mm: numa: avoid unnecessary disruption of NUMA hinting during migration
[GitHub/moto-9609/android_kernel_motorola_exynos9610.git] / mm / mprotect.c
CommitLineData
1da177e4
LT
1/*
2 * mm/mprotect.c
3 *
4 * (C) Copyright 1994 Linus Torvalds
5 * (C) Copyright 2002 Christoph Hellwig
6 *
046c6884 7 * Address space accounting code <alan@lxorguk.ukuu.org.uk>
1da177e4
LT
8 * (C) Copyright 2002 Red Hat Inc, All Rights Reserved
9 */
10
11#include <linux/mm.h>
12#include <linux/hugetlb.h>
1da177e4
LT
13#include <linux/shm.h>
14#include <linux/mman.h>
15#include <linux/fs.h>
16#include <linux/highmem.h>
17#include <linux/security.h>
18#include <linux/mempolicy.h>
19#include <linux/personality.h>
20#include <linux/syscalls.h>
0697212a
CL
21#include <linux/swap.h>
22#include <linux/swapops.h>
cddb8a5c 23#include <linux/mmu_notifier.h>
64cdd548 24#include <linux/migrate.h>
cdd6c482 25#include <linux/perf_event.h>
1da177e4
LT
26#include <asm/uaccess.h>
27#include <asm/pgtable.h>
28#include <asm/cacheflush.h>
29#include <asm/tlbflush.h>
30
1c12c4cf
VP
31#ifndef pgprot_modify
32static inline pgprot_t pgprot_modify(pgprot_t oldprot, pgprot_t newprot)
33{
34 return newprot;
35}
36#endif
37
4b10e7d5 38static unsigned long change_pte_range(struct vm_area_struct *vma, pmd_t *pmd,
c1e6098b 39 unsigned long addr, unsigned long end, pgprot_t newprot,
0f19c179 40 int dirty_accountable, int prot_numa)
1da177e4 41{
4b10e7d5 42 struct mm_struct *mm = vma->vm_mm;
0697212a 43 pte_t *pte, oldpte;
705e87c0 44 spinlock_t *ptl;
7da4d641 45 unsigned long pages = 0;
1da177e4 46
705e87c0 47 pte = pte_offset_map_lock(mm, pmd, addr, &ptl);
6606c3e0 48 arch_enter_lazy_mmu_mode();
1da177e4 49 do {
0697212a
CL
50 oldpte = *pte;
51 if (pte_present(oldpte)) {
1da177e4 52 pte_t ptent;
4b10e7d5 53 bool updated = false;
1da177e4 54
4b10e7d5 55 if (!prot_numa) {
0c5f83c2 56 ptent = ptep_modify_prot_start(mm, addr, pte);
1667918b
MG
57 if (pte_numa(ptent))
58 ptent = pte_mknonnuma(ptent);
4b10e7d5
MG
59 ptent = pte_modify(ptent, newprot);
60 updated = true;
61 } else {
62 struct page *page;
63
0c5f83c2 64 ptent = *pte;
4b10e7d5
MG
65 page = vm_normal_page(vma, addr, oldpte);
66 if (page) {
1bc115d8 67 if (!pte_numa(oldpte)) {
4b10e7d5 68 ptent = pte_mknuma(ptent);
0c5f83c2 69 set_pte_at(mm, addr, pte, ptent);
4b10e7d5
MG
70 updated = true;
71 }
72 }
73 }
1ea0704e 74
c1e6098b
PZ
75 /*
76 * Avoid taking write faults for pages we know to be
77 * dirty.
