From patchwork Mon Mar 3 11:08:31 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13998599 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 54670C282CD for ; Mon, 3 Mar 2025 11:09:00 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id DEE10280004; Mon, 3 Mar 2025 06:08:59 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id D77E8280001; Mon, 3 Mar 2025 06:08:59 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B0715280004; Mon, 3 Mar 2025 06:08:59 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 89FF6280001 for ; Mon, 3 Mar 2025 06:08:59 -0500 (EST) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 0F4A61C6D1E for ; Mon, 3 Mar 2025 11:08:59 +0000 (UTC) X-FDA: 83179967598.21.EB3BFC8 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf19.hostedemail.com (Postfix) with ESMTP id 9872A1A000F for ; Mon, 3 Mar 2025 11:08:55 +0000 (UTC) Authentication-Results: imf19.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=fSYIRZ0T; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=fCyoSMB9; spf=pass (imf19.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741000135; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=HV0nA8fVEHBYsnfvmnLWo4AORBJmffnzXGZGvQs9WUw=; b=E2pSL9qJF+OvGP2bcxwv/I0Q6L6jYh4IwnFldkr0TdNflk92uVWJ96SS3Y0clH64AEcRwk BFYGmwTyI1cOQo1padbtWQMUJcdxtiUNz81JPn0SCJof4sOzjoxOmZtAsq9i7XRYs6sG0C NzaDPdn/KPxQEfvWOR3YAw0jXZVyVXo= ARC-Authentication-Results: i=2; imf19.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=fSYIRZ0T; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=fCyoSMB9; spf=pass (imf19.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741000135; a=rsa-sha256; cv=pass; b=Od9QRAgT0KCeV2v7kdYi4Oh3REtOcnTQ8mcY38yG/9EZQiu05cWatONHI9KNPovcYVeHs4 SoozDLIUf6GfeYn6s27E0fc0z2fOxr+M29deHilgJn1+xedEs3+0wrvltvUtP0xRuLAcVN 5xbUIxO0+CefFooq2D2TTdvJM+hJVRg= Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 5237tv4m016064; Mon, 3 Mar 2025 11:08:52 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=HV0nA8fVEHBYsnfvmnLWo4AORBJmffnzXGZGvQs9WUw=; b= fSYIRZ0T3RIM6ANPjCBIgy70z9BDwUEbCIHz6OLQDGyX5RbgVimNLzQABxYwWBl4 mDPfk2WuRQuFkaIVJOkHrz3QaLpHqQ7xyeuiVyfO6blbrbDNix+srBuYUf7oHGru Tsw8cf0rZPVrXfSHQytcXdbbKOCoWNaxrPfGLNzhiJ9Dax8T/OLF2GXjyJXAUrHQ LibSLMYrOiVzv/TCWquhOgTFFaNIeWZokHSWNNjxvzMoSZIRzTKi3rywbwuMD9Vv fMsXiNcyAdUAGUoJ3Z6XZ6oAolURqomdoVfICj9oAVms3vhQ70pnhgzE1pZhwbyy +/JwjZdOQ/5jqRq1W59zoQ== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 453uavtcb1-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:52 +0000 (GMT) Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 523B8Vn3039757; Mon, 3 Mar 2025 11:08:51 GMT Received: from nam10-dm6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2049.outbound.protection.outlook.com [104.47.58.49]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 453rp82hk2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:51 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=CpItDKORp5aiONABgX+TShqtDtEqWJUBIM7pHk4W/cAeId0Byy35AG6fe0helJ61ZwVdyVLbPH+vIMeJhdmm4h0tzVni7MveZFnR66+9cZZZphfE8ViFKBTyxpUe+Ojl/tAj+SFlH+RMXh/u3IcCYcvtJbhSydWuhlZoOswIbBZqs9LzydAblcz0dq0woASntVAONCllpGNri0qNzedJ9hovr1mcNf7BsT7Hz5uitVQ9gZR6JPMuhWFSIsjQQB8avDnUnLsxbOwqEl524fQ+Ptm5Uweulk1Wn8sou1vxqV0ysGCU2YEMVRmjkZ4ThjRdMRSH5tMp/S5xDPmfsElQJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HV0nA8fVEHBYsnfvmnLWo4AORBJmffnzXGZGvQs9WUw=; b=LOfBKXWWh3pmlca2sDWh2fbImO4v1KggiZ813UVI6iOPQgDk0RaUxNdZ5TmGgFlHCky5AfqzmubZUZOF8v4Yu5PX2JWTju2Cs5iujDV0C3oS3GEuujWF+4MprWfsWCbDTT4EyxT2nb5FM2LCA794uzwXrbWiZY4yInYDbFyzL63omB7bxjEjep2Lgql8phxYB8p9VJssU9Vo6FdQnq4FQsyhy5zyskD1qRDGv1pukB1RkFWKO9QIr2ksBG9PQ1vpzvaJEIstER8rKzUZrSQuIId/KbEloYW7/qTvXxCsvGbcdUtpygSp1r5qm7gRo5iLQ8gP/ThFuM2N8nrFwr/dDA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HV0nA8fVEHBYsnfvmnLWo4AORBJmffnzXGZGvQs9WUw=; b=fCyoSMB97goD21xqdLjpNkBLCU9AqE5H6UcD122r/vvDjGfenhLLfzU+Ikdd23DtxUJxB+muV1g5VeBOsFNQtTccPa66jBP6aB1pOE1ritztIkaHt4IrlvPEGHymQUxgflqn9YkA0mmtYWY4DwC4bVjtP0vKByN1vc8q/fn4qyc= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DM4PR10MB7427.namprd10.prod.outlook.com (2603:10b6:8:181::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8489.27; Mon, 3 Mar 2025 11:08:49 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 3 Mar 2025 11:08:49 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 1/7] mm/mremap: correctly handle partial mremap() of VMA starting at 0 Date: Mon, 3 Mar 2025 11:08:31 +0000 Message-ID: <195c3956c70a142b12465e09b4aa5e33a898b789.1740911247.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO2P265CA0504.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:13b::11) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DM4PR10MB7427:EE_ X-MS-Office365-Filtering-Correlation-Id: f92b301d-c69f-42c6-7d6b-08dd5a43c66d X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: hSBHCYHVUEYlmMiYa1gjpFdhR/6W4s7R7TYpTv6gQrDpmqA0x81P+UIrZeeEgsGlBYa/KbbF6mfz45/xt51PAY/2RQL2XafaNMylcNCmIwneW8Qp37/1/XUFLjU12OikzXYlWkOJWUUw6Bx5grG3G3hYZPql8/WfV8JVRO3oDVS/+N0CiA2/VH4EfFUcsQsnBs3Hn+6gD8SmNikRmcXx6WBa5Dni+X/Bo4ouXyIcnwJsh1K9sIFh4cDgSS8i6Lz0w8g5Z3fSY8fOxIA1gnZ6HKwu9E8sWchvy2Rnp04WRHXrr+DWZXnSkEZY3BMg2qIGCiuQRbUJtXW+kqtG+LjHX6wsMuV1QbARD7nE8N0sUg4ZPgKA4vqyex1YSmHCabUbCwgWnSff76yVpNNL7TzZn3uQrNAilNKQ2GGnySdrxnHDwGeveHyWTIhyFE25/1FoJi/tMp2DY8/PzC3EiQYjzTdLEhvw6VnljcjOT0eiMvxh4H3yiVAyeZr1Vx6cs/uxDXyQcIIto7UebV+3pVX3XQO1XgRq+JgDzw023rFVkBj6fBsXjPuU84xWdxDLXTrrVgrR8zyfyIW6YJzXLSZglzfsBjv4lOm1w4PbkZpPweKhrXi0HKlkP9dzFpWCr00XiCzxwikUSI0zPSyrextMGawdByyYtp0fNZnoaXOh9vAekDo5IZvDA65EmA3uUjEGn4/hX8yDCLew6tNLsKdWVq6346g87kMVMlV8xqE2OsIHu5RskkTSZabxjKkX9AEzywijjCi60DLWgdQYUfg8xPOXGHf3zQ4ijB6BmYlLmkzabzyFTwYyWRtMQyvrdyr+phn1TiN7ZHl3Q5X4EpvsmmuUrnUFCXUc+gXC81tVddiBllUmHDBqf7Nho+vHT2X2C7sJgwHuioFOmZtGhhQxquucp8m8bfqjAIfby3svkx4S4JL3LQRyIJGhpZ2Q1FZViox1JoFrQ7Xwlt2g8+/BG7CeoayIKEz4sPPh+F4WXL+i+9K+4BM0yJQRhcIr6v1QGFupZlhMC6ZvIP3S+1PPlgzRauCu8vOxjil2PoF9xEKnJzEHxLPMfTsl3EBuy+IuhvLPuHeLCv7XVM9n5mW2BQQnFJ02uwmy5cO+X1uch5S0LiefDKHAdWGYjECqNNlQTrH1ziSw8J53bXgWWF2LYBHdVAAWFpDcZr2IfZ6c4zYUdbEzeZYcq1vBSWTFdjDfHUccgI7SnbGgUczxNMeMP5QIPU1xHLtFsGziRPDelOo5K90urTYrifaEwodZPJwnIDS1ZBBx+aFByIlv7kfNOLZGPFEw/qrXV+bQiOA5iTpIrDBKm5w+93YHasR8VwhKivms2axf8h7MLqxs6uLnaGl1r6SbZJxMpTmwupC4VDnw1QLVr2sWi0qkyNyWsjGDoFvf8F0l51IBNMfRbZgR8rIHdGxNv+pjlqzrW/mCv8xvE9sL7lKNzqm0y/cI/N7ZSar48magb5mfhH+ygGrn4fvDLt9hbssbUA/icQk5hv4CnDSTVKTmpa2L5JRo39hSuH9p/kh/FmpCCk0c2PUZf+XGOKXic5CBW71rsXglEa0wrGI24bkw/mZ+d0SnAnGNExKaUt9NeXuu0dNG1ZDltA== X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: f92b301d-c69f-42c6-7d6b-08dd5a43c66d X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2025 11:08:49.6883 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: Wm+aMh6Sdh+emjnIjAn8XP1KWc6vfSvbfPLPlO/vQUnRkKMPMaRjgxFE62IJzNzgdWUqjmsQqKjqzbfeHpno9vLdA/78C5frbxgG711TcBE= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR10MB7427 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-03_04,2025-03-03_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 suspectscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 malwarescore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503030086 X-Proofpoint-GUID: _WMfokXnu693j8rvK5mCMsElVSLfoKoy X-Proofpoint-ORIG-GUID: _WMfokXnu693j8rvK5mCMsElVSLfoKoy X-Rspam-User: X-Rspamd-Queue-Id: 9872A1A000F X-Rspamd-Server: rspam09 X-Stat-Signature: ps8wbtgjrm4hmu99ason83oxhci98wta X-HE-Tag: 1741000135-97842 X-HE-Meta: U2FsdGVkX1++xa89mV8SuT9dDW9LNqAXNGsSMP857YlwABVezZt//cw99jtYE9uonZ6RNOUzR5WgfeyihE5i55C+kaJNNHog5zEITyxN3TsMUkVn7zjxUVEqfSE7djdkEZQ4byPJLjl2qwnIOqwvGtdQeXMyK4N+Y2xZ0NGF4AWZjdwt3LU+C7sKCw3riQFJoxbgOHV5smj+sbs2OSrLYuM9KgwjUt9XyVC4hVsiKjZx8kMbuoGO917gPnHFcqu4S6t2g2KhJvMgfGIg450q6vYVf5DRa7YKAUOhroWGceB4dLo/40ej4zvLj/DCOEP15xJyRKspuJfAOds02CVLLoEQHQVLdNtlvrYjUuyOyiVgCpoB1ZChmMWsFTDs9WrHh0EaJtvxoj2gQNV7HdwJ7TWOqbq+2TG3+iBdFXK1lhA7WdxjNrOCqc9CXoycgJOurzAKiW7ffmAJPZMFPCRgTgc7xRQAQjXQq7HPk1DFN081cjyrYtEgy9+Ic0MMK+Jh1DTj4v2s33CwBBCX6ktKa94J1dzWFAL8JCALMFcdVu7OlNq/YJFGt1mRMirxe0mqs0ylobb49tG6YspmArD3H+eWvjOm8CPjrvLR/TscGDIVfrOE/XBS9qo2juH4fSxmV+7lTIY0czcwe25taKAnkIUwKpp7vZkkFuCvEFDIKdWMdsu1Fhtz0Y/M66R+goKcw4Ul+SZXBdw5IomCFz0yBOmdSTJ8Ch52o9sY6P7FprhT7Yw1x2E5pMph5q27zZti9Aqf5b84978HVElJlS47N1iJ/b2gtgzpd2AXvVV9eBTb+58Ohq3Cvc1fNMSPE1bFDl7hJwarI3HtflGiQ1JmzKcM69wkgxroxw+QH4iYf227cJhDnys09Zwytg05Q1Ccj1u0Ikmq8ChdizUkVDr/d/w6MxgC9CrUrCOSv5kz957v1D2/+BCOX4LOMYQK5U5cSAH2hWgS6HUVuUHf8QO uH2Ed3bP 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000076, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Consider the case of a a partial mremap() (that results in a VMA split) of an accountable VMA (i.e. which has the VM_ACCOUNT flag set) whose start address is zero, with the MREMAP_MAYMOVE flag specified and a scenario where a move does in fact occur: addr end | | v v |-------------| | vma | |-------------| 0 This move is affected by unmapping the range [addr, end). In order to prevent an incorrect decrement of accounted memory which has already been determined, the mremap() code in move_vma() clears VM_ACCOUNT from the VMA prior to doing so, before reestablishing it in each of the VMAs post-split: addr end | | v v |---| |---| | A | | B | |---| |---| Commit 6b73cff239e5 ("mm: change munmap splitting order and move_vma()") changed this logic such as to determine whether there is a need to do so by establishing account_start and account_end and, in the instance where such an operation is required, assigning them to vma->vm_start and vma->vm_end. Later the code checks if the operation is required for 'A' referenced above thusly: if (account_start) { ... } However, if the VMA described above has vma->vm_start == 0, which is now assigned to account_start, this branch will not be executed. As a result, the VMA 'A' above will remain stripped of its VM_ACCOUNT flag, incorrectly. The fix is to simply convert these variables to booleans and set them as required. Signed-off-by: Lorenzo Stoakes Fixes: 6b73cff239e5 ("mm: change munmap splitting order and move_vma()") Cc: stable@vger.kernel.org Reviewed-by: Harry Yoo Reviewed-by: Liam R. Howlett --- mm/mremap.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index cff7f552f909..c3e4c86d0b8d 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -705,8 +705,8 @@ static unsigned long move_vma(struct vm_area_struct *vma, unsigned long vm_flags = vma->vm_flags; unsigned long new_pgoff; unsigned long moved_len; - unsigned long account_start = 0; - unsigned long account_end = 0; + bool account_start = false; + bool account_end = false; unsigned long hiwater_vm; int err = 0; bool need_rmap_locks; @@ -790,9 +790,9 @@ static unsigned long move_vma(struct vm_area_struct *vma, if (vm_flags & VM_ACCOUNT && !(flags & MREMAP_DONTUNMAP)) { vm_flags_clear(vma, VM_ACCOUNT); if (vma->vm_start < old_addr) - account_start = vma->vm_start; + account_start = true; if (vma->vm_end > old_addr + old_len) - account_end = vma->vm_end; + account_end = true; } /* @@ -832,7 +832,7 @@ static unsigned long move_vma(struct vm_area_struct *vma, /* OOM: unable to split vma, just get accounts right */ if (vm_flags & VM_ACCOUNT && !(flags & MREMAP_DONTUNMAP)) vm_acct_memory(old_len >> PAGE_SHIFT); - account_start = account_end = 0; + account_start = account_end = false; } if (vm_flags & VM_LOCKED) { From patchwork Mon Mar 3 11:08:32 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13998600 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B2E65C282C6 for ; Mon, 3 Mar 2025 11:09:02 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 38F34280005; Mon, 3 Mar 2025 06:09:02 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 2F11A280001; Mon, 3 Mar 2025 06:09:02 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id EFEDB280005; Mon, 3 Mar 2025 06:09:01 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id BC704280001 for ; Mon, 3 Mar 2025 06:09:01 -0500 (EST) Received: from smtpin11.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id 69D59806E5 for ; Mon, 3 Mar 2025 11:09:01 +0000 (UTC) X-FDA: 83179967682.11.E32BB61 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf14.hostedemail.com (Postfix) with ESMTP id 0DE9B100002 for ; Mon, 3 Mar 2025 11:08:57 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=DvGvN8n4; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=hd3tqxVF; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf14.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741000138; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=EG6ccytL3mfjzNgokq+UADo2jHVfKtGFrTk6AYgEH9g=; b=6XR62vqCoishXDJBUaT9E4bkfbvl/hLTRHgZjMe0fX8XgBn1gvbGSiptUUPeotvxieFVF4 u+2ZJIeDs/UmrP35f8OGYOZD0z1WmS7bmPJK6OIigW1Po6lFP4sRpXBNsnAUCEHS6gwqnA Jv2tltcfptdhKdRKPLUceqDxQWURz3Q= ARC-Authentication-Results: i=2; imf14.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=DvGvN8n4; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=hd3tqxVF; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf14.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741000138; a=rsa-sha256; cv=pass; b=kqi7MWNtsslzkm6CqCeAMyPtKu5DbSowDFemCQiXbI584D8JK8+EKJ4Q7UYRx4/H7rQET2 MTfdao8lEEMXvuUQ8kIrnKwYHVdRk7ytKWYvDTNrLtYLnIEg7MXIa2V3j3IEbiyMA4zunl 4cCFqxta0ZhZYkphMgG7um1Jco34Uuc= Received: from pps.filterd (m0246627.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 5237tiQZ031358; Mon, 3 Mar 2025 11:08:55 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=EG6ccytL3mfjzNgokq+UADo2jHVfKtGFrTk6AYgEH9g=; b= DvGvN8n4zMZWGpXGL03W3VOYXjZttywaiyJlAvkqBQO3h+JDqzK9ef+A4Af6ieqU bC+HIE27YvgIr/hrrkk/ZFJqWoW7+39u5HazBYUdc4Rshz2jzXvNEH3j6UcD0qjB VOqtkxVI8ROqGxznfhElPhclp3XVmJO47R5V+IEWr95qY3DG0+aTPyY/+kboXy0d GOcpu7y+cZAL8kntTGYBastmCXi2CRZAbx0AWcJjTQMxv+Kq+tiAogM7HorXBFzw kSs/yBnnn4GHRCr3BC3n8k8ZXmYDx7ciS6CoorHB/3qnPsoN24oFZOZouwUc9etQ 7sYMobvHjbdmqLm74zjsOQ== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 453u81td6q-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:54 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 5239BtXF003191; Mon, 3 Mar 2025 11:08:53 GMT Received: from nam10-dm6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2043.outbound.protection.outlook.com [104.47.58.43]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 453rp7bfu7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:53 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=o8/TDWLAUpXObuJbIomwZTr8M/QlOEsdFiN2KOzcUU5EMru5aeKSRqJgzzDNCdM4fb5NWfKjVJEqM9jzxNbznO5vxUrM9SyZPqgUNg841353ETYiyHx9SQYbC3wRnPPdL0v7HjSVEqz5Lzcx5btjSOeHGeWvOSle6R2DpJ5Im01/O1o2Gp38vgAuuRrXaHkwC+9F0A7F8TwPDbHk40xzZq7Q/u3nqc06c8VL3qiY2rEKqY4IkOzU9tClkm/B21rf4KR6UsWG5td73vcMoTmmh+MlYHR1oIBBWvTIzfK+vJULkEj79Rn5NW+nTteZNQzjnLdsbaaBxCPVf/5MNdiAiw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=EG6ccytL3mfjzNgokq+UADo2jHVfKtGFrTk6AYgEH9g=; b=NdIUgNIM5pVE5M4sKFn7FiSaRv+PXkvQRbNdJNOXwuCVJKOAWhk/wFHoLka2EVUzV69wTk/PYh/rwJ1Cs/H+a84IfUeNQgE151Bqmuvj2x47KHWC349m47TKDjBy2+OLIGPI5J7/TkUoDmQHGRlfS46JktGpdGrzctRayiTBZelljy5ucMEyDKHS2f/5EsFXck7gVJGtpXoVJLZE63kxW0peEQWE5hCtmdkzxn/hI85U7yM3Qn1Ml3ZYEGAr8gJ7qSllso9aGP7syWRpzHCwqV1IF3PAyNNvDZ7Q8WY7ICWRfmtlJKk/9OCVt9fFosP95Reels+U23V4z39POxwMiw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EG6ccytL3mfjzNgokq+UADo2jHVfKtGFrTk6AYgEH9g=; b=hd3tqxVFFEASBNbd4Wja16vxpvLq9DbGhZwq8l+1emVcj+bEp9UQalmpkMi1bSnzrh6YIIr8u/nkP0NFwjSdzG09Hxfu7vzgzgYurOjNFoRGJi8NZpWAnJIE97R90Ii9zt7oOxTOKxAROyq2e4faf0j3+3QSLpPxkf8akBCIvMU= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DM4PR10MB7427.namprd10.prod.outlook.com (2603:10b6:8:181::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8489.27; Mon, 3 Mar 2025 11:08:51 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 3 Mar 2025 11:08:51 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 2/7] mm/mremap: refactor mremap() system call implementation Date: Mon, 3 Mar 2025 11:08:32 +0000 Message-ID: X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0551.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:319::19) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DM4PR10MB7427:EE_ X-MS-Office365-Filtering-Correlation-Id: ff282744-f419-43c6-891b-08dd5a43c7aa X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: gx03TW6POIE2JbRh+15cySVlHhqcTtOamVXPyNwFBEzCcC2BEoeYKGx7QGAZidnatlc4xEbxVoHnXy12u5MpYPPmfMJeykd+CrPj0qk8YR9zjo1woj65586VhRMUUeRLGHWNfyf/oOn6aVaHvuYg+4QpF8pYJj6bL2Yb7UnlXWRdRK9wpCdViaax8iSVAj/0I+BITNJwIReKBz9kj87tILpOwD9hhXOpm0v8+yDLJSSk1qJuu7kMD63RcFbzm63BblPBTBcs39rp/LFv0gEwKFAxefoS7R6MYjz95ItuBYmHsiInUigXxS3UQO1BS/Vf3XjvKqTLyPblSyCsqhBXcr8gMsre5pdrjcH1PTFbipem9NyKt2p+RJ4LZ1Ydrya4gQRZhJ44zzsEYPzGZnqNAihqKxOAEEnR/AQhO4GPzSVuTTy9HQyt9xhO43875gmDlbscykDddtQ7JCkcF8usdPX/8g+Er/XrC+IPKQUpxNiJPdmXw4MMc8Pcs+6MElDx8T0H9uYgqiGFZTdiljUUBdJ864OJ3wnFBfDFy+8hDp29ZkvNi3Luq1synhdiKkfRKMh66ys9k3qZyTLoHfXa7rMNdb69CT/Zh+Q87PXsvf5i8yv/Nx5guCiXGBh7Rb34DJW6zzeX9J525wQ86zrRN1CrguaVWb5nP3GoIAdnPoJCQgZl0IqWTaDPiGwH0tptrKzqvkUvD/7VALzQ1yNiqkzjKZaKi4Tjm4RiD+a3wSUy3OzY4komBC3WOKv/aHqTvMlJ1YbmkqcgTs7SUk2c/k5B7kbSZicUF2GzdsTU3dCMljp2tXEF0mH2tP85QCpVz0ZbksT7niR7GZrtz5UEgY3UQDZ0/oMeHIl56r+fp4dJ8AtvsN3A2zlZrI2re3HZFBfB/684a9FnX6H7LKwEZ1z2f0Hpzmwq3XewMPwWVuy3WdBOQ56lxf+dy6A4LLxCEj+U3eLRdcSF6NdigzEClY2cmTqfQKvZMD8+fKJZR6TKhoAzyNX09tL+yTfRjbNrX8WBtbGvFHpgg4+cmCPj1uWbxO+SRW5mITzakjf8JVwwaBvqErupJNkrFES9+I6BSJwYGovDPlUWyCc1/XFFGCV9YOxt91iBppLUbRvEoJWxFgdvebtXtWGAaFj0IP2/Skti619kroDiOqEA3qdrfqOZq/fwcpsl6CxLOzBDhqbIWG1bb+bKD0ybLtNPoZoel1qqYXmB2Sl+iLN3TgsSInnjOLmeEp87+bttGEcdztfs568XbOulTXeqO7eeGqw5drnbzK8MHhkHd1ziEvh3ugHDTYhle00n4UDVfk2Qn41Rh4bnvNl4C9UqL6L1rd02/ApXHkWLDNOpmdTTSSoTTtlW06YTMcUfUOAQeXhnrdrumiGcexMfIAw9nysd+LL2ji/SksP9yoq70XBN9wKHev1ob/ytVlV2rHGUWUDH4H6bEJ3+KDy7MvpGlHyzEI7rzoatwJocL68dgqOXcWdHsA0DJmUMpwrcYsXkwvo9ZlcC/LgGUWhW8O8wEmQ6aftRCGXBDiW0DjJbNFaVgZP546NIBRnRge0RRe0fnow8PyTceRt0/WVMMqwMxE5G6ALOUggjULtaB8kB9WTvywA39A== X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: ff282744-f419-43c6-891b-08dd5a43c7aa X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2025 11:08:51.7221 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: AZQlKPkWVUAHeiSzkWj5hyA9n70WKdfNzvD1kSU7/6/xORsGxGeCYdpyNczoCswLB3O365MptcuArM5a011knGeMYcqm4W9r2phpn5gjgXo= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR10MB7427 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-03_04,2025-03-03_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 adultscore=0 bulkscore=0 mlxlogscore=999 malwarescore=0 spamscore=0 phishscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503030086 X-Proofpoint-GUID: UagsyvwALR2wRk6j_MnYUKv5kI5MAWpa X-Proofpoint-ORIG-GUID: UagsyvwALR2wRk6j_MnYUKv5kI5MAWpa X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 0DE9B100002 X-Rspam-User: X-Stat-Signature: scqb3j1yg6k1td6uhdb7y3nz7cuq5w6o X-HE-Tag: 1741000137-626782 X-HE-Meta: