mm/gup: sanity-check with CONFIG_DEBUG_VM that anonymous pages are exclusive when...
[linux-block.git] / mm / rmap.c
CommitLineData
1da177e4
LT
1/*
2 * mm/rmap.c - physical to virtual reverse mappings
3 *
4 * Copyright 2001, Rik van Riel <riel@conectiva.com.br>
5 * Released under the General Public License (GPL).
6 *
7 * Simple, low overhead reverse mapping scheme.
8 * Please try to keep this thing as modular as possible.
9 *
10 * Provides methods for unmapping each kind of mapped page:
11 * the anon methods track anonymous pages, and
12 * the file methods track pages belonging to an inode.
13 *
14 * Original design by Rik van Riel <riel@conectiva.com.br> 2001
15 * File methods by Dave McCracken <dmccr@us.ibm.com> 2003, 2004
16 * Anonymous methods by Andrea Arcangeli <andrea@suse.de> 2004
98f32602 17 * Contributions by Hugh Dickins 2003, 2004
1da177e4
LT
18 */
19
20/*
21 * Lock ordering in mm:
22 *
9608703e 23 * inode->i_rwsem (while writing or truncating, not reading or faulting)
c1e8d7c6 24 * mm->mmap_lock
730633f0
JK
25 * mapping->invalidate_lock (in filemap_fault)
26 * page->flags PG_locked (lock_page) * (see hugetlbfs below)
27 * hugetlbfs_i_mmap_rwsem_key (in huge_pmd_share)
28 * mapping->i_mmap_rwsem
29 * hugetlb_fault_mutex (hugetlbfs specific page fault mutex)
30 * anon_vma->rwsem
31 * mm->page_table_lock or pte_lock
32 * swap_lock (in swap_duplicate, swap_info_get)
33 * mmlist_lock (in mmput, drain_mmlist and others)
e621900a
MWO
34 * mapping->private_lock (in block_dirty_folio)
35 * folio_lock_memcg move_lock (in block_dirty_folio)
730633f0 36 * i_pages lock (widely used)
e809c3fe 37 * lruvec->lru_lock (in folio_lruvec_lock_irq)
730633f0
JK
38 * inode->i_lock (in set_page_dirty's __mark_inode_dirty)
39 * bdi.wb->list_lock (in set_page_dirty's __mark_inode_dirty)
40 * sb_lock (within inode_lock in fs/fs-writeback.c)
41 * i_pages lock (widely used, in set_page_dirty,
42 * in arch-dependent flush_dcache_mmap_lock,
43 * within bdi.wb->list_lock in __sync_single_inode)
6a46079c 44 *
9608703e 45 * anon_vma->rwsem,mapping->i_mmap_rwsem (memory_failure, collect_procs_anon)
9b679320 46 * ->tasklist_lock
6a46079c 47 * pte map lock
c0d0381a
MK
48 *
49 * * hugetlbfs PageHuge() pages take locks in this order:
50 * mapping->i_mmap_rwsem
51 * hugetlb_fault_mutex (hugetlbfs specific page fault mutex)
52 * page->flags PG_locked (lock_page)
1da177e4
LT
53 */
54
55#include <linux/mm.h>
6e84f315 56#include <linux/sched/mm.h>
29930025 57#include <linux/sched/task.h>
1da177e4
LT
58#include <linux/pagemap.h>
59#include <linux/swap.h>
60#include <linux/swapops.h>
61#include <linux/slab.h>
62#include <linux/init.h>
5ad64688 63#include <linux/ksm.h>
1da177e4
LT
64#include <linux/rmap.h>
65#include <linux/rcupdate.h>
b95f1b31 66#include <linux/export.h>
8a9f3ccd 67#include <linux/memcontrol.h>
cddb8a5c 68#include <linux/mmu_notifier.h>
64cdd548 69#include <linux/migrate.h>
0fe6e20b 70#include <linux/hugetlb.h>
444f84fd 71#include <linux/huge_mm.h>
ef5d437f 72#include <linux/backing-dev.h>
33c3fc71 73#include <linux/page_idle.h>
a5430dda 74#include <linux/memremap.h>
bce73e48 75#include <linux/userfaultfd_k.h>
1da177e4
LT
76
77#include <asm/tlbflush.h>
78
4cc79b33 79#define CREATE_TRACE_POINTS
72b252ae 80#include <trace/events/tlb.h>
4cc79b33 81#include <trace/events/migrate.h>
72b252ae 82
b291f000
NP
83#include "internal.h"
84
fdd2e5f8 85static struct kmem_cache *anon_vma_cachep;
5beb4930 86static struct kmem_cache *anon_vma_chain_cachep;
fdd2e5f8
AB
87
88static inline struct anon_vma *anon_vma_alloc(void)
89{
01d8b20d
PZ
90 struct anon_vma *anon_vma;
91
92 anon_vma = kmem_cache_alloc(anon_vma_cachep, GFP_KERNEL);
93 if (anon_vma) {
94 atomic_set(&anon_vma->refcount, 1);
7a3ef208
KK
95 anon_vma->degree = 1; /* Reference for first vma */
96 anon_vma->parent = anon_vma;
01d8b20d
PZ
97 /*
98 * Initialise the anon_vma root to point to itself. If called
99 * from fork, the root will be reset to the parents anon_vma.
100 */
101 anon_vma->root = anon_vma;
102 }
103
104 return anon_vma;
fdd2e5f8
AB
105}
106
01d8b20d 107static inline void anon_vma_free(struct anon_vma *anon_vma)
fdd2e5f8 108{
01d8b20d 109 VM_BUG_ON(atomic_read(&anon_vma->refcount));
88c22088
PZ
110
111 /*
2f031c6f 112 * Synchronize against folio_lock_anon_vma_read() such that
88c22088
PZ
113 * we can safely hold the lock without the anon_vma getting
114 * freed.
115 *
116 * Relies on the full mb implied by the atomic_dec_and_test() from
117 * put_anon_vma() against the acquire barrier implied by
2f031c6f 118 * down_read_trylock() from folio_lock_anon_vma_read(). This orders:
88c22088 119 *
2f031c6f 120 * folio_lock_anon_vma_read() VS put_anon_vma()
4fc3f1d6 121 * down_read_trylock() atomic_dec_and_test()
88c22088 122 * LOCK MB
4fc3f1d6 123 * atomic_read() rwsem_is_locked()
88c22088
PZ
124 *
125 * LOCK should suffice since the actual taking of the lock must
126 * happen _before_ what follows.
127 */
7f39dda9 128 might_sleep();
5a505085 129 if (rwsem_is_locked(&anon_vma->root->rwsem)) {
4fc3f1d6 130 anon_vma_lock_write(anon_vma);
08b52706 131 anon_vma_unlock_write(anon_vma);
88c22088
PZ
132 }
133
fdd2e5f8
AB
134 kmem_cache_free(anon_vma_cachep, anon_vma);
135}
1da177e4 136
dd34739c 137static inline struct anon_vma_chain *anon_vma_chain_alloc(gfp_t gfp)
5beb4930 138{
dd34739c 139 return kmem_cache_alloc(anon_vma_chain_cachep, gfp);
5beb4930
RR
140}
141
e574b5fd 142static void anon_vma_chain_free(struct anon_vma_chain *anon_vma_chain)
5beb4930
RR
143{
144 kmem_cache_free(anon_vma_chain_cachep, anon_vma_chain);
145}
146
6583a843
KC
147static void anon_vma_chain_link(struct vm_area_struct *vma,
148 struct anon_vma_chain *avc,
149 struct anon_vma *anon_vma)
150{
151 avc->vma = vma;
152 avc->anon_vma = anon_vma;
153 list_add(&avc->same_vma, &vma->anon_vma_chain);
bf181b9f 154 anon_vma_interval_tree_insert(avc, &anon_vma->rb_root);
6583a843
KC
155}
156
d9d332e0 157/**
d5a187da 158 * __anon_vma_prepare - attach an anon_vma to a memory region
d9d332e0
LT
159 * @vma: the memory region in question
160 *
161 * This makes sure the memory mapping described by 'vma' has
162 * an 'anon_vma' attached to it, so that we can associate the
163 * anonymous pages mapped into it with that anon_vma.
164 *
d5a187da
VB
165 * The common case will be that we already have one, which
166 * is handled inline by anon_vma_prepare(). But if
23a0790a 167 * not we either need to find an adjacent mapping that we
d9d332e0
LT
168 * can re-use the anon_vma from (very common when the only
169 * reason for splitting a vma has been mprotect()), or we
170 * allocate a new one.
171 *
172 * Anon-vma allocations are very subtle, because we may have
2f031c6f 173 * optimistically looked up an anon_vma in folio_lock_anon_vma_read()
aaf1f990 174 * and that may actually touch the rwsem even in the newly
d9d332e0
LT
175 * allocated vma (it depends on RCU to make sure that the
176 * anon_vma isn't actually destroyed).
177 *
178 * As a result, we need to do proper anon_vma locking even
179 * for the new allocation. At the same time, we do not want
180 * to do any locking for the common case of already having
181 * an anon_vma.
182 *
c1e8d7c6 183 * This must be called with the mmap_lock held for reading.
d9d332e0 184 */
d5a187da 185int __anon_vma_prepare(struct vm_area_struct *vma)
1da177e4 186{
d5a187da
VB
187 struct mm_struct *mm = vma->vm_mm;
188 struct anon_vma *anon_vma, *allocated;
5beb4930 189 struct anon_vma_chain *avc;
1da177e4
LT
190
191 might_sleep();
1da177e4 192
d5a187da
VB
193 avc = anon_vma_chain_alloc(GFP_KERNEL);
194 if (!avc)
195 goto out_enomem;
196
197 anon_vma = find_mergeable_anon_vma(vma);
198 allocated = NULL;
199 if (!anon_vma) {
200 anon_vma = anon_vma_alloc();
201 if (unlikely(!anon_vma))
202 goto out_enomem_free_avc;
203 allocated = anon_vma;
204 }
5beb4930 205
d5a187da
VB
206 anon_vma_lock_write(anon_vma);
207 /* page_table_lock to protect against threads */
208 spin_lock(&mm->page_table_lock);
209 if (likely(!vma->anon_vma)) {
210 vma->anon_vma = anon_vma;
211 anon_vma_chain_link(vma, avc, anon_vma);
212 /* vma reference or self-parent link for new root */
213 anon_vma->degree++;
d9d332e0 214 allocated = NULL;
d5a187da
VB
215 avc = NULL;
216 }
217 spin_unlock(&mm->page_table_lock);
218 anon_vma_unlock_write(anon_vma);
1da177e4 219
d5a187da
VB
220 if (unlikely(allocated))
221 put_anon_vma(allocated);
222 if (unlikely(avc))
223 anon_vma_chain_free(avc);
31f2b0eb 224
1da177e4 225 return 0;
5beb4930
RR
226
227 out_enomem_free_avc:
228 anon_vma_chain_free(avc);
229 out_enomem:
230 return -ENOMEM;
1da177e4
LT
231}
232
bb4aa396
LT
233/*
234 * This is a useful helper function for locking the anon_vma root as
235 * we traverse the vma->anon_vma_chain, looping over anon_vma's that
236 * have the same vma.
237 *
238 * Such anon_vma's should have the same root, so you'd expect to see
239 * just a single mutex_lock for the whole traversal.
240 */
241static inline struct anon_vma *lock_anon_vma_root(struct anon_vma *root, struct anon_vma *anon_vma)
242{
243 struct anon_vma *new_root = anon_vma->root;
244 if (new_root != root) {
245 if (WARN_ON_ONCE(root))
5a505085 246 up_write(&root->rwsem);
bb4aa396 247 root = new_root;
5a505085 248 down_write(&root->rwsem);
bb4aa396
LT
249 }
250 return root;
251}
252
253static inline void unlock_anon_vma_root(struct anon_vma *root)
254{
255 if (root)
5a505085 256 up_write(&root->rwsem);
bb4aa396
LT
257}
258
5beb4930
RR
259/*
260 * Attach the anon_vmas from src to dst.
261 * Returns 0 on success, -ENOMEM on failure.
7a3ef208 262 *
cb152a1a 263 * anon_vma_clone() is called by __vma_adjust(), __split_vma(), copy_vma() and
47b390d2
WY
264 * anon_vma_fork(). The first three want an exact copy of src, while the last
265 * one, anon_vma_fork(), may try to reuse an existing anon_vma to prevent
266 * endless growth of anon_vma. Since dst->anon_vma is set to NULL before call,
267 * we can identify this case by checking (!dst->anon_vma && src->anon_vma).
268 *
269 * If (!dst->anon_vma && src->anon_vma) is true, this function tries to find
270 * and reuse existing anon_vma which has no vmas and only one child anon_vma.
271 * This prevents degradation of anon_vma hierarchy to endless linear chain in
272 * case of constantly forking task. On the other hand, an anon_vma with more
273 * than one child isn't reused even if there was no alive vma, thus rmap
274 * walker has a good chance of avoiding scanning the whole hierarchy when it
275 * searches where page is mapped.
5beb4930
RR
276 */
277int anon_vma_clone(struct vm_area_struct *dst, struct vm_area_struct *src)
1da177e4 278{
5beb4930 279 struct anon_vma_chain *avc, *pavc;
bb4aa396 280 struct anon_vma *root = NULL;
5beb4930 281
646d87b4 282 list_for_each_entry_reverse(pavc, &src->anon_vma_chain, same_vma) {
bb4aa396
LT
283 struct anon_vma *anon_vma;
284
dd34739c
LT
285 avc = anon_vma_chain_alloc(GFP_NOWAIT | __GFP_NOWARN);
286 if (unlikely(!avc)) {
287 unlock_anon_vma_root(root);
288 root = NULL;
289 avc = anon_vma_chain_alloc(GFP_KERNEL);
290 if (!avc)
291 goto enomem_failure;
292 }
bb4aa396
LT
293 anon_vma = pavc->anon_vma;
294 root = lock_anon_vma_root(root, anon_vma);
295 anon_vma_chain_link(dst, avc, anon_vma);
7a3ef208
KK
296
297 /*
298 * Reuse existing anon_vma if its degree lower than two,
299 * that means it has no vma and only one anon_vma child.
300 *
301 * Do not chose parent anon_vma, otherwise first child
302 * will always reuse it. Root anon_vma is never reused:
303 * it has self-parent reference and at least one child.
