.
1157 */
a9c42b33
RZ
1158 if (pos >= i_size_read(inode)) {
1159 vmf_ret = VM_FAULT_SIGBUS;
1160 goto out;
1161 }
a7d73fe6 1162
d2c43ef1 1163 if (write && !vmf->cow_page)
a7d73fe6
CH
1164 flags |= IOMAP_WRITE;
1165
13e451fd
JK
1166 entry = grab_mapping_entry(mapping, vmf->pgoff, 0);
1167 if (IS_ERR(entry)) {
1168 vmf_ret = dax_fault_return(PTR_ERR(entry));
1169 goto out;
1170 }
1171
e2093926
RZ
1172 /*
1173 * It is possible, particularly with mixed reads & writes to private
1174 * mappings, that we have raced with a PMD fault that overlaps with
1175 * the PTE we need to set up. If so just return and the fault will be
1176 * retried.
1177 */
1178 if (pmd_trans_huge(*vmf->pmd) || pmd_devmap(*vmf->pmd)) {
1179 vmf_ret = VM_FAULT_NOPAGE;
1180 goto unlock_entry;
1181 }
1182
a7d73fe6
CH
1183 /*
1184 * Note that we don't bother to use iomap_apply here: DAX required
1185 * the file system block size to be equal the page size, which means
1186 * that we never have to deal with more than a single extent here.
1187 */
1188 error = ops->iomap_begin(inode, pos, PAGE_SIZE, flags, &iomap);
c0b24625
JK
1189 if (iomap_errp)
1190 *iomap_errp = error;
a9c42b33
RZ
1191 if (error) {
1192 vmf_ret = dax_fault_return(error);
13e451fd 1193 goto unlock_entry;
a9c42b33 1194 }
a7d73fe6 1195 if (WARN_ON_ONCE(iomap.offset + iomap.length < pos + PAGE_SIZE)) {
13e451fd
JK
1196 error = -EIO; /* fs corruption? */
1197 goto error_finish_iomap;
a7d73fe6
CH
1198 }
1199
a7d73fe6 1200 if (vmf->cow_page) {
31a6f1a6
JK
1201 sector_t sector = dax_iomap_sector(&iomap, pos);
1202
a7d73fe6
CH
1203 switch (iomap.type) {
1204 case IOMAP_HOLE:
1205 case IOMAP_UNWRITTEN:
1206 clear_user_highpage(vmf->cow_page, vaddr);
1207 break;
1208 case IOMAP_MAPPED:
cccbce67
DW
1209 error = copy_user_dax(iomap.bdev, iomap.dax_dev,
1210 sector, PAGE_SIZE, vmf->cow_page, vaddr);
a7d73fe6
CH
1211 break;
1212 default:
1213 WARN_ON_ONCE(1);
1214 error = -EIO;
1215 break;
1216 }
1217
1218 if (error)
13e451fd 1219 goto error_finish_iomap;
b1aa812b
JK
1220
1221 __SetPageUptodate(vmf->cow_page);
1222 vmf_ret = finish_fault(vmf);
1223 if (!vmf_ret)
1224 vmf_ret = VM_FAULT_DONE_COW;
13e451fd 1225 goto finish_iomap;
a7d73fe6
CH
1226 }
1227
aaa422c4 1228 sync = dax_fault_is_synchronous(flags, vma, &iomap);
caa51d26 1229
a7d73fe6
CH
1230 switch (iomap.type) {
1231 case IOMAP_MAPPED:
1232 if (iomap.flags & IOMAP_F_NEW) {
1233 count_vm_event(PGMAJFAULT);
a0987ad5 1234 count_memcg_event_mm(vma->vm_mm, PGMAJFAULT);
a7d73fe6
CH
1235 major = VM_FAULT_MAJOR;
1236 }
1b5a1cb2
JK
1237 error = dax_iomap_pfn(&iomap, pos, PAGE_SIZE, &pfn);
1238 if (error < 0)
1239 goto error_finish_iomap;
1240
3fe0791c 1241 entry = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
caa51d26 1242 0, write && !sync);
1b5a1cb2
JK
1243 if (IS_ERR(entry)) {
1244 error = PTR_ERR(entry);
1245 goto error_finish_iomap;
1246 }
1247
caa51d26
JK
1248 /*
1249 * If we are doing synchronous page fault and inode needs fsync,
1250 * we can insert PTE into page tables only after that happens.
1251 * Skip insertion for now and return the pfn so that caller can
1252 * insert it after fsync is done.