U2FsdGVkX1+qfIpCcUDpwAU2YlTl7o2VjtKMMjvZ3W7m4AhY5UMB2P8tbDwQfR4Fq2G+b7AMk5u+kdf7icrzLtD50/D21qjXqYkGMo1Na57JT6hvgbitsFXvhNS1NPEZ45Jcgjlj/YUBAp0vjJB7sQ+gdl+oPVEhx6i3FFZa6kjfo5fe03zyEoQEEWecyBVUlCzm5UgY11Y0qFO6gxCk2h/LllkquLNbVJPvTtoe7o+Txfo1zx9N8zpoGy4m1PkiHXNbrX8jK8kr0P5O5IuzkaIpLi6ven/lmhb/y4K3yodK4gZ8tUrKF5PNIHI6R0lGXz4kk2WjAkO+R6V+0L72/8X3OAX4cdgeSu6j3Gn+qSOPNFFqirV4NoY2dl4KrlRrGK6ka8i1gNdi2IpYrGDDFI1vsBb3TIBYaEMxsylFi9fmWadMABFfS5rlaHTfmepOKhwj+934/h6j5jtI4P3YNVZ3dDVA5NrR9D7LQjcPZG1sP48Mr34Ik/cFHHtzHx+d31b6c+UM+cNX940lpZXucTjYF6I9DEhfFDCbxpOxIJusnXod6hW60KSmQUPzwv//d3hXU2FVqc4QNUp3VEsJC+XOFn3KHM7X72C69Q7Vq/g6t3Zw5vSRQHC1D4U8CrO/GrpGiExrT/VP3n2gWyavfjWePjUcu8k0v+LamAB1SJzzKRzvBLiG97IOceWodawv68vCaHW9/ti7ug+CSA3l5pbxYON6GIk4Wva/SdeqTJ+epvOWGQlKHH6XVJmShimY0JqWWkTjDnArEDHl35qJRDyo+5r2+ss9XC6eDOQi+21tvdf/EQ+6A0rTi5yFTOZjbhTcUtvAUMBR4hJEjgJ8CIrkfTdCDKqYpHVmifcH/G5MZ4wckcWVX/iqnHQnsAP3o7h2gIEKZmEQwaqj2+XQVdU1VIWJlkk7WkNn7AzKnhsQs7gYBfUjm3lqK/3/MXcsu9cWVuNiCpJ0M17yyJE gLb9Iz5/ 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Place checks into a separate function so the mremap() system call is less egregiously long, remove unnecessary mremap_to() offset_in_page() check and just check that earlier so we keep all such basic checks together. Separate out the VMA in-place expansion, hugetlb and expand/move logic into separate, readable functions. De-duplicate code where possible, add comments and ensure that all error handling explicitly specifies the error at the point of it occurring rather than setting a prefixed error value and implicitly setting (which is bug prone). This lays the groundwork for subsequent patches further simplifying and extending the mremap() implementation. Signed-off-by: Lorenzo Stoakes --- mm/mremap.c | 405 ++++++++++++++++++++++++++++++++-------------------- 1 file changed, 251 insertions(+), 154 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index c3e4c86d0b8d..c4abda8dfc57 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -942,33 +942,14 @@ static unsigned long mremap_to(unsigned long addr, unsigned long old_len, unsigned long ret; unsigned long map_flags = 0; - if (offset_in_page(new_addr)) - return -EINVAL; - + /* Is the new length or address silly? */ if (new_len > TASK_SIZE || new_addr > TASK_SIZE - new_len) return -EINVAL; - /* Ensure the old/new locations do not overlap */ + /* Ensure the old/new locations do not overlap. */ if (addr + old_len > new_addr && new_addr + new_len > addr) return -EINVAL; - /* - * move_vma() need us to stay 4 maps below the threshold, otherwise - * it will bail out at the very beginning. - * That is a problem if we have already unmaped the regions here - * (new_addr, and old_addr), because userspace will not know the - * state of the vma's after it gets -ENOMEM. - * So, to avoid such scenario we can pre-compute if the whole - * operation has high chances to success map-wise. - * Worst-scenario case is when both vma's (new_addr and old_addr) get - * split in 3 before unmapping it. - * That means 2 more maps (1 for each) to the ones we already hold. - * Check whether current map count plus 2 still leads us to 4 maps below - * the threshold, otherwise return -ENOMEM here to be more safe. - */ - if ((mm->map_count + 2) >= sysctl_max_map_count - 3) - return -ENOMEM; - if (flags & MREMAP_FIXED) { /* * In mremap_to(). @@ -1035,6 +1016,218 @@ static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) return 1; } +/* Do the mremap() flags require that the new_addr parameter be specified? */ +static bool implies_new_addr(unsigned long flags) +{ + return flags & (MREMAP_FIXED | MREMAP_DONTUNMAP); +} + +/* + * Are the parameters passed to mremap() valid? If so return 0, otherwise return + * error. + */ +static unsigned long check_mremap_params(unsigned long addr, + unsigned long flags, + unsigned long old_len, + unsigned long new_len, + unsigned long new_addr) +{ + /* Ensure no unexpected flag values. */ + if (flags & ~(MREMAP_FIXED | MREMAP_MAYMOVE | MREMAP_DONTUNMAP)) + return -EINVAL; + + /* Start address must be page-aligned. */ + if (offset_in_page(addr)) + return -EINVAL; + + /* + * We allow a zero old-len as a special case + * for DOS-emu "duplicate shm area" thing. But + * a zero new-len is nonsensical. + */ + if (!PAGE_ALIGN(new_len)) + return -EINVAL; + + /* Remainder of checks are for cases with specific new_addr. */ + if (!implies_new_addr(flags)) + return 0; + + /* The new address must be page-aligned. */ + if (offset_in_page(new_addr)) + return -EINVAL; + + /* A fixed address implies a move. */ + if (!(flags & MREMAP_MAYMOVE)) + return -EINVAL; + + /* MREMAP_DONTUNMAP does not allow resizing in the process. */ + if (flags & MREMAP_DONTUNMAP && old_len != new_len) + return -EINVAL; + + /* + * move_vma() need us to stay 4 maps below the threshold, otherwise + * it will bail out at the very beginning. + * That is a problem if we have already unmaped the regions here + * (new_addr, and old_addr), because userspace will not know the + * state of the vma's after it gets -ENOMEM. + * So, to avoid such scenario we can pre-compute if the whole + * operation has high chances to success map-wise. + * Worst-scenario case is when both vma's (new_addr and old_addr) get + * split in 3 before unmapping it. + * That means 2 more maps (1 for each) to the ones we already hold. + * Check whether current map count plus 2 still leads us to 4 maps below + * the threshold, otherwise return -ENOMEM here to be more safe. + */ + if ((current->mm->map_count + 2) >= sysctl_max_map_count - 3) + return -ENOMEM; + + return 0; +} + +/* + * We know we can expand the VMA in-place by delta pages, so do so. + * + * If we discover the VMA is locked, update mm_struct statistics accordingly and + * indicate so to the caller. + */ +static unsigned long expand_vma_inplace(struct vm_area_struct *vma, + unsigned long delta, bool *locked) +{ + struct mm_struct *mm = current->mm; + long pages = delta >> PAGE_SHIFT; + VMA_ITERATOR(vmi, mm, vma->vm_end); + long charged = 0; + + if (vma->vm_flags & VM_ACCOUNT) { + if (security_vm_enough_memory_mm(mm, pages)) + return -ENOMEM; + + charged = pages; + } + + /* + * Function vma_merge_extend() is called on the + * extension we are adding to the already existing vma, + * vma_merge_extend() will merge this extension with the + * already existing vma (expand operation itself) and + * possibly also with the next vma if it becomes + * adjacent to the expanded vma and otherwise + * compatible. + */ + vma = vma_merge_extend(&vmi, vma, delta); + if (!vma) { + vm_unacct_memory(charged); + return -ENOMEM; + } + + vm_stat_account(mm, vma->vm_flags, pages); + if (vma->vm_flags & VM_LOCKED) { + mm->locked_vm += pages; + *locked = true; + } + + return 0; +} + +static bool align_hugetlb(struct vm_area_struct *vma, + unsigned long addr, + unsigned long new_addr, + unsigned long *old_len_ptr, + unsigned long *new_len_ptr, + unsigned long *delta_ptr) +{ + unsigned long old_len = *old_len_ptr; + unsigned long new_len = *new_len_ptr; + struct hstate *h __maybe_unused = hstate_vma(vma); + + old_len = ALIGN(old_len, huge_page_size(h)); + new_len = ALIGN(new_len, huge_page_size(h)); + + /* addrs must be huge page aligned */ + if (addr & ~huge_page_mask(h)) + return false; + if (new_addr & ~huge_page_mask(h)) + return false; + + /* + * Don't allow remap expansion, because the underlying hugetlb + * reservation is not yet capable to handle split reservation. + */ + if (new_len > old_len) + return false; + + *old_len_ptr = old_len; + *new_len_ptr = new_len; + *delta_ptr = abs_diff(old_len, new_len); + return true; +} + +/* + * We are mremap()'ing without specifying a fixed address to move to, but are + * requesting that the VMA's size be increased. + * + * Try to do so in-place, if this fails, then move the VMA to a new location to + * action the change. + */ +static unsigned long expand_vma(struct vm_area_struct *vma, + unsigned long addr, unsigned long old_len, + unsigned long new_len, unsigned long flags, + bool *locked_ptr, unsigned long *new_addr_ptr, + struct vm_userfaultfd_ctx *uf_ptr, + struct list_head *uf_unmap_ptr) +{ + unsigned long err; + unsigned long map_flags; + unsigned long new_addr; /* We ignore any user-supplied one. */ + pgoff_t pgoff; + + err = resize_is_valid(vma, addr, old_len, new_len, flags); + if (err) + return err; + + /* + * [addr, old_len) spans precisely to the end of the VMA, so try to + * expand it in-place. + */ + if (old_len == vma->vm_end - addr && + vma_expandable(vma, new_len - old_len)) { + err = expand_vma_inplace(vma, new_len - old_len, locked_ptr); + if (IS_ERR_VALUE(err)) + return err; + + /* + * We want to populate the newly expanded portion of the VMA to + * satisfy the expectation that mlock()'ing a VMA maintains all + * of its pages in memory. + */ + if (*locked_ptr) + *new_addr_ptr = addr; + + /* OK we're done! */ + return addr; + } + + /* + * We weren't able to just expand or shrink the area, + * we need to create a new one and move it. + */ + + /* We're not allowed to move the VMA, so error out. */ + if (!(flags & MREMAP_MAYMOVE)) + return -ENOMEM; + + /* Find a new location to move the VMA to. */ + map_flags = (vma->vm_flags & VM_MAYSHARE) ? MAP_SHARED : 0; + pgoff = vma->vm_pgoff + ((addr - vma->vm_start) >> PAGE_SHIFT); + new_addr = get_unmapped_area(vma->vm_file, 0, new_len, pgoff, map_flags); + if (IS_ERR_VALUE(new_addr)) + return new_addr; + *new_addr_ptr = new_addr; + + return move_vma(vma, addr, old_len, new_len, new_addr, + locked_ptr, flags, uf_ptr, uf_unmap_ptr); +} + /* * Expand (or shrink) an existing mapping, potentially moving it at the * same time (controlled by the MREMAP_MAYMOVE flag and available VM space) @@ -1048,7 +1241,8 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, { struct mm_struct *mm = current->mm; struct vm_area_struct *vma; - unsigned long ret = -EINVAL; + unsigned long ret; + unsigned long delta; bool locked = false; struct vm_userfaultfd_ctx uf = NULL_VM_UFFD_CTX; LIST_HEAD(uf_unmap_early); @@ -1067,70 +1261,38 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, */ addr = untagged_addr(addr); - if (flags & ~(MREMAP_FIXED | MREMAP_MAYMOVE | MREMAP_DONTUNMAP)) - return ret; - - if (flags & MREMAP_FIXED && !(flags & MREMAP_MAYMOVE)) - return ret; - - /* - * MREMAP_DONTUNMAP is always a move and it does not allow resizing - * in the process. - */ - if (flags & MREMAP_DONTUNMAP && - (!(flags & MREMAP_MAYMOVE) || old_len != new_len)) - return ret; - - - if (offset_in_page(addr)) + ret = check_mremap_params(addr, flags, old_len, new_len, new_addr); + if (ret) return ret; old_len = PAGE_ALIGN(old_len); new_len = PAGE_ALIGN(new_len); + delta = abs_diff(old_len, new_len); - /* - * We allow a zero old-len as a special case - * for DOS-emu "duplicate shm area" thing. But - * a zero new-len is nonsensical. - */ - if (!new_len) - return ret; - - if (mmap_write_lock_killable(current->mm)) + if (mmap_write_lock_killable(mm)) return -EINTR; + vma = vma_lookup(mm, addr); if (!vma) { ret = -EFAULT; goto out; } - /* Don't allow remapping vmas when they have already been sealed */ + /* If mseal()'d, mremap() is prohibited. */ if (!can_modify_vma(vma)) { ret = -EPERM; goto out; } - if (is_vm_hugetlb_page(vma)) { - struct hstate *h __maybe_unused = hstate_vma(vma); - - old_len = ALIGN(old_len, huge_page_size(h)); - new_len = ALIGN(new_len, huge_page_size(h)); - - /* addrs must be huge page aligned */ - if (addr & ~huge_page_mask(h)) - goto out; - if (new_addr & ~huge_page_mask(h)) - goto out; - - /* - * Don't allow remap expansion, because the underlying hugetlb - * reservation is not yet capable to handle split reservation. - */ - if (new_len > old_len) - goto out; + /* Align to hugetlb page size, if required. */ + if (is_vm_hugetlb_page(vma) && + !align_hugetlb(vma, addr, new_addr, &old_len, &new_len, &delta)) { + ret = -EINVAL; + goto out; } - if (flags & (MREMAP_FIXED | MREMAP_DONTUNMAP)) { + /* Are we RELOCATING the VMA to a SPECIFIC address? */ + if (implies_new_addr(flags)) { ret = mremap_to(addr, old_len, new_addr, new_len, &locked, flags, &uf, &uf_unmap_early, &uf_unmap); @@ -1138,109 +1300,44 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, } /* - * Always allow a shrinking remap: that just unmaps - * the unnecessary pages.. - * do_vmi_munmap does all the needed commit accounting, and - * unlocks the mmap_lock if so directed. + * From here on in we are only RESIZING the VMA, attempting to do so + * in-place, moving the VMA if we cannot. */ - if (old_len >= new_len) { - VMA_ITERATOR(vmi, mm, addr + new_len); - if (old_len == new_len) { - ret = addr; - goto out; - } + /* NO-OP CASE - resizing to the same size. */ + if (new_len == old_len) { + ret = addr; + goto out; + } + + /* SHRINK CASE. Can always be done in-place. */ + if (new_len < old_len) { + VMA_ITERATOR(vmi, mm, addr + new_len); - ret = do_vmi_munmap(&vmi, mm, addr + new_len, old_len - new_len, + /* + * Simply unmap the shrunken portion of the VMA. This does all + * the needed commit accounting, unlocking the mmap lock. + */ + ret = do_vmi_munmap(&vmi, mm, addr + new_len, delta, &uf_unmap, true); if (ret) goto out; + /* We succeeded, mmap lock released for us. */ ret = addr; goto out_unlocked; } - /* - * Ok, we need to grow.. - */ - ret = resize_is_valid(vma, addr, old_len, new_len, flags); - if (ret) - goto out; - - /* old_len exactly to the end of the area.. - */ - if (old_len == vma->vm_end - addr) { - unsigned long delta = new_len - old_len; - - /* can we just expand the current mapping? */ - if (vma_expandable(vma, delta)) { - long pages = delta >> PAGE_SHIFT; - VMA_ITERATOR(vmi, mm, vma->vm_end); - long charged = 0; - - if (vma->vm_flags & VM_ACCOUNT) { - if (security_vm_enough_memory_mm(mm, pages)) { - ret = -ENOMEM; - goto out; - } - charged = pages; - } - - /* - * Function vma_merge_extend() is called on the - * extension we are adding to the already existing vma, - * vma_merge_extend() will merge this extension with the - * already existing vma (expand operation itself) and - * possibly also with the next vma if it becomes - * adjacent to the expanded vma and otherwise - * compatible. - */ - vma = vma_merge_extend(&vmi, vma, delta); - if (!vma) { - vm_unacct_memory(charged); - ret = -ENOMEM; - goto out; - } + /* EXPAND case. We try to do in-place, if we can't, then we move it. */ + ret = expand_vma(vma, addr, old_len, new_len, flags, &locked, &new_addr, + &uf, &uf_unmap); - vm_stat_account(mm, vma->vm_flags, pages); - if (vma->vm_flags & VM_LOCKED) { - mm->locked_vm += pages; - locked = true; - new_addr = addr; - } - ret = addr; - goto out; - } - } - - /* - * We weren't able to just expand or shrink the area, - * we need to create a new one and move it.. - */ - ret = -ENOMEM; - if (flags & MREMAP_MAYMOVE) { - unsigned long map_flags = 0; - if (vma->vm_flags & VM_MAYSHARE) - map_flags |= MAP_SHARED; - - new_addr = get_unmapped_area(vma->vm_file, 0, new_len, - vma->vm_pgoff + - ((addr - vma->vm_start) >> PAGE_SHIFT), - map_flags); - if (IS_ERR_VALUE(new_addr)) { - ret = new_addr; - goto out; - } - - ret = move_vma(vma, addr, old_len, new_len, new_addr, - &locked, flags, &uf, &uf_unmap); - } out: if (offset_in_page(ret)) locked = false; - mmap_write_unlock(current->mm); + mmap_write_unlock(mm); if (locked && new_len > old_len) - mm_populate(new_addr + old_len, new_len - old_len); + mm_populate(new_addr + old_len, delta); out_unlocked: userfaultfd_unmap_complete(mm, &uf_unmap_early); mremap_userfaultfd_complete(&uf, addr, ret, old_len); From patchwork Mon Mar 3 11:08:33 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13998802 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 485B4C282C5 for ; Mon, 3 Mar 2025 12:52:03 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B778E6B0089; Mon, 3 Mar 2025 07:52:02 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id B26CB6B008A; Mon, 3 Mar 2025 07:52:02 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 951C7280001; Mon, 3 Mar 2025 07:52:02 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 72F0F6B0089 for ; Mon, 3 Mar 2025 07:52:02 -0500 (EST) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 3079751456 for ; Mon, 3 Mar 2025 12:52:02 +0000 (UTC) X-FDA: 83180227284.21.7265713 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf26.hostedemail.com (Postfix) with ESMTP id 9C8FE140009 for ; Mon, 3 Mar 2025 12:51:58 +0000 (UTC) Authentication-Results: imf26.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=aY9R6rOB; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=XIjAgqWi; spf=pass (imf26.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741006318; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=1Has/MXKXTVWDN5Di9puibXAvmMuHkHfSmiQDjztFlg=; b=pqrlgwEV8KNK1Pf9Bm8zBQf9Jd+n/ttf+CA1154l3wNnPOBoEqIdyxJo0RT2pl/63oZV+D W4DddizP7ZElFM0e8yrLWq5ElLxj3Nf5cHfh/9gWtvYqGiAGiVQrucNUwrVNfrG2pmwwAY pAHaeSfb4ZBPpCaNudIL8kjxbwCbI2U= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741006318; a=rsa-sha256; cv=pass; b=rBsmHJride01u+lPiytLHFyW0ECyEr0vQ/ShjMKut/QqKQWl4dGpgOML26m224JoV5sntI oYtQnATBW8prNjTik0bctKm6OXVOkQn5/TYjEPfNWw6B8SZDyOGE6M4U4U+arpausF+1fq MFQyATEDFrloEK9+sYMnFlgUkgkDlhU= ARC-Authentication-Results: i=2; imf26.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=aY9R6rOB; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=XIjAgqWi; spf=pass (imf26.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com Received: from pps.filterd (m0333521.