Merge tag 'pinctrl-v4.17-1' of git://git.kernel.org/pub/scm/linux/kernel/git/linusw...
[linux-2.6-block.git] / mm / nommu.c
CommitLineData
1da177e4
LT
1/*
2 * linux/mm/nommu.c
3 *
4 * Replacement code for mm functions to support CPU's that don't
5 * have any form of memory management unit (thus no virtual memory).
6 *
7 * See Documentation/nommu-mmap.txt
8 *
8feae131 9 * Copyright (c) 2004-2008 David Howells <dhowells@redhat.com>
1da177e4
LT
10 * Copyright (c) 2000-2003 David McCullough <davidm@snapgear.com>
11 * Copyright (c) 2000-2001 D Jeff Dionne <jeff@uClinux.org>
12 * Copyright (c) 2002 Greg Ungerer <gerg@snapgear.com>
29c185e5 13 * Copyright (c) 2007-2010 Paul Mundt <lethal@linux-sh.org>
1da177e4
LT
14 */
15
b1de0d13
MH
16#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
17
b95f1b31 18#include <linux/export.h>
1da177e4 19#include <linux/mm.h>
6e84f315 20#include <linux/sched/mm.h>
615d6e87 21#include <linux/vmacache.h>
1da177e4
LT
22#include <linux/mman.h>
23#include <linux/swap.h>
24#include <linux/file.h>
25#include <linux/highmem.h>
26#include <linux/pagemap.h>
27#include <linux/slab.h>
28#include <linux/vmalloc.h>
1da177e4
LT
29#include <linux/blkdev.h>
30#include <linux/backing-dev.h>
3b32123d 31#include <linux/compiler.h>
1da177e4
LT
32#include <linux/mount.h>
33#include <linux/personality.h>
34#include <linux/security.h>
35#include <linux/syscalls.h>
120a795d 36#include <linux/audit.h>
b1de0d13 37#include <linux/printk.h>
1da177e4 38
7c0f6ba6 39#include <linux/uaccess.h>
1da177e4
LT
40#include <asm/tlb.h>
41#include <asm/tlbflush.h>
eb8cdec4 42#include <asm/mmu_context.h>
8feae131
DH
43#include "internal.h"
44
1da177e4 45void *high_memory;
944b6874 46EXPORT_SYMBOL(high_memory);
1da177e4
LT
47struct page *mem_map;
48unsigned long max_mapnr;
5b8bf307 49EXPORT_SYMBOL(max_mapnr);
4266c97a 50unsigned long highest_memmap_pfn;
fc4d5c29 51int sysctl_nr_trim_pages = CONFIG_NOMMU_INITIAL_TRIM_EXCESS;
1da177e4
LT
52int heap_stack_gap = 0;
53
33e5d769 54atomic_long_t mmap_pages_allocated;
8feae131 55
1da177e4 56EXPORT_SYMBOL(mem_map);
1da177e4 57
8feae131
DH
58/* list of mapped, potentially shareable regions */
59static struct kmem_cache *vm_region_jar;
60struct rb_root nommu_region_tree = RB_ROOT;
61DECLARE_RWSEM(nommu_region_sem);
1da177e4 62
f0f37e2f 63const struct vm_operations_struct generic_file_vm_ops = {
1da177e4
LT
64};
65
1da177e4
LT
66/*
67 * Return the total memory allocated for this pointer, not
68 * just what the caller asked for.
69 *
70 * Doesn't have to be accurate, i.e. may have races.
71 */
72unsigned int kobjsize(const void *objp)
73{
74 struct page *page;
75
4016a139
MH
76 /*
77 * If the object we have should not have ksize performed on it,
78 * return size of 0
79 */
5a1603be 80 if (!objp || !virt_addr_valid(objp))
6cfd53fc
PM
81 return 0;
82
83 page = virt_to_head_page(objp);
6cfd53fc
PM
84
85 /*
86 * If the allocator sets PageSlab, we know the pointer came from
87 * kmalloc().
88 */
1da177e4
LT
89 if (PageSlab(page))
90 return ksize(objp);
91
ab2e83ea
PM
92 /*
93 * If it's not a compound page, see if we have a matching VMA
94 * region. This test is intentionally done in reverse order,
95 * so if there's no VMA, we still fall through and hand back
96 * PAGE_SIZE for 0-order pages.
97 */
98 if (!PageCompound(page)) {
99 struct vm_area_struct *vma;
100
101 vma = find_vma(current->mm, (unsigned long)objp);
102 if (vma)
103 return vma->vm_end - vma->vm_start;
104 }
105
6cfd53fc
PM
106 /*
107 * The ksize() function is only guaranteed to work for pointers
5a1603be 108 * returned by kmalloc(). So handle arbitrary pointers here.
6cfd53fc 109 */
5a1603be 110 return PAGE_SIZE << compound_order(page);
1da177e4
LT
111}
112
0d731759 113static long __get_user_pages(struct task_struct *tsk, struct mm_struct *mm,
28a35716
ML
114 unsigned long start, unsigned long nr_pages,
115 unsigned int foll_flags, struct page **pages,
116 struct vm_area_struct **vmas, int *nonblocking)
1da177e4 117{
910e46da 118 struct vm_area_struct *vma;
7b4d5b8b
DH
119 unsigned long vm_flags;
120 int i;
121
122 /* calculate required read or write permissions.
58fa879e 123 * If FOLL_FORCE is set, we only require the "MAY" flags.
7b4d5b8b 124 */
58fa879e
HD
125 vm_flags = (foll_flags & FOLL_WRITE) ?
126 (VM_WRITE | VM_MAYWRITE) : (VM_READ | VM_MAYREAD);
127 vm_flags &= (foll_flags & FOLL_FORCE) ?
128 (VM_MAYREAD | VM_MAYWRITE) : (VM_READ | VM_WRITE);
1da177e4 129
9d73777e 130 for (i = 0; i < nr_pages; i++) {
7561e8ca 131 vma = find_vma(mm, start);
7b4d5b8b
DH
132 if (!vma)
133 goto finish_or_fault;
134
135 /* protect what we can, including chardevs */
1c3aff1c
HD
136 if ((vma->vm_flags & (VM_IO | VM_PFNMAP)) ||
137 !(vm_flags & vma->vm_flags))
7b4d5b8b 138 goto finish_or_fault;
910e46da 139
1da177e4
LT
140 if (pages) {
141 pages[i] = virt_to_page(start);
142 if (pages[i])
09cbfeaf 143 get_page(pages[i]);
1da177e4
LT
144 }
145 if (vmas)
910e46da 146 vmas[i] = vma;
e1ee65d8 147 start = (start + PAGE_SIZE) & PAGE_MASK;
1da177e4 148 }
7b4d5b8b
DH
149
150 return i;
151
152finish_or_fault:
153 return i ? : -EFAULT;
1da177e4 154}
b291f000 155
b291f000
NP
156/*
157 * get a list of pages in an address range belonging to the specified process
158 * and indicate the VMA that covers each page
159 * - this is potentially dodgy as we may end incrementing the page count of a
160 * slab page or a secondary page from a compound page
161 * - don't permit access to VMAs that don't support it, such as I/O mappings
162 */
c12d2da5 163long get_user_pages(unsigned long start, unsigned long nr_pages,
768ae309 164 unsigned int gup_flags, struct page **pages,
28a35716 165 struct vm_area_struct **vmas)
b291f000 166{
768ae309
LS
167 return __get_user_pages(current, current->mm, start, nr_pages,
168 gup_flags, pages, vmas, NULL);
b291f000 169}
c12d2da5 170EXPORT_SYMBOL(get_user_pages);
66aa2b4b 171
c12d2da5 172long get_user_pages_locked(unsigned long start, unsigned long nr_pages,
3b913179 173 unsigned int gup_flags, struct page **pages,
cde70140 174 int *locked)
f0818f47 175{
768ae309 176 return get_user_pages(start, nr_pages, gup_flags, pages, NULL);
f0818f47 177}
c12d2da5 178EXPORT_SYMBOL(get_user_pages_locked);
f0818f47 179
8b7457ef
LS
180static long __get_user_pages_unlocked(struct task_struct *tsk,
181 struct mm_struct *mm, unsigned long start,
182 unsigned long nr_pages, struct page **pages,
183 unsigned int gup_flags)
f0818f47
AA
184{
185 long ret;
186 down_read(&mm->mmap_sem);
cde70140
DH
187 ret = __get_user_pages(tsk, mm, start, nr_pages, gup_flags, pages,
188 NULL, NULL);
f0818f47
AA
189 up_read(&mm->mmap_sem);
190 return ret;
191}
0fd71a56 192
c12d2da5 193long get_user_pages_unlocked(unsigned long start, unsigned long nr_pages,
c164154f 194 struct page **pages, unsigned int gup_flags)
0fd71a56 195{
cde70140 196 return __get_user_pages_unlocked(current, current->mm, start, nr_pages,
c164154f 197 pages, gup_flags);
0fd71a56 198}
c12d2da5 199EXPORT_SYMBOL(get_user_pages_unlocked);
f0818f47 200
dfc2f91a
PM
201/**
202 * follow_pfn - look up PFN at a user virtual address
203 * @vma: memory mapping
204 * @address: user virtual address
205 * @pfn: location to store found PFN
206 *
207 * Only IO mappings and raw PFN mappings are allowed.
208 *
209 * Returns zero and the pfn at @pfn on success, -ve otherwise.
210 */
211int follow_pfn(struct vm_area_struct *vma, unsigned long address,
212 unsigned long *pfn)
213{
214 if (!(vma->vm_flags & (VM_IO | VM_PFNMAP)))
215 return -EINVAL;
216
217 *pfn = address >> PAGE_SHIFT;
218 return 0;
219}
220EXPORT_SYMBOL(follow_pfn);
221
f1c4069e 222LIST_HEAD(vmap_area_list);
1da177e4 223
b3bdda02 224void vfree(const void *addr)
1da177e4
LT
225{
226 kfree(addr);
227}
b5073173 228EXPORT_SYMBOL(vfree);
1da177e4 229
dd0fc66f 230void *__vmalloc(unsigned long size, gfp_t gfp_mask, pgprot_t prot)
1da177e4
LT
231{
232 /*
8518609d
RD
233 * You can't specify __GFP_HIGHMEM with kmalloc() since kmalloc()
234 * returns only a logical address.