1253 */
1254 if (sync) {
1255 if (WARN_ON_ONCE(!pfnp)) {
1256 error = -EIO;
1257 goto error_finish_iomap;
1258 }
1259 *pfnp = pfn;
1260 vmf_ret = VM_FAULT_NEEDDSYNC | major;
1261 goto finish_iomap;
1262 }
1b5a1cb2
JK
1263 trace_dax_insert_mapping(inode, vmf, entry);
1264 if (write)
1265 error = vm_insert_mixed_mkwrite(vma, vaddr, pfn);
1266 else
1267 error = vm_insert_mixed(vma, vaddr, pfn);
1268
9f141d6e
JK
1269 /* -EBUSY is fine, somebody else faulted on the same PTE */
1270 if (error == -EBUSY)
1271 error = 0;
a7d73fe6
CH
1272 break;
1273 case IOMAP_UNWRITTEN:
1274 case IOMAP_HOLE:
d2c43ef1 1275 if (!write) {
91d25ba8 1276 vmf_ret = dax_load_hole(mapping, entry, vmf);
13e451fd 1277 goto finish_iomap;
1550290b 1278 }
a7d73fe6
CH
1279 /*FALLTHRU*/
1280 default:
1281 WARN_ON_ONCE(1);
1282 error = -EIO;
1283 break;
1284 }
1285
13e451fd 1286 error_finish_iomap:
9f141d6e 1287 vmf_ret = dax_fault_return(error) | major;
9f141d6e
JK
1288 finish_iomap:
1289 if (ops->iomap_end) {
1290 int copied = PAGE_SIZE;
1291
1292 if (vmf_ret & VM_FAULT_ERROR)
1293 copied = 0;
1294 /*
1295 * The fault is done by now and there's no way back (other
1296 * thread may be already happily using PTE we have installed).
1297 * Just ignore error from ->iomap_end since we cannot do much
1298 * with it.
1299 */
1300 ops->iomap_end(inode, pos, PAGE_SIZE, copied, flags, &iomap);
1550290b 1301 }
13e451fd 1302 unlock_entry:
91d25ba8 1303 put_locked_mapping_entry(mapping, vmf->pgoff);
13e451fd 1304 out:
a9c42b33 1305 trace_dax_pte_fault_done(inode, vmf, vmf_ret);
9f141d6e 1306 return vmf_ret;
a7d73fe6 1307}
642261ac
RZ
1308
1309#ifdef CONFIG_FS_DAX_PMD
f4200391 1310static int dax_pmd_load_hole(struct vm_fault *vmf, struct iomap *iomap,
91d25ba8 1311 void *entry)
642261ac 1312{
f4200391
DJ
1313 struct address_space *mapping = vmf->vma->vm_file->f_mapping;
1314 unsigned long pmd_addr = vmf->address & PMD_MASK;
653b2ea3 1315 struct inode *inode = mapping->host;
642261ac 1316 struct page *zero_page;
653b2ea3 1317 void *ret = NULL;
642261ac
RZ
1318 spinlock_t *ptl;
1319 pmd_t pmd_entry;
3fe0791c 1320 pfn_t pfn;
642261ac 1321
f4200391 1322 zero_page = mm_get_huge_zero_page(vmf->vma->vm_mm);
642261ac
RZ
1323
1324 if (unlikely(!zero_page))
653b2ea3 1325 goto fallback;
642261ac 1326
3fe0791c
DW
1327 pfn = page_to_pfn_t(zero_page);
1328 ret = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
f5b7b748 1329 RADIX_DAX_PMD | RADIX_DAX_ZERO_PAGE, false);
642261ac 1330 if (IS_ERR(ret))
653b2ea3 1331 goto fallback;
642261ac 1332
f4200391
DJ
1333 ptl = pmd_lock(vmf->vma->vm_mm, vmf->pmd);
1334 if (!pmd_none(*(vmf->pmd))) {
642261ac 1335 spin_unlock(ptl);
653b2ea3 1336 goto fallback;
642261ac
RZ
1337 }
1338
f4200391 1339 pmd_entry = mk_pmd(zero_page, vmf->vma->vm_page_prot);
642261ac 1340 pmd_entry = pmd_mkhuge(pmd_entry);
f4200391 1341 set_pmd_at(vmf->vma->vm_mm, pmd_addr, vmf->pmd, pmd_entry);
642261ac 1342 spin_unlock(ptl);
f4200391 1343 trace_dax_pmd_load_hole(inode, vmf, zero_page, ret);
642261ac 1344 return VM_FAULT_NOPAGE;
653b2ea3
RZ
1345
1346fallback:
f4200391 1347 trace_dax_pmd_load_hole_fallback(inode, vmf, zero_page, ret);
653b2ea3 1348 return VM_FAULT_FALLBACK;