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 5237tgcd026452; Mon, 3 Mar 2025 11:08:57 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=1Has/MXKXTVWDN5Di9puibXAvmMuHkHfSmiQDjztFlg=; b= aY9R6rOB+ELNacEIzf9EUDgWsdYbvlTcinnQwKkpqdNI8dYAiwfEgOZvEECrG6bk gT/c/mjHtTQ1Bfo65zWBRi18YcG0vaF6miMtKa5+KUV3xHD37bN9adB9eoquVjm9 kGHrMTmnSTtDfBD8u8fb9BHvutI+RdLKtnKtQyepqxBvwIrqHDIft1Ae2ngl0/kC 3Ky7g4IF2/XEpNScg6Kyk8iCxq4N8BWw5jQnwJwydXJRgr1RnOCsJ4tjwyfLDDG7 us2UeyHGJ+x/DucM+32MdsWzP/4e0r75fH0bVN++z+ca80Any9u1xsE0nPf1oi9h GAGVL5rL6oT6yeLEMY5l6Q== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 453u9qae0v-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:56 +0000 (GMT) Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 5239GbMC039698; Mon, 3 Mar 2025 11:08:56 GMT Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2043.outbound.protection.outlook.com [104.47.70.43]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 453rp82hkq-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:55 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=CWDuQ522006VatPhrsa3NxAhefK8OZ6+Em8WESEKpNH78CRRDr9Q4F/mDkhJtpVuiDPP5IL43MJYnt7IYOOLOjCJMLQL2nxN3QaT8AeecHWlLj92c7XswcGKPAU4YyQ+VtTW8BcfHxEVUCIQf1bwsDZHPxmtbJi0/m8AD89GQD+O/yNFXMeBdjMRE5MCRQJnMzgu0Ua6DOVJj67iIDF60wn15S6M5BS3EmxcsWGDxKrWzJ92IGQ+K/822PMzW6vlbQGiEpmYtWdOXkWcwHiBRiTZEhtH0VsZfp/znJuxdXCU4Mk3QfmT3R1gGUj/1LVv9LFsjfIYWnpcOrDSau2eXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=1Has/MXKXTVWDN5Di9puibXAvmMuHkHfSmiQDjztFlg=; b=BHaKUYJRYjEf7imSvEr1uSgE66sSHSUljePnSBwHRVT73ysidV1yqUzVXHoa2AfBTER1ZXGbdBq1uwyNz3yCgaWWyVzZ9zWPeElRhxMP3mi8Zp04PVgAFQRcsS8u5xfP+3trxa/+wxC6zXK7q1ZdMJG6tmQm55eOJq7R/0y7yXm/i425hekfRAKvh6skSGG7ddSNV+KC20gfIre69Y+5O01rERADH2LXiAJI6lQT6M2mugXqMyNx+1SNsI41imboTsanO3qkWswg5YaJkCEYAc8t3p9Sqf2ASR1GMkRV0QU/2KEGPBg0lu0JHVLM53tF9daufJulQGJKrL3oUZ0uhw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1Has/MXKXTVWDN5Di9puibXAvmMuHkHfSmiQDjztFlg=; b=XIjAgqWiFsE+aD3ailuYb6H48aM0t3tuso6lL+j9np9nDzj9MjkkJAMazunvweHnNqa7K99IejjSSBxiqXr6wpomYADhPreEeZRo0rAmob5NE3tM0/RTOMoggLoZuLQaRn4ZHi8yRVRvsnnJboUf6l4TR8DHPfSMNTlgh95dPvM= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DM4PR10MB7427.namprd10.prod.outlook.com (2603:10b6:8:181::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8489.27; Mon, 3 Mar 2025 11:08:53 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 3 Mar 2025 11:08:53 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 3/7] mm/mremap: introduce and use vma_remap_struct threaded state Date: Mon, 3 Mar 2025 11:08:33 +0000 Message-ID: <665d51a5bf1002e84d76733ab313fe304ff73f65.1740911247.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0062.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:153::13) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DM4PR10MB7427:EE_ X-MS-Office365-Filtering-Correlation-Id: 45b2258a-8777-432e-f6b0-08dd5a43c8da X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: bdqeHpkT+qc739uDejIFsmobAqaNJAYIr56R+cwjuU8FxmXHVlWOhr91rvrNSbhZ2XqSjXTS1cUauXoUePnmlUxgJmuP66FBMSbmZQE1TZqmqXJ4dQHMTIx15ih/XEUhunRYKqC+WCDv9gDRjOdTRyD02G/O0No9IpRzZJYdRxlZ6pPWsNLLkH8P1o3uKSLcm0yANnEDuXH8DHlZchhwu7PIaJsTyRkKpKKeEtlHbkac4/zXS8yBVbt1+Wf2tttdsBkLTP6OEEu0MBGfPcUw5tIQ0XdbWdXPmrN+TtQtwGRIt7CnJ3YFq9dO9wKpraHSb02GrEdSSHrAwQzrouLxBlPi6ggtR0xaFNqupe70LiBNbogceIwU/GhFSvNB+wfctVX79GdnXRAZBflzQktihXmyObQ1k3r2c6CLbePsYonO+fR+Y7tR3ZoM+auiSl9w+TWa6Dgyq5nEmFxUq3xY5ckCq9a4h9ChP5B+o4FwfOzPorhPoxLZF8Djpph14hkZm6AQJQTqwsUizvNiCITTqwFuQ3AnNCAZ+2esUXuSPwBkHP1JsaPj1ZpWK82g6xv5d+mJcXOczgARvduUfUbd6qmXwJV4H2kOWyaOSqm1QtSW0XtuLAY08Yn/87ppO4/PzXu1f5JgDkz1BqU7RagsX/Mw1toN7p/gDKOzhOMM53GuuzCidJZsRaOh2WDXusxVA0JDcVrFkXAWXPQNjlKHE8LJ4BPzW9qaKxyHmVLBatm46Nf42CVtlGsg/xmWvz46Gikek64ePjRgGok5AXSI72+au6rogxlll8Mwrf14/8SUdWcGkE2y69YCuBkyfpb2Lst3Oo4DMX69irzWzJmSmBnqKsn/ndBD6xQM20TetSJMd1IjYCkLGFgwMQdgOQxRXvNp4BtQGiXOZeVFx75+0c8z6FE8F8MN2TNXt0SL1e+BdOUFLeqsdF1LvknqYF+PIO9IJEoSoBOflrFl8TFJfIANKvqWF+Wxkv6rS2FnHxicZNr8MOory8aYq5JXrWPSH70JjS8BJOxfO0P18rEL9Evp7CWayfRaL2y+5Vo75muSbNa1fM5vI+rlAf8ngvfLbhqViuTsqGqc7K5g/cSNtZxj1HdZIJpbbHgG8rp9IdioiU9ASwswtQLkHHxithSBFcAJLTpGpDpyXpHTZw4Rz4QpOKRwPqR9DQw9ed00m3eF9Yobm+J3fCTW1e6lmyPXOQU+NIOAUyUsOqXHiX5krf5OyjLyAGiKe7crpYLUVdiVLDMZIbFJ5PM/S66WeeR01dl2FyOvukks0AC6j8VkpZKvgjJU/zT+hufQQggYW+p1lEDtkA80rAXsTngZ0T1z+qvKnAJbxMjneSRAMJ7igx18chOGTp4uZcKmoiQ2zLi6mNFkTZUgRPPDSmYdn9/g X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 45b2258a-8777-432e-f6b0-08dd5a43c8da X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2025 11:08:53.7362 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: cBwIlExuzKgUjj/ulVRrElcxNn9CSWa95pIxCC63qoNdeAiiwRXM3/9FBtUwyUV98fsp+YGZduu9H+/F2BNneUCW+orvbU1KrGPfqI9UhAM= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR10MB7427 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-03_04,2025-03-03_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 suspectscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 malwarescore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503030086 X-Proofpoint-ORIG-GUID: SL03SwDfY57TCXb3D7tvgINXD3jjbe0A X-Proofpoint-GUID: SL03SwDfY57TCXb3D7tvgINXD3jjbe0A X-Stat-Signature: rkb6to5fm4rmnnn3sxp7huo3mrpyiemd X-Rspamd-Queue-Id: 9C8FE140009 X-Rspam-User: X-Rspamd-Server: rspam01 X-HE-Tag: 1741006318-665989 X-HE-Meta: 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 gv0mHvKr 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: A number of mremap() calls both pass around and modify a large number of parameters, making the code less readable and often repeatedly having to determine things such as VMA, size delta, and more. Avoid this by using the common pattern of passing a state object through the operation, updating it as we go. We introduce the vma_remap_struct or 'VRM' for this purpose. This also gives us the ability to accumulate further state through the operation that would otherwise require awkward and error-prone pointer passing. We can also now trivially define helper functions that operate on a VRM object. This pattern has proven itself to be very powerful when implemented for VMA merge, VMA unmapping and memory mapping operations, so it is battle-tested and functional. We both introduce the data structure and use it, introducing helper functions as needed to make things readable, we move some state such as mmap lock and mlock() status to the VRM, we introduce a means of classifying the type of mremap() operation and de-duplicate the get_unmapped_area() lookup. We also neatly thread userfaultfd state throughout the operation. Note that there is further refactoring to be done, chiefly adjust move_vma() to accept a VRM parameter. We defer this as there is pre-requisite work required to be able to do so which we will do in a subsequent patch. Signed-off-by: Lorenzo Stoakes --- mm/mremap.c | 559 +++++++++++++++++++++++++++++++++------------------- 1 file changed, 354 insertions(+), 205 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index c4abda8dfc57..7f0c71aa9bb9 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -32,6 +32,43 @@ #include "internal.h" +/* Classify the kind of remap operation being performed. */ +enum mremap_operation { + MREMAP_NO_RESIZE, /* old_len == new_len, if not moved, do nothing. */ + MREMAP_SHRINK, /* old_len > new_len. */ + MREMAP_EXPAND, /* old_len < new_len. */ +}; + +/* + * Describes a VMA mremap() operation and is threaded throughout it. + * + * Any of the fields may be mutated by the operation, however these values will + * always accurately reflect the remap (for instance, we may adjust lengths and + * delta to account for hugetlb alignment). + */ +struct vma_remap_struct { + /* User-provided state. */ + unsigned long addr; /* User-specified address from which we remap. */ + unsigned long old_len; /* Length of range being remapped. */ + unsigned long new_len; /* Desired new length of mapping. */ + unsigned long flags; /* user-specified MREMAP_* flags. */ + unsigned long new_addr; /* Optionally, desired new address. */ + + /* uffd state. */ + struct vm_userfaultfd_ctx *uf; + struct list_head *uf_unmap_early; + struct list_head *uf_unmap; + + /* VMA state, determined in do_mremap(). */ + struct vm_area_struct *vma; + + /* Internal state, determined in do_mremap(). */ + unsigned long delta; /* Absolute delta of old_len, new_len. */ + bool locked; /* Was the VMA mlock()'d (has the VM_LOCKED flag set). */ + enum mremap_operation remap_type; /* expand, shrink, etc. */ + bool mmap_locked; /* Is current->mm currently write-locked? */ +}; + static pud_t *get_old_pud(struct mm_struct *mm, unsigned long addr) { pgd_t *pgd; @@ -693,6 +730,97 @@ unsigned long move_page_tables(struct vm_area_struct *vma, return len + old_addr - old_end; /* how much done */ } +/* Set vrm->delta to the difference in VMA size specified by user. */ +static void vrm_set_delta(struct vma_remap_struct *vrm) +{ + vrm->delta = abs_diff(vrm->old_len, vrm->new_len); +} + +/* Determine what kind of remap this is - shrink, expand or no resize at all. */ +static enum mremap_operation vrm_remap_type(struct vma_remap_struct *vrm) +{ + if (vrm->delta == 0) + return MREMAP_NO_RESIZE; + + if (vrm->old_len > vrm->new_len) + return MREMAP_SHRINK; + + return MREMAP_EXPAND; +} + +/* Set the vrm->remap_type, assumes state is sufficient set up for this. */ +static void vrm_set_remap_type(struct vma_remap_struct *vrm) +{ + vrm->remap_type = vrm_remap_type(vrm); +} + +/* + * When moving a VMA to vrm->new_adr, does this result in the new and old VMAs + * overlapping? + */ +static bool vrm_overlaps(struct vma_remap_struct *vrm) +{ + unsigned long start_old = vrm->addr; + unsigned long start_new = vrm->new_addr; + unsigned long end_old = vrm->addr + vrm->old_len; + unsigned long end_new = vrm->new_addr + vrm->new_len; + + /* + * start_old end_old + * |-----------| + * | | + * |-----------| + * |-------------| + * | | + * |-------------| + * start_new end_new + */ + if (end_old > start_new && end_new > start_old) + return true; + + return false; +} + +/* Do the mremap() flags require that the new_addr parameter be specified? */ +static bool vrm_implies_new_addr(struct vma_remap_struct *vrm) +{ + return vrm->flags & (MREMAP_FIXED | MREMAP_DONTUNMAP); +} + +/* + * Find an unmapped area for the requested vrm->new_addr. + * + * If MREMAP_FIXED then this is equivalent to a MAP_FIXED mmap() call. If only + * MREMAP_DONTUNMAP is set, then this is equivalent to providing a hint to + * mmap(), otherwise this is equivalent to mmap() specifying a NULL address. + * + * Returns 0 on success (with vrm->new_addr updated), or an error code upon + * failure. + */ +static unsigned long vrm_set_new_addr(struct vma_remap_struct *vrm) +{ + struct vm_area_struct *vma = vrm->vma; + unsigned long map_flags = 0; + /* Page Offset _into_ the VMA. */ + pgoff_t internal_pgoff = (vrm->addr - vma->vm_start) >> PAGE_SHIFT; + pgoff_t pgoff = vma->vm_pgoff + internal_pgoff; + unsigned long new_addr = vrm_implies_new_addr(vrm) ? vrm->new_addr : 0; + unsigned long res; + + if (vrm->flags & MREMAP_FIXED) + map_flags |= MAP_FIXED; + if (vma->vm_flags & VM_MAYSHARE) + map_flags |= MAP_SHARED; + + res = get_unmapped_area(vma->vm_file, new_addr, vrm->new_len, pgoff, + map_flags); + if (IS_ERR_VALUE(res)) + return res; + + vrm->new_addr = res; + return 0; +} + static unsigned long move_vma(struct vm_area_struct *vma, unsigned long old_addr, unsigned long old_len, unsigned long new_len, unsigned long new_addr, @@ -860,18 +988,15 @@ static unsigned long move_vma(struct vm_area_struct *vma, * resize_is_valid() - Ensure the vma can be resized to the new length at the give * address. * - * @vma: The vma to resize - * @addr: The old address - * @old_len: The current size - * @new_len: The desired size - * @flags: The vma flags - * * Return 0 on success, error otherwise. */ -static int resize_is_valid(struct vm_area_struct *vma, unsigned long addr, - unsigned long old_len, unsigned long new_len, unsigned long flags) +static int resize_is_valid(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; + struct vm_area_struct *vma = vrm->vma; + unsigned long addr = vrm->addr; + unsigned long old_len = vrm->old_len; + unsigned long new_len = vrm->new_len; unsigned long pgoff; /* @@ -883,11 +1008,12 @@ static int resize_is_valid(struct vm_area_struct *vma, unsigned long addr, * behavior. As a result, fail such attempts. */ if (!old_len && !(vma->vm_flags & (VM_SHARED | VM_MAYSHARE))) { - pr_warn_once("%s (%d): attempted to duplicate a private mapping with mremap. This is not supported.\n", current->comm, current->pid); + pr_warn_once("%s (%d): attempted to duplicate a private mapping with mremap. This is not supported.\n", + current->comm, current->pid); return -EINVAL; } - if ((flags & MREMAP_DONTUNMAP) && + if ((vrm->flags & MREMAP_DONTUNMAP) && (vma->vm_flags & (VM_DONTEXPAND | VM_PFNMAP))) return -EINVAL; @@ -907,99 +1033,114 @@ static int resize_is_valid(struct vm_area_struct *vma, unsigned long addr, if (vma->vm_flags & (VM_DONTEXPAND | VM_PFNMAP)) return -EFAULT; - if (!mlock_future_ok(mm, vma->vm_flags, new_len - old_len)) + if (!mlock_future_ok(mm, vma->vm_flags, vrm->delta)) return -EAGAIN; - if (!may_expand_vm(mm, vma->vm_flags, - (new_len - old_len) >> PAGE_SHIFT)) + if (!may_expand_vm(mm, vma->vm_flags, vrm->delta >> PAGE_SHIFT)) return -ENOMEM; return 0; } /* - * mremap_to() - remap a vma to a new location - * @addr: The old address - * @old_len: The old size - * @new_addr: The target address - * @new_len: The new size - * @locked: If the returned vma is locked (VM_LOCKED) - * @flags: the mremap flags - * @uf: The mremap userfaultfd context - * @uf_unmap_early: The userfaultfd unmap early context - * @uf_unmap: The userfaultfd unmap context + * The user has requested that the VMA be shrunk (i.e., old_len > new_len), so + * execute this, optionally dropping the mmap lock when we do so. * + * In both cases this invalidates the VMA, however if we don't drop the lock, + * then load the correct VMA into vrm->vma afterwards. + */ +static unsigned long shrink_vma(struct vma_remap_struct *vrm, + bool drop_lock) +{ + struct mm_struct *mm = current->mm; + unsigned long unmap_start = vrm->addr + vrm->new_len; + unsigned long unmap_bytes = vrm->delta; + unsigned long res; + VMA_ITERATOR(vmi, mm, unmap_start); + + VM_BUG_ON(vrm->remap_type != MREMAP_SHRINK); + + res = do_vmi_munmap(&vmi, mm, unmap_start, unmap_bytes, + vrm->uf_unmap, drop_lock); + vrm->vma = NULL; /* Invalidated. */ + if (res) + return res; + + /* + * If we've not dropped the lock, then we should reload the VMA to + * replace the invalidated VMA with the one that may have now been + * split. + */ + if (drop_lock) + vrm->mmap_locked = false; + else + vrm->vma = vma_lookup(mm, vrm->addr); + + return 0; +} + +/* + * mremap_to() - remap a vma to a new location. * Returns: The new address of the vma or an error. */ -static unsigned long mremap_to(unsigned long addr, unsigned long old_len, - unsigned long new_addr, unsigned long new_len, bool *locked, - unsigned long flags, struct vm_userfaultfd_ctx *uf, - struct list_head *uf_unmap_early, - struct list_head *uf_unmap) +static unsigned long mremap_to(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; - struct vm_area_struct *vma; - unsigned long ret; - unsigned long map_flags = 0; + unsigned long err; /* Is the new length or address silly? */ - if (new_len > TASK_SIZE || new_addr > TASK_SIZE - new_len) + if (vrm->new_len > TASK_SIZE || + vrm->new_addr > TASK_SIZE - vrm->new_len) return -EINVAL; - /* Ensure the old/new locations do not overlap. */ - if (addr + old_len > new_addr && new_addr + new_len > addr) + if (vrm_overlaps(vrm)) return -EINVAL; - if (flags & MREMAP_FIXED) { + if (vrm->flags & MREMAP_FIXED) { /* * In mremap_to(). * VMA is moved to dst address, and munmap dst first. * do_munmap will check if dst is sealed. */ - ret = do_munmap(mm, new_addr, new_len, uf_unmap_early); - if (ret) - return ret; - } + err = do_munmap(mm, vrm->new_addr, vrm->new_len, + vrm->uf_unmap_early); + vrm->vma = NULL; /* Invalidated. */ + if (err) + return err; - if (old_len > new_len) { - ret = do_munmap(mm, addr+new_len, old_len - new_len, uf_unmap); - if (ret) - return ret; - old_len = new_len; + /* + * If we remap a portion of a VMA elsewhere in the same VMA, + * this can invalidate the old VMA and iterator. Reset. + */ + vrm->vma = vma_lookup(mm, vrm->addr); } - vma = vma_lookup(mm, addr); - if (!vma) - return -EFAULT; + if (vrm->remap_type == MREMAP_SHRINK) { + err = shrink_vma(vrm, /* drop_lock= */false); + if (err) + return err; - ret = resize_is_valid(vma, addr, old_len, new_len, flags); - if (ret) - return ret; + /* Set up for the move now shrink has been executed. */ + vrm->old_len = vrm->new_len; + } + + err = resize_is_valid(vrm); + if (err) + return err; /* MREMAP_DONTUNMAP expands by old_len since old_len == new_len */ - if (flags & MREMAP_DONTUNMAP && - !may_expand_vm(mm, vma->vm_flags, old_len >> PAGE_SHIFT)) { + if (vrm->flags & MREMAP_DONTUNMAP && + !may_expand_vm(mm, vrm->vma->vm_flags, vrm->old_len >> PAGE_SHIFT)) { return -ENOMEM; } - if (flags & MREMAP_FIXED) - map_flags |= MAP_FIXED; - - if (vma->vm_flags & VM_MAYSHARE) - map_flags |= MAP_SHARED; - - ret = get_unmapped_area(vma->vm_file, new_addr, new_len, vma->vm_pgoff + - ((addr - vma->vm_start) >> PAGE_SHIFT), - map_flags); - if (IS_ERR_VALUE(ret)) - return ret; - - /* We got a new mapping */ - if (!