78 */
4b10e7d5 79 if (dirty_accountable && pte_dirty(ptent)) {
c1e6098b 80 ptent = pte_mkwrite(ptent);
4b10e7d5
MG
81 updated = true;
82 }
1ea0704e 83
4b10e7d5
MG
84 if (updated)
85 pages++;
0c5f83c2
MG
86
87 /* Only !prot_numa always clears the pte */
88 if (!prot_numa)
89 ptep_modify_prot_commit(mm, addr, pte, ptent);
ce1744f4 90 } else if (IS_ENABLED(CONFIG_MIGRATION) && !pte_file(oldpte)) {
0697212a
CL
91 swp_entry_t entry = pte_to_swp_entry(oldpte);
92
93 if (is_write_migration_entry(entry)) {
c3d16e16 94 pte_t newpte;
0697212a
CL
95 /*
96 * A protection check is difficult so
97 * just be safe and disable write
98 */
99 make_migration_entry_read(&entry);
c3d16e16
CG
100 newpte = swp_entry_to_pte(entry);
101 if (pte_swp_soft_dirty(oldpte))
102 newpte = pte_swp_mksoft_dirty(newpte);
103 set_pte_at(mm, addr, pte, newpte);
e920e14c
MG
104
105 pages++;
0697212a 106 }
1da177e4
LT
107 }
108 } while (pte++, addr += PAGE_SIZE, addr != end);
6606c3e0 109 arch_leave_lazy_mmu_mode();
705e87c0 110 pte_unmap_unlock(pte - 1, ptl);
7da4d641
PZ
111
112 return pages;
1da177e4
LT
113}
114
7d12efae
AM
115static inline unsigned long change_pmd_range(struct vm_area_struct *vma,
116 pud_t *pud, unsigned long addr, unsigned long end,
117 pgprot_t newprot, int dirty_accountable, int prot_numa)
1da177e4
LT
118{
119 pmd_t *pmd;
120 unsigned long next;
7da4d641 121 unsigned long pages = 0;
72403b4a 122 unsigned long nr_huge_updates = 0;
1da177e4
LT
123
124 pmd = pmd_offset(pud, addr);
125 do {
25cbbef1
MG
126 unsigned long this_pages;
127
1da177e4 128 next = pmd_addr_end(addr, end);
cd7548ab
JW
129 if (pmd_trans_huge(*pmd)) {
130 if (next - addr != HPAGE_PMD_SIZE)
e180377f 131 split_huge_page_pmd(vma, addr, pmd);
f123d74a
MG
132 else {
133 int nr_ptes = change_huge_pmd(vma, pmd, addr,
134 newprot, prot_numa);
135
136 if (nr_ptes) {
72403b4a
MG
137 if (nr_ptes == HPAGE_PMD_NR) {
138 pages += HPAGE_PMD_NR;
139 nr_huge_updates++;
140 }
f123d74a
MG
141 continue;
142 }
7da4d641 143 }
cd7548ab
JW
144 /* fall through */
145 }
1da177e4
LT
146 if (pmd_none_or_clear_bad(pmd))
147 continue;
25cbbef1 148 this_pages = change_pte_range(vma, pmd, addr, next, newprot,
0f19c179 149 dirty_accountable, prot_numa);
25cbbef1 150 pages += this_pages;
1da177e4 151 } while (pmd++, addr = next, addr != end);
7da4d641 152
72403b4a
MG
153 if (nr_huge_updates)
154 count_vm_numa_events(NUMA_HUGE_PTE_UPDATES, nr_huge_updates);
7da4d641 155 return pages;
1da177e4
LT
156}
157
7d12efae
AM
158static inline unsigned long change_pud_range(struct vm_area_struct *vma,
159 pgd_t *pgd, unsigned long addr, unsigned long end,
160 pgprot_t newprot, int dirty_accountable, int prot_numa)
1da177e4
LT
161{
162 pud_t *pud;
163 unsigned long next;
7da4d641 164 unsigned long pages = 0;
1da177e4
LT
165
166 pud = pud_offset(pgd, addr);
167 do {
168 next = pud_addr_end(addr, end);
169 if (pud_none_or_clear_bad(pud))
170 continue;
7da4d641 171 pages += change_pmd_range(vma, pud, addr, next, newprot,
4b10e7d5 172 dirty_accountable, prot_numa);
1da177e4 173 } while (pud++, addr = next, addr != end);
7da4d641
PZ
174
175 return pages;
1da177e4
LT
176}
177
7da4d641 178static unsigned long change_protection_range(struct vm_area_struct *vma,
c1e6098b 179 unsigned long addr, unsigned long end, pgprot_t newprot,