304 */
47b390d2
WY
305 if (!dst->anon_vma && src->anon_vma &&
306 anon_vma != src->anon_vma && anon_vma->degree < 2)
7a3ef208 307 dst->anon_vma = anon_vma;
5beb4930 308 }
7a3ef208
KK
309 if (dst->anon_vma)
310 dst->anon_vma->degree++;
bb4aa396 311 unlock_anon_vma_root(root);
5beb4930 312 return 0;
1da177e4 313
5beb4930 314 enomem_failure:
3fe89b3e
LY
315 /*
316 * dst->anon_vma is dropped here otherwise its degree can be incorrectly
317 * decremented in unlink_anon_vmas().
318 * We can safely do this because callers of anon_vma_clone() don't care
319 * about dst->anon_vma if anon_vma_clone() failed.
320 */
321 dst->anon_vma = NULL;
5beb4930
RR
322 unlink_anon_vmas(dst);
323 return -ENOMEM;
1da177e4
LT
324}
325
5beb4930
RR
326/*
327 * Attach vma to its own anon_vma, as well as to the anon_vmas that
328 * the corresponding VMA in the parent process is attached to.
329 * Returns 0 on success, non-zero on failure.
330 */
331int anon_vma_fork(struct vm_area_struct *vma, struct vm_area_struct *pvma)
1da177e4 332{
5beb4930
RR
333 struct anon_vma_chain *avc;
334 struct anon_vma *anon_vma;
c4ea95d7 335 int error;
1da177e4 336
5beb4930
RR
337 /* Don't bother if the parent process has no anon_vma here. */
338 if (!pvma->anon_vma)
339 return 0;
340
7a3ef208
KK
341 /* Drop inherited anon_vma, we'll reuse existing or allocate new. */
342 vma->anon_vma = NULL;
343
5beb4930
RR
344 /*
345 * First, attach the new VMA to the parent VMA's anon_vmas,
346 * so rmap can find non-COWed pages in child processes.
347 */
c4ea95d7
DF
348 error = anon_vma_clone(vma, pvma);
349 if (error)
350 return error;
5beb4930 351
7a3ef208
KK
352 /* An existing anon_vma has been reused, all done then. */
353 if (vma->anon_vma)
354 return 0;
355
5beb4930
RR
356 /* Then add our own anon_vma. */
357 anon_vma = anon_vma_alloc();
358 if (!anon_vma)
359 goto out_error;
dd34739c 360 avc = anon_vma_chain_alloc(GFP_KERNEL);
5beb4930
RR
361 if (!avc)
362 goto out_error_free_anon_vma;
5c341ee1
RR
363
364 /*
aaf1f990 365 * The root anon_vma's rwsem is the lock actually used when we
5c341ee1
RR
366 * lock any of the anon_vmas in this anon_vma tree.
367 */
368 anon_vma->root = pvma->anon_vma->root;
7a3ef208 369 anon_vma->parent = pvma->anon_vma;
76545066 370 /*
01d8b20d
PZ
371 * With refcounts, an anon_vma can stay around longer than the
372 * process it belongs to. The root anon_vma needs to be pinned until
373 * this anon_vma is freed, because the lock lives in the root.
76545066
RR
374 */
375 get_anon_vma(anon_vma->root);
5beb4930
RR
376 /* Mark this anon_vma as the one where our new (COWed) pages go. */
377 vma->anon_vma = anon_vma;
4fc3f1d6 378 anon_vma_lock_write(anon_vma);
5c341ee1 379 anon_vma_chain_link(vma, avc, anon_vma);
7a3ef208 380 anon_vma->parent->degree++;
08b52706 381 anon_vma_unlock_write(anon_vma);
5beb4930
RR
382
383 return 0;
384
385 out_error_free_anon_vma:
01d8b20d 386 put_anon_vma(anon_vma);
5beb4930 387 out_error:
4946d54c 388 unlink_anon_vmas(vma);
5beb4930 389 return -ENOMEM;
1da177e4
LT
390}
391
5beb4930
RR
392void unlink_anon_vmas(struct vm_area_struct *vma)
393{
394 struct anon_vma_chain *avc, *next;
eee2acba 395 struct anon_vma *root = NULL;
5beb4930 396
5c341ee1
RR
397 /*
398 * Unlink each anon_vma chained to the VMA. This list is ordered
399 * from newest to oldest, ensuring the root anon_vma gets freed last.
400 */
5beb4930 401 list_for_each_entry_safe(avc, next, &vma->anon_vma_chain, same_vma) {
eee2acba
PZ
402 struct anon_vma *anon_vma = avc->anon_vma;
403
404 root = lock_anon_vma_root(root, anon_vma);
bf181b9f 405 anon_vma_interval_tree_remove(avc, &anon_vma->rb_root);
eee2acba
PZ
406
407 /*
408 * Leave empty anon_vmas on the list - we'll need
409 * to free them outside the lock.
410 */
f808c13f 411 if (RB_EMPTY_ROOT(&anon_vma->rb_root.rb_root)) {
7a3ef208 412 anon_vma->parent->degree--;
eee2acba 413 continue;
7a3ef208 414 }
eee2acba
PZ
415
416 list_del(&avc->same_vma);
417 anon_vma_chain_free(avc);
418 }
ee8ab190 419 if (vma->anon_vma) {
7a3ef208 420 vma->anon_vma->degree--;
ee8ab190
LX
421
422 /*
423 * vma would still be needed after unlink, and anon_vma will be prepared
424 * when handle fault.
425 */
426 vma->anon_vma = NULL;
427 }
eee2acba
PZ
428 unlock_anon_vma_root(root);
429
430 /*
431 * Iterate the list once more, it now only contains empty and unlinked
432 * anon_vmas, destroy them. Could not do before due to __put_anon_vma()
5a505085 433 * needing to write-acquire the anon_vma->root->rwsem.
eee2acba
PZ
434 */
435 list_for_each_entry_safe(avc, next, &vma->anon_vma_chain, same_vma) {
436 struct anon_vma *anon_vma = avc->anon_vma;
437
e4c5800a 438 VM_WARN_ON(anon_vma->degree);
eee2acba
PZ
439 put_anon_vma(anon_vma);
440
5beb4930
RR
441 list_del(&avc->same_vma);
442 anon_vma_chain_free(avc);
443 }
444}
445
51cc5068 446static void anon_vma_ctor(void *data)
1da177e4 447{
a35afb83 448 struct anon_vma *anon_vma = data;
1da177e4 449
5a505085 450 init_rwsem(&anon_vma->rwsem);
83813267 451 atomic_set(&anon_vma->refcount, 0);
f808c13f 452 anon_vma->rb_root = RB_ROOT_CACHED;
1da177e4
LT
453}
454
455void __init anon_vma_init(void)
456{
457 anon_vma_cachep = kmem_cache_create("anon_vma", sizeof(struct anon_vma),
5f0d5a3a 458 0, SLAB_TYPESAFE_BY_RCU|SLAB_PANIC|SLAB_ACCOUNT,
5d097056
VD
459 anon_vma_ctor);
460 anon_vma_chain_cachep = KMEM_CACHE(anon_vma_chain,
461 SLAB_PANIC|SLAB_ACCOUNT);
1da177e4
LT
462}
463
464/*
6111e4ca
PZ
465 * Getting a lock on a stable anon_vma from a page off the LRU is tricky!
466 *
467 * Since there is no serialization what so ever against page_remove_rmap()
ad8a20cf
ML
468 * the best this function can do is return a refcount increased anon_vma
469 * that might have been relevant to this page.
6111e4ca
PZ
470 *
471 * The page might have been remapped to a different anon_vma or the anon_vma
472 * returned may already be freed (and even reused).
473 *
bc658c96
PZ
474 * In case it was remapped to a different anon_vma, the new anon_vma will be a
475 * child of the old anon_vma, and the anon_vma lifetime rules will therefore
476 * ensure that any anon_vma obtained from the page will still be valid for as
477 * long as we observe page_mapped() [ hence all those page_mapped() tests ].
478 *
6111e4ca
PZ
479 * All users of this function must be very careful when walking the anon_vma
480 * chain and verify that the page in question is indeed mapped in it
481 * [ something equivalent to page_mapped_in_vma() ].
482 *
091e4299
MC
483 * Since anon_vma's slab is SLAB_TYPESAFE_BY_RCU and we know from
484 * page_remove_rmap() that the anon_vma pointer from page->mapping is valid
485 * if there is a mapcount, we can dereference the anon_vma after observing
486 * those.
1da177e4 487 */
746b18d4 488struct anon_vma *page_get_anon_vma(struct page *page)
1da177e4 489{
746b18d4 490 struct anon_vma *anon_vma = NULL;
1da177e4
LT
491 unsigned long anon_mapping;
492
493 rcu_read_lock();
4db0c3c2 494 anon_mapping = (unsigned long)READ_ONCE(page->mapping);
3ca7b3c5 495 if ((anon_mapping & PAGE_MAPPING_FLAGS) != PAGE_MAPPING_ANON)
1da177e4
LT
496 goto out;
497 if (!page_mapped(page))
498 goto out;
499
500 anon_vma = (struct anon_vma *) (anon_mapping - PAGE_MAPPING_ANON);
746b18d4
PZ
501 if (!atomic_inc_not_zero(&anon_vma->refcount)) {
502 anon_vma = NULL;
503 goto out;
504 }
f1819427
HD
505
506 /*
507 * If this page is still mapped, then its anon_vma cannot have been
746b18d4
PZ
508 * freed. But if it has been unmapped, we have no security against the
509 * anon_vma structure being freed and reused (for another anon_vma:
5f0d5a3a 510 * SLAB_TYPESAFE_BY_RCU guarantees that - so the atomic_inc_not_zero()
746b18d4 511 * above cannot corrupt).
f1819427 512 */
746b18d4 513 if (!page_mapped(page)) {
7f39dda9 514 rcu_read_unlock();
746b18d4 515 put_anon_vma(anon_vma);
7f39dda9 516 return NULL;
746b18d4 517 }
1da177e4
LT
518out:
519 rcu_read_unlock();
746b18d4
PZ
520
521 return anon_vma;
522}
523
88c22088
PZ
524/*
525 * Similar to page_get_anon_vma() except it locks the anon_vma.
526 *
527 * Its a little more complex as it tries to keep the fast path to a single
528 * atomic op -- the trylock. If we fail the trylock, we fall back to getting a
529 * reference like with page_get_anon_vma() and then block on the mutex.
530 */
9595d769 531struct anon_vma *folio_lock_anon_vma_read(struct folio *folio)
746b18d4 532{
88c22088 533 struct anon_vma *anon_vma = NULL;
eee0f252 534 struct anon_vma *root_anon_vma;
88c22088 535 unsigned long anon_mapping;
746b18d4 536
88c22088 537 rcu_read_lock();
9595d769 538 anon_mapping = (unsigned long)READ_ONCE(folio->mapping);
88c22088
PZ
539 if ((anon_mapping & PAGE_MAPPING_FLAGS) != PAGE_MAPPING_ANON)
540 goto out;
9595d769 541 if (!folio_mapped(folio))
88c22088
PZ
542 goto out;
543
544 anon_vma = (struct anon_vma *) (anon_mapping - PAGE_MAPPING_ANON);
4db0c3c2 545 root_anon_vma = READ_ONCE(anon_vma->root);
4fc3f1d6 546 if (down_read_trylock(&root_anon_vma->rwsem)) {
88c22088 547 /*
9595d769 548 * If the folio is still mapped, then this anon_vma is still
eee0f252 549 * its anon_vma, and holding the mutex ensures that it will
bc658c96 550 * not go away, see anon_vma_free().
88c22088 551 */
9595d769 552 if (!folio_mapped(folio)) {
4fc3f1d6 553 up_read(&root_anon_vma->rwsem);
88c22088
PZ
554 anon_vma = NULL;
555 }
556 goto out;
557 }
746b18d4 558
88c22088
PZ
559 /* trylock failed, we got to sleep */
560 if (!atomic_inc_not_zero(&anon_vma->refcount)) {
561 anon_vma = NULL;
562 goto out;
563 }
564
9595d769 565 if (!folio_mapped(folio)) {
7f39dda9 566 rcu_read_unlock();
88c22088 567 put_anon_vma(anon_vma);
7f39dda9 568 return NULL;
88c22088
PZ
569 }
570
571 /* we pinned the anon_vma, its safe to sleep */
572 rcu_read_unlock();
4fc3f1d6 573 anon_vma_lock_read(anon_vma);
88c22088
PZ
574
575 if (atomic_dec_and_test(&anon_vma->refcount)) {
576 /*
577 * Oops, we held the last refcount, release the lock
578 * and bail -- can't simply use put_anon_vma() because
4fc3f1d6 579 * we'll deadlock on the anon_vma_lock_write() recursion.
88c22088 580 */
4fc3f1d6 581 anon_vma_unlock_read(anon_vma);
88c22088
PZ
582 __put_anon_vma(anon_vma);
583 anon_vma = NULL;
584 }
585
586 return anon_vma;
587
588out:
589 rcu_read_unlock();
746b18d4 590 return anon_vma;
34bbd704
ON
591}
592
4fc3f1d6 593void page_unlock_anon_vma_read(struct anon_vma *anon_vma)
34bbd704 594{
4fc3f1d6 595 anon_vma_unlock_read(anon_vma);
1da177e4
LT
596}
597
72b252ae 598#ifdef CONFIG_ARCH_WANT_BATCHED_UNMAP_TLB_FLUSH
72b252ae
MG
599/*
600 * Flush TLB entries for recently unmapped pages from remote CPUs. It is
601 * important if a PTE was dirty when it was unmapped that it's flushed
602 * before any IO is initiated on the page to prevent lost writes. Similarly,
603 * it must be flushed before freeing to prevent data leakage.
604 */
605void try_to_unmap_flush(void)
606{
607 struct tlbflush_unmap_batch *tlb_ubc = &current->tlb_ubc;
72b252ae
MG
608
609 if (!tlb_ubc->flush_required)
610 return;
611
e73ad5ff 612 arch_tlbbatch_flush(&tlb_ubc->arch);
72b252ae 613 tlb_ubc->flush_required = false;
d950c947 614 tlb_ubc->writable = false;
72b252ae
MG
615}
616
d950c947
MG
617/* Flush iff there are potentially writable TLB entries that can race with IO */
618void try_to_unmap_flush_dirty(void)
619{
620 struct tlbflush_unmap_batch *tlb_ubc = &current->tlb_ubc;
621
622 if (tlb_ubc->writable)
623 try_to_unmap_flush();
624}
625
5ee2fa2f
HY
626/*
627 * Bits 0-14 of mm->tlb_flush_batched record pending generations.