(flags & MREMAP_FIXED)) - new_addr = ret; + err = vrm_set_new_addr(vrm); + if (err) + return err; - return move_vma(vma, addr, old_len, new_len, new_addr, locked, flags, - uf, uf_unmap); + return move_vma(vrm->vma, vrm->addr, vrm->old_len, vrm->new_len, + vrm->new_addr, &vrm->locked, vrm->flags, + vrm->uf, vrm->uf_unmap); } static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) @@ -1016,22 +1157,33 @@ static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) return 1; } -/* Do the mremap() flags require that the new_addr parameter be specified? */ -static bool implies_new_addr(unsigned long flags) +/* Determine whether we are actually able to execute an in-place expansion. */ +static bool vrm_can_expand_in_place(struct vma_remap_struct *vrm) { - return flags & (MREMAP_FIXED | MREMAP_DONTUNMAP); + /* Number of bytes from vrm->addr to end of VMA. */ + unsigned long suffix_bytes = vrm->vma->vm_end - vrm->addr; + + /* If end of range aligns to end of VMA, we can just expand in-place. */ + if (suffix_bytes != vrm->old_len) + return false; + + /* Check whether this is feasible. */ + if (!vma_expandable(vrm->vma, vrm->delta)) + return false; + + return true; } /* * Are the parameters passed to mremap() valid? If so return 0, otherwise return * error. */ -static unsigned long check_mremap_params(unsigned long addr, - unsigned long flags, - unsigned long old_len, - unsigned long new_len, - unsigned long new_addr) +static unsigned long check_mremap_params(struct vma_remap_struct *vrm) + { + unsigned long addr = vrm->addr; + unsigned long flags = vrm->flags; + /* Ensure no unexpected flag values. */ if (flags & ~(MREMAP_FIXED | MREMAP_MAYMOVE | MREMAP_DONTUNMAP)) return -EINVAL; @@ -1045,15 +1197,15 @@ static unsigned long check_mremap_params(unsigned long addr, * for DOS-emu "duplicate shm area" thing. But * a zero new-len is nonsensical. */ - if (!PAGE_ALIGN(new_len)) + if (!PAGE_ALIGN(vrm->new_len)) return -EINVAL; /* Remainder of checks are for cases with specific new_addr. */ - if (!implies_new_addr(flags)) + if (!vrm_implies_new_addr(vrm)) return 0; /* The new address must be page-aligned. */ - if (offset_in_page(new_addr)) + if (offset_in_page(vrm->new_addr)) return -EINVAL; /* A fixed address implies a move. */ @@ -1061,7 +1213,7 @@ static unsigned long check_mremap_params(unsigned long addr, return -EINVAL; /* MREMAP_DONTUNMAP does not allow resizing in the process. */ - if (flags & MREMAP_DONTUNMAP && old_len != new_len) + if (flags & MREMAP_DONTUNMAP && vrm->old_len != vrm->new_len) return -EINVAL; /* @@ -1090,11 +1242,11 @@ static unsigned long check_mremap_params(unsigned long addr, * If we discover the VMA is locked, update mm_struct statistics accordingly and * indicate so to the caller. */ -static unsigned long expand_vma_inplace(struct vm_area_struct *vma, - unsigned long delta, bool *locked) +static unsigned long expand_vma_in_place(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; - long pages = delta >> PAGE_SHIFT; + long pages = vrm->delta >> PAGE_SHIFT; + struct vm_area_struct *vma = vrm->vma; VMA_ITERATOR(vmi, mm, vma->vm_end); long charged = 0; @@ -1114,7 +1266,7 @@ static unsigned long expand_vma_inplace(struct vm_area_struct *vma, * adjacent to the expanded vma and otherwise * compatible. */ - vma = vma_merge_extend(&vmi, vma, delta); + vma = vrm->vma = vma_merge_extend(&vmi, vma, vrm->delta); if (!vma) { vm_unacct_memory(charged); return -ENOMEM; @@ -1123,42 +1275,34 @@ static unsigned long expand_vma_inplace(struct vm_area_struct *vma, vm_stat_account(mm, vma->vm_flags, pages); if (vma->vm_flags & VM_LOCKED) { mm->locked_vm += pages; - *locked = true; + vrm->locked = true; } return 0; } -static bool align_hugetlb(struct vm_area_struct *vma, - unsigned long addr, - unsigned long new_addr, - unsigned long *old_len_ptr, - unsigned long *new_len_ptr, - unsigned long *delta_ptr) +static bool align_hugetlb(struct vma_remap_struct *vrm) { - unsigned long old_len = *old_len_ptr; - unsigned long new_len = *new_len_ptr; - struct hstate *h __maybe_unused = hstate_vma(vma); + struct hstate *h __maybe_unused = hstate_vma(vrm->vma); - old_len = ALIGN(old_len, huge_page_size(h)); - new_len = ALIGN(new_len, huge_page_size(h)); + vrm->old_len = ALIGN(vrm->old_len, huge_page_size(h)); + vrm->new_len = ALIGN(vrm->new_len, huge_page_size(h)); /* addrs must be huge page aligned */ - if (addr & ~huge_page_mask(h)) + if (vrm->addr & ~huge_page_mask(h)) return false; - if (new_addr & ~huge_page_mask(h)) + if (vrm->new_addr & ~huge_page_mask(h)) return false; /* * Don't allow remap expansion, because the underlying hugetlb * reservation is not yet capable to handle split reservation. */ - if (new_len > old_len) + if (vrm->new_len > vrm->old_len) return false; - *old_len_ptr = old_len; - *new_len_ptr = new_len; - *delta_ptr = abs_diff(old_len, new_len); + vrm_set_delta(vrm); + return true; } @@ -1169,19 +1313,16 @@ static bool align_hugetlb(struct vm_area_struct *vma, * Try to do so in-place, if this fails, then move the VMA to a new location to * action the change. */ -static unsigned long expand_vma(struct vm_area_struct *vma, - unsigned long addr, unsigned long old_len, - unsigned long new_len, unsigned long flags, - bool *locked_ptr, unsigned long *new_addr_ptr, - struct vm_userfaultfd_ctx *uf_ptr, - struct list_head *uf_unmap_ptr) +static unsigned long expand_vma(struct vma_remap_struct *vrm) { unsigned long err; - unsigned long map_flags; - unsigned long new_addr; /* We ignore any user-supplied one. */ - pgoff_t pgoff; + struct vm_area_struct *vma = vrm->vma; + unsigned long addr = vrm->addr; + unsigned long old_len = vrm->old_len; + unsigned long new_len = vrm->new_len; + unsigned long flags = vrm->flags; - err = resize_is_valid(vma, addr, old_len, new_len, flags); + err = resize_is_valid(vrm); if (err) return err; @@ -1189,10 +1330,9 @@ static unsigned long expand_vma(struct vm_area_struct *vma, * [addr, old_len) spans precisely to the end of the VMA, so try to * expand it in-place. */ - if (old_len == vma->vm_end - addr && - vma_expandable(vma, new_len - old_len)) { - err = expand_vma_inplace(vma, new_len - old_len, locked_ptr); - if (IS_ERR_VALUE(err)) + if (vrm_can_expand_in_place(vrm)) { + err = expand_vma_in_place(vrm); + if (err) return err; /* @@ -1200,8 +1340,8 @@ static unsigned long expand_vma(struct vm_area_struct *vma, * satisfy the expectation that mlock()'ing a VMA maintains all * of its pages in memory. */ - if (*locked_ptr) - *new_addr_ptr = addr; + if (vrm->locked) + vrm->new_addr = addr; /* OK we're done! */ return addr; @@ -1217,62 +1357,65 @@ static unsigned long expand_vma(struct vm_area_struct *vma, return -ENOMEM; /* Find a new location to move the VMA to. */ - map_flags = (vma->vm_flags & VM_MAYSHARE) ? MAP_SHARED : 0; - pgoff = vma->vm_pgoff + ((addr - vma->vm_start) >> PAGE_SHIFT); - new_addr = get_unmapped_area(vma->vm_file, 0, new_len, pgoff, map_flags); - if (IS_ERR_VALUE(new_addr)) - return new_addr; - *new_addr_ptr = new_addr; + err = vrm_set_new_addr(vrm); + if (err) + return err; - return move_vma(vma, addr, old_len, new_len, new_addr, - locked_ptr, flags, uf_ptr, uf_unmap_ptr); + return move_vma(vma, addr, old_len, new_len, vrm->new_addr, + &vrm->locked, flags, vrm->uf, vrm->uf_unmap); } /* - * Expand (or shrink) an existing mapping, potentially moving it at the - * same time (controlled by the MREMAP_MAYMOVE flag and available VM space) - * - * MREMAP_FIXED option added 5-Dec-1999 by Benjamin LaHaise - * This option implies MREMAP_MAYMOVE. + * Attempt to resize the VMA in-place, if we cannot, then move the VMA to the + * first available address to perform the operation. */ -SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, - unsigned long, new_len, unsigned long, flags, - unsigned long, new_addr) +static unsigned long mremap_at(struct vma_remap_struct *vrm) +{ + unsigned long res; + + switch (vrm->remap_type) { + case MREMAP_NO_RESIZE: + /* NO-OP CASE - resizing to the same size. */ + return vrm->addr; + case MREMAP_SHRINK: + /* + * SHRINK CASE. Can always be done in-place. + * + * Simply unmap the shrunken portion of the VMA. This does all + * the needed commit accounting, and we indicate that the mmap + * lock should be dropped. + */ + res = shrink_vma(vrm, /* drop_lock= */true); + if (res) + return res; + + return vrm->addr; + case MREMAP_EXPAND: + return expand_vma(vrm); + } + + BUG(); +} + +static unsigned long do_mremap(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; struct vm_area_struct *vma; unsigned long ret; - unsigned long delta; - bool locked = false; - struct vm_userfaultfd_ctx uf = NULL_VM_UFFD_CTX; - LIST_HEAD(uf_unmap_early); - LIST_HEAD(uf_unmap); - /* - * There is a deliberate asymmetry here: we strip the pointer tag - * from the old address but leave the new address alone. This is - * for consistency with mmap(), where we prevent the creation of - * aliasing mappings in userspace by leaving the tag bits of the - * mapping address intact. A non-zero tag will cause the subsequent - * range checks to reject the address as invalid. - * - * See Documentation/arch/arm64/tagged-address-abi.rst for more - * information. - */ - addr = untagged_addr(addr); - - ret = check_mremap_params(addr, flags, old_len, new_len, new_addr); + ret = check_mremap_params(vrm); if (ret) return ret; - old_len = PAGE_ALIGN(old_len); - new_len = PAGE_ALIGN(new_len); - delta = abs_diff(old_len, new_len); + vrm->old_len = PAGE_ALIGN(vrm->old_len); + vrm->new_len = PAGE_ALIGN(vrm->new_len); + vrm_set_delta(vrm); if (mmap_write_lock_killable(mm)) return -EINTR; + vrm->mmap_locked = true; - vma = vma_lookup(mm, addr); + vma = vrm->vma = vma_lookup(mm, vrm->addr); if (!vma) { ret = -EFAULT; goto out; @@ -1285,62 +1428,68 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, } /* Align to hugetlb page size, if required. */ - if (is_vm_hugetlb_page(vma) && - !align_hugetlb(vma, addr, new_addr, &old_len, &new_len, &delta)) { + if (is_vm_hugetlb_page(vma) && !align_hugetlb(vrm)) { ret = -EINVAL; goto out; } - /* Are we RELOCATING the VMA to a SPECIFIC address? */ - if (implies_new_addr(flags)) { - ret = mremap_to(addr, old_len, new_addr, new_len, - &locked, flags, &uf, &uf_unmap_early, - &uf_unmap); - goto out; - } + vrm_set_remap_type(vrm); - /* - * From here on in we are only RESIZING the VMA, attempting to do so - * in-place, moving the VMA if we cannot. - */ + /* Actually execute mremap. */ + ret = vrm_implies_new_addr(vrm) ? mremap_to(vrm) : mremap_at(vrm); - /* NO-OP CASE - resizing to the same size. */ - if (new_len == old_len) { - ret = addr; - goto out; - } - - /* SHRINK CASE. Can always be done in-place. */ - if (new_len < old_len) { - VMA_ITERATOR(vmi, mm, addr + new_len); +out: + if (vrm->mmap_locked) { + mmap_write_unlock(mm); + vrm->mmap_locked = false; - /* - * Simply unmap the shrunken portion of the VMA. This does all - * the needed commit accounting, unlocking the mmap lock. - */ - ret = do_vmi_munmap(&vmi, mm, addr + new_len, delta, - &uf_unmap, true); - if (ret) - goto out; - - /* We succeeded, mmap lock released for us. */ - ret = addr; - goto out_unlocked; + if (!offset_in_page(ret) && vrm->locked && vrm->new_len > vrm->old_len) + mm_populate(vrm->new_addr + vrm->old_len, vrm->delta); } - /* EXPAND case. We try to do in-place, if we can't, then we move it. */ - ret = expand_vma(vma, addr, old_len, new_len, flags, &locked, &new_addr, - &uf, &uf_unmap); + userfaultfd_unmap_complete(mm, vrm->uf_unmap_early); + mremap_userfaultfd_complete(vrm->uf, vrm->addr, ret, vrm->old_len); + userfaultfd_unmap_complete(mm, vrm->uf_unmap); -out: - if (offset_in_page(ret)) - locked = false; - mmap_write_unlock(mm); - if (locked && new_len > old_len) - mm_populate(new_addr + old_len, delta); -out_unlocked: - userfaultfd_unmap_complete(mm, &uf_unmap_early); - mremap_userfaultfd_complete(&uf, addr, ret, old_len); - userfaultfd_unmap_complete(mm, &uf_unmap); return ret; } + +/* + * Expand (or shrink) an existing mapping, potentially moving it at the + * same time (controlled by the MREMAP_MAYMOVE flag and available VM space) + * + * MREMAP_FIXED option added 5-Dec-1999 by Benjamin LaHaise + * This option implies MREMAP_MAYMOVE. + */ +SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, + unsigned long, new_len, unsigned long, flags, + unsigned long, new_addr) +{ + struct vm_userfaultfd_ctx uf = NULL_VM_UFFD_CTX; + LIST_HEAD(uf_unmap_early); + LIST_HEAD(uf_unmap); + /* + * There is a deliberate asymmetry here: we strip the pointer tag + * from the old address but leave the new address alone. This is + * for consistency with mmap(), where we prevent the creation of + * aliasing mappings in userspace by leaving the tag bits of the + * mapping address intact. A non-zero tag will cause the subsequent + * range checks to reject the address as invalid. + * + * See Documentation/arch/arm64/tagged-address-abi.rst for more + * information. + */ + struct vma_remap_struct vrm = { + .addr = untagged_addr(addr), + .old_len = old_len, + .new_len = new_len, + .flags = flags, + .new_addr = new_addr, + + .uf = &uf, + .uf_unmap_early = &uf_unmap_early, + .uf_unmap = &uf_unmap, + }; + + return do_mremap(&vrm); +} From patchwork Mon Mar 3 11:08:34 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13998601 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 810AAC282C6 for ; Mon, 3 Mar 2025 11:09:06 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 11ECB6B007B; Mon, 3 Mar 2025 06:09:06 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 080346B0085; Mon, 3 Mar 2025 06:09:06 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D51CB280006; Mon, 3 Mar 2025 06:09:05 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id AAE98280001 for ; Mon, 3 Mar 2025 06:09:05 -0500 (EST) Received: from smtpin08.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 783EF1C8027 for ; Mon, 3 Mar 2025 11:09:05 +0000 (UTC) X-FDA: 83179967850.08.0829CD6 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf30.hostedemail.com (Postfix) with ESMTP id 12A748000B for ; Mon, 3 Mar 2025 11:09:01 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=KDsAbmIB; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=m1r0WASy; spf=pass (imf30.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741000142; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=HXsGRQzNKMXt42MCoue5RtWOd2wLzstBfkrX8aat4C8=; b=vOCgsix8cuCCegH4p0B+y2sFFDHrFl7+xiTU5cbYHlqreFFBacMtHLVT7arI+Xy6wTZAyE E5QdLhdkm6sUt5odlhT9xpSEFiYEl+3HRkGkAtSV0XVR1XJug3pM7426i4g6oxuG8zNrWT V/FeS7zT5R54iqsGS34wUDPHb9tNu/c= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741000142; a=rsa-sha256; cv=pass; b=QOJLm1MABTZyB6E2gNdPV7r4PS0D84msa8AO04C/N61+lRZnH9LGGPsupW72Q0bqK9WWZ8 RlSxhkEWwz1o0bcfJHoaRk0EO7Jnv2aZeSPIhhbhTApuuc1+bKBbQhldKeV/yr5vla0nP5 WH2VgXAIz7lOV5akIFrs9ezchSzRvIY= ARC-Authentication-Results: i=2; imf30.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=KDsAbmIB; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=m1r0WASy; spf=pass (imf30.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 5237tkGK015585; Mon, 3 Mar 2025 11:08:59 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=HXsGRQzNKMXt42MCoue5RtWOd2wLzstBfkrX8aat4C8=; b= KDsAbmIBLuTL+6tjZl/+Edt3Zg9Zd96KSfnmmdp4y0PLTvwYF4uU86uJViRpKcrp x1/pTWGUSEQtXTFvDQy5NjqKVf61N9HU3uqDhUrPSAMaPB+By02Yn63b3W49Fe0z qK8VM15mzNG3kEeceb96i7HOq7aWiCTGTAHuPHq59KutYTZ3F+wVa5menh2Dr+Vm uoBr1sCiu4p0ceyl9FYapKa0q1S803pUydFL72JYWywWTceWUOxA/r+t4ko9VkFZ nJvMbLhWw/K9lOnF9cEE6m1kQXjSuBBd2e4Wi8he+JixobTAIyyomiRnRpMgri5x UQVyi47OmCKlaiL1Ariu1Q== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 453uavtcb6-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:58 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 5239CfQL003167; Mon, 3 Mar 2025 11:08:57 GMT Received: from nam10-dm6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2047.outbound.protection.outlook.com [104.47.58.47]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 453rp7bfvd-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:57 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=BkzCAzGFTd1YVGSUIK0LVRrPn67nR/zPkH+JY6mTI4XNNeSEnQiHl4grc/XqtKKDvvrfJ9/J0WRf6x/Sz0KCPeqnmoHZpiK36eMtYpR0GnSj/ctKCpG4aHqORW0soc5gwCWjy0G0kblfpbZSW/bhN4z5Immv83eO1JwauKbYFJepoE3vyVOKZOkMCdr8dji9mUbAhFtLhXxxtrgfQ7N7mhzFZFzlQQajL5eyjcBn33ukBxEFcJhrVSoxycf2o//YzNoM3xw49dNhxWy7y3gdd8Z+CSPZ2V3C7KeIhKDIrAlUr8rdjAvwxeLq8Em8QecBbBmwdOvQWLsNYxoVvsmPnA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HXsGRQzNKMXt42MCoue5RtWOd2wLzstBfkrX8aat4C8=; b=GT/7g8GgmN/eIQatlej1y61LaQo/Cd/qGn+5L5xkLk7sC64R6ywDgnfl+A2hgGBTCV/fHiuCWHoh5YH63HXvp28z32JuAAKy6gl7A11FZkcOqKpyNw5JOEhMNvKfd9HBzbdrAD1CrJ/jlQxJM9PWuOKx90fjsa1jmzrHne5i1EXI6mTRK5q2IGZhiogPQe8DHcxXjoFdUCTtQT39Ogm6L3k9xV7d2SMJp3qSasGkZW67dfKS4ImYLC/pXI3sCKgDaAyeqoYgeuamyhiDp1bNlxx0/ygoPGA4qxSWhqYYiB9qetV6G9nBDNSJnEZjb0N7KcmZJUDxsZADklbdsjsEDA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HXsGRQzNKMXt42MCoue5RtWOd2wLzstBfkrX8aat4C8=; b=m1r0WASybgksnz3z7CO/xbFnoHPlLHWFAYqPhdmsqGuJjxQbYTaCih5B1Y8+g0XL1SPiM90bC0uY1FZWT8L5Ofo5XXdNs8y8XpcdlvOS/2q8aKWoOP202cKnu77bo/jDWGutcvrXrRhPPOfsnIx58ciWvt+P627eRk6xQq3myLE= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DM4PR10MB7427.namprd10.prod.outlook.com (2603:10b6:8:181::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8489.27; Mon, 3 Mar 2025 11:08:56 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 3 Mar 2025 11:08:55 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 4/7] mm/mremap: initial refactor of move_vma() Date: Mon, 3 Mar 2025 11:08:34 +0000 Message-ID: X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0417.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:18b::8) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DM4PR10MB7427:EE_ X-MS-Office365-Filtering-Correlation-Id: d3297e34-240c-486e-0299-08dd5a43ca25 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: d3297e34-240c-486e-0299-08dd5a43ca25 X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2025 11:08:55.8913 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: j0+HU+S50LHvhwolnyqNkPnWASIeb3l+jmblPnSAHma3k/EFtWj1qiLd/0wwVhiUgUEAxrCFLyTSUInQUSMvIwnGdU5Z/FlWxALREYNiyvY= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR10MB7427 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-03_04,2025-03-03_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 adultscore=0 bulkscore=0 mlxlogscore=999 malwarescore=0 spamscore=0 phishscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503030086 X-Proofpoint-GUID: MclRlKW6RDqbynPUlnLKvZVBOr-cfzf9 X-Proofpoint-ORIG-GUID: MclRlKW6RDqbynPUlnLKvZVBOr-cfzf9 X-Stat-Signature: waypem7femo6hhgf4jc96wuo56aqjttr X-Rspamd-Queue-Id: 12A748000B X-Rspam-User: X-Rspamd-Server: rspam01 X-HE-Tag: 1741000141-683608 X-HE-Meta: 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 USPSy/gl ayrt3N+OPag2z54bXBVVONbo4bNzcHTc1nyT4JL7JtAbaZJVETEvpHcEthcBn68vxshVbxuRHH89+7PVupxbVRLX7nQEQgzl1I6YDiekHH8DvFjxNTWGkX+exSbeHEtcq/yzGHWqEiwRqbFoQjCJI94krOH6ZltbYycS/7GWRasz9GT3rjJwsC2cixwG6cPHLHZGDrjXaYT4TBReTDMzRfaJLgEDP7SI00Mbd9m6VWwhtgS1XHx2cHOPO3ModzhFuqGe/3ZBObfBeURN0WsAuDOQ9hcTilBhMs3/hYP79RD3ef6bG3wCgxCGjq1s1d80Ck3h4YIaSgpTeaDjuDEFucFkYS1Xkv8b5ru2Y7mnB1zI4AjPGqsU5mVu+diHNw01hBDnn1NK7ZfF4aMeB4eo9/6xOycnBjQZoaeR4Cl5KEVGVkGkdaYNnL6OViBR0cHXNlLYAGqXMHM3Sl3i31pCliVFGmixiH45+yE2J601nSdyJrcW/x7M1H+JKCWVvRNOaApQpUy665H2bWDocGOW5qnUY8IqOG0KiF2ZtK7DtwrkTho/duo6MZSAxjO9QZGXnoI4fOza+GUbphQUGQJlq2bhr41tEcWb57o+qCrZPEVQtvRl3n8HPRC+Qkq9hn3lRlNVxLkV2Eya9QVeZ9OUDZ680Yg== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Update move_vma() to use the threaded VRM object, de-duplicate code and separate into smaller functions to aid readability and debug-ability. This in turn allows further simplification of expand_vma() as we can simply thread VRM through the function. We also take the opportunity to abstract the account charging page count into the VRM in order that we can correctly thread this through the operation. We additionally do the same for tracking mm statistics - exec_vm, stack_vm, data_vm, and locked_vm. As part of this change, we slightly modify when locked pages statistics are counted for in mm_struct statistics. However this should cause no issues, as there is no chance of underflow, nor will any rlimit failures occur as a result. This is an intermediate step before a further refactoring of move_vma() in order to aid review. Signed-off-by: Lorenzo Stoakes --- mm/mremap.c | 186 ++++++++++++++++++++++++++++++++++------------------ 1 file changed, 122 insertions(+), 64 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index 7f0c71aa9bb9..fdbf5515fc44 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -67,6 +67,7 @@ struct vma_remap_struct { bool locked; /* Was the VMA mlock()'d (has the VM_LOCKED flag set). */ enum mremap_operation remap_type; /* expand, shrink, etc. */ bool mmap_locked; /* Is current->mm currently write-locked? */ + unsigned long charged; /* If VM_ACCOUNT, # pages to account. */ }; static pud_t *get_old_pud(struct mm_struct *mm, unsigned long addr) @@ -821,35 +822,88 @@ static unsigned long vrm_set_new_addr(struct vma_remap_struct *vrm) return 0; } -static unsigned long move_vma(struct vm_area_struct *vma, - unsigned long old_addr, unsigned long old_len, - unsigned long new_len, unsigned long new_addr, - bool *locked, unsigned long flags, - struct vm_userfaultfd_ctx *uf, struct list_head *uf_unmap) +/* + * Keep track of pages which have been added to the memory mapping. If the VMA + * is accounted, also check to see if there is sufficient memory. + * + * Returns true on success, false if insufficient memory to charge. + */ +static bool vrm_charge(struct vma_remap_struct *vrm) { - long to_account = new_len - old_len; - struct mm_struct *mm = vma->vm_mm; - struct vm_area_struct *new_vma; - unsigned long vm_flags = vma->vm_flags; - unsigned long new_pgoff; - unsigned long moved_len; - bool account_start = false; - bool account_end = false; - unsigned long hiwater_vm; - int err = 0; - bool need_rmap_locks; - struct vma_iterator vmi; + unsigned long charged; + + if (!