1da177e4 235 */
84097518 236 return kmalloc(size, (gfp_mask | __GFP_COMP) & ~__GFP_HIGHMEM);
1da177e4 237}
b5073173 238EXPORT_SYMBOL(__vmalloc);
1da177e4 239
a7c3e901
MH
240void *__vmalloc_node_flags(unsigned long size, int node, gfp_t flags)
241{
242 return __vmalloc(size, flags, PAGE_KERNEL);
243}
244
f905bc44
PM
245void *vmalloc_user(unsigned long size)
246{
247 void *ret;
248
19809c2d 249 ret = __vmalloc(size, GFP_KERNEL | __GFP_ZERO, PAGE_KERNEL);
f905bc44
PM
250 if (ret) {
251 struct vm_area_struct *vma;
252
253 down_write(&current->mm->mmap_sem);
254 vma = find_vma(current->mm, (unsigned long)ret);
255 if (vma)
256 vma->vm_flags |= VM_USERMAP;
257 up_write(&current->mm->mmap_sem);
258 }
259
260 return ret;
261}
262EXPORT_SYMBOL(vmalloc_user);
263
b3bdda02 264struct page *vmalloc_to_page(const void *addr)
1da177e4
LT
265{
266 return virt_to_page(addr);
267}
b5073173 268EXPORT_SYMBOL(vmalloc_to_page);
1da177e4 269
b3bdda02 270unsigned long vmalloc_to_pfn(const void *addr)
1da177e4
LT
271{
272 return page_to_pfn(virt_to_page(addr));
273}
b5073173 274EXPORT_SYMBOL(vmalloc_to_pfn);
1da177e4
LT
275
276long vread(char *buf, char *addr, unsigned long count)
277{
9bde916b
CG
278 /* Don't allow overflow */
279 if ((unsigned long) buf + count < count)
280 count = -(unsigned long) buf;
281
1da177e4
LT
282 memcpy(buf, addr, count);
283 return count;
284}
285
286long vwrite(char *buf, char *addr, unsigned long count)
287{
288 /* Don't allow overflow */
289 if ((unsigned long) addr + count < count)
290 count = -(unsigned long) addr;
291
292 memcpy(addr, buf, count);
ac714904 293 return count;
1da177e4
LT
294}
295
296/*
e1c05067 297 * vmalloc - allocate virtually contiguous memory
1da177e4
LT
298 *
299 * @size: allocation size
300 *
301 * Allocate enough pages to cover @size from the page level
e1c05067 302 * allocator and map them into contiguous kernel virtual space.
1da177e4 303 *
c1c8897f 304 * For tight control over page level allocator and protection flags
1da177e4
LT
305 * use __vmalloc() instead.
306 */
307void *vmalloc(unsigned long size)
308{
309 return __vmalloc(size, GFP_KERNEL | __GFP_HIGHMEM, PAGE_KERNEL);
310}
f6138882
AM
311EXPORT_SYMBOL(vmalloc);
312
e1ca7788 313/*
e1c05067 314 * vzalloc - allocate virtually contiguous memory with zero fill
e1ca7788
DY
315 *
316 * @size: allocation size
317 *
318 * Allocate enough pages to cover @size from the page level
e1c05067 319 * allocator and map them into contiguous kernel virtual space.
e1ca7788
DY
320 * The memory allocated is set to zero.
321 *
322 * For tight control over page level allocator and protection flags
323 * use __vmalloc() instead.
324 */
325void *vzalloc(unsigned long size)
326{
327 return __vmalloc(size, GFP_KERNEL | __GFP_HIGHMEM | __GFP_ZERO,
328 PAGE_KERNEL);
329}
330EXPORT_SYMBOL(vzalloc);
331
332/**
333 * vmalloc_node - allocate memory on a specific node
334 * @size: allocation size
335 * @node: numa node
336 *
337 * Allocate enough pages to cover @size from the page level
338 * allocator and map them into contiguous kernel virtual space.
339 *
340 * For tight control over page level allocator and protection flags
341 * use __vmalloc() instead.
342 */
f6138882
AM
343void *vmalloc_node(unsigned long size, int node)
344{
345 return vmalloc(size);
346}
9a14f653 347EXPORT_SYMBOL(vmalloc_node);
e1ca7788
DY
348
349/**
350 * vzalloc_node - allocate memory on a specific node with zero fill
351 * @size: allocation size
352 * @node: numa node
353 *
354 * Allocate enough pages to cover @size from the page level
355 * allocator and map them into contiguous kernel virtual space.
356 * The memory allocated is set to zero.
357 *
358 * For tight control over page level allocator and protection flags
359 * use __vmalloc() instead.
360 */
361void *vzalloc_node(unsigned long size, int node)
362{
363 return vzalloc(size);
364}
365EXPORT_SYMBOL(vzalloc_node);
1da177e4 366
1af446ed
PM
367#ifndef PAGE_KERNEL_EXEC
368# define PAGE_KERNEL_EXEC PAGE_KERNEL
369#endif
370
371/**
372 * vmalloc_exec - allocate virtually contiguous, executable memory
373 * @size: allocation size
374 *
375 * Kernel-internal function to allocate enough pages to cover @size
376 * the page level allocator and map them into contiguous and
377 * executable kernel virtual space.
378 *
379 * For tight control over page level allocator and protection flags
380 * use __vmalloc() instead.
381 */
382
383void *vmalloc_exec(unsigned long size)
384{
385 return __vmalloc(size, GFP_KERNEL | __GFP_HIGHMEM, PAGE_KERNEL_EXEC);
386}
387
b5073173
PM
388/**
389 * vmalloc_32 - allocate virtually contiguous memory (32bit addressable)
1da177e4
LT
390 * @size: allocation size
391 *
392 * Allocate enough 32bit PA addressable pages to cover @size from the
e1c05067 393 * page level allocator and map them into contiguous kernel virtual space.
1da177e4
LT
394 */
395void *vmalloc_32(unsigned long size)
396{
397 return __vmalloc(size, GFP_KERNEL, PAGE_KERNEL);
398}
b5073173
PM
399EXPORT_SYMBOL(vmalloc_32);
400
401/**
402 * vmalloc_32_user - allocate zeroed virtually contiguous 32bit memory
403 * @size: allocation size
404 *
405 * The resulting memory area is 32bit addressable and zeroed so it can be
406 * mapped to userspace without leaking data.
f905bc44
PM
407 *
408 * VM_USERMAP is set on the corresponding VMA so that subsequent calls to
409 * remap_vmalloc_range() are permissible.
b5073173
PM
410 */
411void *vmalloc_32_user(unsigned long size)
412{
f905bc44
PM
413 /*
414 * We'll have to sort out the ZONE_DMA bits for 64-bit,
415 * but for now this can simply use vmalloc_user() directly.
416 */
417 return vmalloc_user(size);
b5073173
PM
418}
419EXPORT_SYMBOL(vmalloc_32_user);
1da177e4
LT
420
421void *vmap(struct page **pages, unsigned int count, unsigned long flags, pgprot_t prot)
422{
423 BUG();
424 return NULL;
425}
b5073173 426EXPORT_SYMBOL(vmap);
1da177e4 427
b3bdda02 428void vunmap(const void *addr)
1da177e4
LT
429{
430 BUG();
431}
b5073173 432EXPORT_SYMBOL(vunmap);
1da177e4 433
eb6434d9
PM
434void *vm_map_ram(struct page **pages, unsigned int count, int node, pgprot_t prot)
435{
436 BUG();
437 return NULL;
438}
439EXPORT_SYMBOL(vm_map_ram);
440
441void vm_unmap_ram(const void *mem, unsigned int count)
442{
443 BUG();
444}
445EXPORT_SYMBOL(vm_unmap_ram);
446
447void vm_unmap_aliases(void)
448{
449}
450EXPORT_SYMBOL_GPL(vm_unmap_aliases);
451
1eeb66a1
CH
452/*
453 * Implement a stub for vmalloc_sync_all() if the architecture chose not to
454 * have one.
455 */
3b32123d 456void __weak vmalloc_sync_all(void)
1eeb66a1
CH
457{
458}
459
29c185e5
PM
460/**
461 * alloc_vm_area - allocate a range of kernel address space
462 * @size: size of the area
463 *
464 * Returns: NULL on failure, vm_struct on success
465 *
466 * This function reserves a range of kernel address space, and
467 * allocates pagetables to map that range. No actual mappings
468 * are created. If the kernel address space is not shared
469 * between processes, it syncs the pagetable across all
470 * processes.
471 */
cd12909c 472struct vm_struct *alloc_vm_area(size_t size, pte_t **ptes)
29c185e5
PM
473{
474 BUG();
475 return NULL;
476}
477EXPORT_SYMBOL_GPL(alloc_vm_area);
478
479void free_vm_area(struct vm_struct *area)
480{
481 BUG();
482}
483EXPORT_SYMBOL_GPL(free_vm_area);
484
b5073173
PM
485int vm_insert_page(struct vm_area_struct *vma, unsigned long addr,
486 struct page *page)
487{
488 return -EINVAL;
489}
490EXPORT_SYMBOL(vm_insert_page);
491
1da177e4
LT
492/*
493 * sys_brk() for the most part doesn't need the global kernel
494 * lock, except when an application is doing something nasty
495 * like trying to un-brk an area that has already been mapped
496 * to a regular file. in this case, the unmapping will need
497 * to invoke file system routines that need the global lock.
498 */
6a6160a7 499SYSCALL_DEFINE1(brk, unsigned long, brk)
1da177e4
LT
500{
501 struct mm_struct *mm = current->mm;
502
503 if (brk < mm->start_brk || brk > mm->context.end_brk)
504 return mm->brk;
505
506 if (mm->brk == brk)
507 return mm->brk;
508
509 /*
510 * Always allow shrinking brk
511 */
512 if (brk <= mm->brk) {
513 mm->brk = brk;
514 return brk;
515 }
516
517 /*
518 * Ok, looks good - let it rip.