628 * Bits 16-30 of mm->tlb_flush_batched bit record flushed generations.
629 */
630#define TLB_FLUSH_BATCH_FLUSHED_SHIFT 16
631#define TLB_FLUSH_BATCH_PENDING_MASK \
632 ((1 << (TLB_FLUSH_BATCH_FLUSHED_SHIFT - 1)) - 1)
633#define TLB_FLUSH_BATCH_PENDING_LARGE \
634 (TLB_FLUSH_BATCH_PENDING_MASK / 2)
635
c7ab0d2f 636static void set_tlb_ubc_flush_pending(struct mm_struct *mm, bool writable)
72b252ae
MG
637{
638 struct tlbflush_unmap_batch *tlb_ubc = &current->tlb_ubc;
5ee2fa2f 639 int batch, nbatch;
72b252ae 640
e73ad5ff 641 arch_tlbbatch_add_mm(&tlb_ubc->arch, mm);
72b252ae 642 tlb_ubc->flush_required = true;
d950c947 643
3ea27719
MG
644 /*
645 * Ensure compiler does not re-order the setting of tlb_flush_batched
646 * before the PTE is cleared.
647 */
648 barrier();
5ee2fa2f
HY
649 batch = atomic_read(&mm->tlb_flush_batched);
650retry:
651 if ((batch & TLB_FLUSH_BATCH_PENDING_MASK) > TLB_FLUSH_BATCH_PENDING_LARGE) {
652 /*
653 * Prevent `pending' from catching up with `flushed' because of
654 * overflow. Reset `pending' and `flushed' to be 1 and 0 if
655 * `pending' becomes large.
656 */
657 nbatch = atomic_cmpxchg(&mm->tlb_flush_batched, batch, 1);
658 if (nbatch != batch) {
659 batch = nbatch;
660 goto retry;
661 }
662 } else {
663 atomic_inc(&mm->tlb_flush_batched);
664 }
3ea27719 665
d950c947
MG
666 /*
667 * If the PTE was dirty then it's best to assume it's writable. The
668 * caller must use try_to_unmap_flush_dirty() or try_to_unmap_flush()
669 * before the page is queued for IO.
670 */
671 if (writable)
672 tlb_ubc->writable = true;
72b252ae
MG
673}
674
675/*
676 * Returns true if the TLB flush should be deferred to the end of a batch of
677 * unmap operations to reduce IPIs.
678 */
679static bool should_defer_flush(struct mm_struct *mm, enum ttu_flags flags)
680{
681 bool should_defer = false;
682
683 if (!(flags & TTU_BATCH_FLUSH))
684 return false;
685
686 /* If remote CPUs need to be flushed then defer batch the flush */
687 if (cpumask_any_but(mm_cpumask(mm), get_cpu()) < nr_cpu_ids)
688 should_defer = true;
689 put_cpu();
690
691 return should_defer;
692}
3ea27719
MG
693
694/*
695 * Reclaim unmaps pages under the PTL but do not flush the TLB prior to
696 * releasing the PTL if TLB flushes are batched. It's possible for a parallel
697 * operation such as mprotect or munmap to race between reclaim unmapping
698 * the page and flushing the page. If this race occurs, it potentially allows
699 * access to data via a stale TLB entry. Tracking all mm's that have TLB
700 * batching in flight would be expensive during reclaim so instead track
701 * whether TLB batching occurred in the past and if so then do a flush here
702 * if required. This will cost one additional flush per reclaim cycle paid
703 * by the first operation at risk such as mprotect and mumap.
704 *
705 * This must be called under the PTL so that an access to tlb_flush_batched
706 * that is potentially a "reclaim vs mprotect/munmap/etc" race will synchronise
707 * via the PTL.
708 */
709void flush_tlb_batched_pending(struct mm_struct *mm)
710{
5ee2fa2f
HY
711 int batch = atomic_read(&mm->tlb_flush_batched);
712 int pending = batch & TLB_FLUSH_BATCH_PENDING_MASK;
713 int flushed = batch >> TLB_FLUSH_BATCH_FLUSHED_SHIFT;
3ea27719 714
5ee2fa2f
HY
715 if (pending != flushed) {
716 flush_tlb_mm(mm);
3ea27719 717 /*
5ee2fa2f
HY
718 * If the new TLB flushing is pending during flushing, leave
719 * mm->tlb_flush_batched as is, to avoid losing flushing.
3ea27719 720 */
5ee2fa2f
HY
721 atomic_cmpxchg(&mm->tlb_flush_batched, batch,
722 pending | (pending << TLB_FLUSH_BATCH_FLUSHED_SHIFT));
3ea27719
MG
723 }
724}
72b252ae 725#else
c7ab0d2f 726static void set_tlb_ubc_flush_pending(struct mm_struct *mm, bool writable)
72b252ae
MG
727{
728}
729
730static bool should_defer_flush(struct mm_struct *mm, enum ttu_flags flags)
731{
732 return false;
733}
734#endif /* CONFIG_ARCH_WANT_BATCHED_UNMAP_TLB_FLUSH */
735
1da177e4 736/*
bf89c8c8 737 * At what user virtual address is page expected in vma?
ab941e0f 738 * Caller should check the page is actually part of the vma.
1da177e4
LT
739 */
740unsigned long page_address_in_vma(struct page *page, struct vm_area_struct *vma)
741{
e05b3453
MWO
742 struct folio *folio = page_folio(page);
743 if (folio_test_anon(folio)) {
744 struct anon_vma *page__anon_vma = folio_anon_vma(folio);
4829b906
HD
745 /*
746 * Note: swapoff's unuse_vma() is more efficient with this
747 * check, and needs it to match anon_vma when KSM is active.
748 */
749 if (!vma->anon_vma || !page__anon_vma ||
750 vma->anon_vma->root != page__anon_vma->root)
21d0d443 751 return -EFAULT;
31657170
JW
752 } else if (!vma->vm_file) {
753 return -EFAULT;
e05b3453 754 } else if (vma->vm_file->f_mapping != folio->mapping) {
1da177e4 755 return -EFAULT;
31657170 756 }
494334e4
HD
757
758 return vma_address(page, vma);
1da177e4
LT
759}
760
6219049a
BL
761pmd_t *mm_find_pmd(struct mm_struct *mm, unsigned long address)
762{
763 pgd_t *pgd;
c2febafc 764 p4d_t *p4d;
6219049a
BL
765 pud_t *pud;
766 pmd_t *pmd = NULL;
f72e7dcd 767 pmd_t pmde;
6219049a
BL
768
769 pgd = pgd_offset(mm, address);
770 if (!pgd_present(*pgd))
771 goto out;
772
c2febafc
KS
773 p4d = p4d_offset(pgd, address);
774 if (!p4d_present(*p4d))
775 goto out;
776
777 pud = pud_offset(p4d, address);
6219049a
BL
778 if (!pud_present(*pud))
779 goto out;
780
781 pmd = pmd_offset(pud, address);
f72e7dcd 782 /*
8809aa2d 783 * Some THP functions use the sequence pmdp_huge_clear_flush(), set_pmd_at()
f72e7dcd
HD
784 * without holding anon_vma lock for write. So when looking for a
785 * genuine pmde (in which to find pte), test present and !THP together.
786 */
e37c6982
CB
787 pmde = *pmd;
788 barrier();
f72e7dcd 789 if (!pmd_present(pmde) || pmd_trans_huge(pmde))
6219049a
BL
790 pmd = NULL;
791out:
792 return pmd;
793}
794
b3ac0413 795struct folio_referenced_arg {
8749cfea
VD
796 int mapcount;
797 int referenced;
798 unsigned long vm_flags;
799 struct mem_cgroup *memcg;
800};
801/*
b3ac0413 802 * arg: folio_referenced_arg will be passed
8749cfea 803 */
2f031c6f
MWO
804static bool folio_referenced_one(struct folio *folio,
805 struct vm_area_struct *vma, unsigned long address, void *arg)
8749cfea 806{
b3ac0413
MWO
807 struct folio_referenced_arg *pra = arg;
808 DEFINE_FOLIO_VMA_WALK(pvmw, folio, vma, address, 0);
8749cfea
VD
809 int referenced = 0;
810
8eaedede
KS
811 while (page_vma_mapped_walk(&pvmw)) {
812 address = pvmw.address;
b20ce5e0 813
47d4f3ee 814 if ((vma->vm_flags & VM_LOCKED) &&
b3ac0413 815 (!folio_test_large(folio) || !pvmw.pte)) {
47d4f3ee 816 /* Restore the mlock which got missed */
b3ac0413 817 mlock_vma_folio(folio, vma, !pvmw.pte);
8eaedede
KS
818 page_vma_mapped_walk_done(&pvmw);
819 pra->vm_flags |= VM_LOCKED;
e4b82222 820 return false; /* To break the loop */
8eaedede 821 }
71e3aac0 822
8eaedede
KS
823 if (pvmw.pte) {
824 if (ptep_clear_flush_young_notify(vma, address,
825 pvmw.pte)) {
826 /*
827 * Don't treat a reference through
828 * a sequentially read mapping as such.
b3ac0413 829 * If the folio has been used in another mapping,
8eaedede
KS
830 * we will catch it; if this other mapping is
831 * already gone, the unmap path will have set
b3ac0413 832 * the referenced flag or activated the folio.
8eaedede
KS
833 */
834 if (likely(!(vma->vm_flags & VM_SEQ_READ)))
835 referenced++;
836 }
837 } else if (IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE)) {
838 if (pmdp_clear_flush_young_notify(vma, address,
839 pvmw.pmd))
8749cfea 840 referenced++;
8eaedede 841 } else {
b3ac0413 842 /* unexpected pmd-mapped folio? */
8eaedede 843 WARN_ON_ONCE(1);
8749cfea 844 }
8eaedede
KS
845
846 pra->mapcount--;
b20ce5e0 847 }
b20ce5e0 848
33c3fc71 849 if (referenced)
b3ac0413
MWO
850 folio_clear_idle(folio);
851 if (folio_test_clear_young(folio))
33c3fc71
VD
852 referenced++;
853
9f32624b
JK
854 if (referenced) {
855 pra->referenced++;
47d4f3ee 856 pra->vm_flags |= vma->vm_flags & ~VM_LOCKED;
1da177e4 857 }
34bbd704 858
9f32624b 859 if (!pra->mapcount)
e4b82222 860 return false; /* To break the loop */
9f32624b 861
e4b82222 862 return true;
1da177e4
LT
863}
864
b3ac0413 865static bool invalid_folio_referenced_vma(struct vm_area_struct *vma, void *arg)
1da177e4 866{
b3ac0413 867 struct folio_referenced_arg *pra = arg;
9f32624b 868 struct mem_cgroup *memcg = pra->memcg;
1da177e4 869
9f32624b
JK
870 if (!mm_match_cgroup(vma->vm_mm, memcg))
871 return true;
1da177e4 872
9f32624b 873 return false;
1da177e4
LT
874}
875
876/**
b3ac0413
MWO
877 * folio_referenced() - Test if the folio was referenced.
878 * @folio: The folio to test.
879 * @is_locked: Caller holds lock on the folio.
72835c86 880 * @memcg: target memory cgroup
b3ac0413 881 * @vm_flags: A combination of all the vma->vm_flags which referenced the folio.
1da177e4 882 *
b3ac0413
MWO
883 * Quick test_and_clear_referenced for all mappings of a folio,
884 *
885 * Return: The number of mappings which referenced the folio.
1da177e4 886 */
b3ac0413
MWO
887int folio_referenced(struct folio *folio, int is_locked,
888 struct mem_cgroup *memcg, unsigned long *vm_flags)
1da177e4 889{
5ad64688 890 int we_locked = 0;
b3ac0413
MWO
891 struct folio_referenced_arg pra = {
892 .mapcount = folio_mapcount(folio),
9f32624b
JK
893 .memcg = memcg,
894 };
895 struct rmap_walk_control rwc = {
b3ac0413 896 .rmap_one = folio_referenced_one,
9f32624b 897 .arg = (void *)&pra,
2f031c6f 898 .anon_lock = folio_lock_anon_vma_read,
9f32624b 899 };
1da177e4 900
6fe6b7e3 901 *vm_flags = 0;
059d8442 902 if (!pra.mapcount)
9f32624b
JK
903 return 0;
904
b3ac0413 905 if (!folio_raw_mapping(folio))
9f32624b
JK
906 return 0;
907
b3ac0413
MWO
908 if (!is_locked && (!folio_test_anon(folio) || folio_test_ksm(folio))) {
909 we_locked = folio_trylock(folio);
9f32624b
JK
910 if (!we_locked)
911 return 1;
1da177e4 912 }
9f32624b
JK
913
914 /*
915 * If we are reclaiming on behalf of a cgroup, skip
916 * counting on behalf of references from different
917 * cgroups
918 */
919 if (memcg) {
b3ac0413 920 rwc.invalid_vma = invalid_folio_referenced_vma;
9f32624b
JK
921 }
922
2f031c6f 923 rmap_walk(folio, &rwc);
9f32624b
JK
924 *vm_flags = pra.vm_flags;
925
926 if (we_locked)
b3ac0413 927 folio_unlock(folio);
9f32624b
JK
928
929 return pra.referenced;
1da177e4
LT
930}
931
6a8e0596 932static int page_vma_mkclean_one(struct page_vma_mapped_walk *pvmw)
d08b3851 933{
6a8e0596
MS
934 int cleaned = 0;
935 struct vm_area_struct *vma = pvmw->vma;
ac46d4f3 936 struct mmu_notifier_range range;
6a8e0596 937 unsigned long address = pvmw->address;
d08b3851 938
369ea824
JG
939 /*
940 * We have to assume the worse case ie pmd for invalidation. Note that
e83c09a2 941 * the folio can not be freed from this function.