(vrm->vma->vm_flags & VM_ACCOUNT)) + return true; + + /* + * If we don't unmap the old mapping, then we account the entirety of + * the length of the new one. Otherwise it's just the delta in size. + */ + if (vrm->flags & MREMAP_DONTUNMAP) + charged = vrm->new_len >> PAGE_SHIFT; + else + charged = vrm->delta >> PAGE_SHIFT; + + + /* This accounts 'charged' pages of memory. */ + if (security_vm_enough_memory_mm(current->mm, charged)) + return false; + + vrm->charged = charged; + return true; +} + +/* + * an error has occurred so we will not be using vrm->charged memory. Unaccount + * this memory if the VMA is accounted. + */ +static void vrm_uncharge(struct vma_remap_struct *vrm) +{ + if (!(vrm->vma->vm_flags & VM_ACCOUNT)) + return; + + vm_unacct_memory(vrm->charged); + vrm->charged = 0; +} + +/* + * Update mm exec_vm, stack_vm, data_vm, and locked_vm fields as needed to + * account for 'bytes' memory used, and if locked, indicate this in the VRM so + * we can handle this correctly later. + */ +static void vrm_stat_account(struct vma_remap_struct *vrm, + unsigned long bytes) +{ + unsigned long pages = bytes >> PAGE_SHIFT; + struct mm_struct *mm = current->mm; + struct vm_area_struct *vma = vrm->vma; + + vm_stat_account(mm, vma->vm_flags, pages); + if (vma->vm_flags & VM_LOCKED) { + mm->locked_vm += pages; + vrm->locked = true; + } +} + +/* + * Perform checks before attempting to write a VMA prior to it being + * moved. + */ +static unsigned long prep_move_vma(struct vma_remap_struct *vrm, + unsigned long *vm_flags_ptr) +{ + unsigned long err; + struct vm_area_struct *vma = vrm->vma; + unsigned long old_addr = vrm->addr; + unsigned long old_len = vrm->old_len; /* * We'd prefer to avoid failure later on in do_munmap: * which may split one vma into three before unmapping. */ - if (mm->map_count >= sysctl_max_map_count - 3) + if (current->mm->map_count >= sysctl_max_map_count - 3) return -ENOMEM; - if (unlikely(flags & MREMAP_DONTUNMAP)) - to_account = new_len; - if (vma->vm_ops && vma->vm_ops->may_split) { if (vma->vm_start != old_addr) err = vma->vm_ops->may_split(vma, old_addr); @@ -867,22 +921,46 @@ static unsigned long move_vma(struct vm_area_struct *vma, * so KSM can come around to merge on vma and new_vma afterwards. */ err = ksm_madvise(vma, old_addr, old_addr + old_len, - MADV_UNMERGEABLE, &vm_flags); + MADV_UNMERGEABLE, vm_flags_ptr); if (err) return err; - if (vm_flags & VM_ACCOUNT) { - if (security_vm_enough_memory_mm(mm, to_account >> PAGE_SHIFT)) - return -ENOMEM; - } + return 0; +} + +static unsigned long move_vma(struct vma_remap_struct *vrm) +{ + struct mm_struct *mm = current->mm; + struct vm_area_struct *vma = vrm->vma; + struct vm_area_struct *new_vma; + unsigned long vm_flags = vma->vm_flags; + unsigned long old_addr = vrm->addr, new_addr = vrm->new_addr; + unsigned long old_len = vrm->old_len, new_len = vrm->new_len; + unsigned long new_pgoff; + unsigned long moved_len; + unsigned long account_start = false; + unsigned long account_end = false; + unsigned long hiwater_vm; + int err; + bool need_rmap_locks; + struct vma_iterator vmi; + + err = prep_move_vma(vrm, &vm_flags); + if (err) + return err; + + /* If accounted, charge the number of bytes the operation will use. */ + if (!vrm_charge(vrm)) + return -ENOMEM; vma_start_write(vma); new_pgoff = vma->vm_pgoff + ((old_addr - vma->vm_start) >> PAGE_SHIFT); - new_vma = copy_vma(&vma, new_addr, new_len, new_pgoff, + new_vma = copy_vma(&vrm->vma, new_addr, new_len, new_pgoff, &need_rmap_locks); + /* This may have been updated. */ + vma = vrm->vma; if (!new_vma) { - if (vm_flags & VM_ACCOUNT) - vm_unacct_memory(to_account >> PAGE_SHIFT); + vrm_uncharge(vrm); return -ENOMEM; } @@ -907,7 +985,7 @@ static unsigned long move_vma(struct vm_area_struct *vma, old_addr = new_addr; new_addr = err; } else { - mremap_userfaultfd_prep(new_vma, uf); + mremap_userfaultfd_prep(new_vma, vrm->uf); } if (is_vm_hugetlb_page(vma)) { @@ -915,7 +993,7 @@ static unsigned long move_vma(struct vm_area_struct *vma, } /* Conceal VM_ACCOUNT so old reservation is not undone */ - if (vm_flags & VM_ACCOUNT && !(flags & MREMAP_DONTUNMAP)) { + if (vm_flags & VM_ACCOUNT && !(vrm->flags & MREMAP_DONTUNMAP)) { vm_flags_clear(vma, VM_ACCOUNT); if (vma->vm_start < old_addr) account_start = true; @@ -933,13 +1011,12 @@ static unsigned long move_vma(struct vm_area_struct *vma, * If this were a serious issue, we'd add a flag to do_munmap(). */ hiwater_vm = mm->hiwater_vm; - vm_stat_account(mm, vma->vm_flags, new_len >> PAGE_SHIFT); /* Tell pfnmap has moved from this vma */ if (unlikely(vma->vm_flags & VM_PFNMAP)) untrack_pfn_clear(vma); - if (unlikely(!err && (flags & MREMAP_DONTUNMAP))) { + if (unlikely(!err && (vrm->flags & MREMAP_DONTUNMAP))) { /* We always clear VM_LOCKED[ONFAULT] on the old vma */ vm_flags_clear(vma, VM_LOCKED_MASK); @@ -952,22 +1029,20 @@ static unsigned long move_vma(struct vm_area_struct *vma, unlink_anon_vmas(vma); /* Because we won't unmap we don't need to touch locked_vm */ + vrm_stat_account(vrm, new_len); return new_addr; } + vrm_stat_account(vrm, new_len); + vma_iter_init(&vmi, mm, old_addr); - if (do_vmi_munmap(&vmi, mm, old_addr, old_len, uf_unmap, false) < 0) { + if (do_vmi_munmap(&vmi, mm, old_addr, old_len, vrm->uf_unmap, false) < 0) { /* OOM: unable to split vma, just get accounts right */ - if (vm_flags & VM_ACCOUNT && !(flags & MREMAP_DONTUNMAP)) + if (vm_flags & VM_ACCOUNT && !(vrm->flags & MREMAP_DONTUNMAP)) vm_acct_memory(old_len >> PAGE_SHIFT); account_start = account_end = false; } - if (vm_flags & VM_LOCKED) { - mm->locked_vm += new_len >> PAGE_SHIFT; - *locked = true; - } - mm->hiwater_vm = hiwater_vm; /* Restore VM_ACCOUNT if one or two pieces of vma left */ @@ -1138,9 +1213,7 @@ static unsigned long mremap_to(struct vma_remap_struct *vrm) if (err) return err; - return move_vma(vrm->vma, vrm->addr, vrm->old_len, vrm->new_len, - vrm->new_addr, &vrm->locked, vrm->flags, - vrm->uf, vrm->uf_unmap); + return move_vma(vrm); } static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) @@ -1245,17 +1318,11 @@ static unsigned long check_mremap_params(struct vma_remap_struct *vrm) static unsigned long expand_vma_in_place(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; - long pages = vrm->delta >> PAGE_SHIFT; struct vm_area_struct *vma = vrm->vma; VMA_ITERATOR(vmi, mm, vma->vm_end); - long charged = 0; - - if (vma->vm_flags & VM_ACCOUNT) { - if (security_vm_enough_memory_mm(mm, pages)) - return -ENOMEM; - charged = pages; - } + if (!vrm_charge(vrm)) + return -ENOMEM; /* * Function vma_merge_extend() is called on the @@ -1268,15 +1335,11 @@ static unsigned long expand_vma_in_place(struct vma_remap_struct *vrm) */ vma = vrm->vma = vma_merge_extend(&vmi, vma, vrm->delta); if (!vma) { - vm_unacct_memory(charged); + vrm_uncharge(vrm); return -ENOMEM; } - vm_stat_account(mm, vma->vm_flags, pages); - if (vma->vm_flags & VM_LOCKED) { - mm->locked_vm += pages; - vrm->locked = true; - } + vrm_stat_account(vrm, vrm->delta); return 0; } @@ -1316,11 +1379,7 @@ static bool align_hugetlb(struct vma_remap_struct *vrm) static unsigned long expand_vma(struct vma_remap_struct *vrm) { unsigned long err; - struct vm_area_struct *vma = vrm->vma; unsigned long addr = vrm->addr; - unsigned long old_len = vrm->old_len; - unsigned long new_len = vrm->new_len; - unsigned long flags = vrm->flags; err = resize_is_valid(vrm); if (err) @@ -1353,7 +1412,7 @@ static unsigned long expand_vma(struct vma_remap_struct *vrm) */ /* We're not allowed to move the VMA, so error out. */ - if (!(flags & MREMAP_MAYMOVE)) + if (!(vrm->flags & MREMAP_MAYMOVE)) return -ENOMEM; /* Find a new location to move the VMA to. */ @@ -1361,8 +1420,7 @@ static unsigned long expand_vma(struct vma_remap_struct *vrm) if (err) return err; - return move_vma(vma, addr, old_len, new_len, vrm->new_addr, - &vrm->locked, flags, vrm->uf, vrm->uf_unmap); + return move_vma(vrm); } /* From patchwork Mon Mar 3 11:08:35 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13998742 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 330EFC282C5 for ; Mon, 3 Mar 2025 12:26:41 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A0B606B0085; Mon, 3 Mar 2025 07:26:40 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 9BAE06B0088; Mon, 3 Mar 2025 07:26:40 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 810846B0089; Mon, 3 Mar 2025 07:26:40 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 643666B0085 for ; Mon, 3 Mar 2025 07:26:40 -0500 (EST) Received: from smtpin12.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id 13A301C8371 for ; Mon, 3 Mar 2025 12:26:40 +0000 (UTC) X-FDA: 83180163360.12.22FAD52 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf23.hostedemail.com (Postfix) with ESMTP id 81204140007 for ; Mon, 3 Mar 2025 12:26:36 +0000 (UTC) Authentication-Results: imf23.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=Mgt2ekRx; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=nmLdRnED; dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf23.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741004796; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Au38QI6Bec+OFkRDyXv79mMYH5dNLY0/KARSrcoXYSA=; b=zzyKHIyGlG4N43S/r5hmknNIuaLnx/oMFEn4ao8FNipfVNMEW/bIfZcm7obvdg3tF8KugI sFVe9ZFacrDztbA7+zfBhebsILeH5VI0tiT5SxNRcYw8kRETG8myzRFOJN2uABH8VKAiqZ Y41ozUyvU6JcznxdEdLc//hsNbcI6Hc= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741004796; a=rsa-sha256; cv=pass; b=5AvhxG+od0xUrE8sr8xzGgZ21M0ObtPOv/LlaWBA2Vi2Xztz/KFGHskw0lHbNWCsdCJ9wY OzzmZpWXKipwvTgOenF+7OhUkI4U6VN//9NesXrWpQvsQ6R0yQ/klILOJ3SLC/1r60pol/ 4TzkB7cUyrXRmv1Y0y89jCfVNThhmWk= ARC-Authentication-Results: i=2; imf23.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=Mgt2ekRx; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=nmLdRnED; dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf23.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") Received: from pps.filterd (m0333521.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 5237tiV9026461; Mon, 3 Mar 2025 11:09:00 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=Au38QI6Bec+OFkRDyXv79mMYH5dNLY0/KARSrcoXYSA=; b= Mgt2ekRxUwVThS+ZM4eKes2Drg2u2pGICuVYJrt9gh+5lPcItlf0kXrGab4qsAOF kHiwuc9QgqVWBVntoTfPOJpp28tCO47JKQ9gynOmGsN1ZQIqjDSIk7i7X+rzzfsa Kbjjb3dfQMVik6sGVtJpiKoL3BFRdJ+sqZKSBcmq+p7lYq6WBtAoouoH/ytlQ1UF 4xyduJwTA3eEKeowu/EZ7y/EDHdCFLNPmIpnQeyb86DFcdsvyVXJsobEhwrgmsHI JmbjRw62f3pvpTE9oLHaC3NWnpAxoyzL0X0YtIiXb29eqm1kouxrmjPLve4u69JI OGZeWgNMH42We9bypaCvmQ== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 453u9qae10-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:09:00 +0000 (GMT) Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 523AiLnP039768; Mon, 3 Mar 2025 11:08:59 GMT Received: from nam12-mw2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2046.outbound.protection.outlook.com [104.47.66.46]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 453rp82hmx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:08:59 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=vkrAc9NQ7HxhwOBW4XKEWDIBO+LrfWUEKCU75TWKLMf5hGsvShVDBdsCSdHKOyMv21ZZQY0HTTr1mXOENQWOAb4Prs+dM3dfVVlU34JVMH0KAo59xFIrh1HJvlhsOXX6WKoT6xgseMbdtU7TqZwEsfewBj7YwLmAVwRIVp3wjSrQxUhOko8A5QT5PGVCpURZrSvxEt7X5pTdUHUDp9bHRRoLvNyGo0rKCy0VuUy5gJ8Z/1yTOtdb5xsfJRfeNmILLyu5l+gEgzEcAfwtTtHxri+ypXS/k0C5jyFyKaES3LeSJp7P3AFOGrTOKHaTu/u13Dl+IDk7zyeImkzUzDj80Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Au38QI6Bec+OFkRDyXv79mMYH5dNLY0/KARSrcoXYSA=; b=fCUVZy4WO0g5gMhxuDKd1d/VDFTp8lpJuj7og/tgmf8awrsMqeX9KteteR8oitjSvo01uRV+tNm1tHR5WAlvp3rGawEKOlyRkQa0NwppTfadNHn+YNEBiWPc58NwdUETBq+URm63iky+EN/w4ICOOhec0JEPsUSciTJ10ztHXBNPorbutSbMYt+xoGXEyTmjNXmURAM3H9QmEu+xaWma1pDL21A1MIUZQEeVwv126J8xv3++DvnZlFCKtrQ/JKjNBpKLWSLzQV97eaU6Y7Tx+MbgLpb4WbaRrCUY06afD+Q/MrrOHUnVd+tqdKzg9kZaY8ZSmeJm/LQSniqDo4+RWA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Au38QI6Bec+OFkRDyXv79mMYH5dNLY0/KARSrcoXYSA=; b=nmLdRnEDFtMwvBAWrbYGJ9CVqrihqtW9dk9zg0S+uK24MOf9DQj4WzcR3eorHbmEGWMo/7VWj6x1jdYJOHIeiTe31iQqnsTiKBKUc5oXc6KXX054140z+gilbZioicX+FZ6HZcAMVKjWOBpModdUequ11ofyPL9D8NEvbYF71bs= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DM4PR10MB7427.namprd10.prod.outlook.com (2603:10b6:8:181::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8489.27; Mon, 3 Mar 2025 11:08:58 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 3 Mar 2025 11:08:57 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 5/7] mm/mremap: complete refactor of move_vma() Date: Mon, 3 Mar 2025 11:08:35 +0000 Message-ID: <61a8071433adf3815713523a5c1db62cbe1e55a1.1740911247.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P265CA0246.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:350::9) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DM4PR10MB7427:EE_ X-MS-Office365-Filtering-Correlation-Id: f93c710e-318d-4a3a-006e-08dd5a43cb59 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: I5YimbcIR7hzzno79S/mokoTxaoyBDWuBp054+ne4yoFvatEpzrlLZZ6ms+FJcQ91Vy9pfrynpt/tCL3xz/tEB2RpF0X47CmB4hTVaJozIZI2fNFMWud6TM7aF3MdnvkbNRZX3lDMFq4zUmrBTpJTmDcVdE7et2kkgg/cdsCC5Me3VyMz7ZlbBGFY6Rp7mqeVAfoMQgLJq1AP0QQyL/vS8Iq9x5M/nAk0x/isajvbNEzHf77ki7hkAMOHmm+/ljEYZw2nRwg6TYoWvzib21yw6kj84kR52PICjvBMi6NEYM7zc/JWUC7qCCJzoGOf65UP1lsSaEEJ+BHa8U+ppaDl9R5gyhjtzM6fsCCMUVPYuSjZYzwMGoRf8JRMKBVnKRF807egHqq+fRNrHOf8jorlUYhHhbqJ0bWxf66+OL2zswRU6K7UnOY5ylfhWp50FJn5JMhZwtP7gwmkcHbj8b/QklmbxPmqFVvcBhaGFLiXZ+znwOAeI/DsPCOlGCDTwHa1emAXGd5eR1uCUXB8Px1/SdlJkalLdFLLrFoOAoMGJcis8EcpL0X9IcbqN0bctW65F1+/o/YJFY00B4u63WkWiV3jTXrlufM6uw8SllDkc4= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: f93c710e-318d-4a3a-006e-08dd5a43cb59 X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2025 11:08:57.9019 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: wwvxwxaJ4doyWXUQGQp1E+AAcjtnSdQ1Xhco5kXpDH9QAnzIx9aqOVxBXyyzBSdJBGUwmXHdCbFtiZi/3p1lHyC5C3YnsxjlGsjMw860s3Y= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR10MB7427 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-03_04,2025-03-03_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 suspectscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 malwarescore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503030086 X-Proofpoint-ORIG-GUID: iGtWUZAdCvS-U_l0Rv6oWk35Vgms-Xva X-Proofpoint-GUID: iGtWUZAdCvS-U_l0Rv6oWk35Vgms-Xva X-Rspam-User: X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: 81204140007 X-Stat-Signature: 4wnf1j9fnk6t7ked1dtqi68gpgn61u5g X-HE-Tag: 1741004796-137860 X-HE-Meta: U2FsdGVkX1+OQvm5VXY8AnGAQEtehl1iu7RUQjnpXv1Zxma7Nlm6uXSMic/tiSnifOwjt0CbFD87Hfv/cC4qeBsEbNCyn2BAW+AtMYDZkqHJxdYJA9dsPqoCV3LIVNBi0ZFUb0ZvfmcReaebBbZjJBSovsmocoKJIJ8tV2Ibzgp/BcRR/ufoXQsh5jtX3jHB6Eco2mfdbT7VJdLRYPkAOvlJODaO3M+RX2GeXG4tB3kXYLY9xSGwnSjfo1BlzNekfT0QDNwJDyAt3yXg4JQZL+HF7PYDMjZd52s+2RkOGMtWD2qRJ332F+x2dijWHJTBy+BduhTQlJ2LAfMY/xmul8IIwbe1DCd6mJvKI7wTJ3eFeArzQtNdg/rSFi86nE8O43uEY8+UZYmIAujfsezVxzsvm4k7OLmbvhgZEzfa2dw/QCmFD3iy24i69N0nEbB2CxkDwPRBI/HkN1w4yUt2mtjImBwtNGibMZmvYrcthQ8l3OX1nL17pvZtpahyb+9EHIqqooqA3TSCp0i4pmzvIWtca3fKMdVGFQ9vkbaCIFVoCd4GZ/YA7z3oIB3DZfQse72G5FgRQvJWmhpeQB9NrRK8aa3NReqPzREBo2hWpZ3glELVhIktx58C7MYDTna2JZbtvVARn/jEm1OVUIvVoHyKzB+hm+OzNcQPf/1dYKVGOKOmQjB51JLiAiVIkrD4E2My7zJSAIJm/PGMYDrwnv9JT5YCJattbG37Hx0anGX0vDbbNlmHxIiknk/kLUSzdn+U6RJzOXcyi0shhF3Nm3GpPUSrlWowt6M1PH1UFIVwcuVhZu37jiJoJUTZesKn2WBHQbgGZC5bmcM/wr+mZ7TYdyD0iZRfOW7IQHR67ObO5EvImiB3mKzlvNUtSQOeYfjQmh+EM54HBCHeW4+8uny4LSkJmKYdBR8l03yDtM3xyinkdppEsonC/Ke9uoBAxAsWRc/XslDKF1Fo0RB g2T2stRc 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000001, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: We invoke ksm_madvise() with an intentionally dummy flags field, so no need to pass around. Additionally, the code tries to be 'clever' with account_start, account_end, using these to both check that vma->vm_start != 0 and that we ought to account the newly split portion of VMA post-move, either before or after it. We need to do this because we intentionally removed VM_ACCOUNT on the VMA prior to unmapping, so we don't erroneously unaccount memory (we have already calculated the correct amount to account and accounted it, any subsequent subtraction will be incorrect). This patch significantly expands the comment (from 2002!) about 'concealing' the flag to make it abundantly clear what's going on, as well as adding and expanding a number of other comments also. We can remove account_start, account_end by instead tracking when we account (i.e. vma->vm_flags has the VM_ACCOUNT flag set, and this is not an MREMAP_DONTUNMAP operation), and figuring out when to reinstate the VM_ACCOUNT flag on prior/subsequent VMAs separately. We additionally break the function into logical pieces and attack the very confusing error handling logic (where, for instance, new_addr is set to err). After this change the code is considerably more readable and easy to manipulate. Signed-off-by: Lorenzo Stoakes --- mm/mremap.c | 292 ++++++++++++++++++++++++++++++++++++---------------- 1 file changed, 203 insertions(+), 89 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index fdbf5515fc44..1ceabd0d9634 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -889,13 +889,13 @@ static void vrm_stat_account(struct vma_remap_struct *vrm, * Perform checks before attempting to write a VMA prior to it being * moved. */ -static unsigned long prep_move_vma(struct vma_remap_struct *vrm, - unsigned long *vm_flags_ptr) +static unsigned long prep_move_vma(struct vma_remap_struct *vrm) { unsigned long err; struct vm_area_struct *vma = vrm->vma; unsigned long old_addr = vrm->addr; unsigned long old_len = vrm->old_len; + unsigned long dummy = vma->vm_flags; /* * We'd prefer to avoid failure later on in do_munmap: @@ -921,56 +921,150 @@ static unsigned long prep_move_vma(struct vma_remap_struct *vrm, * so KSM can come around to merge on vma and new_vma afterwards. */ err = ksm_madvise(vma, old_addr, old_addr + old_len, - MADV_UNMERGEABLE, vm_flags_ptr); + MADV_UNMERGEABLE, &dummy); if (err) return err; return 0; } -static unsigned long move_vma(struct vma_remap_struct *vrm) +/* + * Unmap source VMA for VMA move, turning it from a copy to a move, being + * careful to ensure we do not underflow memory account while doing so if an + * accountable move. + * + * This is best effort, if we fail to unmap then we simply try + */ +static void unmap_source_vma(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; + unsigned long addr = vrm->addr; + unsigned long len = vrm->old_len; struct vm_area_struct *vma = vrm->vma; - struct vm_area_struct *new_vma; - unsigned long vm_flags = vma->vm_flags; - unsigned long old_addr = vrm->addr, new_addr = vrm->new_addr; - unsigned long old_len = vrm->old_len, new_len = vrm->new_len; - unsigned long new_pgoff; - unsigned long moved_len; - unsigned long account_start = false; - unsigned long account_end = false; - unsigned long hiwater_vm; + VMA_ITERATOR(vmi, mm, addr); int err; - bool need_rmap_locks; - struct vma_iterator vmi; + unsigned long vm_start; + unsigned long vm_end; + /* + * It might seem odd that we check for MREMAP_DONTUNMAP here, given this + * function implies that we unmap the original VMA, which seems + * contradictory. + * + * However, this occurs when this operation was attempted and an error + * arose, in which case we _do_ wish to unmap the _new_ VMA, which means + * we actually _do_ want it be unaccounted. + */ + bool accountable_move = (vma->vm_flags & VM_ACCOUNT) && + !