519 */
cfe79c00 520 flush_icache_range(mm->brk, brk);
1da177e4
LT
521 return mm->brk = brk;
522}
523
8feae131 524/*
3edf41d8 525 * initialise the percpu counter for VM and region record slabs
8feae131
DH
526 */
527void __init mmap_init(void)
1da177e4 528{
00a62ce9
KM
529 int ret;
530
908c7f19 531 ret = percpu_counter_init(&vm_committed_as, 0, GFP_KERNEL);
00a62ce9 532 VM_BUG_ON(ret);
5d097056 533 vm_region_jar = KMEM_CACHE(vm_region, SLAB_PANIC|SLAB_ACCOUNT);
1da177e4 534}
1da177e4 535
3034097a 536/*
8feae131
DH
537 * validate the region tree
538 * - the caller must hold the region lock
3034097a 539 */
8feae131
DH
540#ifdef CONFIG_DEBUG_NOMMU_REGIONS
541static noinline void validate_nommu_regions(void)
3034097a 542{
8feae131
DH
543 struct vm_region *region, *last;
544 struct rb_node *p, *lastp;
3034097a 545
8feae131
DH
546 lastp = rb_first(&nommu_region_tree);
547 if (!lastp)
548 return;
549
550 last = rb_entry(lastp, struct vm_region, vm_rb);
c9427bc0
GT
551 BUG_ON(last->vm_end <= last->vm_start);
552 BUG_ON(last->vm_top < last->vm_end);
8feae131
DH
553
554 while ((p = rb_next(lastp))) {
555 region = rb_entry(p, struct vm_region, vm_rb);
556 last = rb_entry(lastp, struct vm_region, vm_rb);
557
c9427bc0
GT
558 BUG_ON(region->vm_end <= region->vm_start);
559 BUG_ON(region->vm_top < region->vm_end);
560 BUG_ON(region->vm_start < last->vm_top);
3034097a 561
8feae131
DH
562 lastp = p;
563 }
3034097a 564}
8feae131 565#else
33e5d769
DH
566static void validate_nommu_regions(void)
567{
568}
8feae131 569#endif
3034097a
DH
570
571/*
8feae131 572 * add a region into the global tree
3034097a 573 */
8feae131 574static void add_nommu_region(struct vm_region *region)
3034097a 575{
8feae131
DH
576 struct vm_region *pregion;
577 struct rb_node **p, *parent;
3034097a 578
8feae131
DH
579 validate_nommu_regions();
580
8feae131
DH
581 parent = NULL;
582 p = &nommu_region_tree.rb_node;
583 while (*p) {
584 parent = *p;
585 pregion = rb_entry(parent, struct vm_region, vm_rb);
586 if (region->vm_start < pregion->vm_start)
587 p = &(*p)->rb_left;
588 else if (region->vm_start > pregion->vm_start)
589 p = &(*p)->rb_right;
590 else if (pregion == region)
591 return;
592 else
593 BUG();
3034097a
DH
594 }
595
8feae131
DH
596 rb_link_node(&region->vm_rb, parent, p);
597 rb_insert_color(&region->vm_rb, &nommu_region_tree);
3034097a 598
8feae131 599 validate_nommu_regions();
3034097a 600}
3034097a 601
930e652a 602/*
8feae131 603 * delete a region from the global tree
930e652a 604 */
8feae131 605static void delete_nommu_region(struct vm_region *region)
930e652a 606{
8feae131 607 BUG_ON(!nommu_region_tree.rb_node);
930e652a 608
8feae131
DH
609 validate_nommu_regions();
610 rb_erase(&region->vm_rb, &nommu_region_tree);
611 validate_nommu_regions();
57c8f63e
GU
612}
613
6fa5f80b 614/*
8feae131 615 * free a contiguous series of pages
6fa5f80b 616 */
8feae131 617static void free_page_series(unsigned long from, unsigned long to)
6fa5f80b 618{
8feae131
DH
619 for (; from < to; from += PAGE_SIZE) {
620 struct page *page = virt_to_page(from);
621
33e5d769 622 atomic_long_dec(&mmap_pages_allocated);
8feae131 623 put_page(page);
6fa5f80b 624 }
6fa5f80b
DH
625}
626
3034097a 627/*
8feae131 628 * release a reference to a region
33e5d769 629 * - the caller must hold the region semaphore for writing, which this releases
dd8632a1 630 * - the region may not have been added to the tree yet, in which case vm_top
8feae131 631 * will equal vm_start
3034097a 632 */
8feae131
DH
633static void __put_nommu_region(struct vm_region *region)
634 __releases(nommu_region_sem)
1da177e4 635{
8feae131 636 BUG_ON(!nommu_region_tree.rb_node);
1da177e4 637
1e2ae599 638 if (--region->vm_usage == 0) {
dd8632a1 639 if (region->vm_top > region->vm_start)
8feae131
DH
640 delete_nommu_region(region);
641 up_write(&nommu_region_sem);
642
643 if (region->vm_file)
644 fput(region->vm_file);
645
646 /* IO memory and memory shared directly out of the pagecache
647 * from ramfs/tmpfs mustn't be released here */
22cc877b 648 if (region->vm_flags & VM_MAPPED_COPY)
dd8632a1 649 free_page_series(region->vm_start, region->vm_top);
8feae131
DH
650 kmem_cache_free(vm_region_jar, region);
651 } else {
652 up_write(&nommu_region_sem);
1da177e4 653 }
8feae131 654}
1da177e4 655
8feae131
DH
656/*
657 * release a reference to a region
658 */
659static void put_nommu_region(struct vm_region *region)
660{
661 down_write(&nommu_region_sem);
662 __put_nommu_region(region);
1da177e4
LT
663}
664
3034097a 665/*
8feae131
DH
666 * add a VMA into a process's mm_struct in the appropriate place in the list
667 * and tree and add to the address space's page tree also if not an anonymous
668 * page
669 * - should be called with mm->mmap_sem held writelocked
3034097a 670 */
8feae131 671static void add_vma_to_mm(struct mm_struct *mm, struct vm_area_struct *vma)
1da177e4 672{
6038def0 673 struct vm_area_struct *pvma, *prev;
1da177e4 674 struct address_space *mapping;
6038def0 675 struct rb_node **p, *parent, *rb_prev;
8feae131 676
8feae131
DH
677 BUG_ON(!vma->vm_region);
678
679 mm->map_count++;
680 vma->vm_mm = mm;
1da177e4
LT
681
682 /* add the VMA to the mapping */
683 if (vma->vm_file) {
684 mapping = vma->vm_file->f_mapping;
685
83cde9e8 686 i_mmap_lock_write(mapping);
1da177e4 687 flush_dcache_mmap_lock(mapping);
6b2dbba8 688 vma_interval_tree_insert(vma, &mapping->i_mmap);
1da177e4 689 flush_dcache_mmap_unlock(mapping);
83cde9e8 690 i_mmap_unlock_write(mapping);
1da177e4
LT
691 }
692
8feae131 693 /* add the VMA to the tree */
6038def0 694 parent = rb_prev = NULL;
8feae131 695 p = &mm->mm_rb.rb_node;
1da177e4
LT
696 while (*p) {
697 parent = *p;
698 pvma = rb_entry(parent, struct vm_area_struct, vm_rb);
699
8feae131
DH
700 /* sort by: start addr, end addr, VMA struct addr in that order
701 * (the latter is necessary as we may get identical VMAs) */
702 if (vma->vm_start < pvma->vm_start)
1da177e4 703 p = &(*p)->rb_left;
6038def0
NK
704 else if (vma->vm_start > pvma->vm_start) {
705 rb_prev = parent;
1da177e4 706 p = &(*p)->rb_right;
6038def0 707 } else if (vma->vm_end < pvma->vm_end)
8feae131 708 p = &(*p)->rb_left;
6038def0
NK
709 else if (vma->vm_end > pvma->vm_end) {
710 rb_prev = parent;
8feae131 711 p = &(*p)->rb_right;
6038def0 712 } else if (vma < pvma)
8feae131 713 p = &(*p)->rb_left;
6038def0
NK
714 else if (vma > pvma) {
715 rb_prev = parent;
8feae131 716 p = &(*p)->rb_right;
6038def0 717 } else
8feae131 718 BUG();
1da177e4
LT
719 }
720
721 rb_link_node(&vma->vm_rb, parent, p);
8feae131
DH
722 rb_insert_color(&vma->vm_rb, &mm->mm_rb);
723
724 /* add VMA to the VMA list also */
6038def0
NK
725 prev = NULL;
726 if (rb_prev)
727 prev = rb_entry(rb_prev, struct vm_area_struct, vm_rb);
8feae131 728
6038def0 729 __vma_link_list(mm, vma, prev, parent);
1da177e4
LT
730}
731
3034097a 732/*
8feae131 733 * delete a VMA from its owning mm_struct and address space
3034097a 734 */
8feae131 735static void delete_vma_from_mm(struct vm_area_struct *vma)
1da177e4 736{
615d6e87 737 int i;
1da177e4 738 struct address_space *mapping;
8feae131 739 struct mm_struct *mm = vma->vm_mm;
615d6e87 740 struct task_struct *curr = current;
8feae131 741
8feae131 742 mm->map_count--;
615d6e87
DB
743 for (i = 0; i < VMACACHE_SIZE; i++) {
744 /* if the vma is cached, invalidate the entire cache */
314ff785 745 if (curr->vmacache.vmas[i] == vma) {
e020d5bd 746 vmacache_invalidate(mm);
615d6e87
DB
747 break;
748 }
749 }
1da177e4
LT
750
751 /* remove the VMA from the mapping */
752 if (vma->vm_file) {
753 mapping = vma->vm_file->f_mapping;
754
83cde9e8 755 i_mmap_lock_write(mapping);
1da177e4 756 flush_dcache_mmap_lock(mapping);
6b2dbba8 757 vma_interval_tree_remove(vma, &mapping->i_mmap);