642261ac
RZ
1349}
1350
9a0dd422 1351static int dax_iomap_pmd_fault(struct vm_fault *vmf, pfn_t *pfnp,
a2d58167 1352 const struct iomap_ops *ops)
642261ac 1353{
f4200391 1354 struct vm_area_struct *vma = vmf->vma;
642261ac 1355 struct address_space *mapping = vma->vm_file->f_mapping;
d8a849e1
DJ
1356 unsigned long pmd_addr = vmf->address & PMD_MASK;
1357 bool write = vmf->flags & FAULT_FLAG_WRITE;
caa51d26 1358 bool sync;
9484ab1b 1359 unsigned int iomap_flags = (write ? IOMAP_WRITE : 0) | IOMAP_FAULT;
642261ac
RZ
1360 struct inode *inode = mapping->host;
1361 int result = VM_FAULT_FALLBACK;
1362 struct iomap iomap = { 0 };
1363 pgoff_t max_pgoff, pgoff;
642261ac
RZ
1364 void *entry;
1365 loff_t pos;
1366 int error;
302a5e31 1367 pfn_t pfn;
642261ac 1368
282a8e03
RZ
1369 /*
1370 * Check whether offset isn't beyond end of file now. Caller is
1371 * supposed to hold locks serializing us with truncate / punch hole so
1372 * this is a reliable test.
1373 */
1374 pgoff = linear_page_index(vma, pmd_addr);
957ac8c4 1375 max_pgoff = DIV_ROUND_UP(i_size_read(inode), PAGE_SIZE);
282a8e03 1376
f4200391 1377 trace_dax_pmd_fault(inode, vmf, max_pgoff, 0);
282a8e03 1378
fffa281b
RZ
1379 /*
1380 * Make sure that the faulting address's PMD offset (color) matches
1381 * the PMD offset from the start of the file. This is necessary so
1382 * that a PMD range in the page table overlaps exactly with a PMD
1383 * range in the radix tree.
1384 */
1385 if ((vmf->pgoff & PG_PMD_COLOUR) !=
1386 ((vmf->address >> PAGE_SHIFT) & PG_PMD_COLOUR))
1387 goto fallback;
1388
642261ac
RZ
1389 /* Fall back to PTEs if we're going to COW */
1390 if (write && !(vma->vm_flags & VM_SHARED))
1391 goto fallback;
1392
1393 /* If the PMD would extend outside the VMA */
1394 if (pmd_addr < vma->vm_start)
1395 goto fallback;
1396 if ((pmd_addr + PMD_SIZE) > vma->vm_end)
1397 goto fallback;
1398
957ac8c4 1399 if (pgoff >= max_pgoff) {
282a8e03
RZ
1400 result = VM_FAULT_SIGBUS;
1401 goto out;
1402 }
642261ac
RZ
1403
1404 /* If the PMD would extend beyond the file size */
957ac8c4 1405 if ((pgoff | PG_PMD_COLOUR) >= max_pgoff)
642261ac
RZ
1406 goto fallback;
1407
876f2946 1408 /*
91d25ba8
RZ
1409 * grab_mapping_entry() will make sure we get a 2MiB empty entry, a
1410 * 2MiB zero page entry or a DAX PMD. If it can't (because a 4k page
1411 * is already in the tree, for instance), it will return -EEXIST and
1412 * we just fall back to 4k entries.
876f2946
RZ
1413 */
1414 entry = grab_mapping_entry(mapping, pgoff, RADIX_DAX_PMD);
1415 if (IS_ERR(entry))
1416 goto fallback;
1417
e2093926
RZ
1418 /*
1419 * It is possible, particularly with mixed reads & writes to private
1420 * mappings, that we have raced with a PTE fault that overlaps with
1421 * the PMD we need to set up. If so just return and the fault will be
1422 * retried.
1423 */
1424 if (!pmd_none(*vmf->pmd) && !pmd_trans_huge(*vmf->pmd) &&
1425 !pmd_devmap(*vmf->pmd)) {
1426 result = 0;
1427 goto unlock_entry;
1428 }
1429
642261ac
RZ
1430 /*
1431 * Note that we don't use iomap_apply here. We aren't doing I/O, only
1432 * setting up a mapping, so really we're using iomap_begin() as a way
1433 * to look up our filesystem block.