(vrm->flags & MREMAP_DONTUNMAP); - err = prep_move_vma(vrm, &vm_flags); - if (err) - return err; + /* + * So we perform a trick here to prevent incorrect accounting. Any merge + * or new VMA allocation performed in copy_vma() does not adjust + * accounting, it is expected that callers handle this. + * + * And indeed we already have, accounting appropriately in the case of + * both in vrm_charge(). + * + * However, when we unmap the existing VMA (to effect the move), this + * code will, if the VMA has VM_ACCOUNT set, attempt to unaccount + * removed pages. + * + * To avoid this we temporarily clear this flag, reinstating on any + * portions of the original VMA that remain. + */ + if (accountable_move) { + vm_flags_clear(vma, VM_ACCOUNT); + /* We are about to split vma, so store the start/end. */ + vm_start = vma->vm_start; + vm_end = vma->vm_end; + } - /* If accounted, charge the number of bytes the operation will use. */ - if (!vrm_charge(vrm)) - return -ENOMEM; + err = do_vmi_munmap(&vmi, mm, addr, len, vrm->uf_unmap, /* unlock= */false); + vrm->vma = NULL; /* Invalidated. */ + if (err) { + /* OOM: unable to split vma, just get accounts right */ + vm_acct_memory(len >> PAGE_SHIFT); + return; + } - vma_start_write(vma); - new_pgoff = vma->vm_pgoff + ((old_addr - vma->vm_start) >> PAGE_SHIFT); - new_vma = copy_vma(&vrm->vma, new_addr, new_len, new_pgoff, + /* + * If we mremap() from a VMA like this: + * + * addr end + * | | + * v v + * |-------------| + * | | + * |-------------| + * + * Having cleared VM_ACCOUNT from the whole VMA, after we unmap above + * we'll end up with: + * + * addr end + * | | + * v v + * |---| |---| + * | A | | B | + * |---| |---| + * + * The VMI is still pointing at addr, so vma_prev() will give us A, and + * a subsequent or lone vma_next() will give as B. + * + * do_vmi_munmap() will have restored the VMI back to addr. + */ + if (accountable_move) { + unsigned long end = addr + len; + + if (vm_start < addr) { + struct vm_area_struct *prev = vma_prev(&vmi); + + vm_flags_set(prev, VM_ACCOUNT); /* Acquires VMA lock. */ + } + + if (vm_end > end) { + struct vm_area_struct *next = vma_next(&vmi); + + vm_flags_set(next, VM_ACCOUNT); /* Acquires VMA lock. */ + } + } +} + +/* + * Copy vrm->vma over to vrm->new_addr possibly adjusting size as part of the + * process. Additionally handle an error occurring on moving of page tables, + * where we reset vrm state to cause unmapping of the new VMA. + * + * Outputs the newly installed VMA to new_vma_ptr. Returns 0 on success or an + * error code. + */ +static int copy_vma_and_data(struct vma_remap_struct *vrm, + struct vm_area_struct **new_vma_ptr) +{ + unsigned long internal_offset = vrm->addr - vrm->vma->vm_start; + unsigned long internal_pgoff = internal_offset >> PAGE_SHIFT; + unsigned long new_pgoff = vrm->vma->vm_pgoff + internal_pgoff; + unsigned long moved_len; + bool need_rmap_locks; + struct vm_area_struct *vma; + struct vm_area_struct *new_vma; + int err = 0; + + new_vma = copy_vma(&vrm->vma, vrm->new_addr, vrm->new_len, new_pgoff, &need_rmap_locks); - /* This may have been updated. */ - vma = vrm->vma; if (!new_vma) { vrm_uncharge(vrm); + *new_vma_ptr = NULL; return -ENOMEM; } + vma = vrm->vma; - moved_len = move_page_tables(vma, old_addr, new_vma, new_addr, old_len, - need_rmap_locks, false); - if (moved_len < old_len) { + moved_len = move_page_tables(vma, vrm->addr, new_vma, + vrm->new_addr, vrm->old_len, + need_rmap_locks, /* for_stack= */false); + if (moved_len < vrm->old_len) err = -ENOMEM; - } else if (vma->vm_ops && vma->vm_ops->mremap) { + else if (vma->vm_ops && vma->vm_ops->mremap) err = vma->vm_ops->mremap(new_vma); - } if (unlikely(err)) { /* @@ -978,28 +1072,84 @@ static unsigned long move_vma(struct vma_remap_struct *vrm) * which will succeed since page tables still there, * and then proceed to unmap new area instead of old. */ - move_page_tables(new_vma, new_addr, vma, old_addr, moved_len, - true, false); - vma = new_vma; - old_len = new_len; - old_addr = new_addr; - new_addr = err; + move_page_tables(new_vma, vrm->new_addr, vma, vrm->addr, + moved_len, /* need_rmap_locks = */true, + /* for_stack= */false); + vrm->vma = new_vma; + vrm->old_len = vrm->new_len; + vrm->addr = vrm->new_addr; } else { mremap_userfaultfd_prep(new_vma, vrm->uf); } - if (is_vm_hugetlb_page(vma)) { + if (is_vm_hugetlb_page(vma)) clear_vma_resv_huge_pages(vma); - } - /* Conceal VM_ACCOUNT so old reservation is not undone */ - if (vm_flags & VM_ACCOUNT && !(vrm->flags & MREMAP_DONTUNMAP)) { - vm_flags_clear(vma, VM_ACCOUNT); - if (vma->vm_start < old_addr) - account_start = true; - if (vma->vm_end > old_addr + old_len) - account_end = true; - } + /* Tell pfnmap has moved from this vma */ + if (unlikely(vma->vm_flags & VM_PFNMAP)) + untrack_pfn_clear(vma); + + *new_vma_ptr = new_vma; + return err; +} + +/* + * Perform final tasks for MADV_DONTUNMAP operation, clearing mlock() and + * account flags on remaining VMA by convention (it cannot be mlock()'d any + * longer, as pages in range are no longer mapped), and removing anon_vma_chain + * links from it (if the entire VMA was copied over). + */ +static void dontunmap_complete(struct vma_remap_struct *vrm, + struct vm_area_struct *new_vma) +{ + unsigned long start = vrm->addr; + unsigned long end = vrm->addr + vrm->old_len; + unsigned long old_start = vrm->vma->vm_start; + unsigned long old_end = vrm->vma->vm_end; + + /* + * We always clear VM_LOCKED[ONFAULT] | VM_ACCOUNT on the old + * vma. + */ + vm_flags_clear(vrm->vma, VM_LOCKED_MASK | VM_ACCOUNT); + + /* + * anon_vma links of the old vma is no longer needed after its page + * table has been moved. + */ + if (new_vma != vrm->vma && start == old_start && end == old_end) + unlink_anon_vmas(vrm->vma); + + /* Because we won't unmap we don't need to touch locked_vm. */ +} + +static unsigned long move_vma(struct vma_remap_struct *vrm) +{ + struct mm_struct *mm = current->mm; + struct vm_area_struct *new_vma; + unsigned long hiwater_vm; + int err; + + err = prep_move_vma(vrm); + if (err) + return err; + + /* If accounted, charge the number of bytes the operation will use. */ + if (!vrm_charge(vrm)) + return -ENOMEM; + + /* We don't want racing faults. */ + vma_start_write(vrm->vma); + + /* Perform copy step. */ + err = copy_vma_and_data(vrm, &new_vma); + /* + * If we established the copied-to VMA, we attempt to recover from the + * error by setting the destination VMA to the source VMA and unmapping + * it below. + */ + if (err && !new_vma) + return err; /* * If we failed to move page tables we still do total_vm increment @@ -1012,51 +1162,15 @@ static unsigned long move_vma(struct vma_remap_struct *vrm) */ hiwater_vm = mm->hiwater_vm; - /* Tell pfnmap has moved from this vma */ - if (unlikely(vma->vm_flags & VM_PFNMAP)) - untrack_pfn_clear(vma); - - if (unlikely(!err && (vrm->flags & MREMAP_DONTUNMAP))) { - /* We always clear VM_LOCKED[ONFAULT] on the old vma */ - vm_flags_clear(vma, VM_LOCKED_MASK); - - /* - * anon_vma links of the old vma is no longer needed after its page - * table has been moved. - */ - if (new_vma != vma && vma->vm_start == old_addr && - vma->vm_end == (old_addr + old_len)) - unlink_anon_vmas(vma); - - /* Because we won't unmap we don't need to touch locked_vm */ - vrm_stat_account(vrm, new_len); - return new_addr; - } - - vrm_stat_account(vrm, new_len); - - vma_iter_init(&vmi, mm, old_addr); - if (do_vmi_munmap(&vmi, mm, old_addr, old_len, vrm->uf_unmap, false) < 0) { - /* OOM: unable to split vma, just get accounts right */ - if (vm_flags & VM_ACCOUNT && !(vrm->flags & MREMAP_DONTUNMAP)) - vm_acct_memory(old_len >> PAGE_SHIFT); - account_start = account_end = false; - } + vrm_stat_account(vrm, vrm->new_len); + if (unlikely(!err && (vrm->flags & MREMAP_DONTUNMAP))) + dontunmap_complete(vrm, new_vma); + else + unmap_source_vma(vrm); mm->hiwater_vm = hiwater_vm; - /* Restore VM_ACCOUNT if one or two pieces of vma left */ - if (account_start) { - vma = vma_prev(&vmi); - vm_flags_set(vma, VM_ACCOUNT); - } - - if (account_end) { - vma = vma_next(&vmi); - vm_flags_set(vma, VM_ACCOUNT); - } - - return new_addr; + return err ? (unsigned long)err : vrm->new_addr; } /* From patchwork Mon Mar 3 11:08:36 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13998602 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B68DBC282C6 for ; Mon, 3 Mar 2025 11:09:10 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 39273280006; Mon, 3 Mar 2025 06:09:10 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 31876280001; Mon, 3 Mar 2025 06:09:10 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 11C78280006; Mon, 3 Mar 2025 06:09:10 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id DB255280001 for ; Mon, 3 Mar 2025 06:09:09 -0500 (EST) Received: from smtpin11.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 9B5FEB11BC for ; Mon, 3 Mar 2025 11:09:09 +0000 (UTC) X-FDA: 83179968018.11.2334C74 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf28.hostedemail.com (Postfix) with ESMTP id 3116AC0008 for ; Mon, 3 Mar 2025 11:09:06 +0000 (UTC) Authentication-Results: imf28.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=QrBXgMAQ; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=gQFjzAf0; spf=pass (imf28.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741000146; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=bIYkEwe9IxN3IrcpgG1lPRkBq/md1eyAzQ4D5Fqcm0M=; b=Xc0IUAg5M78NNdXKHJIKaZvlK2hzjkRYhnAaPYtBnFpulzLBl6O1gNmXKubRUdl8DdTS9K 7UL98ECNhsWytfoLuW+W6qDTFWOh1vnvaBsUIA4AGAeXjJ+75145e0RNlhgKb2b58HbL5G uUstIJqHAJN/4qDbcI8DDaX7lwMlw8I= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741000146; a=rsa-sha256; cv=pass; b=v8g02F+HjFKti6dDxGA3UUU36s5xo4KyKFa/fO+dpb+0fvJnbCa10NVdqzwoG2d8rHiMaW nzpAtpAz5T3gaDTx/PSD5XOyY7AKZm0gS15FcFwXUuWxJWPYy5hj8PGHitRhXdlITI6qJf AoMmQucRJW44wRUCaZ7F9wrlsXxprd4= ARC-Authentication-Results: i=2; imf28.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=QrBXgMAQ; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=gQFjzAf0; spf=pass (imf28.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 5237uDpT008103; Mon, 3 Mar 2025 11:09:03 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=bIYkEwe9IxN3IrcpgG1lPRkBq/md1eyAzQ4D5Fqcm0M=; b= QrBXgMAQ0+rFTkroY9ksc2XIjKeSflCMoM06hQCNsSlFz3Bfo+sfiO7ws/sAh52V rnk3oz9Qgzhksud52L5XFIIpspE8V0CxLLClGnJkJJp4Weqw9op+rOV0zurZEvAh quYhBwQl3cPt6UEQdQNgc5WrlB7qkwzU+kXYzWBSRZXhmexegiBlUdze+h0Ye9jq RjDyTqxvqHC4p369rb3LaNcw2Yn8WxKrpsubULSg925wR7s2cFp0OoO3fhFVtgU3 dHlpqzMV5h++E5sRcoQcJsHbp9A2oDLascEsmNCZPhinTg91KV4wglP4rlJecTPQ nPZocQtC6plDD4oFsySv/w== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 453ub72cvb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:09:03 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 5239IXXB003236; Mon, 3 Mar 2025 11:09:01 GMT Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2040.outbound.protection.outlook.com [104.47.70.40]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 453rp7bfwg-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:09:01 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=Q6JU53eJIx74iVzXFZiZGEIPRD0O35vzCuhFDBWAsCKNF2myDCtOH82vtrUc+mP1uETPCFCK/UeRgKOcsMKao8U2QNly1Gq/TXAz/aRr8PnpCn8FVdfJIZVgwpkE6iylphYpoCjDU2jwOqnCGtFyhHR+SUxm1WjBkt2vI6Lj/tRsv+K8H0bbe6m3mkXkuf+2X1wU0cTTOEjT1DQ7eDT8jpnEm0TZ1xSo9UTHea3Jlj2Rr+n//z/NYG3mR3kuQb5jw9czLaNloDtozzFFD+9lBp0twpcS/ez1T+W1n2pSTeuLk9iieTYodYFa1K10+IAFHLiR4A79MPPJJ653oSmujQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bIYkEwe9IxN3IrcpgG1lPRkBq/md1eyAzQ4D5Fqcm0M=; b=R25Ykwvon/jdo/F4/kPXRhyiWtjT4eiV0LjjY/W55VyKE+L5Jraia1bZmXVYMu+cHMD3+FQwRdJkB0Ft/N6/cXF7dWKgfJEQWAQajubeA3yviKQp+GU7ZLxV60awAcZFSJ8rBaEFgfzfRnNFKzTawx1xcvxpnjingjMuFfLKWd5K3gy2Re1ftgytPMmTOxLOmC1dmmnV9uS0k2MLZP9sEXjG9ZtZoovzU85PLfZJy+UXGyx89AedKc8ZZ8wRuugZNSVEMrKU2tHpUyIwL3UHj6UOC0vqHmHOUnv0XIpotHyzp7eQezP/UTVYDhvRN52GiZC65ivgxsRipjNN/kINzA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bIYkEwe9IxN3IrcpgG1lPRkBq/md1eyAzQ4D5Fqcm0M=; b=gQFjzAf0iUWaMG95ez4QJHVqms/8uMMC2jlyPSpFtWqSaWBMPNQPHnrYStAhoitB+v9IlJcOKNX8TDIEbGbAbjIwlcTZtwCAd8HqBYaiUwklxp7VfEScj+aIxbU3nn1Oa+IbycBqJEePVvMiWxcborwmsIMDzR6mxjgY4jfsqO4= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DM4PR10MB7427.namprd10.prod.outlook.com (2603:10b6:8:181::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8489.27; Mon, 3 Mar 2025 11:09:00 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 3 Mar 2025 11:09:00 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 6/7] mm/mremap: refactor move_page_tables(), abstracting state Date: Mon, 3 Mar 2025 11:08:36 +0000 Message-ID: <1afa8a1a40277aa4cfd595c50f5fa85ea3839813.1740911247.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P265CA0323.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:390::11) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DM4PR10MB7427:EE_ X-MS-Office365-Filtering-Correlation-Id: e0b52be1-7ace-447b-c7eb-08dd5a43cca3 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: e0b52be1-7ace-447b-c7eb-08dd5a43cca3 X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2025 11:09:00.1181 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: MdwLobELdaRC9fWOrWY4VPei2qSZ/VLOxuNQaB2g1dxYW+jKKzLdJkDysrhNJ0px3xxJZIJ8kUtJIE9DtK//ak60rihL8c9nCYMwquzLlLQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR10MB7427 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-03_04,2025-03-03_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 adultscore=0 bulkscore=0 mlxlogscore=999 malwarescore=0 spamscore=0 phishscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503030086 X-Proofpoint-GUID: rOzcFZKG7zbL_sCpvPHYpxKueLY-PR_a X-Proofpoint-ORIG-GUID: rOzcFZKG7zbL_sCpvPHYpxKueLY-PR_a X-Rspamd-Server: rspam02 X-Stat-Signature: tm1d371eaun3k4ayhrctnqk1wrknx7ha X-Rspamd-Queue-Id: 3116AC0008 X-Rspam-User: X-HE-Tag: 1741000145-649503 X-HE-Meta: U2FsdGVkX1/FJu0SZdTTW5hftM5Ks5YDdLWuX3mnd8QU8fL6JTsJgXtEDXViDiPcet6A5ziH+YfryaPIxpz19FXdergWY1GFKDXR6qIN4T34F9jNOQh88533C8Jfjj9C5A1QJjNL+n4SvBh4y6cHzoTJKyN6cf5synOqO1HVLiJu3eodWRBnlZTXfeMoixc7VBVYPrK43KPH9EKZjkXTs5Hja9BeYZjga2wMeL0lX85tC9BgnsudBw3cM5VWMhAmgETUyMkuiLScwBJt3jijqzQnwogp9GSuqZ3Ni2Fa/BFse2SkQ5St1YE7akY9Uy/+WbzcWAQm5PJB/Ld5hLnkDwE0Vi7hJ4JqRTrv6EFmHSDkMQTY4Vk/LAttAL6QuCFhLsSC7is8dUTHSOHLCWMTucRNQzQS695ioJjXBIQaI+KBxHrJRkq5OPA7nYvMk7ccbXa5+2ZODwqMTaIGGC6ZIrwSK6dR3nzM4P7i7LrWOSX8IUY9IOOzPu9LpFPsT8HbYkXkt5hQppgEyT/ohe3VEbw9strROmpznVBixAuctaRaIw+HoTycsvvjg+DqMWwLnpQccF61tI0d2WHnDWWCOawf4nUtVTRqr0L5MBijsxk9wZPR2WKI7xG3N9kWEuH4Re/aJkoshyQM43X3L1EfZ0UiIXNSyvcYsVYyurtUyI/k7ZIcHHvp9csFzEUqFAuVBcU4lB+jlufh3icAIYHkQj6NDRJnnAkO9NPKNfTAusE0uUIzXf+K9BFFv7qlohyjQiKO36/XNAjvF/x3BPf0rjAzZA9N7l5a/oQ+5jaxU8+FMl0eAt43ujJccGrxvEejxHlpul20FuEBT9oFGOKR3enUFuWTR7hZQJTLQ/OFYRyo0TvK4OMVIUjbYfRGhl9pu6uaNiv4SBHeEtQHd9jfP0fD9XOIPBNXfG3feNNwVzErG2JHsrGnffceTnRK6s6RZ7AQbfEaJC+IWJf9d1E 2SaLNxmN 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: A lot of state is threaded throughout the page table moving logic within the mremap code, including boolean values which control behaviour specifically in regard to whether rmap locks need be held over the operation and whether the VMA belongs to a temporary stack being moved by move_arg_pages() (and consequently, relocate_vma_down()). As we already transmit state throughout this operation, it is neater and more readable to maintain a small state object. We do so in the form of pagetable_move_control. In addition, this allows us to update parameters within the state as we manipulate things, for instance with regard to the page table realignment logic. In future I want to add additional functionality to the page table logic, so this is an additional motivation for making it easier to do so. This patch changes move_page_tables() to accept a pointer to a pagetable_move_control struct, and performs changes at this level only. Further page table logic will be updated in a subsequent patch. We additionally also take the opportunity to add significant comments describing the address realignment logic to make it abundantly clear what is going on in this code. Signed-off-by: Lorenzo Stoakes --- mm/internal.h | 46 ++++++++++++-- mm/mmap.c | 5 +- mm/mremap.c | 172 ++++++++++++++++++++++++++++++++++++-------------- 3 files changed, 171 insertions(+), 52 deletions(-) diff --git a/mm/internal.h b/mm/internal.h index 2e5310d47bf8..5d9894e5adfc 100644 --- a/mm/internal.h +++ b/mm/internal.h @@ -24,6 +24,47 @@ struct folio_batch; +/* + * Maintains state across a page table move. The operation assumes both source + * and destination VMAs already exist and are specified by the user. + * + * Partial moves are permitted, but: + * from_vma->vm_start <= from_addr < from_vma->vm_end - len + * to_vma->vm_start <= to_addr < to_vma->vm_end - len + * + * Must be maintained. + * + * mmap lock must be held in write and VMA write locks must be