1da177e4 758 flush_dcache_mmap_unlock(mapping);
83cde9e8 759 i_mmap_unlock_write(mapping);
1da177e4
LT
760 }
761
8feae131
DH
762 /* remove from the MM's tree and list */
763 rb_erase(&vma->vm_rb, &mm->mm_rb);
b951bf2c
NK
764
765 if (vma->vm_prev)
766 vma->vm_prev->vm_next = vma->vm_next;
767 else
768 mm->mmap = vma->vm_next;
769
770 if (vma->vm_next)
771 vma->vm_next->vm_prev = vma->vm_prev;
8feae131
DH
772}
773
774/*
775 * destroy a VMA record
776 */
777static void delete_vma(struct mm_struct *mm, struct vm_area_struct *vma)
778{
8feae131
DH
779 if (vma->vm_ops && vma->vm_ops->close)
780 vma->vm_ops->close(vma);
e9714acf 781 if (vma->vm_file)
8feae131 782 fput(vma->vm_file);
8feae131
DH
783 put_nommu_region(vma->vm_region);
784 kmem_cache_free(vm_area_cachep, vma);
785}
786
787/*
788 * look up the first VMA in which addr resides, NULL if none
789 * - should be called with mm->mmap_sem at least held readlocked
790 */
791struct vm_area_struct *find_vma(struct mm_struct *mm, unsigned long addr)
792{
793 struct vm_area_struct *vma;
8feae131
DH
794
795 /* check the cache first */
615d6e87
DB
796 vma = vmacache_find(mm, addr);
797 if (likely(vma))
8feae131
DH
798 return vma;
799
e922c4c5 800 /* trawl the list (there may be multiple mappings in which addr
8feae131 801 * resides) */
e922c4c5 802 for (vma = mm->mmap; vma; vma = vma->vm_next) {
8feae131
DH
803 if (vma->vm_start > addr)
804 return NULL;
805 if (vma->vm_end > addr) {
615d6e87 806 vmacache_update(addr, vma);
8feae131
DH
807 return vma;
808 }
809 }
810
811 return NULL;
812}
813EXPORT_SYMBOL(find_vma);
814
815/*
816 * find a VMA
817 * - we don't extend stack VMAs under NOMMU conditions
818 */
819struct vm_area_struct *find_extend_vma(struct mm_struct *mm, unsigned long addr)
820{
7561e8ca 821 return find_vma(mm, addr);
8feae131
DH
822}
823
824/*
825 * expand a stack to a given address
826 * - not supported under NOMMU conditions
827 */
828int expand_stack(struct vm_area_struct *vma, unsigned long address)
829{
830 return -ENOMEM;
831}
832
833/*
834 * look up the first VMA exactly that exactly matches addr
835 * - should be called with mm->mmap_sem at least held readlocked
836 */
837static struct vm_area_struct *find_vma_exact(struct mm_struct *mm,
838 unsigned long addr,
839 unsigned long len)
840{
841 struct vm_area_struct *vma;
8feae131
DH
842 unsigned long end = addr + len;
843
844 /* check the cache first */
615d6e87
DB
845 vma = vmacache_find_exact(mm, addr, end);
846 if (vma)
8feae131
DH
847 return vma;
848
e922c4c5 849 /* trawl the list (there may be multiple mappings in which addr
8feae131 850 * resides) */
e922c4c5 851 for (vma = mm->mmap; vma; vma = vma->vm_next) {
8feae131
DH
852 if (vma->vm_start < addr)
853 continue;
854 if (vma->vm_start > addr)
855 return NULL;
856 if (vma->vm_end == end) {
615d6e87 857 vmacache_update(addr, vma);
8feae131
DH
858 return vma;
859 }
860 }
861
862 return NULL;
1da177e4
LT
863}
864
865/*
866 * determine whether a mapping should be permitted and, if so, what sort of
867 * mapping we're capable of supporting
868 */
869static int validate_mmap_request(struct file *file,
870 unsigned long addr,
871 unsigned long len,
872 unsigned long prot,
873 unsigned long flags,
874 unsigned long pgoff,
875 unsigned long *_capabilities)
876{
8feae131 877 unsigned long capabilities, rlen;
1da177e4
LT
878 int ret;
879
880 /* do the simple checks first */
22cc877b 881 if (flags & MAP_FIXED)
1da177e4 882 return -EINVAL;
1da177e4
LT
883
884 if ((flags & MAP_TYPE) != MAP_PRIVATE &&
885 (flags & MAP_TYPE) != MAP_SHARED)
886 return -EINVAL;
887
f81cff0d 888 if (!len)
1da177e4
LT
889 return -EINVAL;
890
f81cff0d 891 /* Careful about overflows.. */
8feae131
DH
892 rlen = PAGE_ALIGN(len);
893 if (!rlen || rlen > TASK_SIZE)
f81cff0d
MF
894 return -ENOMEM;
895
1da177e4 896 /* offset overflow? */
8feae131 897 if ((pgoff + (rlen >> PAGE_SHIFT)) < pgoff)
f81cff0d 898 return -EOVERFLOW;
1da177e4
LT
899
900 if (file) {
1da177e4 901 /* files must support mmap */
72c2d531 902 if (!file->f_op->mmap)
1da177e4
LT
903 return -ENODEV;
904
905 /* work out if what we've got could possibly be shared
906 * - we support chardevs that provide their own "memory"
907 * - we support files/blockdevs that are memory backed
908 */
b4caecd4
CH
909 if (file->f_op->mmap_capabilities) {
910 capabilities = file->f_op->mmap_capabilities(file);
911 } else {
1da177e4
LT
912 /* no explicit capabilities set, so assume some
913 * defaults */
496ad9aa 914 switch (file_inode(file)->i_mode & S_IFMT) {
1da177e4
LT
915 case S_IFREG:
916 case S_IFBLK:
b4caecd4 917 capabilities = NOMMU_MAP_COPY;
1da177e4
LT
918 break;
919
920 case S_IFCHR:
921 capabilities =
b4caecd4
CH
922 NOMMU_MAP_DIRECT |
923 NOMMU_MAP_READ |
924 NOMMU_MAP_WRITE;
1da177e4
LT
925 break;
926
927 default:
928 return -EINVAL;
929 }
930 }
931
932 /* eliminate any capabilities that we can't support on this
933 * device */
934 if (!file->f_op->get_unmapped_area)
b4caecd4 935 capabilities &= ~NOMMU_MAP_DIRECT;
6e242a1c 936 if (!(file->f_mode & FMODE_CAN_READ))
b4caecd4 937 capabilities &= ~NOMMU_MAP_COPY;
1da177e4 938
28d7a6ae
GY
939 /* The file shall have been opened with read permission. */
940 if (!(file->f_mode & FMODE_READ))
941 return -EACCES;
942
1da177e4
LT
943 if (flags & MAP_SHARED) {
944 /* do checks for writing, appending and locking */
945 if ((prot & PROT_WRITE) &&
946 !(file->f_mode & FMODE_WRITE))
947 return -EACCES;
948
496ad9aa 949 if (IS_APPEND(file_inode(file)) &&
1da177e4
LT
950 (file->f_mode & FMODE_WRITE))
951 return -EACCES;
952
d7a06983 953 if (locks_verify_locked(file))
1da177e4
LT
954 return -EAGAIN;
955
b4caecd4 956 if (!(capabilities & NOMMU_MAP_DIRECT))
1da177e4
LT
957 return -ENODEV;
958
1da177e4 959 /* we mustn't privatise shared mappings */
b4caecd4 960 capabilities &= ~NOMMU_MAP_COPY;
ac714904 961 } else {
1da177e4
LT
962 /* we're going to read the file into private memory we
963 * allocate */
b4caecd4 964 if (!(capabilities & NOMMU_MAP_COPY))
1da177e4
LT
965 return -ENODEV;
966
967 /* we don't permit a private writable mapping to be
968 * shared with the backing device */
969 if (prot & PROT_WRITE)
b4caecd4 970 capabilities &= ~NOMMU_MAP_DIRECT;
1da177e4
LT
971 }
972
b4caecd4
CH
973 if (capabilities & NOMMU_MAP_DIRECT) {
974 if (((prot & PROT_READ) && !(capabilities & NOMMU_MAP_READ)) ||
975 ((prot & PROT_WRITE) && !(capabilities & NOMMU_MAP_WRITE)) ||
976 ((prot & PROT_EXEC) && !(capabilities & NOMMU_MAP_EXEC))
3c7b2045 977 ) {
b4caecd4 978 capabilities &= ~NOMMU_MAP_DIRECT;
3c7b2045 979 if (flags & MAP_SHARED) {
22cc877b 980 pr_warn("MAP_SHARED not completely supported on !MMU\n");
3c7b2045
BS
981 return -EINVAL;
982 }
983 }
984 }
985
1da177e4
LT
986 /* handle executable mappings and implied executable
987 * mappings */
90f8572b 988 if (path_noexec(&file->f_path)) {
1da177e4
LT
989 if (prot & PROT_EXEC)
990 return -EPERM;
ac714904 991 } else if ((prot & PROT_READ) && !(prot & PROT_EXEC)) {
1da177e4
LT
992 /* handle implication of PROT_EXEC by PROT_READ */
993 if (current->personality & READ_IMPLIES_EXEC) {
b4caecd4 994 if (capabilities & NOMMU_MAP_EXEC)
1da177e4
LT
995 prot |= PROT_EXEC;
996 }
ac714904 997 } else if ((prot & PROT_READ) &&
1da177e4 998 (prot & PROT_EXEC) &&
b4caecd4 999 !(capabilities & NOMMU_MAP_EXEC)
1da177e4
LT
1000 ) {
1001 /* backing file is not executable, try to copy */
b4caecd4 1002 capabilities &= ~NOMMU_MAP_DIRECT;
1da177e4 1003 }
ac714904 1004 } else {
1da177e4
LT
1005 /* anonymous mappings are always memory backed and can be
1006 * privately mapped
1007 */
b4caecd4 1008 capabilities = NOMMU_MAP_COPY;
1da177e4
LT
1009
1010 /* handle PROT_EXEC implication by PROT_READ */