369ea824 942 */
7269f999
JG
943 mmu_notifier_range_init(&range, MMU_NOTIFY_PROTECTION_PAGE,
944 0, vma, vma->vm_mm, address,
6a8e0596 945 vma_address_end(pvmw));
ac46d4f3 946 mmu_notifier_invalidate_range_start(&range);
369ea824 947
6a8e0596 948 while (page_vma_mapped_walk(pvmw)) {
f27176cf 949 int ret = 0;
369ea824 950
6a8e0596
MS
951 address = pvmw->address;
952 if (pvmw->pte) {
f27176cf 953 pte_t entry;
6a8e0596 954 pte_t *pte = pvmw->pte;
f27176cf
KS
955
956 if (!pte_dirty(*pte) && !pte_write(*pte))
957 continue;
958
785373b4
LT
959 flush_cache_page(vma, address, pte_pfn(*pte));
960 entry = ptep_clear_flush(vma, address, pte);
f27176cf
KS
961 entry = pte_wrprotect(entry);
962 entry = pte_mkclean(entry);
785373b4 963 set_pte_at(vma->vm_mm, address, pte, entry);
f27176cf
KS
964 ret = 1;
965 } else {
396bcc52 966#ifdef CONFIG_TRANSPARENT_HUGEPAGE
6a8e0596 967 pmd_t *pmd = pvmw->pmd;
f27176cf
KS
968 pmd_t entry;
969
970 if (!pmd_dirty(*pmd) && !pmd_write(*pmd))
971 continue;
972
7f9c9b60
MS
973 flush_cache_range(vma, address,
974 address + HPAGE_PMD_SIZE);
024eee0e 975 entry = pmdp_invalidate(vma, address, pmd);
f27176cf
KS
976 entry = pmd_wrprotect(entry);
977 entry = pmd_mkclean(entry);
785373b4 978 set_pmd_at(vma->vm_mm, address, pmd, entry);
f27176cf
KS
979 ret = 1;
980#else
e83c09a2 981 /* unexpected pmd-mapped folio? */
f27176cf
KS
982 WARN_ON_ONCE(1);
983#endif
984 }
d08b3851 985
0f10851e
JG
986 /*
987 * No need to call mmu_notifier_invalidate_range() as we are
988 * downgrading page table protection not changing it to point
989 * to a new page.
990 *
ad56b738 991 * See Documentation/vm/mmu_notifier.rst
0f10851e
JG
992 */
993 if (ret)
6a8e0596 994 cleaned++;
c2fda5fe 995 }
d08b3851 996
ac46d4f3 997 mmu_notifier_invalidate_range_end(&range);
369ea824 998
6a8e0596
MS
999 return cleaned;
1000}
1001
1002static bool page_mkclean_one(struct folio *folio, struct vm_area_struct *vma,
1003 unsigned long address, void *arg)
1004{
1005 DEFINE_FOLIO_VMA_WALK(pvmw, folio, vma, address, PVMW_SYNC);
1006 int *cleaned = arg;
1007
1008 *cleaned += page_vma_mkclean_one(&pvmw);
1009
e4b82222 1010 return true;
d08b3851
PZ
1011}
1012
9853a407 1013static bool invalid_mkclean_vma(struct vm_area_struct *vma, void *arg)
d08b3851 1014{
9853a407 1015 if (vma->vm_flags & VM_SHARED)
871beb8c 1016 return false;
d08b3851 1017
871beb8c 1018 return true;
d08b3851
PZ
1019}
1020
d9c08e22 1021int folio_mkclean(struct folio *folio)
d08b3851 1022{
9853a407
JK
1023 int cleaned = 0;
1024 struct address_space *mapping;
1025 struct rmap_walk_control rwc = {
1026 .arg = (void *)&cleaned,
1027 .rmap_one = page_mkclean_one,
1028 .invalid_vma = invalid_mkclean_vma,
1029 };
d08b3851 1030
d9c08e22 1031 BUG_ON(!folio_test_locked(folio));
d08b3851 1032
d9c08e22 1033 if (!folio_mapped(folio))
9853a407
JK
1034 return 0;
1035
d9c08e22 1036 mapping = folio_mapping(folio);
9853a407
JK
1037 if (!mapping)
1038 return 0;
1039
2f031c6f 1040 rmap_walk(folio, &rwc);
d08b3851 1041
9853a407 1042 return cleaned;
d08b3851 1043}
d9c08e22 1044EXPORT_SYMBOL_GPL(folio_mkclean);
d08b3851 1045
6a8e0596
MS
1046/**
1047 * pfn_mkclean_range - Cleans the PTEs (including PMDs) mapped with range of
1048 * [@pfn, @pfn + @nr_pages) at the specific offset (@pgoff)
1049 * within the @vma of shared mappings. And since clean PTEs
1050 * should also be readonly, write protects them too.
1051 * @pfn: start pfn.
1052 * @nr_pages: number of physically contiguous pages srarting with @pfn.
1053 * @pgoff: page offset that the @pfn mapped with.
1054 * @vma: vma that @pfn mapped within.
1055 *
1056 * Returns the number of cleaned PTEs (including PMDs).
1057 */
1058int pfn_mkclean_range(unsigned long pfn, unsigned long nr_pages, pgoff_t pgoff,
1059 struct vm_area_struct *vma)
1060{
1061 struct page_vma_mapped_walk pvmw = {
1062 .pfn = pfn,
1063 .nr_pages = nr_pages,
1064 .pgoff = pgoff,
1065 .vma = vma,
1066 .flags = PVMW_SYNC,
1067 };
1068
1069 if (invalid_mkclean_vma(vma, NULL))
1070 return 0;
1071
1072 pvmw.address = vma_pgoff_address(pgoff, nr_pages, vma);
1073 VM_BUG_ON_VMA(pvmw.address == -EFAULT, vma);
1074
1075 return page_vma_mkclean_one(&pvmw);
1076}
1077
c44b6743
RR
1078/**
1079 * page_move_anon_rmap - move a page to our anon_vma
1080 * @page: the page to move to our anon_vma
1081 * @vma: the vma the page belongs to
c44b6743
RR
1082 *
1083 * When a page belongs exclusively to one process after a COW event,
1084 * that page can be moved into the anon_vma that belongs to just that
1085 * process, so the rmap code will not search the parent or sibling
1086 * processes.
1087 */
5a49973d 1088void page_move_anon_rmap(struct page *page, struct vm_area_struct *vma)
c44b6743
RR
1089{
1090 struct anon_vma *anon_vma = vma->anon_vma;
6c287605 1091 struct page *subpage = page;
c44b6743 1092
5a49973d
HD
1093 page = compound_head(page);
1094
309381fe 1095 VM_BUG_ON_PAGE(!PageLocked(page), page);
81d1b09c 1096 VM_BUG_ON_VMA(!anon_vma, vma);
c44b6743
RR
1097
1098 anon_vma = (void *) anon_vma + PAGE_MAPPING_ANON;
414e2fb8
VD
1099 /*
1100 * Ensure that anon_vma and the PAGE_MAPPING_ANON bit are written
b3ac0413
MWO
1101 * simultaneously, so a concurrent reader (eg folio_referenced()'s
1102 * folio_test_anon()) will not see one without the other.
414e2fb8
VD
1103 */
1104 WRITE_ONCE(page->mapping, (struct address_space *) anon_vma);
6c287605 1105 SetPageAnonExclusive(subpage);
c44b6743
RR
1106}
1107
9617d95e 1108/**
4e1c1975 1109 * __page_set_anon_rmap - set up new anonymous rmap
451b9514 1110 * @page: Page or Hugepage to add to rmap
4e1c1975
AK
1111 * @vma: VM area to add page to.
1112 * @address: User virtual address of the mapping
e8a03feb 1113 * @exclusive: the page is exclusively owned by the current process
9617d95e
NP
1114 */
1115static void __page_set_anon_rmap(struct page *page,
e8a03feb 1116 struct vm_area_struct *vma, unsigned long address, int exclusive)
9617d95e 1117{
e8a03feb 1118 struct anon_vma *anon_vma = vma->anon_vma;
ea90002b 1119
e8a03feb 1120 BUG_ON(!anon_vma);
ea90002b 1121
4e1c1975 1122 if (PageAnon(page))
6c287605 1123 goto out;
4e1c1975 1124
ea90002b 1125 /*
e8a03feb
RR
1126 * If the page isn't exclusively mapped into this vma,
1127 * we must use the _oldest_ possible anon_vma for the
1128 * page mapping!
ea90002b 1129 */
4e1c1975 1130 if (!exclusive)
288468c3 1131 anon_vma = anon_vma->root;
9617d95e 1132
16f5e707
AS
1133 /*
1134 * page_idle does a lockless/optimistic rmap scan on page->mapping.
1135 * Make sure the compiler doesn't split the stores of anon_vma and
1136 * the PAGE_MAPPING_ANON type identifier, otherwise the rmap code
1137 * could mistake the mapping for a struct address_space and crash.
1138 */
9617d95e 1139 anon_vma = (void *) anon_vma + PAGE_MAPPING_ANON;
16f5e707 1140 WRITE_ONCE(page->mapping, (struct address_space *) anon_vma);
9617d95e 1141 page->index = linear_page_index(vma, address);
6c287605
DH
1142out:
1143 if (exclusive)
1144 SetPageAnonExclusive(page);
9617d95e
NP
1145}
1146
c97a9e10 1147/**
43d8eac4 1148 * __page_check_anon_rmap - sanity check anonymous rmap addition
c97a9e10
NP
1149 * @page: the page to add the mapping to
1150 * @vma: the vm area in which the mapping is added
1151 * @address: the user virtual address mapped
1152 */
1153static void __page_check_anon_rmap(struct page *page,
1154 struct vm_area_struct *vma, unsigned long address)
1155{
e05b3453 1156 struct folio *folio = page_folio(page);
c97a9e10
NP
1157 /*
1158 * The page's anon-rmap details (mapping and index) are guaranteed to
1159 * be set up correctly at this point.
1160 *
1161 * We have exclusion against page_add_anon_rmap because the caller
90aaca85 1162 * always holds the page locked.
c97a9e10
NP
1163 *
1164 * We have exclusion against page_add_new_anon_rmap because those pages
1165 * are initially only visible via the pagetables, and the pte is locked
1166 * over the call to page_add_new_anon_rmap.
1167 */
e05b3453
MWO
1168 VM_BUG_ON_FOLIO(folio_anon_vma(folio)->root != vma->anon_vma->root,
1169 folio);
30c46382
YS
1170 VM_BUG_ON_PAGE(page_to_pgoff(page) != linear_page_index(vma, address),
1171 page);
c97a9e10
NP
1172}
1173
1da177e4
LT
1174/**
1175 * page_add_anon_rmap - add pte mapping to an anonymous page
1176 * @page: the page to add the mapping to
1177 * @vma: the vm area in which the mapping is added
1178 * @address: the user virtual address mapped
f1e2db12 1179 * @flags: the rmap flags
1da177e4 1180 *
5ad64688 1181 * The caller needs to hold the pte lock, and the page must be locked in
80e14822
HD
1182 * the anon_vma case: to serialize mapping,index checking after setting,
1183 * and to ensure that PageAnon is not being upgraded racily to PageKsm
1184 * (but PageKsm is never downgraded to PageAnon).
1da177e4
LT
1185 */
1186void page_add_anon_rmap(struct page *page,
14f9135d 1187 struct vm_area_struct *vma, unsigned long address, rmap_t flags)
1da177e4 1188{
53f9263b
KS
1189 bool compound = flags & RMAP_COMPOUND;
1190 bool first;
1191
be5d0a74
JW
1192 if (unlikely(PageKsm(page)))
1193 lock_page_memcg(page);
1194 else
1195 VM_BUG_ON_PAGE(!PageLocked(page), page);
1196
e9b61f19
KS
1197 if (compound) {
1198 atomic_t *mapcount;
53f9263b 1199 VM_BUG_ON_PAGE(!PageLocked(page), page);
e9b61f19
KS
1200 VM_BUG_ON_PAGE(!PageTransHuge(page), page);
1201 mapcount = compound_mapcount_ptr(page);
1202 first = atomic_inc_and_test(mapcount);
53f9263b
KS
1203 } else {
1204 first = atomic_inc_and_test(&page->_mapcount);
1205 }
6c287605
DH
1206 VM_BUG_ON_PAGE(!first && (flags & RMAP_EXCLUSIVE), page);
1207 VM_BUG_ON_PAGE(!first && PageAnonExclusive(page), page);
53f9263b 1208
79134171 1209 if (first) {
6c357848 1210 int nr = compound ? thp_nr_pages(page) : 1;
bea04b07
JZ
1211 /*
1212 * We use the irq-unsafe __{inc|mod}_zone_page_stat because
1213 * these counters are not modified in interrupt context, and
1214 * pte lock(a spinlock) is held, which implies preemption
1215 * disabled.
1216 */
65c45377 1217 if (compound)
69473e5d 1218 __mod_lruvec_page_state(page, NR_ANON_THPS, nr);
be5d0a74 1219 __mod_lruvec_page_state(page, NR_ANON_MAPPED, nr);
79134171 1220 }
5ad64688 1221
cea86fe2 1222 if (unlikely(PageKsm(page)))
be5d0a74 1223 unlock_page_memcg(page);
53f9263b 1224
5dbe0af4 1225 /* address might be in next vma when migration races vma_adjust */
cea86fe2 1226 else if (first)
d281ee61 1227 __page_set_anon_rmap(page, vma, address,
14f9135d 1228 !!(flags & RMAP_EXCLUSIVE));
69029cd5 1229 else
c97a9e10 1230 __page_check_anon_rmap(page, vma, address);
cea86fe2
HD
1231
1232 mlock_vma_page(page, vma, compound);
1da177e4
LT
1233}
1234
43d8eac4 1235/**
40f2bbf7 1236 * page_add_new_anon_rmap - add mapping to a new anonymous page
9617d95e
NP
1237 * @page: the page to add the mapping to
1238 * @vma: the vm area in which the mapping is added
1239 * @address: the user virtual address mapped
40f2bbf7
DH
1240 *
1241 * If it's a compound page, it is accounted as a compound page. As the page
1242 * is new, it's assume to get mapped exclusively by a single process.
9617d95e
NP
1243 *
1244 * Same as page_add_anon_rmap but must only be called on *new* pages.
1245 * This means the inc-and-test can be bypassed.
c97a9e10 1246 * Page does not have to be locked.