held on any VMA + * that is visible. + * + * Use the PAGETABLE_MOVE() macro to initialise this struct. + * + * NOTE: The page table move is affected by reading from [old_addr, old_end), + * and old_addr may be updated for better page table alignment, so len_in + * represents the length of the range being copied as specified by the user. + */ +struct pagetable_move_control { + struct vm_area_struct *old; /* Source VMA. */ + struct vm_area_struct *new; /* Destination VMA. */ + unsigned long old_addr; /* Address from which the move begins. */ + unsigned long old_end; /* Exclusive address at which old range ends. */ + unsigned long new_addr; /* Address to move page tables to. */ + unsigned long len_in; /* Bytes to remap specified by user. */ + + bool need_rmap_locks; /* Do rmap locks need to be taken? */ + bool for_stack; /* Is this an early temp stack being moved? */ +}; + +#define PAGETABLE_MOVE(name, old_, new_, old_addr_, new_addr_, len_) \ + struct pagetable_move_control name = { \ + .old = old_, \ + .new = new_, \ + .old_addr = old_addr_, \ + .old_end = (old_addr_) + (len_), \ + .new_addr = new_addr_, \ + .len_in = len_, \ + } + /* * The set of flags that only affect watermark checking and reclaim * behaviour. This is used by the MM to obey the caller constraints @@ -1527,10 +1568,7 @@ extern struct list_lru shadow_nodes; } while (0) /* mremap.c */ -unsigned long move_page_tables(struct vm_area_struct *vma, - unsigned long old_addr, struct vm_area_struct *new_vma, - unsigned long new_addr, unsigned long len, - bool need_rmap_locks, bool for_stack); +unsigned long move_page_tables(struct pagetable_move_control *pmc); #ifdef CONFIG_UNACCEPTED_MEMORY void accept_page(struct page *page); diff --git a/mm/mmap.c b/mm/mmap.c index 15d6cd7cc845..efcc4ca7500d 100644 --- a/mm/mmap.c +++ b/mm/mmap.c @@ -1694,6 +1694,7 @@ int relocate_vma_down(struct vm_area_struct *vma, unsigned long shift) VMG_STATE(vmg, mm, &vmi, new_start, old_end, 0, vma->vm_pgoff); struct vm_area_struct *next; struct mmu_gather tlb; + PAGETABLE_MOVE(pmc, vma, vma, old_start, new_start, length); BUG_ON(new_start > new_end); @@ -1716,8 +1717,8 @@ int relocate_vma_down(struct vm_area_struct *vma, unsigned long shift) * move the page tables downwards, on failure we rely on * process cleanup to remove whatever mess we made. */ - if (length != move_page_tables(vma, old_start, - vma, new_start, length, false, true)) + pmc.for_stack = true; + if (length != move_page_tables(&pmc)) return -ENOMEM; tlb_gather_mmu(&tlb, mm); diff --git a/mm/mremap.c b/mm/mremap.c index 1ceabd0d9634..fdbe35de5e5a 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -579,8 +579,9 @@ static bool move_pgt_entry(enum pgt_entry entry, struct vm_area_struct *vma, * the VMA that is created to span the source and destination of the move, * so we make an exception for it. */ -static bool can_align_down(struct vm_area_struct *vma, unsigned long addr_to_align, - unsigned long mask, bool for_stack) +static bool can_align_down(struct pagetable_move_control *pmc, + struct vm_area_struct *vma, unsigned long addr_to_align, + unsigned long mask) { unsigned long addr_masked = addr_to_align & mask; @@ -589,11 +590,11 @@ static bool can_align_down(struct vm_area_struct *vma, unsigned long addr_to_ali * of the corresponding VMA, we can't align down or we will destroy part * of the current mapping. */ - if (!for_stack && vma->vm_start != addr_to_align) + if (!pmc->for_stack && vma->vm_start != addr_to_align) return false; /* In the stack case we explicitly permit in-VMA alignment. */ - if (for_stack && addr_masked >= vma->vm_start) + if (pmc->for_stack && addr_masked >= vma->vm_start) return true; /* @@ -603,54 +604,131 @@ static bool can_align_down(struct vm_area_struct *vma, unsigned long addr_to_ali return find_vma_intersection(vma->vm_mm, addr_masked, vma->vm_start) == NULL; } -/* Opportunistically realign to specified boundary for faster copy. */ -static void try_realign_addr(unsigned long *old_addr, struct vm_area_struct *old_vma, - unsigned long *new_addr, struct vm_area_struct *new_vma, - unsigned long mask, bool for_stack) +/* + * Determine if are in fact able to realign for efficiency to a higher page + * table boundary. + */ +static bool can_realign_addr(struct pagetable_move_control *pmc, + unsigned long pagetable_mask) { + unsigned long align_mask = ~pagetable_mask; + unsigned long old_align = pmc->old_addr & align_mask; + unsigned long new_align = pmc->new_addr & align_mask; + unsigned long pagetable_size = align_mask + 1; + unsigned long old_align_next = pagetable_size - old_align; + + /* + * We don't want to have to go hunting for VMAs from the end of the old + * VMA to the next page table boundary, also we want to make sure the + * operation is wortwhile. + * + * So ensure that we only perform this realignment if the end of the + * range being copied from is at least page table aligned: + * + * boundary boundary + * .<- old_align -> . + * . |----------------.-----------| + * . | vma . | + * . |----------------.-----------| + * . <----------------.-----------> + * . len_in + * <-------------------------------> + * . pagetable_size . + * . <----------------> + * . old_align_next . + */ + if (pmc->len_in < old_align_next) + return false; + /* Skip if the addresses are already aligned. */ - if ((*old_addr & ~mask) == 0) - return; + if (old_align == 0) + return false; /* Only realign if the new and old addresses are mutually aligned. */ - if ((*old_addr & ~mask) != (*new_addr & ~mask)) - return; + if (old_align != new_align) + return false; /* Ensure realignment doesn't cause overlap with existing mappings. */ - if (!can_align_down(old_vma, *old_addr, mask, for_stack) || - !can_align_down(new_vma, *new_addr, mask, for_stack)) + if (!can_align_down(pmc, pmc->old, pmc->old_addr, pagetable_mask) || + !can_align_down(pmc, pmc->new, pmc->new_addr, pagetable_mask)) + return false; + + return true; +} + +/* + * Opportunistically realign to specified boundary for faster copy. + * + * Consider an mremap() of a VMA with page table boundaries as below, and no + * preceding VMAs from the lower page table boundary to the start of the VMA, + * with the end of the range being at least page table aligned: + * + * boundary boundary + * . |----------------.-----------| + * . | vma . | + * . |----------------.-----------| + * . pmc->old_addr . pmc->old_end + * . <----------------------------> + * . move these page tables + * + * If we proceed with moving page tables in this scenario, we will have a lot of + * work to do traversing old page tables and establishing new ones in the + * destination across multiple lower level page tables. + * + * The idea here is simply to align pmc->old_addr, pmc->new_addr down to the + * page table boundary, so we can simply copy a single page table entry for the + * aligned portion of the VMA instead: + * + * boundary boundary + * . |----------------.-----------| + * . | vma . | + * . |----------------.-----------| + * pmc->old_addr . pmc->old_end + * <-------------------------------------------> + * . move these page tables + */ +static void try_realign_addr(struct pagetable_move_control *pmc, + unsigned long pagetable_mask) +{ + + if (!can_realign_addr(pmc, pagetable_mask)) return; - *old_addr = *old_addr & mask; - *new_addr = *new_addr & mask; + /* + * Simply align to page table boundaries. Note that we do NOT update the + * pmc->old_end value, and since the move_page_tables() operation spans + * from [old_addr, old_end) (offsetting new_addr as it is performed), + * this simply changes the start of the copy, not the end. + */ + pmc->old_addr &= pagetable_mask; + pmc->new_addr &= pagetable_mask; } -unsigned long move_page_tables(struct vm_area_struct *vma, - unsigned long old_addr, struct vm_area_struct *new_vma, - unsigned long new_addr, unsigned long len, - bool need_rmap_locks, bool for_stack) +unsigned long move_page_tables(struct pagetable_move_control *pmc) { unsigned long extent, old_end; struct mmu_notifier_range range; pmd_t *old_pmd, *new_pmd; pud_t *old_pud, *new_pud; + unsigned long old_addr, new_addr; + struct vm_area_struct *vma = pmc->old; - if (!len) + if (!pmc->len_in) return 0; - old_end = old_addr + len; - if (is_vm_hugetlb_page(vma)) - return move_hugetlb_page_tables(vma, new_vma, old_addr, - new_addr, len); + return move_hugetlb_page_tables(pmc->old, pmc->new, pmc->old_addr, + pmc->new_addr, pmc->len_in); /* * If possible, realign addresses to PMD boundary for faster copy. * Only realign if the mremap copying hits a PMD boundary. */ - if (len >= PMD_SIZE - (old_addr & ~PMD_MASK)) - try_realign_addr(&old_addr, vma, &new_addr, new_vma, PMD_MASK, - for_stack); + try_realign_addr(pmc, PMD_MASK); + /* These may have been changed. */ + old_addr = pmc->old_addr; + new_addr = pmc->new_addr; + old_end = pmc->old_end; flush_cache_range(vma, old_addr, old_end); mmu_notifier_range_init(&range, MMU_NOTIFY_UNMAP, 0, vma->vm_mm, @@ -674,12 +752,11 @@ unsigned long move_page_tables(struct vm_area_struct *vma, if (pud_trans_huge(*old_pud) || pud_devmap(*old_pud)) { if (extent == HPAGE_PUD_SIZE) { move_pgt_entry(HPAGE_PUD, vma, old_addr, new_addr, - old_pud, new_pud, need_rmap_locks); + old_pud, new_pud, pmc->need_rmap_locks); /* We ignore and continue on error? */ continue; } } else if (IS_ENABLED(CONFIG_HAVE_MOVE_PUD) && extent == PUD_SIZE) { - if (move_pgt_entry(NORMAL_PUD, vma, old_addr, new_addr, old_pud, new_pud, true)) continue; @@ -697,7 +774,7 @@ unsigned long move_page_tables(struct vm_area_struct *vma, pmd_devmap(*old_pmd)) { if (extent == HPAGE_PMD_SIZE && move_pgt_entry(HPAGE_PMD, vma, old_addr, new_addr, - old_pmd, new_pmd, need_rmap_locks)) + old_pmd, new_pmd, pmc->need_rmap_locks)) continue; split_huge_pmd(vma, old_pmd, old_addr); } else if (IS_ENABLED(CONFIG_HAVE_MOVE_PMD) && @@ -712,10 +789,10 @@ unsigned long move_page_tables(struct vm_area_struct *vma, } if (pmd_none(*old_pmd)) continue; - if (pte_alloc(new_vma->vm_mm, new_pmd)) + if (pte_alloc(pmc->new->vm_mm, new_pmd)) break; if (move_ptes(vma, old_pmd, old_addr, old_addr + extent, - new_vma, new_pmd, new_addr, need_rmap_locks) < 0) + pmc->new, new_pmd, new_addr, pmc->need_rmap_locks) < 0) goto again; } @@ -725,10 +802,10 @@ unsigned long move_page_tables(struct vm_area_struct *vma, * Prevent negative return values when {old,new}_addr was realigned * but we broke out of the above loop for the first PMD itself. */ - if (old_addr < old_end - len) + if (old_addr < old_end - pmc->len_in) return 0; - return len + old_addr - old_end; /* how much done */ + return pmc->len_in + old_addr - old_end; /* how much done */ } /* Set vrm->delta to the difference in VMA size specified by user. */ @@ -1044,37 +1121,40 @@ static int copy_vma_and_data(struct vma_remap_struct *vrm, unsigned long internal_pgoff = internal_offset >> PAGE_SHIFT; unsigned long new_pgoff = vrm->vma->vm_pgoff + internal_pgoff; unsigned long moved_len; - bool need_rmap_locks; - struct vm_area_struct *vma; + struct vm_area_struct *vma = vrm->vma; struct vm_area_struct *new_vma; int err = 0; + PAGETABLE_MOVE(pmc, NULL, NULL, vrm->addr, vrm->new_addr, vrm->old_len); - new_vma = copy_vma(&vrm->vma, vrm->new_addr, vrm->new_len, new_pgoff, - &need_rmap_locks); + new_vma = copy_vma(&vma, vrm->new_addr, vrm->new_len, new_pgoff, + &pmc.need_rmap_locks); if (!new_vma) { vrm_uncharge(vrm); *new_vma_ptr = NULL; return -ENOMEM; } - vma = vrm->vma; + vrm->vma = vma; + pmc.old = vma; + pmc.new = new_vma; - moved_len = move_page_tables(vma, vrm->addr, new_vma, - vrm->new_addr, vrm->old_len, - need_rmap_locks, /* for_stack= */false); + moved_len = move_page_tables(&pmc); if (moved_len < vrm->old_len) err = -ENOMEM; else if (vma->vm_ops && vma->vm_ops->mremap) err = vma->vm_ops->mremap(new_vma); if (unlikely(err)) { + PAGETABLE_MOVE(pmc_revert, new_vma, vma, vrm->new_addr, + vrm->addr, moved_len); + /* * On error, move entries back from new area to old, * which will succeed since page tables still there, * and then proceed to unmap new area instead of old. */ - move_page_tables(new_vma, vrm->new_addr, vma, vrm->addr, - moved_len, /* need_rmap_locks = */true, - /* for_stack= */false); + pmc_revert.need_rmap_locks = true; + move_page_tables(&pmc_revert); + vrm->vma = new_vma; vrm->old_len = vrm->new_len; vrm->addr = vrm->new_addr; From patchwork Mon Mar 3 11:08:37 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 13998603 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 33932C282C5 for ; Mon, 3 Mar 2025 11:09:13 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B5C3C280001; Mon, 3 Mar 2025 06:09:10 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id A6BB9280007; Mon, 3 Mar 2025 06:09:10 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 7FA5D280001; Mon, 3 Mar 2025 06:09:10 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 49099280007 for ; Mon, 3 Mar 2025 06:09:10 -0500 (EST) Received: from smtpin07.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id D50C8C06F9 for ; Mon, 3 Mar 2025 11:09:09 +0000 (UTC) X-FDA: 83179968018.07.F94E21C Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by imf14.hostedemail.com (Postfix) with ESMTP id 8928410000C for ; Mon, 3 Mar 2025 11:09:06 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=iH2QS1iO; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=O2JncHgF; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf14.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741000146; a=rsa-sha256; cv=pass; b=X/yacwYef2bjWF7B52ErHE1dgAPoE+tPcGk6C2U1NP7Oi+pXk2dFdhf0EDY+5Cukys49Z/ b3G3bX/hZhUlMQ/IRq86w7xdh4+7s+Xx9BNbYCQovA/E1SgjSHtQFLByifSJRQPB9/x4X6 cH+0cT85ZD3uKFa/IGlCzlQkckYB7TA= ARC-Authentication-Results: i=2; imf14.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=iH2QS1iO; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=O2JncHgF; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf14.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741000146; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=UFeyc5hv/+DZiP4eqFY8b2qd+q4XOCr8h7SaLZMjDX8=; b=KuyR+V7OOcNyZto9K3LGoghh3W8mRrdgz+cFfui83Te9RB2mriO42XLWIzFhN3KJ2xplyz 8zMt/1EsTw7A576QDtZ4FFwXg6ikw2EIfu8ECYMIK6g8mO4BIVMXpwD8nw3ZNjj7cgILGT Nb/hNN6kfItpr1ORSnQfiZKFJhCcD+4= Received: from pps.filterd (m0246632.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 5237tfkr030074; Mon, 3 Mar 2025 11:09:04 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=UFeyc5hv/+DZiP4eqFY8b2qd+q4XOCr8h7SaLZMjDX8=; b= iH2QS1iOBGl4WfxExuk3108/k10SvuBjzkzmG9CCcTQ5WOBUPz1hYQ4ENO7koGCu AjtuhLay7+TRFrcVcf/FGSckszvslEjaUPFJo9Rv1ANsdk50pDqf9XrDpWYn9Ify JE4zbLZhGNqNksQJWGyuoVpszZeiu6i/ELCypeGHQA4IS5D+phno3wtD7fbuD1oS cbRF5hOWDQhrJOEH+3zQeQfZYUp7AdnlQqV00d/oshiHSBmXGxQUXHgHp4W1g1Z4 QzqcvLkLS/L9NxL3i0VYObAfkthsr1ZRB/7OZH4BJIxTihwM295Lr0A1PLzLHe61 Y8UrLuX+yTwgxN7zxTsDWQ== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 453u86jdd0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:09:04 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 5239EudP003158; Mon, 3 Mar 2025 11:09:03 GMT Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2045.outbound.protection.outlook.com [104.47.70.45]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 453rp7bfxb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 03 Mar 2025 11:09:03 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=xdjP82/V1IJTywZm6Sr3Hz1LeUYFD5Il4MvZbJj+9z+Z1MIjEdyH2bz9J9v1tlh+LHcHHksyhYrqB/ltd50+xrWvMOXN5l6DJdr9wlFJOk/sN1rEa7bH5gtqvix1+g1Q1kptfihk0JLdqDw7V7ufayJgSGRg/oVMJ8UICii32lEzXu1FXTXBcWMRh1lfpmAW2AhEdg8k4XLYo7pdUaTQv9Zu/d4hYTXtWWbO6sTt2a95NgGVNLGWuuuw2oN6L5G4j1jtuUzeiDIJJpUOfVT64Rpd48B9YkbSwZECw+puW2c+qCpQRgLVM1+VZuvrTQT2hs9W5Mwv1sTk7ZatbC5qnw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=UFeyc5hv/+DZiP4eqFY8b2qd+q4XOCr8h7SaLZMjDX8=; b=bhAQy7ll4PjgooIRMWJbJwYbl/UBXpiZgNu899oarz/hY6pJ6gyT36B5/ey9NZ9Ag+ka+0Pga+T0ULJvo4a2AI+IoF2DOr1Hc31RMqwkKDHyClzb9N5cAmReVyIG7KBdMcEqFcPFyiKj0txqIrQ4DHPCEhrfe1VtaQRb7asTXTowe+flKrg09MzRVnQ+if9KSi1QvHkHtlxOukJ7oOLimSX7pnIUbP20emrQ5SyuE278AEk3lj2pIyvWdnP0L/jQmHvem22cDIipJTp8SnX2eUHtFxlziFaZqmxHoYOpNxYKFR0VIHVKVZINFBJ5UwOJ48h/ili+4DjbTZ6zQoisQg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=UFeyc5hv/+DZiP4eqFY8b2qd+q4XOCr8h7SaLZMjDX8=; b=O2JncHgFPwzmYrnWrcHGkNWIU0dkKQBGUOXodBJLXXHXDLMwpYdEs/9OM1+ySGv7Tm+7vTRnZPfOKpUD1tl8vJ84C0Lv4+Xkljqr1ddN5ts8LXhjTOMG+WFmULwJ/J0VkXn/DS4nPSHq5RSRKO/ZIeeR63QW6ZXdC7lKihLQ6MM= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DM4PR10MB7427.namprd10.prod.outlook.com (2603:10b6:8:181::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8489.27; Mon, 3 Mar 2025 11:09:02 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 3 Mar 2025 11:09:02 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH 7/7] mm/mremap: thread state through move page table operation Date: Mon, 3 Mar 2025 11:08:37 +0000 Message-ID: <4cc18ebfc0cb32e9e42d86503cef3265108343e4.1740911247.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P265CA0249.