1011 if ((prot & PROT_READ) &&
1012 (current->personality & READ_IMPLIES_EXEC))
1013 prot |= PROT_EXEC;
1014 }
1015
1016 /* allow the security API to have its say */
e5467859 1017 ret = security_mmap_addr(addr);
1da177e4
LT
1018 if (ret < 0)
1019 return ret;
1020
1021 /* looks okay */
1022 *_capabilities = capabilities;
1023 return 0;
1024}
1025
1026/*
1027 * we've determined that we can make the mapping, now translate what we
1028 * now know into VMA flags
1029 */
1030static unsigned long determine_vm_flags(struct file *file,
1031 unsigned long prot,
1032 unsigned long flags,
1033 unsigned long capabilities)
1034{
1035 unsigned long vm_flags;
1036
e6bfb709 1037 vm_flags = calc_vm_prot_bits(prot, 0) | calc_vm_flag_bits(flags);
1da177e4
LT
1038 /* vm_flags |= mm->def_flags; */
1039
b4caecd4 1040 if (!(capabilities & NOMMU_MAP_DIRECT)) {
1da177e4 1041 /* attempt to share read-only copies of mapped file chunks */
3c7b2045 1042 vm_flags |= VM_MAYREAD | VM_MAYWRITE | VM_MAYEXEC;
1da177e4
LT
1043 if (file && !(prot & PROT_WRITE))
1044 vm_flags |= VM_MAYSHARE;
3c7b2045 1045 } else {
1da177e4
LT
1046 /* overlay a shareable mapping on the backing device or inode
1047 * if possible - used for chardevs, ramfs/tmpfs/shmfs and
1048 * romfs/cramfs */
b4caecd4 1049 vm_flags |= VM_MAYSHARE | (capabilities & NOMMU_VMFLAGS);
1da177e4 1050 if (flags & MAP_SHARED)
3c7b2045 1051 vm_flags |= VM_SHARED;
1da177e4
LT
1052 }
1053
1054 /* refuse to let anyone share private mappings with this process if
1055 * it's being traced - otherwise breakpoints set in it may interfere
1056 * with another untraced process
1057 */
a288eecc 1058 if ((flags & MAP_PRIVATE) && current->ptrace)
1da177e4
LT
1059 vm_flags &= ~VM_MAYSHARE;
1060
1061 return vm_flags;
1062}
1063
1064/*
8feae131
DH
1065 * set up a shared mapping on a file (the driver or filesystem provides and
1066 * pins the storage)
1da177e4 1067 */
8feae131 1068static int do_mmap_shared_file(struct vm_area_struct *vma)
1da177e4
LT
1069{
1070 int ret;
1071
f74ac015 1072 ret = call_mmap(vma->vm_file, vma);
dd8632a1
PM
1073 if (ret == 0) {
1074 vma->vm_region->vm_top = vma->vm_region->vm_end;
645d83c5 1075 return 0;
dd8632a1 1076 }
1da177e4
LT
1077 if (ret != -ENOSYS)
1078 return ret;
1079
3fa30460
DH
1080 /* getting -ENOSYS indicates that direct mmap isn't possible (as
1081 * opposed to tried but failed) so we can only give a suitable error as
1082 * it's not possible to make a private copy if MAP_SHARED was given */
1da177e4
LT
1083 return -ENODEV;
1084}
1085
1086/*
1087 * set up a private mapping or an anonymous shared mapping
1088 */
8feae131
DH
1089static int do_mmap_private(struct vm_area_struct *vma,
1090 struct vm_region *region,
645d83c5
DH
1091 unsigned long len,
1092 unsigned long capabilities)
1da177e4 1093{
dbc8358c 1094 unsigned long total, point;
1da177e4 1095 void *base;
8feae131 1096 int ret, order;
1da177e4
LT
1097
1098 /* invoke the file's mapping function so that it can keep track of
1099 * shared mappings on devices or memory
1100 * - VM_MAYSHARE will be set if it may attempt to share
1101 */
b4caecd4 1102 if (capabilities & NOMMU_MAP_DIRECT) {
f74ac015 1103 ret = call_mmap(vma->vm_file, vma);
dd8632a1 1104 if (ret == 0) {
1da177e4 1105 /* shouldn't return success if we're not sharing */
dd8632a1
PM
1106 BUG_ON(!(vma->vm_flags & VM_MAYSHARE));
1107 vma->vm_region->vm_top = vma->vm_region->vm_end;
645d83c5 1108 return 0;
1da177e4 1109 }
dd8632a1
PM
1110 if (ret != -ENOSYS)
1111 return ret;
1da177e4
LT
1112
1113 /* getting an ENOSYS error indicates that direct mmap isn't
1114 * possible (as opposed to tried but failed) so we'll try to
1115 * make a private copy of the data and map that instead */
1116 }
1117
8feae131 1118
1da177e4
LT
1119 /* allocate some memory to hold the mapping
1120 * - note that this may not return a page-aligned address if the object
1121 * we're allocating is smaller than a page
1122 */
f67d9b15 1123 order = get_order(len);
8feae131 1124 total = 1 << order;
f67d9b15 1125 point = len >> PAGE_SHIFT;
dd8632a1 1126
dbc8358c 1127 /* we don't want to allocate a power-of-2 sized page set */
22cc877b 1128 if (sysctl_nr_trim_pages && total - point >= sysctl_nr_trim_pages)
dbc8358c 1129 total = point;
8feae131 1130
da616534 1131 base = alloc_pages_exact(total << PAGE_SHIFT, GFP_KERNEL);
dbc8358c
JK
1132 if (!base)
1133 goto enomem;
1134
1135 atomic_long_add(total, &mmap_pages_allocated);
1da177e4 1136
8feae131
DH
1137 region->vm_flags = vma->vm_flags |= VM_MAPPED_COPY;
1138 region->vm_start = (unsigned long) base;
f67d9b15 1139 region->vm_end = region->vm_start + len;
dd8632a1 1140 region->vm_top = region->vm_start + (total << PAGE_SHIFT);
8feae131
DH
1141
1142 vma->vm_start = region->vm_start;
1143 vma->vm_end = region->vm_start + len;
1da177e4
LT
1144
1145 if (vma->vm_file) {
1146 /* read the contents of a file into the copy */
1da177e4
LT
1147 loff_t fpos;
1148
1149 fpos = vma->vm_pgoff;
1150 fpos <<= PAGE_SHIFT;
1151
b4bf802a 1152 ret = kernel_read(vma->vm_file, base, len, &fpos);
1da177e4
LT
1153 if (ret < 0)
1154 goto error_free;
1155
1156 /* clear the last little bit */
f67d9b15
BL
1157 if (ret < len)
1158 memset(base + ret, 0, len - ret);
1da177e4 1159
1da177e4
LT
1160 }
1161
1162 return 0;
1163
1164error_free:
7223bb4a 1165 free_page_series(region->vm_start, region->vm_top);
8feae131
DH
1166 region->vm_start = vma->vm_start = 0;
1167 region->vm_end = vma->vm_end = 0;
dd8632a1 1168 region->vm_top = 0;
1da177e4
LT
1169 return ret;
1170
1171enomem:
b1de0d13 1172 pr_err("Allocation of length %lu from process %d (%s) failed\n",
05ae6fa3 1173 len, current->pid, current->comm);
9af744d7 1174 show_free_areas(0, NULL);
1da177e4
LT
1175 return -ENOMEM;
1176}
1177
1178/*
1179 * handle mapping creation for uClinux
1180 */
1fcfd8db
ON
1181unsigned long do_mmap(struct file *file,
1182 unsigned long addr,
1183 unsigned long len,
1184 unsigned long prot,
1185 unsigned long flags,
1186 vm_flags_t vm_flags,
1187 unsigned long pgoff,
897ab3e0
MR
1188 unsigned long *populate,
1189 struct list_head *uf)
1da177e4 1190{
8feae131
DH
1191 struct vm_area_struct *vma;
1192 struct vm_region *region;
1da177e4 1193 struct rb_node *rb;
1fcfd8db 1194 unsigned long capabilities, result;
1da177e4
LT
1195 int ret;
1196
41badc15 1197 *populate = 0;
bebeb3d6 1198
1da177e4
LT
1199 /* decide whether we should attempt the mapping, and if so what sort of
1200 * mapping */
1201 ret = validate_mmap_request(file, addr, len, prot, flags, pgoff,
1202 &capabilities);
22cc877b 1203 if (ret < 0)
1da177e4
LT
1204 return ret;
1205
06aab5a3
DH
1206 /* we ignore the address hint */
1207 addr = 0;
f67d9b15 1208 len = PAGE_ALIGN(len);
06aab5a3 1209
1da177e4
LT
1210 /* we've determined that we can make the mapping, now translate what we
1211 * now know into VMA flags */
1fcfd8db 1212 vm_flags |= determine_vm_flags(file, prot, flags, capabilities);
1da177e4 1213
8feae131
DH
1214 /* we're going to need to record the mapping */
1215 region = kmem_cache_zalloc(vm_region_jar, GFP_KERNEL);
1216 if (!region)
1217 goto error_getting_region;
1218
1219 vma = kmem_cache_zalloc(vm_area_cachep, GFP_KERNEL);
1220 if (!vma)
1221 goto error_getting_vma;
1da177e4 1222
1e2ae599 1223 region->vm_usage = 1;
8feae131
DH
1224 region->vm_flags = vm_flags;
1225 region->vm_pgoff = pgoff;
1226
5beb4930 1227 INIT_LIST_HEAD(&vma->anon_vma_chain);
8feae131
DH
1228 vma->vm_flags = vm_flags;
1229 vma->vm_pgoff = pgoff;
1da177e4 1230
8feae131 1231 if (file) {
cb0942b8
AV
1232 region->vm_file = get_file(file);
1233 vma->vm_file = get_file(file);
8feae131
DH
1234 }
1235
1236 down_write(&nommu_region_sem);
1237
1238 /* if we want to share, we need to check for regions created by other