9617d95e
NP
1247 */
1248void page_add_new_anon_rmap(struct page *page,
40f2bbf7 1249 struct vm_area_struct *vma, unsigned long address)
9617d95e 1250{
40f2bbf7 1251 const bool compound = PageCompound(page);
6c357848 1252 int nr = compound ? thp_nr_pages(page) : 1;
d281ee61 1253
81d1b09c 1254 VM_BUG_ON_VMA(address < vma->vm_start || address >= vma->vm_end, vma);
fa9949da 1255 __SetPageSwapBacked(page);
d281ee61
KS
1256 if (compound) {
1257 VM_BUG_ON_PAGE(!PageTransHuge(page), page);
53f9263b
KS
1258 /* increment count (starts at -1) */
1259 atomic_set(compound_mapcount_ptr(page), 0);
5232c63f 1260 atomic_set(compound_pincount_ptr(page), 0);
47e29d32 1261
69473e5d 1262 __mod_lruvec_page_state(page, NR_ANON_THPS, nr);
53f9263b 1263 } else {
53f9263b
KS
1264 /* increment count (starts at -1) */
1265 atomic_set(&page->_mapcount, 0);
d281ee61 1266 }
be5d0a74 1267 __mod_lruvec_page_state(page, NR_ANON_MAPPED, nr);
e8a03feb 1268 __page_set_anon_rmap(page, vma, address, 1);
9617d95e
NP
1269}
1270
1da177e4
LT
1271/**
1272 * page_add_file_rmap - add pte mapping to a file page
cea86fe2
HD
1273 * @page: the page to add the mapping to
1274 * @vma: the vm area in which the mapping is added
1275 * @compound: charge the page as compound or small page
1da177e4 1276 *
b8072f09 1277 * The caller needs to hold the pte lock.
1da177e4 1278 */
cea86fe2
HD
1279void page_add_file_rmap(struct page *page,
1280 struct vm_area_struct *vma, bool compound)
1da177e4 1281{
5d543f13 1282 int i, nr = 0;
dd78fedd
KS
1283
1284 VM_BUG_ON_PAGE(compound && !PageTransHuge(page), page);
62cccb8c 1285 lock_page_memcg(page);
dd78fedd 1286 if (compound && PageTransHuge(page)) {
a1528e21
MS
1287 int nr_pages = thp_nr_pages(page);
1288
5d543f13 1289 for (i = 0; i < nr_pages; i++) {
dd78fedd
KS
1290 if (atomic_inc_and_test(&page[i]._mapcount))
1291 nr++;
1292 }
1293 if (!atomic_inc_and_test(compound_mapcount_ptr(page)))
1294 goto out;
bd55b0c2
HD
1295
1296 /*
1297 * It is racy to ClearPageDoubleMap in page_remove_file_rmap();
1298 * but page lock is held by all page_add_file_rmap() compound
1299 * callers, and SetPageDoubleMap below warns if !PageLocked:
1300 * so here is a place that DoubleMap can be safely cleared.
1301 */
1302 VM_WARN_ON_ONCE(!PageLocked(page));
1303 if (nr == nr_pages && PageDoubleMap(page))
1304 ClearPageDoubleMap(page);
1305
99cb0dbd 1306 if (PageSwapBacked(page))
a1528e21
MS
1307 __mod_lruvec_page_state(page, NR_SHMEM_PMDMAPPED,
1308 nr_pages);
99cb0dbd 1309 else
380780e7
MS
1310 __mod_lruvec_page_state(page, NR_FILE_PMDMAPPED,
1311 nr_pages);
dd78fedd 1312 } else {
c8efc390
KS
1313 if (PageTransCompound(page) && page_mapping(page)) {
1314 VM_WARN_ON_ONCE(!PageLocked(page));
cea86fe2 1315 SetPageDoubleMap(compound_head(page));
9a73f61b 1316 }
5d543f13
HD
1317 if (atomic_inc_and_test(&page->_mapcount))
1318 nr++;
d69b042f 1319 }
dd78fedd 1320out:
5d543f13
HD
1321 if (nr)
1322 __mod_lruvec_page_state(page, NR_FILE_MAPPED, nr);
62cccb8c 1323 unlock_page_memcg(page);
cea86fe2
HD
1324
1325 mlock_vma_page(page, vma, compound);
1da177e4
LT
1326}
1327
dd78fedd 1328static void page_remove_file_rmap(struct page *page, bool compound)
8186eb6a 1329{
5d543f13 1330 int i, nr = 0;
dd78fedd 1331
57dea93a 1332 VM_BUG_ON_PAGE(compound && !PageHead(page), page);
8186eb6a 1333
53f9263b
KS
1334 /* Hugepages are not counted in NR_FILE_MAPPED for now. */
1335 if (unlikely(PageHuge(page))) {
1336 /* hugetlb pages are always mapped with pmds */
1337 atomic_dec(compound_mapcount_ptr(page));
be5d0a74 1338 return;
53f9263b 1339 }
8186eb6a 1340
53f9263b 1341 /* page still mapped by someone else? */
dd78fedd 1342 if (compound && PageTransHuge(page)) {
a1528e21
MS
1343 int nr_pages = thp_nr_pages(page);
1344
5d543f13 1345 for (i = 0; i < nr_pages; i++) {
dd78fedd
KS
1346 if (atomic_add_negative(-1, &page[i]._mapcount))
1347 nr++;
1348 }
1349 if (!atomic_add_negative(-1, compound_mapcount_ptr(page)))
5d543f13 1350 goto out;
99cb0dbd 1351 if (PageSwapBacked(page))
a1528e21
MS
1352 __mod_lruvec_page_state(page, NR_SHMEM_PMDMAPPED,
1353 -nr_pages);
99cb0dbd 1354 else
380780e7
MS
1355 __mod_lruvec_page_state(page, NR_FILE_PMDMAPPED,
1356 -nr_pages);
dd78fedd 1357 } else {
5d543f13
HD
1358 if (atomic_add_negative(-1, &page->_mapcount))
1359 nr++;
dd78fedd 1360 }
5d543f13
HD
1361out:
1362 if (nr)
1363 __mod_lruvec_page_state(page, NR_FILE_MAPPED, -nr);
8186eb6a
JW
1364}
1365
53f9263b
KS
1366static void page_remove_anon_compound_rmap(struct page *page)
1367{
1368 int i, nr;
1369
1370 if (!atomic_add_negative(-1, compound_mapcount_ptr(page)))
1371 return;
1372
1373 /* Hugepages are not counted in NR_ANON_PAGES for now. */
1374 if (unlikely(PageHuge(page)))
1375 return;
1376
1377 if (!IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE))
1378 return;
1379
69473e5d 1380 __mod_lruvec_page_state(page, NR_ANON_THPS, -thp_nr_pages(page));
53f9263b
KS
1381
1382 if (TestClearPageDoubleMap(page)) {
1383 /*
1384 * Subpages can be mapped with PTEs too. Check how many of
f1fe80d4 1385 * them are still mapped.
53f9263b 1386 */
5eaf35ab 1387 for (i = 0, nr = 0; i < thp_nr_pages(page); i++) {
53f9263b
KS
1388 if (atomic_add_negative(-1, &page[i]._mapcount))
1389 nr++;
1390 }
f1fe80d4
KS
1391
1392 /*
1393 * Queue the page for deferred split if at least one small
1394 * page of the compound page is unmapped, but at least one
1395 * small page is still mapped.
1396 */
5eaf35ab 1397 if (nr && nr < thp_nr_pages(page))
f1fe80d4 1398 deferred_split_huge_page(page);
53f9263b 1399 } else {
5eaf35ab 1400 nr = thp_nr_pages(page);
53f9263b
KS
1401 }
1402
f1fe80d4 1403 if (nr)
be5d0a74 1404 __mod_lruvec_page_state(page, NR_ANON_MAPPED, -nr);
53f9263b
KS
1405}
1406
1da177e4
LT
1407/**
1408 * page_remove_rmap - take down pte mapping from a page
d281ee61 1409 * @page: page to remove mapping from
cea86fe2 1410 * @vma: the vm area from which the mapping is removed
d281ee61 1411 * @compound: uncharge the page as compound or small page
1da177e4 1412 *
b8072f09 1413 * The caller needs to hold the pte lock.
1da177e4 1414 */
cea86fe2
HD
1415void page_remove_rmap(struct page *page,
1416 struct vm_area_struct *vma, bool compound)
1da177e4 1417{
be5d0a74 1418 lock_page_memcg(page);
89c06bd5 1419
be5d0a74
JW
1420 if (!PageAnon(page)) {
1421 page_remove_file_rmap(page, compound);
1422 goto out;
1423 }
1424
1425 if (compound) {
1426 page_remove_anon_compound_rmap(page);
1427 goto out;
1428 }
53f9263b 1429
b904dcfe
KM
1430 /* page still mapped by someone else? */
1431 if (!atomic_add_negative(-1, &page->_mapcount))
be5d0a74 1432 goto out;
8186eb6a 1433
0fe6e20b 1434 /*
bea04b07
JZ
1435 * We use the irq-unsafe __{inc|mod}_zone_page_stat because
1436 * these counters are not modified in interrupt context, and
bea04b07 1437 * pte lock(a spinlock) is held, which implies preemption disabled.
0fe6e20b 1438 */
be5d0a74 1439 __dec_lruvec_page_state(page, NR_ANON_MAPPED);
8186eb6a 1440
9a982250
KS
1441 if (PageTransCompound(page))
1442 deferred_split_huge_page(compound_head(page));
1443
b904dcfe
KM
1444 /*
1445 * It would be tidy to reset the PageAnon mapping here,
1446 * but that might overwrite a racing page_add_anon_rmap
1447 * which increments mapcount after us but sets mapping
2d4894b5 1448 * before us: so leave the reset to free_unref_page,
b904dcfe
KM
1449 * and remember that it's only reliable while mapped.
1450 * Leaving it set also helps swapoff to reinstate ptes
1451 * faster for those pages still in swapcache.
1452 */
be5d0a74
JW
1453out:
1454 unlock_page_memcg(page);
cea86fe2
HD
1455
1456 munlock_vma_page(page, vma, compound);
1da177e4
LT
1457}
1458
1459/*
52629506 1460 * @arg: enum ttu_flags will be passed to this argument
1da177e4 1461 */
2f031c6f 1462static bool try_to_unmap_one(struct folio *folio, struct vm_area_struct *vma,
52629506 1463 unsigned long address, void *arg)
1da177e4
LT
1464{
1465 struct mm_struct *mm = vma->vm_mm;
869f7ee6 1466 DEFINE_FOLIO_VMA_WALK(pvmw, folio, vma, address, 0);
1da177e4 1467 pte_t pteval;
c7ab0d2f 1468 struct page *subpage;
6c287605 1469 bool anon_exclusive, ret = true;
ac46d4f3 1470 struct mmu_notifier_range range;
4708f318 1471 enum ttu_flags flags = (enum ttu_flags)(long)arg;
1da177e4 1472
732ed558
HD
1473 /*
1474 * When racing against e.g. zap_pte_range() on another cpu,
1475 * in between its ptep_get_and_clear_full() and page_remove_rmap(),
1fb08ac6 1476 * try_to_unmap() may return before page_mapped() has become false,
732ed558
HD
1477 * if page table locking is skipped: use TTU_SYNC to wait for that.
1478 */
1479 if (flags & TTU_SYNC)
1480 pvmw.flags = PVMW_SYNC;
1481
a98a2f0c 1482 if (flags & TTU_SPLIT_HUGE_PMD)
af28a988 1483 split_huge_pmd_address(vma, address, false, folio);
fec89c10 1484
369ea824 1485 /*
017b1660
MK
1486 * For THP, we have to assume the worse case ie pmd for invalidation.
1487 * For hugetlb, it could be much worse if we need to do pud
1488 * invalidation in the case of pmd sharing.
1489 *
869f7ee6
MWO
1490 * Note that the folio can not be freed in this function as call of
1491 * try_to_unmap() must hold a reference on the folio.
369ea824 1492 */
2aff7a47 1493 range.end = vma_address_end(&pvmw);
7269f999 1494 mmu_notifier_range_init(&range, MMU_NOTIFY_CLEAR, 0, vma, vma->vm_mm,
494334e4 1495 address, range.end);
869f7ee6 1496 if (folio_test_hugetlb(folio)) {
017b1660
MK
1497 /*
1498 * If sharing is possible, start and end will be adjusted
1499 * accordingly.
1500 */
ac46d4f3
JG
1501 adjust_range_if_pmd_sharing_possible(vma, &range.start,
1502 &range.end);
017b1660 1503 }
ac46d4f3 1504 mmu_notifier_invalidate_range_start(&range);
369ea824 1505
c7ab0d2f 1506 while (page_vma_mapped_walk(&pvmw)) {
cea86fe2 1507 /* Unexpected PMD-mapped THP? */
869f7ee6 1508 VM_BUG_ON_FOLIO(!pvmw.pte, folio);
cea86fe2 1509
c7ab0d2f 1510 /*
869f7ee6 1511 * If the folio is in an mlock()d vma, we must not swap it out.
c7ab0d2f 1512 */
efdb6720
HD
1513 if (!(flags & TTU_IGNORE_MLOCK) &&
1514 (vma->vm_flags & VM_LOCKED)) {
cea86fe2 1515 /* Restore the mlock which got missed */
869f7ee6 1516 mlock_vma_folio(folio, vma, false);
efdb6720
HD
1517 page_vma_mapped_walk_done(&pvmw);
1518 ret = false;
1519 break;
b87537d9 1520 }
c7ab0d2f 1521
869f7ee6
MWO
1522 subpage = folio_page(folio,
1523 pte_pfn(*pvmw.pte) - folio_pfn(folio));
785373b4 1524 address = pvmw.address;
6c287605
DH
1525 anon_exclusive = folio_test_anon(folio) &&
1526 PageAnonExclusive(subpage);
785373b4 1527
869f7ee6 1528 if (folio_test_hugetlb(folio) && !folio_test_anon(folio)) {
c0d0381a
MK
1529 /*
1530 * To call huge_pmd_unshare, i_mmap_rwsem must be
1531 * held in write mode. Caller needs to explicitly
1532 * do this outside rmap routines.
1533 */
1534 VM_BUG_ON(!(flags & TTU_RMAP_LOCKED));
34ae204f 1535 if (huge_pmd_unshare(mm, vma, &address, pvmw.pte)) {
017b1660
MK
1536 /*
1537 * huge_pmd_unshare unmapped an entire PMD
1538 * page. There is no way of knowing exactly
1539 * which PMDs may be cached for this mm, so
1540 * we must flush them all. start/end were
1541 * already adjusted above to cover this range.
1542 */
ac46d4f3
JG
1543 flush_cache_range(vma, range.start, range.end);
1544 flush_tlb_range(vma, range.start, range.end);
1545 mmu_notifier_invalidate_range(mm, range.start,
1546 range.end);
017b1660
MK
1547
1548 /*
1549 * The ref count of the PMD page was dropped
1550 * which is part of the way map counting
1551 * is done for shared PMDs. Return 'true'
1552 * here. When there is no other sharing,
1553 * huge_pmd_unshare returns false and we will
1554 * unmap the actual page and drop map count
1555 * to zero.