4b10e7d5 180 int dirty_accountable, int prot_numa)
1da177e4
LT
181{
182 struct mm_struct *mm = vma->vm_mm;
183 pgd_t *pgd;
184 unsigned long next;
185 unsigned long start = addr;
7da4d641 186 unsigned long pages = 0;
1da177e4
LT
187
188 BUG_ON(addr >= end);
189 pgd = pgd_offset(mm, addr);
190 flush_cache_range(vma, addr, end);
1da177e4
LT
191 do {
192 next = pgd_addr_end(addr, end);
193 if (pgd_none_or_clear_bad(pgd))
194 continue;
7da4d641 195 pages += change_pud_range(vma, pgd, addr, next, newprot,
4b10e7d5 196 dirty_accountable, prot_numa);
1da177e4 197 } while (pgd++, addr = next, addr != end);
7da4d641 198
1233d588
IM
199 /* Only flush the TLB if we actually modified any entries: */
200 if (pages)
201 flush_tlb_range(vma, start, end);
7da4d641
PZ
202
203 return pages;
204}
205
206unsigned long change_protection(struct vm_area_struct *vma, unsigned long start,
207 unsigned long end, pgprot_t newprot,
4b10e7d5 208 int dirty_accountable, int prot_numa)
7da4d641
PZ
209{
210 struct mm_struct *mm = vma->vm_mm;
211 unsigned long pages;
212
213 mmu_notifier_invalidate_range_start(mm, start, end);
214 if (is_vm_hugetlb_page(vma))
215 pages = hugetlb_change_protection(vma, start, end, newprot);
216 else
4b10e7d5 217 pages = change_protection_range(vma, start, end, newprot, dirty_accountable, prot_numa);
7da4d641
PZ
218 mmu_notifier_invalidate_range_end(mm, start, end);
219
220 return pages;
1da177e4
LT
221}
222
b6a2fea3 223int
1da177e4
LT
224mprotect_fixup(struct vm_area_struct *vma, struct vm_area_struct **pprev,
225 unsigned long start, unsigned long end, unsigned long newflags)
226{
227 struct mm_struct *mm = vma->vm_mm;
228 unsigned long oldflags = vma->vm_flags;
229 long nrpages = (end - start) >> PAGE_SHIFT;
230 unsigned long charged = 0;
1da177e4
LT
231 pgoff_t pgoff;
232 int error;
c1e6098b 233 int dirty_accountable = 0;
1da177e4
LT
234
235 if (newflags == oldflags) {
236 *pprev = vma;
237 return 0;
238 }
239
240 /*
241 * If we make a private mapping writable we increase our commit;
242 * but (without finer accounting) cannot reduce our commit if we
5a6fe125
MG
243 * make it unwritable again. hugetlb mapping were accounted for
244 * even if read-only so there is no need to account for them here
1da177e4
LT
245 */
246 if (newflags & VM_WRITE) {
5a6fe125 247 if (!(oldflags & (VM_ACCOUNT|VM_WRITE|VM_HUGETLB|
cdfd4325 248 VM_SHARED|VM_NORESERVE))) {
1da177e4 249 charged = nrpages;
191c5424 250 if (security_vm_enough_memory_mm(mm, charged))
1da177e4
LT
251 return -ENOMEM;
252 newflags |= VM_ACCOUNT;
253 }
254 }
255
1da177e4
LT
256 /*
257 * First try to merge with previous and/or next vma.
258 */
259 pgoff = vma->vm_pgoff + ((start - vma->vm_start) >> PAGE_SHIFT);
260 *pprev = vma_merge(mm, *pprev, start, end, newflags,
261 vma->anon_vma, vma->vm_file, pgoff, vma_policy(vma));
262 if (*pprev) {
263 vma = *pprev;
264 goto success;
265 }
266
267 *pprev = vma;
268
269 if (start != vma->vm_start) {
270 error = split_vma(mm, vma, start, 1);
271 if (error)
272 goto fail;
273 }
274
275 if (end != vma->vm_end) {
276 error = split_vma(mm, vma, end, 0);
277 if (error)
278 goto fail;
279 }
280
281success:
282 /*
283 * vm_flags and vm_page_prot are protected by the mmap_sem
284 * held in write mode.