1da177e4 1239 * mmap() calls that overlap with our proposed mapping
8feae131 1240 * - we can only share with a superset match on most regular files
1da177e4
LT
1241 * - shared mappings on character devices and memory backed files are
1242 * permitted to overlap inexactly as far as we are concerned for in
1243 * these cases, sharing is handled in the driver or filesystem rather
1244 * than here
1245 */
1246 if (vm_flags & VM_MAYSHARE) {
8feae131
DH
1247 struct vm_region *pregion;
1248 unsigned long pglen, rpglen, pgend, rpgend, start;
1da177e4 1249
8feae131
DH
1250 pglen = (len + PAGE_SIZE - 1) >> PAGE_SHIFT;
1251 pgend = pgoff + pglen;
165b2392 1252
8feae131
DH
1253 for (rb = rb_first(&nommu_region_tree); rb; rb = rb_next(rb)) {
1254 pregion = rb_entry(rb, struct vm_region, vm_rb);
1da177e4 1255
8feae131 1256 if (!(pregion->vm_flags & VM_MAYSHARE))
1da177e4
LT
1257 continue;
1258
1259 /* search for overlapping mappings on the same file */
496ad9aa
AV
1260 if (file_inode(pregion->vm_file) !=
1261 file_inode(file))
1da177e4
LT
1262 continue;
1263
8feae131 1264 if (pregion->vm_pgoff >= pgend)
1da177e4
LT
1265 continue;
1266
8feae131
DH
1267 rpglen = pregion->vm_end - pregion->vm_start;
1268 rpglen = (rpglen + PAGE_SIZE - 1) >> PAGE_SHIFT;
1269 rpgend = pregion->vm_pgoff + rpglen;
1270 if (pgoff >= rpgend)
1da177e4
LT
1271 continue;
1272
8feae131
DH
1273 /* handle inexactly overlapping matches between
1274 * mappings */
1275 if ((pregion->vm_pgoff != pgoff || rpglen != pglen) &&
1276 !(pgoff >= pregion->vm_pgoff && pgend <= rpgend)) {
1277 /* new mapping is not a subset of the region */
b4caecd4 1278 if (!(capabilities & NOMMU_MAP_DIRECT))
1da177e4
LT
1279 goto sharing_violation;
1280 continue;
1281 }
1282
8feae131 1283 /* we've found a region we can share */
1e2ae599 1284 pregion->vm_usage++;
8feae131
DH
1285 vma->vm_region = pregion;
1286 start = pregion->vm_start;
1287 start += (pgoff - pregion->vm_pgoff) << PAGE_SHIFT;
1288 vma->vm_start = start;
1289 vma->vm_end = start + len;
1290
22cc877b 1291 if (pregion->vm_flags & VM_MAPPED_COPY)
8feae131 1292 vma->vm_flags |= VM_MAPPED_COPY;
22cc877b 1293 else {
8feae131
DH
1294 ret = do_mmap_shared_file(vma);
1295 if (ret < 0) {
1296 vma->vm_region = NULL;
1297 vma->vm_start = 0;
1298 vma->vm_end = 0;
1e2ae599 1299 pregion->vm_usage--;
8feae131
DH
1300 pregion = NULL;
1301 goto error_just_free;
1302 }
1303 }
1304 fput(region->vm_file);
1305 kmem_cache_free(vm_region_jar, region);
1306 region = pregion;
1307 result = start;
1308 goto share;
1da177e4
LT
1309 }
1310
1da177e4
LT
1311 /* obtain the address at which to make a shared mapping
1312 * - this is the hook for quasi-memory character devices to
1313 * tell us the location of a shared mapping
1314 */
b4caecd4 1315 if (capabilities & NOMMU_MAP_DIRECT) {
1da177e4
LT
1316 addr = file->f_op->get_unmapped_area(file, addr, len,
1317 pgoff, flags);
bb005a59 1318 if (IS_ERR_VALUE(addr)) {
1da177e4 1319 ret = addr;
bb005a59 1320 if (ret != -ENOSYS)
8feae131 1321 goto error_just_free;
1da177e4
LT
1322
1323 /* the driver refused to tell us where to site
1324 * the mapping so we'll have to attempt to copy
1325 * it */
bb005a59 1326 ret = -ENODEV;
b4caecd4 1327 if (!(capabilities & NOMMU_MAP_COPY))
8feae131 1328 goto error_just_free;
1da177e4 1329
b4caecd4 1330 capabilities &= ~NOMMU_MAP_DIRECT;
8feae131
DH
1331 } else {
1332 vma->vm_start = region->vm_start = addr;
1333 vma->vm_end = region->vm_end = addr + len;
1da177e4
LT
1334 }
1335 }
1336 }
1337
8feae131 1338 vma->vm_region = region;
1da177e4 1339
645d83c5 1340 /* set up the mapping
b4caecd4 1341 * - the region is filled in if NOMMU_MAP_DIRECT is still set
645d83c5 1342 */
1da177e4 1343 if (file && vma->vm_flags & VM_SHARED)
8feae131 1344 ret = do_mmap_shared_file(vma);
1da177e4 1345 else
645d83c5 1346 ret = do_mmap_private(vma, region, len, capabilities);
1da177e4 1347 if (ret < 0)
645d83c5
DH
1348 goto error_just_free;
1349 add_nommu_region(region);
8feae131 1350
ea637639
JZ
1351 /* clear anonymous mappings that don't ask for uninitialized data */
1352 if (!vma->vm_file && !(flags & MAP_UNINITIALIZED))
1353 memset((void *)region->vm_start, 0,
1354 region->vm_end - region->vm_start);
1355
1da177e4 1356 /* okay... we have a mapping; now we have to register it */
8feae131 1357 result = vma->vm_start;
1da177e4 1358
1da177e4
LT
1359 current->mm->total_vm += len >> PAGE_SHIFT;
1360
8feae131
DH
1361share:
1362 add_vma_to_mm(current->mm, vma);
1da177e4 1363
cfe79c00
MF
1364 /* we flush the region from the icache only when the first executable
1365 * mapping of it is made */
1366 if (vma->vm_flags & VM_EXEC && !region->vm_icache_flushed) {
1367 flush_icache_range(region->vm_start, region->vm_end);
1368 region->vm_icache_flushed = true;
1369 }
1da177e4 1370
cfe79c00 1371 up_write(&nommu_region_sem);
1da177e4 1372
8feae131 1373 return result;
1da177e4 1374
8feae131
DH
1375error_just_free:
1376 up_write(&nommu_region_sem);
1377error:
89a86402
DH
1378 if (region->vm_file)
1379 fput(region->vm_file);
8feae131 1380 kmem_cache_free(vm_region_jar, region);
89a86402
DH
1381 if (vma->vm_file)
1382 fput(vma->vm_file);
8feae131 1383 kmem_cache_free(vm_area_cachep, vma);
8feae131
DH
1384 return ret;
1385
1386sharing_violation:
1387 up_write(&nommu_region_sem);
22cc877b 1388 pr_warn("Attempt to share mismatched mappings\n");
8feae131
DH
1389 ret = -EINVAL;
1390 goto error;
1da177e4 1391
8feae131
DH
1392error_getting_vma:
1393 kmem_cache_free(vm_region_jar, region);
22cc877b
LR
1394 pr_warn("Allocation of vma for %lu byte allocation from process %d failed\n",
1395 len, current->pid);
9af744d7 1396 show_free_areas(0, NULL);
1da177e4
LT
1397 return -ENOMEM;
1398
8feae131 1399error_getting_region:
22cc877b
LR
1400 pr_warn("Allocation of vm region for %lu byte allocation from process %d failed\n",
1401 len, current->pid);
9af744d7 1402 show_free_areas(0, NULL);
1da177e4
LT
1403 return -ENOMEM;
1404}
6be5ceb0 1405
a90f590a
DB
1406unsigned long ksys_mmap_pgoff(unsigned long addr, unsigned long len,
1407 unsigned long prot, unsigned long flags,
1408 unsigned long fd, unsigned long pgoff)
66f0dc48
HD
1409{
1410 struct file *file = NULL;
1411 unsigned long retval = -EBADF;
1412
120a795d 1413 audit_mmap_fd(fd, flags);
66f0dc48
HD
1414 if (!(flags & MAP_ANONYMOUS)) {
1415 file = fget(fd);
1416 if (!file)
1417 goto out;
1418 }
1419
1420 flags &= ~(MAP_EXECUTABLE | MAP_DENYWRITE);
1421
ad1ed293 1422 retval = vm_mmap_pgoff(file, addr, len, prot, flags, pgoff);
66f0dc48
HD
1423
1424 if (file)
1425 fput(file);
1426out:
1427 return retval;
1428}
1429
a90f590a
DB
1430SYSCALL_DEFINE6(mmap_pgoff, unsigned long, addr, unsigned long, len,
1431 unsigned long, prot, unsigned long, flags,
1432 unsigned long, fd, unsigned long, pgoff)
1433{
1434 return ksys_mmap_pgoff(addr, len, prot, flags, fd, pgoff);
1435}
1436
a4679373
CH
1437#ifdef __ARCH_WANT_SYS_OLD_MMAP
1438struct mmap_arg_struct {
1439 unsigned long addr;
1440 unsigned long len;
1441 unsigned long prot;
1442 unsigned long flags;
1443 unsigned long fd;
1444 unsigned long offset;
1445};
1446
1447SYSCALL_DEFINE1(old_mmap, struct mmap_arg_struct __user *, arg)
1448{
1449 struct mmap_arg_struct a;
1450
1451 if (copy_from_user(&a, arg, sizeof(a)))
1452 return -EFAULT;
1824cb75 1453 if (offset_in_page(a.offset))
a4679373
CH
1454 return -EINVAL;
1455
a90f590a
DB
1456 return ksys_mmap_pgoff(a.addr, a.len, a.prot, a.flags, a.fd,
1457 a.offset >> PAGE_SHIFT);
a4679373
CH
1458}
1459#endif /* __ARCH_WANT_SYS_OLD_MMAP */
1460
1da177e4 1461/*
8feae131
DH
1462 * split a vma into two pieces at address 'addr', a new vma is allocated either
1463 * for the first part or the tail.