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:350::14) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DM4PR10MB7427:EE_ X-MS-Office365-Filtering-Correlation-Id: 8700b456-d818-4d55-6f43-08dd5a43cde9 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|1800799024|366016|376014; X-Microsoft-Antispam-Message-Info: 0zj+xJvfYIryvjuVkbe0uhNLWWbYCIOBuNemyh/OleEvtm32OObzwzFlNScEX8nvwfzBnTMW7fD69KLKfTDiSQ9OmT+Yv/cxu26o87ZSB5hLmWzq3us8Bkxpc4HnO+yFCBWMIbUR87Hq2KPYcdVgqRAqOJe3pE6Qx71Ep6oAJErJ7kKtjq5BVC4NIH69+Uu3gB/QYX/qHh5MF3zQxOFvliWt23Roq9mMh81idtfmcVWL8CQ2rK4C+aanHKyMbQzP1H1/vQbzV9NcepHl5jYMM2W04P1AxLgMs+wOFP/BN0BmXgTpdIIcLNGwQfK+tPsCZ+BrmMrkM9fzIQh0nkwPOxXZizJApPC5y0DPw4agl8KFABh01h6oBDJzQupRuOsSZ6qRE9qnG/fRDILjF2/w3AQNh0NbXC8nyAzKkmwDtFvM5qx/6m71Z0F8TLhXEzLKH2sGcDtFNsRpo0Lm7Uq9PYVwCjR4YWpGNq6CP989Q7iusNOPUjn20ITLpK9QaEkDZSGe1ohzkBUCb+XCSvbKarS336NVgV0VgtU+5NEs3jZReIdYS4RSjdSDZ/TbNBqlqj50p6PBwsMZOD7oum214g8wcNmhEJc0NeBkyZmLYTzJjlwoHnEarpfUekzQklE2U4o2bHBVI29H+J5yYhReFuyxmLY67D0X7EGjVhfT87NJrmB8Qzo6cxLdX8ASHzuI3JABaQ0C2v6fVpzXES2lR3xr3TKcmz02ZkGx4J33ArwKhvYaJCNSee20mMiaEpm+5UX8D6fZajVp0/IcsDqd1jcRi0wROjPpDynMyIYE71Lji6GImkDQPrcr9a3o18MikSfcvQjhO8FBgRQhRj8h5qVGyVbTC7lcJglsqZwoRW2IHIT5DK6ST8s+y3/hY6amVPhgG1kLGLrxahRGRPiCw9Vz5AuWAgik/PRbQSzQom50hrhGauMPgtNgvdP/oQ44GcMb889bBdCr/Fypbm9+Fnmhv4NQ083fQ+WlhdwqjUCS2eXo/ab9AcSEXOmc1fdhT0H0fuArpXJ5ieYwtEKfO9vqHYJRVgAzJJd2N1ZoGTXFNLlC35nqtvqXSAsgw82pMpJN5y2kGne/9MW9Yd4EKLOjGdtJxikDpx4Le0Lst+ETLRvLnnR9TK1cvlZCnRJrP1OswTd9zzD5aVz8mkxyvbszkPSaBvC1tElFKSI6u76QX8t3jXM8nzMqxN3na1ly6bJT0971cInNAD/P3ekeariWDexcD2SqxERJR1Mo0prg37ilkuMQbyB5q0RVC9fJCkGirltodct1Juc2kWL3yBMTsgX1iKcsj2czFMGEZX3dyuPyufYqjMU68lvXg6U3BxXx2ZwWFzEq1XiYvK8+JJDen9nRJFeZwfsia4KFGho= X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(1800799024)(366016)(376014);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: wPxyi+XJ7sxtjdgIUwPRB0Q7AYvNphPzrTiEz23IEZgLR5ie/I07wBHqwUweQP2G25GfWrUpDa4HAO2DaiCIOrM1xBt8vGuIvLB+pjfNwXLvwxHpNpRq2Y8qOM63l6cV8CLFD4K26zLWwSlV0HUiLo8M75DPhmeMFBb6/OQuaVHFf5oW17XyneIlbTWR3Z9KpONO3ou2ZaaWp5ikQxWzGNgvKYl8g4rqmzRGHqTh9lFne8AEi/Q+748x3dUngi1FpYp/Isbcvx1WZuBOruBaqJlV1RZcWdMihVnWNH40c4hPUUHMYRROg8hyLXOQjJQMSQEJuTfHHGtNTVnMh1a3eR5LookgJUpdL7JHUQHIYKXhwgTpF/IDclrW3rzB/Aq/A+bz/xwoRnQOWV/xpEM6e41YuYlFbQ0Qj0KRIT0/NTw/HX3SQfjFrNyxIgTP6e+iaYXGzFqlo+csYK0sNv20IYbM8B53+82PTjU1/Wf3gYgIeu2h8EaaicL31JnEM2vTZmxmoXg0J4hpkMTFqTlRNLXwwUX1w6+YcsZaP9t5ROUChcpOOnfaqssT487zbXTTyNarl5vQy7bcM1bliv+A+1cbT3Zu1mdv4JyFgy5E+jwG1b5MP2RjIUWjfG841Nu13ojhR04IcfxzF1oCpU7UNMncsGTb54FMq66RCHhyfPSbVPGdwF6Vbbr/EWss6Rh02Q4d6t0SXnl/ji6/Vu5tdWe2u6BCSig9myuhz6DquW2HOwDBZ5XbbFkuY7JUb2f/PuRIJsS4Ey2NWZ0RlO6Fkw9Lt8ZOIcAeogqmb3Y+fTBg+DxbYdXA7UxxR9IbkMsT9fAZW/y0fPESbUjnZN2BLe9IQbWphGNUb0dnVMkR0pcXR0dT49d31X5SzXNsORAhXwj2CIUTKIAk7RowXPwuQdBJDKk2V2UI2DtcLUY+U73R3pGjPWZNsYrRx8+HiLSB8x4u7fupycAd47Xk7QG4tCo1uhcRq429aRE/Scc4WGEIQWUF1FrQCGcKQu4ETYSyMNx/GXFG/dp24W0AK65obHRidFBjrQrLduELv+Wv0QrATVLJo0wEPKfW20Iw4ax41NCqi86SYdKQfhaBQDcwjEXNcxNOSfHC8CuP3q00gePfsrEe6LQKZDlHR8cLp0CRqLV8dP1lSkWEwjEMCsVzovpYZQb3KksrmqgryrTHYO8ubKyAkC32YWwxw/IjcB+BdO+mlIZEeTy86EzZqTjmskqXrwQpkpeXVyXnVmKm7lQySBQPgcGL7FSjXgqZ6ON1L9dpuf2emMNiAaLxaDM0pyKXGxkJ0hT3Mjtt24+wUGE+no1/DQESgtRGsl57T1ScASfXaWGntPNVArMCg+9LzfzwBDiH+PZEoNpmdez5OHGLOsI4l1XnDNYG8kAy1jMiGaKmucS8iOyVdA6aKzkklzNFfLGUohpGJX3pd3AgZIMk3T4e4AQvDzr5wu7Q5/G8VgGmVeeKVi/KPXC++vESJbmdYFDXx1pgyo0+UKETuHC2onDauw/2ChGKKI8fcGSUQpkTzWUgPuq9hgJHcgp966WhICTobfXtR+SBALPlVD+AIcNmiELP5DBmtCapp5/IgZCo+XURwL3K/HDmvzp/zg== X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 8700b456-d818-4d55-6f43-08dd5a43cde9 X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Mar 2025 11:09:02.3555 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 16YwVYvP19DhC+dg28E2ocjsWv2htTfet55kEJn6mpmDacTE4e59pgoCKJYkAr+Ew5sCOKus5CinOGOlLv/7Kz/N9guDh9tJons3lH8T6+g= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR10MB7427 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1057,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-03_04,2025-03-03_01,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 adultscore=0 bulkscore=0 mlxlogscore=999 malwarescore=0 spamscore=0 phishscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503030086 X-Proofpoint-ORIG-GUID: TMNM7E2cya8tb_S3HByPFNBcnCbtfU0e X-Proofpoint-GUID: TMNM7E2cya8tb_S3HByPFNBcnCbtfU0e X-Rspamd-Server: rspam08 X-Rspamd-Queue-Id: 8928410000C X-Stat-Signature: g6hxkp616yh53notxqp9fe8ewqjk6mz6 X-Rspam-User: X-HE-Tag: 1741000146-597213 X-HE-Meta: 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 hynGDaYs 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Finish refactoring the page table logic by threading the PMC state throughout the operation, allowing us to control the operation as we go. Additionally, update the old_addr, new_addr fields in move_page_tables() as we progress through the process making use of the fact we have this state object now to track this. With these changes made, not only is the code far more readable, but we can finally transmit state throughout the entire operation, which lays the groundwork for sensibly making changes in future to how the mremap() operation is performed. Additionally take the opportunity to refactor the means of determining the progress of the operation, abstracting this to pmc_progress() and simplifying the logic to make it clearer what's going on. Signed-off-by: Lorenzo Stoakes --- mm/internal.h | 3 + mm/mremap.c | 196 +++++++++++++++++++++++++++++--------------------- 2 files changed, 117 insertions(+), 82 deletions(-) diff --git a/mm/internal.h b/mm/internal.h index 5d9894e5adfc..fdd3eeca9968 100644 --- a/mm/internal.h +++ b/mm/internal.h @@ -39,6 +39,9 @@ struct folio_batch; * * Use the PAGETABLE_MOVE() macro to initialise this struct. * + * The old_addr and new_addr fields are updated as the page table move is + * executed. + * * NOTE: The page table move is affected by reading from [old_addr, old_end), * and old_addr may be updated for better page table alignment, so len_in * represents the length of the range being copied as specified by the user. diff --git a/mm/mremap.c b/mm/mremap.c index fdbe35de5e5a..4b1647d32fb0 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -107,8 +107,7 @@ static pmd_t *get_old_pmd(struct mm_struct *mm, unsigned long addr) return pmd; } -static pud_t *alloc_new_pud(struct mm_struct *mm, struct vm_area_struct *vma, - unsigned long addr) +static pud_t *alloc_new_pud(struct mm_struct *mm, unsigned long addr) { pgd_t *pgd; p4d_t *p4d; @@ -121,13 +120,12 @@ static pud_t *alloc_new_pud(struct mm_struct *mm, struct vm_area_struct *vma, return pud_alloc(mm, p4d, addr); } -static pmd_t *alloc_new_pmd(struct mm_struct *mm, struct vm_area_struct *vma, - unsigned long addr) +static pmd_t *alloc_new_pmd(struct mm_struct *mm, unsigned long addr) { pud_t *pud; pmd_t *pmd; - pud = alloc_new_pud(mm, vma, addr); + pud = alloc_new_pud(mm, addr); if (!pud) return NULL; @@ -171,17 +169,19 @@ static pte_t move_soft_dirty_pte(pte_t pte) return pte; } -static int move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, - unsigned long old_addr, unsigned long old_end, - struct vm_area_struct *new_vma, pmd_t *new_pmd, - unsigned long new_addr, bool need_rmap_locks) +static int move_ptes(struct pagetable_move_control *pmc, + unsigned long extent, pmd_t *old_pmd, pmd_t *new_pmd) { + struct vm_area_struct *vma = pmc->old; bool need_clear_uffd_wp = vma_has_uffd_without_event_remap(vma); struct mm_struct *mm = vma->vm_mm; pte_t *old_pte, *new_pte, pte; pmd_t dummy_pmdval; spinlock_t *old_ptl, *new_ptl; bool force_flush = false; + unsigned long old_addr = pmc->old_addr; + unsigned long new_addr = pmc->new_addr; + unsigned long old_end = old_addr + extent; unsigned long len = old_end - old_addr; int err = 0; @@ -203,7 +203,7 @@ static int move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, * serialize access to individual ptes, but only rmap traversal * order guarantees that we won't miss both the old and new ptes). */ - if (need_rmap_locks) + if (pmc->need_rmap_locks) take_rmap_locks(vma); /* @@ -277,7 +277,7 @@ static int move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, pte_unmap(new_pte - 1); pte_unmap_unlock(old_pte - 1, old_ptl); out: - if (need_rmap_locks) + if (pmc->need_rmap_locks) drop_rmap_locks(vma); return err; } @@ -292,10 +292,11 @@ static inline bool arch_supports_page_table_move(void) #endif #ifdef CONFIG_HAVE_MOVE_PMD -static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, - unsigned long new_addr, pmd_t *old_pmd, pmd_t *new_pmd) +static bool move_normal_pmd(struct pagetable_move_control *pmc, + pmd_t *old_pmd, pmd_t *new_pmd) { spinlock_t *old_ptl, *new_ptl; + struct vm_area_struct *vma = pmc->old; struct mm_struct *mm = vma->vm_mm; bool res = false; pmd_t pmd; @@ -341,7 +342,7 @@ static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, * We don't have to worry about the ordering of src and dst * ptlocks because exclusive mmap_lock prevents deadlock. */ - old_ptl = pmd_lock(vma->vm_mm, old_pmd); + old_ptl = pmd_lock(mm, old_pmd); new_ptl = pmd_lockptr(mm, new_pmd); if (new_ptl != old_ptl) spin_lock_nested(new_ptl, SINGLE_DEPTH_NESTING); @@ -358,7 +359,7 @@ static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, VM_BUG_ON(!pmd_none(*new_pmd)); pmd_populate(mm, new_pmd, pmd_pgtable(pmd)); - flush_tlb_range(vma, old_addr, old_addr + PMD_SIZE); + flush_tlb_range(vma, pmc->old_addr, pmc->old_addr + PMD_SIZE); out_unlock: if (new_ptl != old_ptl) spin_unlock(new_ptl); @@ -367,19 +368,19 @@ static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, return res; } #else -static inline bool move_normal_pmd(struct vm_area_struct *vma, - unsigned long old_addr, unsigned long new_addr, pmd_t *old_pmd, - pmd_t *new_pmd) +static inline bool move_normal_pmd(struct pagetable_move_control *pmc, + pmd_t *old_pmd, pmd_t *new_pmd) { return false; } #endif #if CONFIG_PGTABLE_LEVELS > 2 && defined(CONFIG_HAVE_MOVE_PUD) -static bool move_normal_pud(struct vm_area_struct *vma, unsigned long old_addr, - unsigned long new_addr, pud_t *old_pud, pud_t *new_pud) +static bool move_normal_pud(struct pagetable_move_control *pmc, + pud_t *old_pud, pud_t *new_pud) { spinlock_t *old_ptl, *new_ptl; + struct vm_area_struct *vma = pmc->old; struct mm_struct *mm = vma->vm_mm; pud_t pud; @@ -405,7 +406,7 @@ static bool move_normal_pud(struct vm_area_struct *vma, unsigned long old_addr, * We don't have to worry about the ordering of src and dst * ptlocks because exclusive mmap_lock prevents deadlock. */ - old_ptl = pud_lock(vma->vm_mm, old_pud); + old_ptl = pud_lock(mm, old_pud); new_ptl = pud_lockptr(mm, new_pud); if (new_ptl != old_ptl) spin_lock_nested(new_ptl, SINGLE_DEPTH_NESTING); @@ -417,7 +418,7 @@ static bool move_normal_pud(struct vm_area_struct *vma, unsigned long old_addr, VM_BUG_ON(!pud_none(*new_pud)); pud_populate(mm, new_pud, pud_pgtable(pud)); - flush_tlb_range(vma, old_addr, old_addr + PUD_SIZE); + flush_tlb_range(vma, pmc->old_addr, pmc->old_addr + PUD_SIZE); if (new_ptl != old_ptl) spin_unlock(new_ptl); spin_unlock(old_ptl); @@ -425,19 +426,19 @@ static bool move_normal_pud(struct vm_area_struct *vma, unsigned long old_addr, return true; } #else -static inline bool move_normal_pud(struct vm_area_struct *vma, - unsigned long old_addr, unsigned long new_addr, pud_t *old_pud, - pud_t *new_pud) +static inline bool move_normal_pud(struct pagetable_move_control *pmc, + pud_t *old_pud, pud_t *new_pud) { return false; } #endif #if defined(CONFIG_TRANSPARENT_HUGEPAGE) && defined(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD) -static bool move_huge_pud(struct vm_area_struct *vma, unsigned long old_addr, - unsigned long new_addr, pud_t *old_pud, pud_t *new_pud) +static bool move_huge_pud(struct pagetable_move_control *pmc, + pud_t *old_pud, pud_t *new_pud) { spinlock_t *old_ptl, *new_ptl; + struct vm_area_struct *vma = pmc->old; struct mm_struct *mm = vma->vm_mm; pud_t pud; @@ -452,7 +453,7 @@ static bool move_huge_pud(struct vm_area_struct *vma, unsigned long old_addr, * We don't have to worry about the ordering of src and dst * ptlocks because exclusive mmap_lock prevents deadlock. */ - old_ptl = pud_lock(vma->vm_mm, old_pud); + old_ptl = pud_lock(mm, old_pud); new_ptl = pud_lockptr(mm, new_pud); if (new_ptl != old_ptl) spin_lock_nested(new_ptl, SINGLE_DEPTH_NESTING); @@ -465,8 +466,8 @@ static bool move_huge_pud(struct vm_area_struct *vma, unsigned long old_addr, /* Set the new pud */ /* mark soft_ditry when we add pud level soft dirty support */ - set_pud_at(mm, new_addr, new_pud, pud); - flush_pud_tlb_range(vma, old_addr, old_addr + HPAGE_PUD_SIZE); + set_pud_at(mm, pmc->new_addr, new_pud, pud); + flush_pud_tlb_range(vma, pmc->old_addr, pmc->old_addr + HPAGE_PUD_SIZE); if (new_ptl != old_ptl) spin_unlock(new_ptl); spin_unlock(old_ptl); @@ -496,10 +497,12 @@ enum pgt_entry { * destination pgt_entry. */ static __always_inline unsigned long get_extent(enum pgt_entry entry, - unsigned long old_addr, unsigned long old_end, - unsigned long new_addr) + struct pagetable_move_control *pmc) { unsigned long next, extent, mask, size; + unsigned long old_addr = pmc->old_addr; + unsigned long old_end = pmc->old_end; + unsigned long new_addr = pmc->new_addr; switch (entry) { case HPAGE_PMD: @@ -528,38 +531,54 @@ static __always_inline unsigned long get_extent(enum pgt_entry entry, return extent; } +/* + * Should move_pgt_entry() acquire the rmap locks? This is either expressed in + * the PMC, or overridden in the case of normal, larger page tables. + */ +static bool should_take_rmap_locks(struct pagetable_move_control *pmc, + enum pgt_entry entry) +{ + if (pmc->need_rmap_locks) + return true; + + switch (entry) { + case NORMAL_PMD: + case NORMAL_PUD: + return true; + default: + return false; + } +} + /* * Attempts to speedup the move by moving entry at the level corresponding to * pgt_entry. Returns true if the move was successful, else false. */ -static bool move_pgt_entry(enum pgt_entry entry, struct vm_area_struct *vma, - unsigned long old_addr, unsigned long new_addr, - void *old_entry, void *new_entry, bool need_rmap_locks) +static bool move_pgt_entry(struct pagetable_move_control *pmc, + enum pgt_entry entry, void *old_entry, void *new_entry) { bool moved = false; + bool need_rmap_locks = should_take_rmap_locks(pmc, entry); /* See comment in move_ptes() */ if (need_rmap_locks) - take_rmap_locks(vma); + take_rmap_locks(pmc->old); switch (entry) { case NORMAL_PMD: - moved = move_normal_pmd(vma, old_addr, new_addr, old_entry, - new_entry); + moved = move_normal_pmd(pmc, old_entry, new_entry); break; case NORMAL_PUD: - moved = move_normal_pud(vma, old_addr, new_addr, old_entry, - new_entry); + moved = move_normal_pud(pmc, old_entry, new_entry); break; case HPAGE_PMD: moved = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && - move_huge_pmd(vma, old_addr, new_addr, old_entry, + move_huge_pmd(pmc->old, pmc->old_addr, pmc->new_addr, old_entry, new_entry); break; case HPAGE_PUD: moved = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && - move_huge_pud(vma, old_addr, new_addr, old_entry, - new_entry); + move_huge_pud(pmc, old_entry, new_entry); break; default: @@ -568,7 +587,7 @@ static bool move_pgt_entry(enum pgt_entry entry, struct vm_area_struct *vma, } if (need_rmap_locks) - drop_rmap_locks(vma); + drop_rmap_locks(pmc->old); return moved; } @@ -704,19 +723,48 @@ static void try_realign_addr(struct pagetable_move_control *pmc, pmc->new_addr &= pagetable_mask; } +/* Is the page table move operation done? */ +static bool pmc_done(struct pagetable_move_control *pmc) +{ + return pmc->old_addr >= pmc->old_end; +} + +/* Advance to the next page table, offset by extent bytes. */ +static void pmc_next(struct pagetable_move_control *pmc, unsigned long extent) +{ + pmc->old_addr += extent; + pmc->new_addr += extent; +} + +/* + * Determine how many bytes in the specified input range have had their page + * tables moved so far. + */ +static unsigned long pmc_progress(struct pagetable_move_control *pmc) +{ + unsigned long orig_old_addr = pmc->old_end - pmc->len_in; + unsigned long old_addr = pmc->old_addr; + + /* + * Prevent negative return values when {old,new}_addr was realigned but + * we broke out of the loop in move_page_tables() for the first PMD + * itself. + */ + return old_addr < orig_old_addr ? 0 : old_addr - orig_old_addr; +} + unsigned long move_page_tables(struct pagetable_move_control *pmc) { - unsigned long extent, old_end; + unsigned long extent; struct mmu_notifier_range range; pmd_t *old_pmd, *new_pmd; pud_t *old_pud, *new_pud; - unsigned long old_addr, new_addr; - struct vm_area_struct *vma = pmc->old; + struct mm_struct *mm = pmc->old->vm_mm; if (!pmc->len_in) return 0; - if (is_vm_hugetlb_page(vma)) + if (is_vm_hugetlb_page(pmc->old)) return move_hugetlb_page_tables(pmc->old, pmc->new, pmc->old_addr, pmc->new_addr, pmc->len_in); @@ -725,87 +773,71 @@ unsigned long move_page_tables(struct pagetable_move_control *pmc) * Only realign if the mremap copying hits a PMD boundary. */ try_realign_addr(pmc, PMD_MASK); - /* These may have been changed. */ - old_addr = pmc->old_addr; - new_addr = pmc->new_addr; - old_end = pmc->old_end; - - flush_cache_range(vma, old_addr, old_end); - mmu_notifier_range_init(&range, MMU_NOTIFY_UNMAP, 0, vma->vm_mm, - old_addr, old_end); + + flush_cache_range(pmc->old, pmc->old_addr, pmc->old_end); + mmu_notifier_range_init(&range, MMU_NOTIFY_UNMAP, 0, mm, + pmc->old_addr, pmc->old_end); mmu_notifier_invalidate_range_start(&range); - for (; old_addr < old_end; old_addr += extent, new_addr += extent) { + for (; !pmc_done(pmc); pmc_next(pmc, extent)) { cond_resched(); /* * If extent is PUD-sized try to speed up the move by moving at the * PUD level if possible. */ - extent = get_extent(NORMAL_PUD, old_addr, old_end, new_addr); + extent = get_extent(NORMAL_PUD, pmc); - old_pud = get_old_pud(vma->vm_mm, old_addr); + old_pud = get_old_pud(mm, pmc->old_addr); if (!old_pud) continue; - new_pud = alloc_new_pud(vma->vm_mm, vma, new_addr); + new_pud = alloc_new_pud(mm, pmc->new_addr); if (!new_pud) break; if (pud_trans_huge(*old_pud) || pud_devmap(*old_pud)) { if (extent == HPAGE_PUD_SIZE) { - move_pgt_entry(HPAGE_PUD, vma, old_addr, new_addr, - old_pud, new_pud, pmc->need_rmap_locks); + move_pgt_entry(pmc, HPAGE_PUD, old_pud, new_pud); /* We ignore and continue on error? */ continue; } } else if (IS_ENABLED(CONFIG_HAVE_MOVE_PUD) && extent == PUD_SIZE) { - if (move_pgt_entry(NORMAL_PUD, vma, old_addr, new_addr, - old_pud, new_pud, true)) + if (move_pgt_entry(pmc, NORMAL_PUD, old_pud, new_pud)) continue; } - extent = get_extent(NORMAL_PMD, old_addr, old_end, new_addr); - old_pmd = get_old_pmd(vma->vm_mm, old_addr); + extent = get_extent(NORMAL_PMD, pmc); + old_pmd = get_old_pmd(mm, pmc->old_addr); if (!old_pmd) continue; - new_pmd = alloc_new_pmd(vma->vm_mm, vma, new_addr); + new_pmd = alloc_new_pmd(mm, pmc->new_addr); if (!new_pmd) break; again: if (is_swap_pmd(*old_pmd) || pmd_trans_huge(*old_pmd) || pmd_devmap(*old_pmd)) { if (extent == HPAGE_PMD_SIZE && - move_pgt_entry(HPAGE_PMD, vma, old_addr, new_addr, - old_pmd, new_pmd, pmc->need_rmap_locks)) + move_pgt_entry(pmc, HPAGE_PMD, old_pmd, new_pmd)) continue; - split_huge_pmd(vma, old_pmd, old_addr); + split_huge_pmd(pmc->old, old_pmd, pmc->old_addr); } else if (IS_ENABLED(CONFIG_HAVE_MOVE_PMD) && extent == PMD_SIZE) { /* * If the extent is PMD-sized, try to speed the move by * moving at the PMD level if possible. */ - if (move_pgt_entry(NORMAL_PMD, vma, old_addr, new_addr, - old_pmd, new_pmd, true)) + if (move_pgt_entry(pmc, NORMAL_PMD, old_pmd, new_pmd)) continue; } if (pmd_none(*old_pmd)) continue; if (pte_alloc(pmc->new->vm_mm, new_pmd)) break; - if (move_ptes(vma, old_pmd, old_addr, old_addr + extent, - pmc->new, new_pmd, new_addr, pmc->need_rmap_locks) < 0) + if (move_ptes(pmc, extent, old_pmd, new_pmd) < 0) goto again; } mmu_notifier_invalidate_range_end(&range); - /* - * Prevent negative return values when {old,new}_addr was realigned - * but we broke out of the above loop for the first PMD itself. - */ - if (old_addr < old_end - pmc->len_in) - return 0; - - return pmc->len_in + old_addr - old_end; /* how much done */ + return pmc_progress(pmc); } /* Set vrm->delta to the difference in VMA size specified by user. */