1556 */
1557 page_vma_mapped_walk_done(&pvmw);
1558 break;
1559 }
1560 }
8346242a 1561
6c287605
DH
1562 /*
1563 * Nuke the page table entry. When having to clear
1564 * PageAnonExclusive(), we always have to flush.
1565 */
785373b4 1566 flush_cache_page(vma, address, pte_pfn(*pvmw.pte));
6c287605 1567 if (should_defer_flush(mm, flags) && !anon_exclusive) {
c7ab0d2f
KS
1568 /*
1569 * We clear the PTE but do not flush so potentially
869f7ee6 1570 * a remote CPU could still be writing to the folio.
c7ab0d2f
KS
1571 * If the entry was previously clean then the
1572 * architecture must guarantee that a clear->dirty
1573 * transition on a cached TLB entry is written through
1574 * and traps if the PTE is unmapped.
1575 */
785373b4 1576 pteval = ptep_get_and_clear(mm, address, pvmw.pte);
c7ab0d2f
KS
1577
1578 set_tlb_ubc_flush_pending(mm, pte_dirty(pteval));
1579 } else {
785373b4 1580 pteval = ptep_clear_flush(vma, address, pvmw.pte);
c7ab0d2f 1581 }
72b252ae 1582
869f7ee6 1583 /* Set the dirty flag on the folio now the pte is gone. */
c7ab0d2f 1584 if (pte_dirty(pteval))
869f7ee6 1585 folio_mark_dirty(folio);
1da177e4 1586
c7ab0d2f
KS
1587 /* Update high watermark before we lower rss */
1588 update_hiwater_rss(mm);
1da177e4 1589
da358d5c 1590 if (PageHWPoison(subpage) && !(flags & TTU_IGNORE_HWPOISON)) {
5fd27b8e 1591 pteval = swp_entry_to_pte(make_hwpoison_entry(subpage));
869f7ee6
MWO
1592 if (folio_test_hugetlb(folio)) {
1593 hugetlb_count_sub(folio_nr_pages(folio), mm);
785373b4 1594 set_huge_swap_pte_at(mm, address,
5fd27b8e
PA
1595 pvmw.pte, pteval,
1596 vma_mmu_pagesize(vma));
c7ab0d2f 1597 } else {
869f7ee6 1598 dec_mm_counter(mm, mm_counter(&folio->page));
785373b4 1599 set_pte_at(mm, address, pvmw.pte, pteval);
c7ab0d2f 1600 }
365e9c87 1601
bce73e48 1602 } else if (pte_unused(pteval) && !userfaultfd_armed(vma)) {
c7ab0d2f
KS
1603 /*
1604 * The guest indicated that the page content is of no
1605 * interest anymore. Simply discard the pte, vmscan
1606 * will take care of the rest.
bce73e48
CB
1607 * A future reference will then fault in a new zero
1608 * page. When userfaultfd is active, we must not drop
1609 * this page though, as its main user (postcopy
1610 * migration) will not expect userfaults on already
1611 * copied pages.
c7ab0d2f 1612 */
869f7ee6 1613 dec_mm_counter(mm, mm_counter(&folio->page));
0f10851e
JG
1614 /* We have to invalidate as we cleared the pte */
1615 mmu_notifier_invalidate_range(mm, address,
1616 address + PAGE_SIZE);
869f7ee6 1617 } else if (folio_test_anon(folio)) {
c7ab0d2f
KS
1618 swp_entry_t entry = { .val = page_private(subpage) };
1619 pte_t swp_pte;
1620 /*
1621 * Store the swap location in the pte.
1622 * See handle_pte_fault() ...
1623 */
869f7ee6
MWO
1624 if (unlikely(folio_test_swapbacked(folio) !=
1625 folio_test_swapcache(folio))) {
eb94a878 1626 WARN_ON_ONCE(1);
83612a94 1627 ret = false;
369ea824 1628 /* We have to invalidate as we cleared the pte */
0f10851e
JG
1629 mmu_notifier_invalidate_range(mm, address,
1630 address + PAGE_SIZE);
eb94a878
MK
1631 page_vma_mapped_walk_done(&pvmw);
1632 break;
1633 }
c7ab0d2f 1634
802a3a92 1635 /* MADV_FREE page check */
869f7ee6 1636 if (!folio_test_swapbacked(folio)) {
6c8e2a25
MFO
1637 int ref_count, map_count;
1638
1639 /*
1640 * Synchronize with gup_pte_range():
1641 * - clear PTE; barrier; read refcount
1642 * - inc refcount; barrier; read PTE
1643 */
1644 smp_mb();
1645
1646 ref_count = folio_ref_count(folio);
1647 map_count = folio_mapcount(folio);
1648
1649 /*
1650 * Order reads for page refcount and dirty flag
1651 * (see comments in __remove_mapping()).
1652 */
1653 smp_rmb();
1654
1655 /*
1656 * The only page refs must be one from isolation
1657 * plus the rmap(s) (dropped by discard:).
1658 */
1659 if (ref_count == 1 + map_count &&
1660 !folio_test_dirty(folio)) {
0f10851e
JG
1661 /* Invalidate as we cleared the pte */
1662 mmu_notifier_invalidate_range(mm,
1663 address, address + PAGE_SIZE);
802a3a92
SL
1664 dec_mm_counter(mm, MM_ANONPAGES);
1665 goto discard;
1666 }
1667
1668 /*
869f7ee6 1669 * If the folio was redirtied, it cannot be
802a3a92
SL
1670 * discarded. Remap the page to page table.
1671 */
785373b4 1672 set_pte_at(mm, address, pvmw.pte, pteval);
869f7ee6 1673 folio_set_swapbacked(folio);
e4b82222 1674 ret = false;
802a3a92
SL
1675 page_vma_mapped_walk_done(&pvmw);
1676 break;
c7ab0d2f 1677 }
854e9ed0 1678
c7ab0d2f 1679 if (swap_duplicate(entry) < 0) {
785373b4 1680 set_pte_at(mm, address, pvmw.pte, pteval);
e4b82222 1681 ret = false;
c7ab0d2f
KS
1682 page_vma_mapped_walk_done(&pvmw);
1683 break;
1684 }
ca827d55 1685 if (arch_unmap_one(mm, vma, address, pteval) < 0) {
322842ea 1686 swap_free(entry);
ca827d55
KA
1687 set_pte_at(mm, address, pvmw.pte, pteval);
1688 ret = false;
1689 page_vma_mapped_walk_done(&pvmw);
1690 break;
1691 }
6c287605
DH
1692 if (anon_exclusive &&
1693 page_try_share_anon_rmap(subpage)) {
1694 swap_free(entry);
1695 set_pte_at(mm, address, pvmw.pte, pteval);
1696 ret = false;
1697 page_vma_mapped_walk_done(&pvmw);
1698 break;
1699 }
1700 /*
1701 * Note: We *don't* remember yet if the page was mapped
1702 * exclusively in the swap entry, so swapin code has
1703 * to re-determine that manually and might detect the
1704 * page as possibly shared, for example, if there are
1705 * other references on the page or if the page is under
1706 * writeback. We made sure that there are no GUP pins
1707 * on the page that would rely on it, so for GUP pins
1708 * this is fine.
1709 */
c7ab0d2f
KS
1710 if (list_empty(&mm->mmlist)) {
1711 spin_lock(&mmlist_lock);
1712 if (list_empty(&mm->mmlist))
1713 list_add(&mm->mmlist, &init_mm.mmlist);
1714 spin_unlock(&mmlist_lock);
1715 }
854e9ed0 1716 dec_mm_counter(mm, MM_ANONPAGES);
c7ab0d2f
KS
1717 inc_mm_counter(mm, MM_SWAPENTS);
1718 swp_pte = swp_entry_to_pte(entry);
1719 if (pte_soft_dirty(pteval))
1720 swp_pte = pte_swp_mksoft_dirty(swp_pte);
f45ec5ff
PX
1721 if (pte_uffd_wp(pteval))
1722 swp_pte = pte_swp_mkuffd_wp(swp_pte);
785373b4 1723 set_pte_at(mm, address, pvmw.pte, swp_pte);
0f10851e
JG
1724 /* Invalidate as we cleared the pte */
1725 mmu_notifier_invalidate_range(mm, address,
1726 address + PAGE_SIZE);
1727 } else {
1728 /*
869f7ee6
MWO
1729 * This is a locked file-backed folio,
1730 * so it cannot be removed from the page
1731 * cache and replaced by a new folio before
1732 * mmu_notifier_invalidate_range_end, so no
1733 * concurrent thread might update its page table
1734 * to point at a new folio while a device is
1735 * still using this folio.
0f10851e 1736 *
ad56b738 1737 * See Documentation/vm/mmu_notifier.rst
0f10851e 1738 */
869f7ee6 1739 dec_mm_counter(mm, mm_counter_file(&folio->page));
0f10851e 1740 }
854e9ed0 1741discard:
0f10851e
JG
1742 /*
1743 * No need to call mmu_notifier_invalidate_range() it has be
1744 * done above for all cases requiring it to happen under page
1745 * table lock before mmu_notifier_invalidate_range_end()
1746 *
ad56b738 1747 * See Documentation/vm/mmu_notifier.rst
0f10851e 1748 */
869f7ee6 1749 page_remove_rmap(subpage, vma, folio_test_hugetlb(folio));
b7435507 1750 if (vma->vm_flags & VM_LOCKED)
adb11e78 1751 mlock_page_drain_local();
869f7ee6 1752 folio_put(folio);
c7ab0d2f 1753 }
369ea824 1754
ac46d4f3 1755 mmu_notifier_invalidate_range_end(&range);
369ea824 1756
caed0f48 1757 return ret;
1da177e4
LT
1758}
1759
52629506
JK
1760static bool invalid_migration_vma(struct vm_area_struct *vma, void *arg)
1761{
222100ee 1762 return vma_is_temporary_stack(vma);
52629506
JK
1763}
1764
2f031c6f 1765static int page_not_mapped(struct folio *folio)
52629506 1766{
2f031c6f 1767 return !folio_mapped(folio);
2a52bcbc 1768}
52629506 1769
1da177e4 1770/**
869f7ee6
MWO
1771 * try_to_unmap - Try to remove all page table mappings to a folio.
1772 * @folio: The folio to unmap.
14fa31b8 1773 * @flags: action and flags
1da177e4
LT
1774 *
1775 * Tries to remove all the page table entries which are mapping this
869f7ee6
MWO
1776 * folio. It is the caller's responsibility to check if the folio is
1777 * still mapped if needed (use TTU_SYNC to prevent accounting races).
1da177e4 1778 *
869f7ee6 1779 * Context: Caller must hold the folio lock.
1da177e4 1780 */
869f7ee6 1781void try_to_unmap(struct folio *folio, enum ttu_flags flags)
1da177e4 1782{
52629506
JK
1783 struct rmap_walk_control rwc = {
1784 .rmap_one = try_to_unmap_one,
802a3a92 1785 .arg = (void *)flags,
b7e188ec 1786 .done = page_not_mapped,
2f031c6f 1787 .anon_lock = folio_lock_anon_vma_read,
52629506 1788 };
1da177e4 1789
a98a2f0c 1790 if (flags & TTU_RMAP_LOCKED)
2f031c6f 1791 rmap_walk_locked(folio, &rwc);
a98a2f0c 1792 else
2f031c6f 1793 rmap_walk(folio, &rwc);
a98a2f0c
AP
1794}
1795
1796/*
1797 * @arg: enum ttu_flags will be passed to this argument.
1798 *
1799 * If TTU_SPLIT_HUGE_PMD is specified any PMD mappings will be split into PTEs
64b586d1 1800 * containing migration entries.
a98a2f0c 1801 */
2f031c6f 1802static bool try_to_migrate_one(struct folio *folio, struct vm_area_struct *vma,
a98a2f0c
AP
1803 unsigned long address, void *arg)
1804{
1805 struct mm_struct *mm = vma->vm_mm;
4b8554c5 1806 DEFINE_FOLIO_VMA_WALK(pvmw, folio, vma, address, 0);
a98a2f0c
AP
1807 pte_t pteval;
1808 struct page *subpage;
6c287605 1809 bool anon_exclusive, ret = true;
a98a2f0c
AP
1810 struct mmu_notifier_range range;
1811 enum ttu_flags flags = (enum ttu_flags)(long)arg;
1812
a98a2f0c
AP
1813 /*
1814 * When racing against e.g. zap_pte_range() on another cpu,
1815 * in between its ptep_get_and_clear_full() and page_remove_rmap(),
1816 * try_to_migrate() may return before page_mapped() has become false,
1817 * if page table locking is skipped: use TTU_SYNC to wait for that.
1818 */
1819 if (flags & TTU_SYNC)
1820 pvmw.flags = PVMW_SYNC;
1821
1822 /*
1823 * unmap_page() in mm/huge_memory.c is the only user of migration with
1824 * TTU_SPLIT_HUGE_PMD and it wants to freeze.
1825 */
1826 if (flags & TTU_SPLIT_HUGE_PMD)
af28a988 1827 split_huge_pmd_address(vma, address, true, folio);
a98a2f0c
AP
1828
1829 /*
1830 * For THP, we have to assume the worse case ie pmd for invalidation.
1831 * For hugetlb, it could be much worse if we need to do pud
1832 * invalidation in the case of pmd sharing.
1833 *
1834 * Note that the page can not be free in this function as call of
1835 * try_to_unmap() must hold a reference on the page.
1836 */
2aff7a47 1837 range.end = vma_address_end(&pvmw);
a98a2f0c
AP
1838 mmu_notifier_range_init(&range, MMU_NOTIFY_CLEAR, 0, vma, vma->vm_mm,
1839 address, range.end);
4b8554c5 1840 if (folio_test_hugetlb(folio)) {
a98a2f0c
AP
1841 /*
1842 * If sharing is possible, start and end will be adjusted
1843 * accordingly.