1da177e4 1464 */
8feae131
DH
1465int split_vma(struct mm_struct *mm, struct vm_area_struct *vma,
1466 unsigned long addr, int new_below)
1da177e4 1467{
8feae131
DH
1468 struct vm_area_struct *new;
1469 struct vm_region *region;
1470 unsigned long npages;
1da177e4 1471
779c1023
DH
1472 /* we're only permitted to split anonymous regions (these should have
1473 * only a single usage on the region) */
1474 if (vma->vm_file)
8feae131 1475 return -ENOMEM;
1da177e4 1476
8feae131
DH
1477 if (mm->map_count >= sysctl_max_map_count)
1478 return -ENOMEM;
1da177e4 1479
8feae131
DH
1480 region = kmem_cache_alloc(vm_region_jar, GFP_KERNEL);
1481 if (!region)
1482 return -ENOMEM;
1da177e4 1483
8feae131
DH
1484 new = kmem_cache_alloc(vm_area_cachep, GFP_KERNEL);
1485 if (!new) {
1486 kmem_cache_free(vm_region_jar, region);
1487 return -ENOMEM;
1488 }
1489
1490 /* most fields are the same, copy all, and then fixup */
1491 *new = *vma;
1492 *region = *vma->vm_region;
1493 new->vm_region = region;
1494
1495 npages = (addr - vma->vm_start) >> PAGE_SHIFT;
1496
1497 if (new_below) {
dd8632a1 1498 region->vm_top = region->vm_end = new->vm_end = addr;
8feae131
DH
1499 } else {
1500 region->vm_start = new->vm_start = addr;
1501 region->vm_pgoff = new->vm_pgoff += npages;
1da177e4 1502 }
8feae131
DH
1503
1504 if (new->vm_ops && new->vm_ops->open)
1505 new->vm_ops->open(new);
1506
1507 delete_vma_from_mm(vma);
1508 down_write(&nommu_region_sem);
1509 delete_nommu_region(vma->vm_region);
1510 if (new_below) {
1511 vma->vm_region->vm_start = vma->vm_start = addr;
1512 vma->vm_region->vm_pgoff = vma->vm_pgoff += npages;
1513 } else {
1514 vma->vm_region->vm_end = vma->vm_end = addr;
dd8632a1 1515 vma->vm_region->vm_top = addr;
8feae131
DH
1516 }
1517 add_nommu_region(vma->vm_region);
1518 add_nommu_region(new->vm_region);
1519 up_write(&nommu_region_sem);
1520 add_vma_to_mm(mm, vma);
1521 add_vma_to_mm(mm, new);
1522 return 0;
1da177e4
LT
1523}
1524
3034097a 1525/*
8feae131
DH
1526 * shrink a VMA by removing the specified chunk from either the beginning or
1527 * the end
3034097a 1528 */
8feae131
DH
1529static int shrink_vma(struct mm_struct *mm,
1530 struct vm_area_struct *vma,
1531 unsigned long from, unsigned long to)
1da177e4 1532{
8feae131 1533 struct vm_region *region;
1da177e4 1534
8feae131
DH
1535 /* adjust the VMA's pointers, which may reposition it in the MM's tree
1536 * and list */
1537 delete_vma_from_mm(vma);
1538 if (from > vma->vm_start)
1539 vma->vm_end = from;
1540 else
1541 vma->vm_start = to;
1542 add_vma_to_mm(mm, vma);
1da177e4 1543
8feae131
DH
1544 /* cut the backing region down to size */
1545 region = vma->vm_region;
1e2ae599 1546 BUG_ON(region->vm_usage != 1);
8feae131
DH
1547
1548 down_write(&nommu_region_sem);
1549 delete_nommu_region(region);
dd8632a1
PM
1550 if (from > region->vm_start) {
1551 to = region->vm_top;
1552 region->vm_top = region->vm_end = from;
1553 } else {
8feae131 1554 region->vm_start = to;
dd8632a1 1555 }
8feae131
DH
1556 add_nommu_region(region);
1557 up_write(&nommu_region_sem);
1558
1559 free_page_series(from, to);
1560 return 0;
1561}
1da177e4 1562
8feae131
DH
1563/*
1564 * release a mapping
1565 * - under NOMMU conditions the chunk to be unmapped must be backed by a single
1566 * VMA, though it need not cover the whole VMA
1567 */
897ab3e0 1568int do_munmap(struct mm_struct *mm, unsigned long start, size_t len, struct list_head *uf)
8feae131
DH
1569{
1570 struct vm_area_struct *vma;
f67d9b15 1571 unsigned long end;
8feae131 1572 int ret;
1da177e4 1573
f67d9b15 1574 len = PAGE_ALIGN(len);
8feae131
DH
1575 if (len == 0)
1576 return -EINVAL;
365e9c87 1577
f67d9b15
BL
1578 end = start + len;
1579
8feae131
DH
1580 /* find the first potentially overlapping VMA */
1581 vma = find_vma(mm, start);
1582 if (!vma) {
ac714904 1583 static int limit;
33e5d769 1584 if (limit < 5) {
22cc877b
LR
1585 pr_warn("munmap of memory not mmapped by process %d (%s): 0x%lx-0x%lx\n",
1586 current->pid, current->comm,
1587 start, start + len - 1);
33e5d769
DH
1588 limit++;
1589 }
8feae131
DH
1590 return -EINVAL;
1591 }
1da177e4 1592
8feae131
DH
1593 /* we're allowed to split an anonymous VMA but not a file-backed one */
1594 if (vma->vm_file) {
1595 do {
22cc877b 1596 if (start > vma->vm_start)
8feae131 1597 return -EINVAL;
8feae131
DH
1598 if (end == vma->vm_end)
1599 goto erase_whole_vma;
d75a310c
NK
1600 vma = vma->vm_next;
1601 } while (vma);
8feae131
DH
1602 return -EINVAL;
1603 } else {
1604 /* the chunk must be a subset of the VMA found */
1605 if (start == vma->vm_start && end == vma->vm_end)
1606 goto erase_whole_vma;
22cc877b 1607 if (start < vma->vm_start || end > vma->vm_end)
8feae131 1608 return -EINVAL;
1824cb75 1609 if (offset_in_page(start))
8feae131 1610 return -EINVAL;
1824cb75 1611 if (end != vma->vm_end && offset_in_page(end))
8feae131 1612 return -EINVAL;
8feae131
DH
1613 if (start != vma->vm_start && end != vma->vm_end) {
1614 ret = split_vma(mm, vma, start, 1);
22cc877b 1615 if (ret < 0)
8feae131 1616 return ret;
8feae131
DH
1617 }
1618 return shrink_vma(mm, vma, start, end);
1619 }
1da177e4 1620
8feae131
DH
1621erase_whole_vma:
1622 delete_vma_from_mm(vma);
1623 delete_vma(mm, vma);
1da177e4
LT
1624 return 0;
1625}
b5073173 1626EXPORT_SYMBOL(do_munmap);
1da177e4 1627
bfce281c 1628int vm_munmap(unsigned long addr, size_t len)
3034097a 1629{
bfce281c 1630 struct mm_struct *mm = current->mm;
3034097a 1631 int ret;
3034097a
DH
1632
1633 down_write(&mm->mmap_sem);
897ab3e0 1634 ret = do_munmap(mm, addr, len, NULL);
3034097a
DH
1635 up_write(&mm->mmap_sem);
1636 return ret;
1637}
a46ef99d
LT
1638EXPORT_SYMBOL(vm_munmap);
1639
1640SYSCALL_DEFINE2(munmap, unsigned long, addr, size_t, len)
1641{
bfce281c 1642 return vm_munmap(addr, len);
a46ef99d 1643}
3034097a
DH
1644
1645/*
8feae131 1646 * release all the mappings made in a process's VM space
3034097a 1647 */
8feae131 1648void exit_mmap(struct mm_struct *mm)
1da177e4 1649{
8feae131 1650 struct vm_area_struct *vma;
1da177e4 1651
8feae131
DH
1652 if (!mm)
1653 return;
1da177e4 1654
8feae131 1655 mm->total_vm = 0;
1da177e4 1656
8feae131
DH
1657 while ((vma = mm->mmap)) {
1658 mm->mmap = vma->vm_next;
1659 delete_vma_from_mm(vma);
1660 delete_vma(mm, vma);
04c34961 1661 cond_resched();
1da177e4
LT
1662 }
1663}
1664
5d22fc25 1665int vm_brk(unsigned long addr, unsigned long len)
1da177e4
LT
1666{
1667 return -ENOMEM;
1668}
1669
1670/*
6fa5f80b
DH
1671 * expand (or shrink) an existing mapping, potentially moving it at the same
1672 * time (controlled by the MREMAP_MAYMOVE flag and available VM space)
1da177e4 1673 *
6fa5f80b 1674 * under NOMMU conditions, we only permit changing a mapping's size, and only
8feae131
DH
1675 * as long as it stays within the region allocated by do_mmap_private() and the
1676 * block is not shareable
1da177e4 1677 *
6fa5f80b 1678 * MREMAP_FIXED is not supported under NOMMU conditions
1da177e4 1679 */
4b377bab 1680static unsigned long do_mremap(unsigned long addr,
1da177e4
LT
1681 unsigned long old_len, unsigned long new_len,
1682 unsigned long flags, unsigned long new_addr)
1683{
6fa5f80b 1684 struct vm_area_struct *vma;
1da177e4
LT
1685
1686 /* insanity checks first */
f67d9b15
BL
1687 old_len = PAGE_ALIGN(old_len);
1688 new_len = PAGE_ALIGN(new_len);
8feae131 1689 if (old_len == 0 || new_len == 0)
1da177e4
LT
1690 return (unsigned long) -EINVAL;
1691
1824cb75 1692 if (offset_in_page(addr))
8feae131
DH
1693 return -EINVAL;
1694
1da177e4
LT
1695 if (flags & MREMAP_FIXED && new_addr != addr)
1696 return (unsigned long) -EINVAL;
1697
8feae131 1698 vma = find_vma_exact(current->mm, addr, old_len);
6fa5f80b
DH
1699 if (!vma)
1700 return (unsigned long) -EINVAL;
1da177e4 1701
6fa5f80b 1702 if (vma->vm_end != vma->vm_start + old_len)
1da177e4
LT
1703 return (unsigned long) -EFAULT;
1704
6fa5f80b 1705 if (vma->vm_flags & VM_MAYSHARE)
1da177e4
LT
1706 return (unsigned long) -EPERM;
1707
8feae131 1708 if (new_len > vma->vm_region->vm_end - vma->vm_region->vm_start)
1da177e4
LT
1709 return (unsigned long) -ENOMEM;
1710
1711 /* all checks complete - do it */
6fa5f80b 1712 vma->vm_end = vma->vm_start + new_len;
6fa5f80b
DH
1713 return vma->vm_start;
1714}
1715
6a6160a7
HC
1716SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len,
1717 unsigned long, new_len, unsigned long, flags,