1434 */
1435 pos = (loff_t)pgoff << PAGE_SHIFT;
1436 error = ops->iomap_begin(inode, pos, PMD_SIZE, iomap_flags, &iomap);
1437 if (error)
876f2946 1438 goto unlock_entry;
9f141d6e 1439
642261ac
RZ
1440 if (iomap.offset + iomap.length < pos + PMD_SIZE)
1441 goto finish_iomap;
1442
aaa422c4 1443 sync = dax_fault_is_synchronous(iomap_flags, vma, &iomap);
caa51d26 1444
642261ac
RZ
1445 switch (iomap.type) {
1446 case IOMAP_MAPPED:
302a5e31
JK
1447 error = dax_iomap_pfn(&iomap, pos, PMD_SIZE, &pfn);
1448 if (error < 0)
1449 goto finish_iomap;
1450
3fe0791c 1451 entry = dax_insert_mapping_entry(mapping, vmf, entry, pfn,
caa51d26 1452 RADIX_DAX_PMD, write && !sync);
302a5e31
JK
1453 if (IS_ERR(entry))
1454 goto finish_iomap;
1455
caa51d26
JK
1456 /*
1457 * If we are doing synchronous page fault and inode needs fsync,
1458 * we can insert PMD into page tables only after that happens.
1459 * Skip insertion for now and return the pfn so that caller can
1460 * insert it after fsync is done.
1461 */
1462 if (sync) {
1463 if (WARN_ON_ONCE(!pfnp))
1464 goto finish_iomap;
1465 *pfnp = pfn;
1466 result = VM_FAULT_NEEDDSYNC;
1467 goto finish_iomap;
1468 }
1469
302a5e31
JK
1470 trace_dax_pmd_insert_mapping(inode, vmf, PMD_SIZE, pfn, entry);
1471 result = vmf_insert_pfn_pmd(vma, vmf->address, vmf->pmd, pfn,
1472 write);
642261ac
RZ
1473 break;
1474 case IOMAP_UNWRITTEN:
1475 case IOMAP_HOLE:
1476 if (WARN_ON_ONCE(write))
876f2946 1477 break;
91d25ba8 1478 result = dax_pmd_load_hole(vmf, &iomap, entry);
642261ac
RZ
1479 break;
1480 default:
1481 WARN_ON_ONCE(1);
1482 break;
1483 }
1484
1485 finish_iomap:
1486 if (ops->iomap_end) {
9f141d6e
JK
1487 int copied = PMD_SIZE;
1488
1489 if (result == VM_FAULT_FALLBACK)
1490 copied = 0;
1491 /*
1492 * The fault is done by now and there's no way back (other
1493 * thread may be already happily using PMD we have installed).
1494 * Just ignore error from ->iomap_end since we cannot do much
1495 * with it.
1496 */
1497 ops->iomap_end(inode, pos, PMD_SIZE, copied, iomap_flags,
1498 &iomap);
642261ac 1499 }
876f2946 1500 unlock_entry:
91d25ba8 1501 put_locked_mapping_entry(mapping, pgoff);
642261ac
RZ
1502 fallback:
1503 if (result == VM_FAULT_FALLBACK) {
d8a849e1 1504 split_huge_pmd(vma, vmf->pmd, vmf->address);
642261ac
RZ
1505 count_vm_event(THP_FAULT_FALLBACK);
1506 }
282a8e03 1507out:
f4200391 1508 trace_dax_pmd_fault_done(inode, vmf, max_pgoff, result);
642261ac
RZ
1509 return result;
1510}
a2d58167 1511#else
9a0dd422 1512static int dax_iomap_pmd_fault(struct vm_fault *vmf, pfn_t *pfnp,
01cddfe9 1513 const struct iomap_ops *ops)
a2d58167
DJ
1514{
1515 return VM_FAULT_FALLBACK;
1516}
642261ac 1517#endif /* CONFIG_FS_DAX_PMD */
a2d58167
DJ
1518
1519/**
1520 * dax_iomap_fault - handle a page fault on a DAX file
1521 * @vmf: The description of the fault
cec04e8c 1522 * @pe_size: Size of the page to fault in
9a0dd422 1523 * @pfnp: PFN to insert for synchronous faults if fsync is required
c0b24625 1524 * @iomap_errp: Storage for detailed error code in case of error
cec04e8c 1525 * @ops: Iomap ops passed from the file system
a2d58167
DJ
1526 *
1527 * When a page fault occurs, filesystems may call this helper in
1528 * their fault handler for DAX files. dax_iomap_fault() assumes the caller
1529 * has done all the necessary locking for page fault to proceed
1530 * successfully.