1844 */
1845 adjust_range_if_pmd_sharing_possible(vma, &range.start,
1846 &range.end);
1847 }
1848 mmu_notifier_invalidate_range_start(&range);
1849
1850 while (page_vma_mapped_walk(&pvmw)) {
1851#ifdef CONFIG_ARCH_ENABLE_THP_MIGRATION
1852 /* PMD-mapped THP migration entry */
1853 if (!pvmw.pte) {
4b8554c5
MWO
1854 subpage = folio_page(folio,
1855 pmd_pfn(*pvmw.pmd) - folio_pfn(folio));
1856 VM_BUG_ON_FOLIO(folio_test_hugetlb(folio) ||
1857 !folio_test_pmd_mappable(folio), folio);
a98a2f0c 1858
7f5abe60
DH
1859 if (set_pmd_migration_entry(&pvmw, subpage)) {
1860 ret = false;
1861 page_vma_mapped_walk_done(&pvmw);
1862 break;
1863 }
a98a2f0c
AP
1864 continue;
1865 }
1866#endif
1867
1868 /* Unexpected PMD-mapped THP? */
4b8554c5 1869 VM_BUG_ON_FOLIO(!pvmw.pte, folio);
a98a2f0c 1870
4b8554c5
MWO
1871 subpage = folio_page(folio,
1872 pte_pfn(*pvmw.pte) - folio_pfn(folio));
a98a2f0c 1873 address = pvmw.address;
6c287605
DH
1874 anon_exclusive = folio_test_anon(folio) &&
1875 PageAnonExclusive(subpage);
a98a2f0c 1876
4b8554c5 1877 if (folio_test_hugetlb(folio) && !folio_test_anon(folio)) {
a98a2f0c
AP
1878 /*
1879 * To call huge_pmd_unshare, i_mmap_rwsem must be
1880 * held in write mode. Caller needs to explicitly
1881 * do this outside rmap routines.
1882 */
1883 VM_BUG_ON(!(flags & TTU_RMAP_LOCKED));
1884 if (huge_pmd_unshare(mm, vma, &address, pvmw.pte)) {
1885 /*
1886 * huge_pmd_unshare unmapped an entire PMD
1887 * page. There is no way of knowing exactly
1888 * which PMDs may be cached for this mm, so
1889 * we must flush them all. start/end were
1890 * already adjusted above to cover this range.
1891 */
1892 flush_cache_range(vma, range.start, range.end);
1893 flush_tlb_range(vma, range.start, range.end);
1894 mmu_notifier_invalidate_range(mm, range.start,
1895 range.end);
1896
1897 /*
1898 * The ref count of the PMD page was dropped
1899 * which is part of the way map counting
1900 * is done for shared PMDs. Return 'true'
1901 * here. When there is no other sharing,
1902 * huge_pmd_unshare returns false and we will
1903 * unmap the actual page and drop map count
1904 * to zero.
1905 */
1906 page_vma_mapped_walk_done(&pvmw);
1907 break;
1908 }
1909 }
1910
1911 /* Nuke the page table entry. */
1912 flush_cache_page(vma, address, pte_pfn(*pvmw.pte));
1913 pteval = ptep_clear_flush(vma, address, pvmw.pte);
1914
4b8554c5 1915 /* Set the dirty flag on the folio now the pte is gone. */
a98a2f0c 1916 if (pte_dirty(pteval))
4b8554c5 1917 folio_mark_dirty(folio);
a98a2f0c
AP
1918
1919 /* Update high watermark before we lower rss */
1920 update_hiwater_rss(mm);
1921
4b8554c5
MWO
1922 if (folio_is_zone_device(folio)) {
1923 unsigned long pfn = folio_pfn(folio);
a98a2f0c
AP
1924 swp_entry_t entry;
1925 pte_t swp_pte;
1926
6c287605
DH
1927 if (anon_exclusive)
1928 BUG_ON(page_try_share_anon_rmap(subpage));
1929
a98a2f0c
AP
1930 /*
1931 * Store the pfn of the page in a special migration
1932 * pte. do_swap_page() will wait until the migration
1933 * pte is removed and then restart fault handling.
1934 */
3d88705c
AP
1935 entry = pte_to_swp_entry(pteval);
1936 if (is_writable_device_private_entry(entry))
1937 entry = make_writable_migration_entry(pfn);
6c287605
DH
1938 else if (anon_exclusive)
1939 entry = make_readable_exclusive_migration_entry(pfn);
3d88705c
AP
1940 else
1941 entry = make_readable_migration_entry(pfn);
a98a2f0c
AP
1942 swp_pte = swp_entry_to_pte(entry);
1943
1944 /*
1945 * pteval maps a zone device page and is therefore
1946 * a swap pte.
1947 */
1948 if (pte_swp_soft_dirty(pteval))
1949 swp_pte = pte_swp_mksoft_dirty(swp_pte);
1950 if (pte_swp_uffd_wp(pteval))
1951 swp_pte = pte_swp_mkuffd_wp(swp_pte);
1952 set_pte_at(mm, pvmw.address, pvmw.pte, swp_pte);
4cc79b33
AK
1953 trace_set_migration_pte(pvmw.address, pte_val(swp_pte),
1954 compound_order(&folio->page));
a98a2f0c
AP
1955 /*
1956 * No need to invalidate here it will synchronize on
1957 * against the special swap migration pte.
1958 *
1959 * The assignment to subpage above was computed from a
1960 * swap PTE which results in an invalid pointer.
1961 * Since only PAGE_SIZE pages can currently be
1962 * migrated, just set it to page. This will need to be
1963 * changed when hugepage migrations to device private
1964 * memory are supported.
1965 */
4b8554c5 1966 subpage = &folio->page;
da358d5c 1967 } else if (PageHWPoison(subpage)) {
a98a2f0c 1968 pteval = swp_entry_to_pte(make_hwpoison_entry(subpage));
4b8554c5
MWO
1969 if (folio_test_hugetlb(folio)) {
1970 hugetlb_count_sub(folio_nr_pages(folio), mm);
a98a2f0c
AP
1971 set_huge_swap_pte_at(mm, address,
1972 pvmw.pte, pteval,
1973 vma_mmu_pagesize(vma));
1974 } else {
4b8554c5 1975 dec_mm_counter(mm, mm_counter(&folio->page));
a98a2f0c
AP
1976 set_pte_at(mm, address, pvmw.pte, pteval);
1977 }
1978
1979 } else if (pte_unused(pteval) && !userfaultfd_armed(vma)) {
1980 /*
1981 * The guest indicated that the page content is of no
1982 * interest anymore. Simply discard the pte, vmscan
1983 * will take care of the rest.
1984 * A future reference will then fault in a new zero
1985 * page. When userfaultfd is active, we must not drop
1986 * this page though, as its main user (postcopy
1987 * migration) will not expect userfaults on already
1988 * copied pages.
1989 */
4b8554c5 1990 dec_mm_counter(mm, mm_counter(&folio->page));
a98a2f0c
AP
1991 /* We have to invalidate as we cleared the pte */
1992 mmu_notifier_invalidate_range(mm, address,
1993 address + PAGE_SIZE);
1994 } else {
1995 swp_entry_t entry;
1996 pte_t swp_pte;
1997
1998 if (arch_unmap_one(mm, vma, address, pteval) < 0) {
1999 set_pte_at(mm, address, pvmw.pte, pteval);
2000 ret = false;
2001 page_vma_mapped_walk_done(&pvmw);
2002 break;
2003 }
6c287605
DH
2004 VM_BUG_ON_PAGE(pte_write(pteval) && folio_test_anon(folio) &&
2005 !anon_exclusive, subpage);
2006 if (anon_exclusive &&
2007 page_try_share_anon_rmap(subpage)) {
2008 set_pte_at(mm, address, pvmw.pte, pteval);
2009 ret = false;
2010 page_vma_mapped_walk_done(&pvmw);
2011 break;
2012 }
a98a2f0c
AP
2013
2014 /*
2015 * Store the pfn of the page in a special migration
2016 * pte. do_swap_page() will wait until the migration
2017 * pte is removed and then restart fault handling.
2018 */
2019 if (pte_write(pteval))
2020 entry = make_writable_migration_entry(
2021 page_to_pfn(subpage));
6c287605
DH
2022 else if (anon_exclusive)
2023 entry = make_readable_exclusive_migration_entry(
2024 page_to_pfn(subpage));
a98a2f0c
AP
2025 else
2026 entry = make_readable_migration_entry(
2027 page_to_pfn(subpage));
2028
2029 swp_pte = swp_entry_to_pte(entry);
2030 if (pte_soft_dirty(pteval))
2031 swp_pte = pte_swp_mksoft_dirty(swp_pte);
2032 if (pte_uffd_wp(pteval))
2033 swp_pte = pte_swp_mkuffd_wp(swp_pte);
2034 set_pte_at(mm, address, pvmw.pte, swp_pte);
4cc79b33
AK
2035 trace_set_migration_pte(address, pte_val(swp_pte),
2036 compound_order(&folio->page));
a98a2f0c
AP
2037 /*
2038 * No need to invalidate here it will synchronize on
2039 * against the special swap migration pte.
2040 */
2041 }
2042
2043 /*
2044 * No need to call mmu_notifier_invalidate_range() it has be
2045 * done above for all cases requiring it to happen under page
2046 * table lock before mmu_notifier_invalidate_range_end()
2047 *
2048 * See Documentation/vm/mmu_notifier.rst
2049 */
4b8554c5 2050 page_remove_rmap(subpage, vma, folio_test_hugetlb(folio));
b7435507 2051 if (vma->vm_flags & VM_LOCKED)
adb11e78 2052 mlock_page_drain_local();
4b8554c5 2053 folio_put(folio);
a98a2f0c
AP
2054 }
2055
2056 mmu_notifier_invalidate_range_end(&range);
2057
2058 return ret;
2059}
2060
2061/**
2062 * try_to_migrate - try to replace all page table mappings with swap entries
4b8554c5 2063 * @folio: the folio to replace page table entries for
a98a2f0c
AP
2064 * @flags: action and flags
2065 *
4b8554c5
MWO
2066 * Tries to remove all the page table entries which are mapping this folio and
2067 * replace them with special swap entries. Caller must hold the folio lock.
a98a2f0c 2068 */
4b8554c5 2069void try_to_migrate(struct folio *folio, enum ttu_flags flags)
a98a2f0c
AP
2070{
2071 struct rmap_walk_control rwc = {
2072 .rmap_one = try_to_migrate_one,
2073 .arg = (void *)flags,
2074 .done = page_not_mapped,
2f031c6f 2075 .anon_lock = folio_lock_anon_vma_read,
a98a2f0c
AP
2076 };
2077
2078 /*
2079 * Migration always ignores mlock and only supports TTU_RMAP_LOCKED and
2080 * TTU_SPLIT_HUGE_PMD and TTU_SYNC flags.
2081 */
2082 if (WARN_ON_ONCE(flags & ~(TTU_RMAP_LOCKED | TTU_SPLIT_HUGE_PMD |
2083 TTU_SYNC)))
2084 return;
2085
4b8554c5 2086 if (folio_is_zone_device(folio) && !folio_is_device_private(folio))
6c855fce
HD
2087 return;
2088
52629506
JK
2089 /*
2090 * During exec, a temporary VMA is setup and later moved.
2091 * The VMA is moved under the anon_vma lock but not the
2092 * page tables leading to a race where migration cannot
2093 * find the migration ptes. Rather than increasing the
2094 * locking requirements of exec(), migration skips
2095 * temporary VMAs until after exec() completes.
2096 */
4b8554c5 2097 if (!folio_test_ksm(folio) && folio_test_anon(folio))
52629506
JK
2098 rwc.invalid_vma = invalid_migration_vma;
2099
2a52bcbc 2100 if (flags & TTU_RMAP_LOCKED)
2f031c6f 2101 rmap_walk_locked(folio, &rwc);
2a52bcbc 2102 else
2f031c6f 2103 rmap_walk(folio, &rwc);
b291f000 2104}
e9995ef9 2105
b756a3b5
AP
2106#ifdef CONFIG_DEVICE_PRIVATE
2107struct make_exclusive_args {
2108 struct mm_struct *mm;
2109 unsigned long address;
2110 void *owner;
2111 bool valid;
2112};
2113
2f031c6f 2114static bool page_make_device_exclusive_one(struct folio *folio,
b756a3b5
AP
2115 struct vm_area_struct *vma, unsigned long address, void *priv)
2116{
2117 struct mm_struct *mm = vma->vm_mm;
0d251485 2118 DEFINE_FOLIO_VMA_WALK(pvmw, folio, vma, address, 0);
b756a3b5
AP
2119 struct make_exclusive_args *args = priv;
2120 pte_t pteval;
2121 struct page *subpage;
2122 bool ret = true;
2123 struct mmu_notifier_range range;
2124 swp_entry_t entry;
2125 pte_t swp_pte;
2126
2127 mmu_notifier_range_init_owner(&range, MMU_NOTIFY_EXCLUSIVE, 0, vma,
2128 vma->vm_mm, address, min(vma->vm_end,
0d251485
MWO
2129 address + folio_size(folio)),
2130 args->owner);
b756a3b5
AP
2131 mmu_notifier_invalidate_range_start(&range);
2132
2133 while (page_vma_mapped_walk(&pvmw)) {
2134 /* Unexpected PMD-mapped THP? */
0d251485 2135 VM_BUG_ON_FOLIO(!pvmw.pte, folio);
b756a3b5
AP
2136
2137 if (!pte_present(*pvmw.pte)) {
2138 ret = false;
2139 page_vma_mapped_walk_done(&pvmw);
2140 break;
2141 }
2142
0d251485
MWO
2143 subpage = folio_page(folio,
2144 pte_pfn(*pvmw.pte) - folio_pfn(folio));
b756a3b5
AP
2145 address = pvmw.address;
2146
2147 /* Nuke the page table entry. */
2148 flush_cache_page(vma, address, pte_pfn(*pvmw.pte));
2149 pteval = ptep_clear_flush(vma, address, pvmw.pte);
2150
0d251485 2151 /* Set the dirty flag on the folio now the pte is gone. */
b756a3b5 2152 if (pte_dirty(pteval))
0d251485 2153 folio_mark_dirty(folio);
b756a3b5
AP
2154
2155 /*
2156 * Check that our target page is still mapped at the expected
2157 * address.
2158 */
2159 if (args->mm == mm && args->address == address &&
2160 pte_write(pteval))
2161 args->valid = true;
2162
2163 /*
2164 * Store the pfn of the page in a special migration
2165 * pte. do_swap_page() will wait until the migration
2166 * pte is removed and then restart fault handling.
2167 */
2168 if (pte_write(pteval))
2169 entry = make_writable_device_exclusive_entry(
2170 page_to_pfn(subpage));
2171 else
2172 entry = make_readable_device_exclusive_entry(
2173 page_to_pfn(subpage));
2174 swp_pte = swp_entry_to_pte(entry);
2175 if (pte_soft_dirty(pteval))
2176 swp_pte = pte_swp_mksoft_dirty(swp_pte);
2177 if (pte_uffd_wp(pteval))
2178 swp_pte = pte_swp_mkuffd_wp(swp_pte);
2179
2180 set_pte_at(mm, address, pvmw.pte, swp_pte);
2181
2182 /*
2183 * There is a reference on the page for the swap entry which has
2184 * been removed, so shouldn't take another.