1718 unsigned long, new_addr)
6fa5f80b
DH
1719{
1720 unsigned long ret;
1721
1722 down_write(&current->mm->mmap_sem);
1723 ret = do_mremap(addr, old_len, new_len, flags, new_addr);
1724 up_write(&current->mm->mmap_sem);
1725 return ret;
1da177e4
LT
1726}
1727
240aadee
ML
1728struct page *follow_page_mask(struct vm_area_struct *vma,
1729 unsigned long address, unsigned int flags,
1730 unsigned int *page_mask)
1da177e4 1731{
240aadee 1732 *page_mask = 0;
1da177e4
LT
1733 return NULL;
1734}
1735
8f3b1327
BL
1736int remap_pfn_range(struct vm_area_struct *vma, unsigned long addr,
1737 unsigned long pfn, unsigned long size, pgprot_t prot)
1da177e4 1738{
8f3b1327
BL
1739 if (addr != (pfn << PAGE_SHIFT))
1740 return -EINVAL;
1741
314e51b9 1742 vma->vm_flags |= VM_IO | VM_PFNMAP | VM_DONTEXPAND | VM_DONTDUMP;
66aa2b4b 1743 return 0;
1da177e4 1744}
22c4af40 1745EXPORT_SYMBOL(remap_pfn_range);
1da177e4 1746
3c0b9de6
LT
1747int vm_iomap_memory(struct vm_area_struct *vma, phys_addr_t start, unsigned long len)
1748{
1749 unsigned long pfn = start >> PAGE_SHIFT;
1750 unsigned long vm_len = vma->vm_end - vma->vm_start;
1751
1752 pfn += vma->vm_pgoff;
1753 return io_remap_pfn_range(vma, vma->vm_start, pfn, vm_len, vma->vm_page_prot);
1754}
1755EXPORT_SYMBOL(vm_iomap_memory);
1756
f905bc44
PM
1757int remap_vmalloc_range(struct vm_area_struct *vma, void *addr,
1758 unsigned long pgoff)
1759{
1760 unsigned int size = vma->vm_end - vma->vm_start;
1761
1762 if (!(vma->vm_flags & VM_USERMAP))
1763 return -EINVAL;
1764
1765 vma->vm_start = (unsigned long)(addr + (pgoff << PAGE_SHIFT));
1766 vma->vm_end = vma->vm_start + size;
1767
1768 return 0;
1769}
1770EXPORT_SYMBOL(remap_vmalloc_range);
1771
1da177e4
LT
1772unsigned long arch_get_unmapped_area(struct file *file, unsigned long addr,
1773 unsigned long len, unsigned long pgoff, unsigned long flags)
1774{
1775 return -ENOMEM;
1776}
1777
11bac800 1778int filemap_fault(struct vm_fault *vmf)
b0e15190
DH
1779{
1780 BUG();
d0217ac0 1781 return 0;
b0e15190 1782}
b5073173 1783EXPORT_SYMBOL(filemap_fault);
0ec76a11 1784
82b0f8c3 1785void filemap_map_pages(struct vm_fault *vmf,
bae473a4 1786 pgoff_t start_pgoff, pgoff_t end_pgoff)
f1820361
KS
1787{
1788 BUG();
1789}
1790EXPORT_SYMBOL(filemap_map_pages);
1791
84d77d3f 1792int __access_remote_vm(struct task_struct *tsk, struct mm_struct *mm,
442486ec 1793 unsigned long addr, void *buf, int len, unsigned int gup_flags)
0ec76a11 1794{
0ec76a11 1795 struct vm_area_struct *vma;
442486ec 1796 int write = gup_flags & FOLL_WRITE;
0ec76a11
DH
1797
1798 down_read(&mm->mmap_sem);
1799
1800 /* the access must start within one of the target process's mappings */
0159b141
DH
1801 vma = find_vma(mm, addr);
1802 if (vma) {
0ec76a11
DH
1803 /* don't overrun this mapping */
1804 if (addr + len >= vma->vm_end)
1805 len = vma->vm_end - addr;
1806
1807 /* only read or write mappings where it is permitted */
d00c7b99 1808 if (write && vma->vm_flags & VM_MAYWRITE)
7959722b
JZ
1809 copy_to_user_page(vma, NULL, addr,
1810 (void *) addr, buf, len);
d00c7b99 1811 else if (!write && vma->vm_flags & VM_MAYREAD)
7959722b
JZ
1812 copy_from_user_page(vma, NULL, addr,
1813 buf, (void *) addr, len);
0ec76a11
DH
1814 else
1815 len = 0;
1816 } else {
1817 len = 0;
1818 }
1819
1820 up_read(&mm->mmap_sem);
f55f199b
MF
1821
1822 return len;
1823}
1824
1825/**
b7701a5f 1826 * access_remote_vm - access another process' address space
f55f199b
MF
1827 * @mm: the mm_struct of the target address space
1828 * @addr: start address to access
1829 * @buf: source or destination buffer
1830 * @len: number of bytes to transfer
6347e8d5 1831 * @gup_flags: flags modifying lookup behaviour
f55f199b
MF
1832 *
1833 * The caller must hold a reference on @mm.
1834 */
1835int access_remote_vm(struct mm_struct *mm, unsigned long addr,
6347e8d5 1836 void *buf, int len, unsigned int gup_flags)
f55f199b 1837{
6347e8d5 1838 return __access_remote_vm(NULL, mm, addr, buf, len, gup_flags);
f55f199b
MF
1839}
1840
1841/*
1842 * Access another process' address space.
1843 * - source/target buffer must be kernel space
1844 */
f307ab6d
LS
1845int access_process_vm(struct task_struct *tsk, unsigned long addr, void *buf, int len,
1846 unsigned int gup_flags)
f55f199b
MF
1847{
1848 struct mm_struct *mm;
1849
1850 if (addr + len < addr)
1851 return 0;
1852
1853 mm = get_task_mm(tsk);
1854 if (!mm)
1855 return 0;
1856
f307ab6d 1857 len = __access_remote_vm(tsk, mm, addr, buf, len, gup_flags);
f55f199b 1858
0ec76a11
DH
1859 mmput(mm);
1860 return len;
1861}
fcd35857 1862EXPORT_SYMBOL_GPL(access_process_vm);
7e660872
DH
1863
1864/**
1865 * nommu_shrink_inode_mappings - Shrink the shared mappings on an inode
1866 * @inode: The inode to check
1867 * @size: The current filesize of the inode
1868 * @newsize: The proposed filesize of the inode
1869 *
1870 * Check the shared mappings on an inode on behalf of a shrinking truncate to
1871 * make sure that that any outstanding VMAs aren't broken and then shrink the
1872 * vm_regions that extend that beyond so that do_mmap_pgoff() doesn't
1873 * automatically grant mappings that are too large.
1874 */
1875int nommu_shrink_inode_mappings(struct inode *inode, size_t size,
1876 size_t newsize)
1877{
1878 struct vm_area_struct *vma;
7e660872
DH
1879 struct vm_region *region;
1880 pgoff_t low, high;
1881 size_t r_size, r_top;
1882
1883 low = newsize >> PAGE_SHIFT;
1884 high = (size + PAGE_SIZE - 1) >> PAGE_SHIFT;
1885
1886 down_write(&nommu_region_sem);
1acf2e04 1887 i_mmap_lock_read(inode->i_mapping);
7e660872
DH
1888
1889 /* search for VMAs that fall within the dead zone */
6b2dbba8 1890 vma_interval_tree_foreach(vma, &inode->i_mapping->i_mmap, low, high) {
7e660872
DH
1891 /* found one - only interested if it's shared out of the page
1892 * cache */
1893 if (vma->vm_flags & VM_SHARED) {
1acf2e04 1894 i_mmap_unlock_read(inode->i_mapping);
7e660872
DH
1895 up_write(&nommu_region_sem);
1896 return -ETXTBSY; /* not quite true, but near enough */
1897 }
1898 }
1899
1900 /* reduce any regions that overlap the dead zone - if in existence,
1901 * these will be pointed to by VMAs that don't overlap the dead zone
1902 *
1903 * we don't check for any regions that start beyond the EOF as there
1904 * shouldn't be any
1905 */
1acf2e04 1906 vma_interval_tree_foreach(vma, &inode->i_mapping->i_mmap, 0, ULONG_MAX) {
7e660872
DH
1907 if (!(vma->vm_flags & VM_SHARED))
1908 continue;
1909
1910 region = vma->vm_region;
1911 r_size = region->vm_top - region->vm_start;
1912 r_top = (region->vm_pgoff << PAGE_SHIFT) + r_size;
1913
1914 if (r_top > newsize) {
1915 region->vm_top -= r_top - newsize;
1916 if (region->vm_end > region->vm_top)
1917 region->vm_end = region->vm_top;
1918 }
1919 }
1920
1acf2e04 1921 i_mmap_unlock_read(inode->i_mapping);
7e660872
DH
1922 up_write(&nommu_region_sem);
1923 return 0;
1924}
c9b1d098
AS
1925
1926/*
1927 * Initialise sysctl_user_reserve_kbytes.
1928 *
1929 * This is intended to prevent a user from starting a single memory hogging
1930 * process, such that they cannot recover (kill the hog) in OVERCOMMIT_NEVER
1931 * mode.
1932 *
1933 * The default value is min(3% of free memory, 128MB)
1934 * 128MB is enough to recover with sshd/login, bash, and top/kill.
1935 */
1936static int __meminit init_user_reserve(void)
1937{
1938 unsigned long free_kbytes;
1939
c41f012a 1940 free_kbytes = global_zone_page_state(NR_FREE_PAGES) << (PAGE_SHIFT - 10);
c9b1d098
AS
1941
1942 sysctl_user_reserve_kbytes = min(free_kbytes / 32, 1UL << 17);
1943 return 0;
1944}
a4bc6fc7 1945subsys_initcall(init_user_reserve);
4eeab4f5
AS
1946
1947/*
1948 * Initialise sysctl_admin_reserve_kbytes.
1949 *
1950 * The purpose of sysctl_admin_reserve_kbytes is to allow the sys admin
1951 * to log in and kill a memory hogging process.
1952 *
1953 * Systems with more than 256MB will reserve 8MB, enough to recover
1954 * with sshd, bash, and top in OVERCOMMIT_GUESS. Smaller systems will
1955 * only reserve 3% of free pages by default.
1956 */
1957static int __meminit init_admin_reserve(void)
1958{
1959 unsigned long free_kbytes;
1960
c41f012a 1961 free_kbytes = global_zone_page_state(NR_FREE_PAGES) << (PAGE_SHIFT - 10);
4eeab4f5
AS
1962
1963 sysctl_admin_reserve_kbytes = min(free_kbytes / 32, 1UL << 13);
1964 return 0;
1965}
a4bc6fc7 1966subsys_initcall(init_admin_reserve);