285 */
286 vma->vm_flags = newflags;
1c12c4cf
VP
287 vma->vm_page_prot = pgprot_modify(vma->vm_page_prot,
288 vm_get_page_prot(newflags));
289
c1e6098b 290 if (vma_wants_writenotify(vma)) {
1ddd439e 291 vma->vm_page_prot = vm_get_page_prot(newflags & ~VM_SHARED);
c1e6098b
PZ
292 dirty_accountable = 1;
293 }
d08b3851 294
7d12efae
AM
295 change_protection(vma, start, end, vma->vm_page_prot,
296 dirty_accountable, 0);
7da4d641 297
ab50b8ed
HD
298 vm_stat_account(mm, oldflags, vma->vm_file, -nrpages);
299 vm_stat_account(mm, newflags, vma->vm_file, nrpages);
63bfd738 300 perf_event_mmap(vma);
1da177e4
LT
301 return 0;
302
303fail:
304 vm_unacct_memory(charged);
305 return error;
306}
307
6a6160a7
HC
308SYSCALL_DEFINE3(mprotect, unsigned long, start, size_t, len,
309 unsigned long, prot)
1da177e4
LT
310{
311 unsigned long vm_flags, nstart, end, tmp, reqprot;
312 struct vm_area_struct *vma, *prev;
313 int error = -EINVAL;
314 const int grows = prot & (PROT_GROWSDOWN|PROT_GROWSUP);
315 prot &= ~(PROT_GROWSDOWN|PROT_GROWSUP);
316 if (grows == (PROT_GROWSDOWN|PROT_GROWSUP)) /* can't be both */
317 return -EINVAL;
318
319 if (start & ~PAGE_MASK)
320 return -EINVAL;
321 if (!len)
322 return 0;
323 len = PAGE_ALIGN(len);
324 end = start + len;
325 if (end <= start)
326 return -ENOMEM;
b845f313 327 if (!arch_validate_prot(prot))
1da177e4
LT
328 return -EINVAL;
329
330 reqprot = prot;
331 /*
332 * Does the application expect PROT_READ to imply PROT_EXEC:
333 */
b344e05c 334 if ((prot & PROT_READ) && (current->personality & READ_IMPLIES_EXEC))
1da177e4
LT
335 prot |= PROT_EXEC;
336
337 vm_flags = calc_vm_prot_bits(prot);
338
339 down_write(&current->mm->mmap_sem);
340
097d5910 341 vma = find_vma(current->mm, start);
1da177e4
LT
342 error = -ENOMEM;
343 if (!vma)
344 goto out;
097d5910 345 prev = vma->vm_prev;
1da177e4
LT
346 if (unlikely(grows & PROT_GROWSDOWN)) {
347 if (vma->vm_start >= end)
348 goto out;
349 start = vma->vm_start;
350 error = -EINVAL;
351 if (!(vma->vm_flags & VM_GROWSDOWN))
352 goto out;
7d12efae 353 } else {
1da177e4
LT
354 if (vma->vm_start > start)
355 goto out;
356 if (unlikely(grows & PROT_GROWSUP)) {
357 end = vma->vm_end;
358 error = -EINVAL;
359 if (!(vma->vm_flags & VM_GROWSUP))
360 goto out;
361 }
362 }
363 if (start > vma->vm_start)
364 prev = vma;
365
366 for (nstart = start ; ; ) {
367 unsigned long newflags;
368
7d12efae 369 /* Here we know that vma->vm_start <= nstart < vma->vm_end. */
1da177e4 370
7d12efae
AM
371 newflags = vm_flags;
372 newflags |= (vma->vm_flags & ~(VM_READ | VM_WRITE | VM_EXEC));
1da177e4 373
7e2cff42
PBG
374 /* newflags >> 4 shift VM_MAY% in place of VM_% */
375 if ((newflags & ~(newflags >> 4)) & (VM_READ | VM_WRITE | VM_EXEC)) {
1da177e4
LT
376 error = -EACCES;
377 goto out;
378 }
379
380 error = security_file_mprotect(vma, reqprot, prot);
381 if (error)
382 goto out;
383
384 tmp = vma->vm_end;
385 if (tmp > end)
386 tmp = end;
387 error = mprotect_fixup(vma, &prev, nstart, tmp, newflags);
388 if (error)
389 goto out;
390 nstart = tmp;
391
392 if (nstart < prev->vm_end)
393 nstart = prev->vm_end;
394 if (nstart >= end)
395 goto out;
396
397 vma = prev->vm_next;
398 if (!vma || vma->vm_start != nstart) {
399 error = -ENOMEM;
400 goto out;
401 }
402 }
403out:
404 up_write(&current->mm->mmap_sem);
405 return error;
406}