2185 */
cea86fe2 2186 page_remove_rmap(subpage, vma, false);
b756a3b5
AP
2187 }
2188
2189 mmu_notifier_invalidate_range_end(&range);
2190
2191 return ret;
2192}
2193
2194/**
0d251485
MWO
2195 * folio_make_device_exclusive - Mark the folio exclusively owned by a device.
2196 * @folio: The folio to replace page table entries for.
2197 * @mm: The mm_struct where the folio is expected to be mapped.
2198 * @address: Address where the folio is expected to be mapped.
b756a3b5
AP
2199 * @owner: passed to MMU_NOTIFY_EXCLUSIVE range notifier callbacks
2200 *
0d251485
MWO
2201 * Tries to remove all the page table entries which are mapping this
2202 * folio and replace them with special device exclusive swap entries to
2203 * grant a device exclusive access to the folio.
b756a3b5 2204 *
0d251485
MWO
2205 * Context: Caller must hold the folio lock.
2206 * Return: false if the page is still mapped, or if it could not be unmapped
b756a3b5
AP
2207 * from the expected address. Otherwise returns true (success).
2208 */
0d251485
MWO
2209static bool folio_make_device_exclusive(struct folio *folio,
2210 struct mm_struct *mm, unsigned long address, void *owner)
b756a3b5
AP
2211{
2212 struct make_exclusive_args args = {
2213 .mm = mm,
2214 .address = address,
2215 .owner = owner,
2216 .valid = false,
2217 };
2218 struct rmap_walk_control rwc = {
2219 .rmap_one = page_make_device_exclusive_one,
2220 .done = page_not_mapped,
2f031c6f 2221 .anon_lock = folio_lock_anon_vma_read,
b756a3b5
AP
2222 .arg = &args,
2223 };
2224
2225 /*
0d251485
MWO
2226 * Restrict to anonymous folios for now to avoid potential writeback
2227 * issues.
b756a3b5 2228 */
0d251485 2229 if (!folio_test_anon(folio))
b756a3b5
AP
2230 return false;
2231
2f031c6f 2232 rmap_walk(folio, &rwc);
b756a3b5 2233
0d251485 2234 return args.valid && !folio_mapcount(folio);
b756a3b5
AP
2235}
2236
2237/**
2238 * make_device_exclusive_range() - Mark a range for exclusive use by a device
2239 * @mm: mm_struct of assoicated target process
2240 * @start: start of the region to mark for exclusive device access
2241 * @end: end address of region
2242 * @pages: returns the pages which were successfully marked for exclusive access
2243 * @owner: passed to MMU_NOTIFY_EXCLUSIVE range notifier to allow filtering
2244 *
2245 * Returns: number of pages found in the range by GUP. A page is marked for
2246 * exclusive access only if the page pointer is non-NULL.
2247 *
2248 * This function finds ptes mapping page(s) to the given address range, locks
2249 * them and replaces mappings with special swap entries preventing userspace CPU
2250 * access. On fault these entries are replaced with the original mapping after
2251 * calling MMU notifiers.
2252 *
2253 * A driver using this to program access from a device must use a mmu notifier
2254 * critical section to hold a device specific lock during programming. Once
2255 * programming is complete it should drop the page lock and reference after
2256 * which point CPU access to the page will revoke the exclusive access.
2257 */
2258int make_device_exclusive_range(struct mm_struct *mm, unsigned long start,
2259 unsigned long end, struct page **pages,
2260 void *owner)
2261{
2262 long npages = (end - start) >> PAGE_SHIFT;
2263 long i;
2264
2265 npages = get_user_pages_remote(mm, start, npages,
2266 FOLL_GET | FOLL_WRITE | FOLL_SPLIT_PMD,
2267 pages, NULL, NULL);
2268 if (npages < 0)
2269 return npages;
2270
2271 for (i = 0; i < npages; i++, start += PAGE_SIZE) {
0d251485
MWO
2272 struct folio *folio = page_folio(pages[i]);
2273 if (PageTail(pages[i]) || !folio_trylock(folio)) {
2274 folio_put(folio);
b756a3b5
AP
2275 pages[i] = NULL;
2276 continue;
2277 }
2278
0d251485
MWO
2279 if (!folio_make_device_exclusive(folio, mm, start, owner)) {
2280 folio_unlock(folio);
2281 folio_put(folio);
b756a3b5
AP
2282 pages[i] = NULL;
2283 }
2284 }
2285
2286 return npages;
2287}
2288EXPORT_SYMBOL_GPL(make_device_exclusive_range);
2289#endif
2290
01d8b20d 2291void __put_anon_vma(struct anon_vma *anon_vma)
76545066 2292{
01d8b20d 2293 struct anon_vma *root = anon_vma->root;
76545066 2294
624483f3 2295 anon_vma_free(anon_vma);
01d8b20d
PZ
2296 if (root != anon_vma && atomic_dec_and_test(&root->refcount))
2297 anon_vma_free(root);
76545066 2298}
76545066 2299
2f031c6f 2300static struct anon_vma *rmap_walk_anon_lock(struct folio *folio,
84fbbe21 2301 const struct rmap_walk_control *rwc)
faecd8dd
JK
2302{
2303 struct anon_vma *anon_vma;
2304
0dd1c7bb 2305 if (rwc->anon_lock)
2f031c6f 2306 return rwc->anon_lock(folio);
0dd1c7bb 2307
faecd8dd 2308 /*
2f031c6f 2309 * Note: remove_migration_ptes() cannot use folio_lock_anon_vma_read()
faecd8dd 2310 * because that depends on page_mapped(); but not all its usages
c1e8d7c6 2311 * are holding mmap_lock. Users without mmap_lock are required to
faecd8dd
JK
2312 * take a reference count to prevent the anon_vma disappearing
2313 */
e05b3453 2314 anon_vma = folio_anon_vma(folio);
faecd8dd
JK
2315 if (!anon_vma)
2316 return NULL;
2317
2318 anon_vma_lock_read(anon_vma);
2319 return anon_vma;
2320}
2321
e9995ef9 2322/*
e8351ac9
JK
2323 * rmap_walk_anon - do something to anonymous page using the object-based
2324 * rmap method
2325 * @page: the page to be handled
2326 * @rwc: control variable according to each walk type
2327 *
2328 * Find all the mappings of a page using the mapping pointer and the vma chains
2329 * contained in the anon_vma struct it points to.
e9995ef9 2330 */
84fbbe21
MWO
2331static void rmap_walk_anon(struct folio *folio,
2332 const struct rmap_walk_control *rwc, bool locked)
e9995ef9
HD
2333{
2334 struct anon_vma *anon_vma;
a8fa41ad 2335 pgoff_t pgoff_start, pgoff_end;
5beb4930 2336 struct anon_vma_chain *avc;
e9995ef9 2337
b9773199 2338 if (locked) {
e05b3453 2339 anon_vma = folio_anon_vma(folio);
b9773199 2340 /* anon_vma disappear under us? */
e05b3453 2341 VM_BUG_ON_FOLIO(!anon_vma, folio);
b9773199 2342 } else {
2f031c6f 2343 anon_vma = rmap_walk_anon_lock(folio, rwc);
b9773199 2344 }
e9995ef9 2345 if (!anon_vma)
1df631ae 2346 return;
faecd8dd 2347
2f031c6f
MWO
2348 pgoff_start = folio_pgoff(folio);
2349 pgoff_end = pgoff_start + folio_nr_pages(folio) - 1;
a8fa41ad
KS
2350 anon_vma_interval_tree_foreach(avc, &anon_vma->rb_root,
2351 pgoff_start, pgoff_end) {
5beb4930 2352 struct vm_area_struct *vma = avc->vma;
2f031c6f 2353 unsigned long address = vma_address(&folio->page, vma);
0dd1c7bb 2354
494334e4 2355 VM_BUG_ON_VMA(address == -EFAULT, vma);
ad12695f
AA
2356 cond_resched();
2357
0dd1c7bb
JK
2358 if (rwc->invalid_vma && rwc->invalid_vma(vma, rwc->arg))
2359 continue;
2360
2f031c6f 2361 if (!rwc->rmap_one(folio, vma, address, rwc->arg))
e9995ef9 2362 break;
2f031c6f 2363 if (rwc->done && rwc->done(folio))
0dd1c7bb 2364 break;
e9995ef9 2365 }
b9773199
KS
2366
2367 if (!locked)
2368 anon_vma_unlock_read(anon_vma);
e9995ef9
HD
2369}
2370
e8351ac9
JK
2371/*
2372 * rmap_walk_file - do something to file page using the object-based rmap method
2373 * @page: the page to be handled
2374 * @rwc: control variable according to each walk type
2375 *
2376 * Find all the mappings of a page using the mapping pointer and the vma chains
2377 * contained in the address_space struct it points to.
e8351ac9 2378 */
84fbbe21
MWO
2379static void rmap_walk_file(struct folio *folio,
2380 const struct rmap_walk_control *rwc, bool locked)
e9995ef9 2381{
2f031c6f 2382 struct address_space *mapping = folio_mapping(folio);
a8fa41ad 2383 pgoff_t pgoff_start, pgoff_end;
e9995ef9 2384 struct vm_area_struct *vma;
e9995ef9 2385
9f32624b
JK
2386 /*
2387 * The page lock not only makes sure that page->mapping cannot
2388 * suddenly be NULLified by truncation, it makes sure that the
2389 * structure at mapping cannot be freed and reused yet,
c8c06efa 2390 * so we can safely take mapping->i_mmap_rwsem.
9f32624b 2391 */
2f031c6f 2392 VM_BUG_ON_FOLIO(!folio_test_locked(folio), folio);
9f32624b 2393
e9995ef9 2394 if (!mapping)
1df631ae 2395 return;
3dec0ba0 2396
2f031c6f
MWO
2397 pgoff_start = folio_pgoff(folio);
2398 pgoff_end = pgoff_start + folio_nr_pages(folio) - 1;
b9773199
KS
2399 if (!locked)
2400 i_mmap_lock_read(mapping);
a8fa41ad
KS
2401 vma_interval_tree_foreach(vma, &mapping->i_mmap,
2402 pgoff_start, pgoff_end) {
2f031c6f 2403 unsigned long address = vma_address(&folio->page, vma);
0dd1c7bb 2404
494334e4 2405 VM_BUG_ON_VMA(address == -EFAULT, vma);
ad12695f
AA
2406 cond_resched();
2407
0dd1c7bb
JK
2408 if (rwc->invalid_vma && rwc->invalid_vma(vma, rwc->arg))
2409 continue;
2410
2f031c6f 2411 if (!rwc->rmap_one(folio, vma, address, rwc->arg))
0dd1c7bb 2412 goto done;
2f031c6f 2413 if (rwc->done && rwc->done(folio))
0dd1c7bb 2414 goto done;
e9995ef9 2415 }
0dd1c7bb 2416
0dd1c7bb 2417done:
b9773199
KS
2418 if (!locked)
2419 i_mmap_unlock_read(mapping);
e9995ef9
HD
2420}
2421
84fbbe21 2422void rmap_walk(struct folio *folio, const struct rmap_walk_control *rwc)
e9995ef9 2423{
2f031c6f
MWO
2424 if (unlikely(folio_test_ksm(folio)))
2425 rmap_walk_ksm(folio, rwc);
2426 else if (folio_test_anon(folio))
2427 rmap_walk_anon(folio, rwc, false);
b9773199 2428 else
2f031c6f 2429 rmap_walk_file(folio, rwc, false);
b9773199
KS
2430}
2431
2432/* Like rmap_walk, but caller holds relevant rmap lock */
84fbbe21 2433void rmap_walk_locked(struct folio *folio, const struct rmap_walk_control *rwc)
b9773199
KS
2434{
2435 /* no ksm support for now */
2f031c6f
MWO
2436 VM_BUG_ON_FOLIO(folio_test_ksm(folio), folio);
2437 if (folio_test_anon(folio))
2438 rmap_walk_anon(folio, rwc, true);
e9995ef9 2439 else
2f031c6f 2440 rmap_walk_file(folio, rwc, true);
e9995ef9 2441}
0fe6e20b 2442
e3390f67 2443#ifdef CONFIG_HUGETLB_PAGE
0fe6e20b 2444/*
451b9514 2445 * The following two functions are for anonymous (private mapped) hugepages.
0fe6e20b
NH
2446 * Unlike common anonymous pages, anonymous hugepages have no accounting code
2447 * and no lru code, because we handle hugepages differently from common pages.
28c5209d
DH
2448 *
2449 * RMAP_COMPOUND is ignored.
0fe6e20b 2450 */
28c5209d
DH
2451void hugepage_add_anon_rmap(struct page *page, struct vm_area_struct *vma,
2452 unsigned long address, rmap_t flags)
0fe6e20b
NH
2453{
2454 struct anon_vma *anon_vma = vma->anon_vma;
2455 int first;
a850ea30
NH
2456
2457 BUG_ON(!PageLocked(page));
0fe6e20b 2458 BUG_ON(!anon_vma);
5dbe0af4 2459 /* address might be in next vma when migration races vma_adjust */
53f9263b 2460 first = atomic_inc_and_test(compound_mapcount_ptr(page));
6c287605
DH
2461 VM_BUG_ON_PAGE(!first && (flags & RMAP_EXCLUSIVE), page);
2462 VM_BUG_ON_PAGE(!first && PageAnonExclusive(page), page);
0fe6e20b 2463 if (first)
28c5209d
DH
2464 __page_set_anon_rmap(page, vma, address,
2465 !!(flags & RMAP_EXCLUSIVE));
0fe6e20b
NH
2466}
2467
2468void hugepage_add_new_anon_rmap(struct page *page,
2469 struct vm_area_struct *vma, unsigned long address)
2470{
2471 BUG_ON(address < vma->vm_start || address >= vma->vm_end);
53f9263b 2472 atomic_set(compound_mapcount_ptr(page), 0);
5232c63f 2473 atomic_set(compound_pincount_ptr(page), 0);
47e29d32 2474
451b9514 2475 __page_set_anon_rmap(page, vma, address, 1);
0fe6e20b 2476}
e3390f67 2477#endif /* CONFIG_HUGETLB_PAGE */