1531 */
c791ace1 1532int dax_iomap_fault(struct vm_fault *vmf, enum page_entry_size pe_size,
c0b24625 1533 pfn_t *pfnp, int *iomap_errp, const struct iomap_ops *ops)
a2d58167 1534{
c791ace1
DJ
1535 switch (pe_size) {
1536 case PE_SIZE_PTE:
c0b24625 1537 return dax_iomap_pte_fault(vmf, pfnp, iomap_errp, ops);
c791ace1 1538 case PE_SIZE_PMD:
9a0dd422 1539 return dax_iomap_pmd_fault(vmf, pfnp, ops);
a2d58167
DJ
1540 default:
1541 return VM_FAULT_FALLBACK;
1542 }
1543}
1544EXPORT_SYMBOL_GPL(dax_iomap_fault);
71eab6df
JK
1545
1546/**
1547 * dax_insert_pfn_mkwrite - insert PTE or PMD entry into page tables
1548 * @vmf: The description of the fault
1549 * @pe_size: Size of entry to be inserted
1550 * @pfn: PFN to insert
1551 *
1552 * This function inserts writeable PTE or PMD entry into page tables for mmaped
1553 * DAX file. It takes care of marking corresponding radix tree entry as dirty
1554 * as well.
1555 */
1556static int dax_insert_pfn_mkwrite(struct vm_fault *vmf,
1557 enum page_entry_size pe_size,
1558 pfn_t pfn)
1559{
1560 struct address_space *mapping = vmf->vma->vm_file->f_mapping;
1561 void *entry, **slot;
1562 pgoff_t index = vmf->pgoff;
1563 int vmf_ret, error;
1564
b93b0163 1565 xa_lock_irq(&mapping->i_pages);
71eab6df
JK
1566 entry = get_unlocked_mapping_entry(mapping, index, &slot);
1567 /* Did we race with someone splitting entry or so? */
1568 if (!entry ||
1569 (pe_size == PE_SIZE_PTE && !dax_is_pte_entry(entry)) ||
1570 (pe_size == PE_SIZE_PMD && !dax_is_pmd_entry(entry))) {
1571 put_unlocked_mapping_entry(mapping, index, entry);
b93b0163 1572 xa_unlock_irq(&mapping->i_pages);
71eab6df
JK
1573 trace_dax_insert_pfn_mkwrite_no_entry(mapping->host, vmf,
1574 VM_FAULT_NOPAGE);
1575 return VM_FAULT_NOPAGE;
1576 }
b93b0163 1577 radix_tree_tag_set(&mapping->i_pages, index, PAGECACHE_TAG_DIRTY);
71eab6df 1578 entry = lock_slot(mapping, slot);
b93b0163 1579 xa_unlock_irq(&mapping->i_pages);
71eab6df
JK
1580 switch (pe_size) {
1581 case PE_SIZE_PTE:
1582 error = vm_insert_mixed_mkwrite(vmf->vma, vmf->address, pfn);
1583 vmf_ret = dax_fault_return(error);
1584 break;
1585#ifdef CONFIG_FS_DAX_PMD
1586 case PE_SIZE_PMD:
1587 vmf_ret = vmf_insert_pfn_pmd(vmf->vma, vmf->address, vmf->pmd,
1588 pfn, true);
1589 break;
1590#endif
1591 default:
1592 vmf_ret = VM_FAULT_FALLBACK;
1593 }
1594 put_locked_mapping_entry(mapping, index);
1595 trace_dax_insert_pfn_mkwrite(mapping->host, vmf, vmf_ret);
1596 return vmf_ret;
1597}
1598
1599/**
1600 * dax_finish_sync_fault - finish synchronous page fault
1601 * @vmf: The description of the fault
1602 * @pe_size: Size of entry to be inserted
1603 * @pfn: PFN to insert
1604 *
1605 * This function ensures that the file range touched by the page fault is
1606 * stored persistently on the media and handles inserting of appropriate page
1607 * table entry.
1608 */
1609int dax_finish_sync_fault(struct vm_fault *vmf, enum page_entry_size pe_size,
1610 pfn_t pfn)
1611{
1612 int err;
1613 loff_t start = ((loff_t)vmf->pgoff) << PAGE_SHIFT;
1614 size_t len = 0;
1615
1616 if (pe_size == PE_SIZE_PTE)
1617 len = PAGE_SIZE;
1618 else if (pe_size == PE_SIZE_PMD)
1619 len = PMD_SIZE;
1620 else
1621 WARN_ON_ONCE(1);
1622 err = vfs_fsync_range(vmf->vma->vm_file, start, start + len - 1, 1);
1623 if (err)
1624 return VM_FAULT_SIGBUS;
1625 return dax_insert_pfn_mkwrite(vmf, pe_size, pfn);
1626}
1627EXPORT_SYMBOL_GPL(dax_finish_sync_fault);