From patchwork Mon Mar 10 20:50:34 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 14010806 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id B8690C282DE for ; Mon, 10 Mar 2025 22:21:25 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 6E855280005; Mon, 10 Mar 2025 18:21:24 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 69848280004; Mon, 10 Mar 2025 18:21:24 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 4EB77280005; Mon, 10 Mar 2025 18:21:24 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 30F83280004 for ; Mon, 10 Mar 2025 18:21:24 -0400 (EDT) Received: from smtpin17.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 2C4C452F2D for ; Mon, 10 Mar 2025 22:21:24 +0000 (UTC) X-FDA: 83207063688.17.E69C26F Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf15.hostedemail.com (Postfix) with ESMTP id 4C40FA000E for ; Mon, 10 Mar 2025 22:21:20 +0000 (UTC) Authentication-Results: imf15.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=QpGtxxZ1; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=BDmPASFT; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf15.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741645280; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=cTTb8e9qNXZki0winp9zDuBW42NjoXUdms+Tbpbt81A=; b=I26Gs82aNUHg3IeYJe/S0Nnhev3bGwDyj/Y7Ezt4kKbKpXfW2pE1P2V+4OiYF/GW2f9nKu xprLGgZcKAElkE6AFf7eYMpH5mSKr+r7NJKNcEANOSeAg8mNnvx3aAWvPSZuOM9J853zPS LMyfmcnAKlXGM12YSByV1Eu+PqZ3SrE= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741645280; a=rsa-sha256; cv=pass; b=1BuijWN2UZssgrUIqaW/oROkn40x6anq4bYBWuzHmfSRfd/+n9/6vQYr4NkrJEiODKUyRn 9IqnHS+/UCQz0rI0+/xJqXS2vXfcNRXzqJhhdSjAbQzY08oCVofP/Ev2bGvTfEZXf6FubX OXtpH6/iC+g5vB4GOfUbs9n90TfJyL4= ARC-Authentication-Results: i=2; imf15.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=QpGtxxZ1; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=BDmPASFT; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf15.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com Received: from pps.filterd (m0246617.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJtlHi009243; Mon, 10 Mar 2025 20:51:31 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=cTTb8e9qNXZki0winp9zDuBW42NjoXUdms+Tbpbt81A=; b= QpGtxxZ12lVLIZZK0/eMrkJt961Al4m7KEJVr3CKx3VlV1KmkEn+KnX7OL/zoP1K Elpq7Ye/m6kxqT+/HE14oTHJllKVyhWC1osvtR2INQLnYQNUvSiWsuXcPnL5CWMR wFo7cgs7NtYqD0yF4nTrBejfZ0CGKpU50iKlotLDawqeNRH8Ws0qmpuy0zLmCivz 3itC7QyjI4yrfkImxZjyYJI9DWZOe5YvHo8LMDFKyF1Ew38i/XneR1uNZ6snK8VK FCV6IOmx/rkPsQPEXTW2GJyr8sfWoR1Nxi+OmnVw9IcpXkJpMqvEWBNJpdibWUMf nXQlRh7Q8wjxsN2L5+Gbrg== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 458eeu3heb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:30 +0000 (GMT) Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 52AKevlH030605; Mon, 10 Mar 2025 20:51:25 GMT Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2168.outbound.protection.outlook.com [104.47.56.168]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 458gcmgckn-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:25 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=u60nV8Zp8DY7OVBClDglr1RRbJOBNMBmSNJVDUXUT1WRLRjAa2ypTNteb54NQ/UShB+U4Nb5dkyhXC0zLtw8U8B4dLxEiKodlxM0KveFEYarjA+mtf8e4904I4q1d/wjShstJPYOolEGNHGEPhflhokuI0+D1fNKh//wGWBpCbtmEdPMW1JJOUyL13q8CUR8rNrnKJL54E0TXh3NChbWgjlJUFWCpnbFsJXiMCLa3DBoaGaKcmO8n9DevLxxNT0fniBT4y0+K+JkX15DKmJAvhv4u1LoIwcuulpBz435uuF5zhl73siE97YMsZIA7zBp4xAr+Z23cM8E3g2t8SOk7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cTTb8e9qNXZki0winp9zDuBW42NjoXUdms+Tbpbt81A=; b=rrwsGnUo7ftyvXk9J/GFiDEIcRUQEL0Gkpqr5O8qJ+LwTEowPMtHuBbyQ7ymnWMDAcwxz24xobS7Z6gf7hYhF2Z39h60/mWvKShAm9SUuyIve2UArZwN8KiK9TtAW+8h8MNXNzM12FfI9B6Fb5y6ADaA8wR49KZFXUNUTh8lSExJE4pjRP/+O5QVZ3gZqrjRIXYMqL14QkLSViH1y+u8yNr2wBdcc3+/2OvXja0rxn9ax/qaUFd5CUgCHnXkinetwWHQPlZOV3kkZE7YGI8Q0Q2GU/Mmhr9tntCiDKX/0SyPhCXiw04cjco20bGgo6yaXlPkgdt74kEOGF7dRg4rxw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cTTb8e9qNXZki0winp9zDuBW42NjoXUdms+Tbpbt81A=; b=BDmPASFTQujORWFCPLhYz2j7lebB7062dqlx0nBsuFKjw+6kJf+Y1VZshgd91HgQg8hR8YHqwAWVVIZzOnEMiboUqb6seLC2QJ66sP0Wo3ap5d2iI3dlAq2/nOmwSRhfzGal8Vlbg3IspaVTRBZ0cuTJWE6cdwFHusmqDsobE/w= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DS7PR10MB7250.namprd10.prod.outlook.com (2603:10b6:8:e0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8511.27; Mon, 10 Mar 2025 20:51:23 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 10 Mar 2025 20:51:22 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Harry Yoo , Yosry Ahmed , Oliver Sang Subject: [PATCH v3 1/7] mm/mremap: correctly handle partial mremap() of VMA starting at 0 Date: Mon, 10 Mar 2025 20:50:34 +0000 Message-ID: X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P265CA0157.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:2c7::14) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DS7PR10MB7250:EE_ X-MS-Office365-Filtering-Correlation-Id: 69477146-e43c-4a7c-e9c5-08dd6015510d X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|366016; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 69477146-e43c-4a7c-e9c5-08dd6015510d X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2025 20:51:22.8986 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: nEHuDuXh7dbf0L1DTKgcahM3ONfReC4hrwV6CAEA9+kjjAs4TXwiybfwAIAAVGEZjM/7mMSfpO67nBO1KZBVLypHAbXP96N1QlQGt3VWNqQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB7250 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-10_08,2025-03-07_03,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 spamscore=0 phishscore=0 adultscore=0 mlxscore=0 mlxlogscore=999 malwarescore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503100159 X-Proofpoint-ORIG-GUID: JBVTBqzWGJ9MClGzfueuEnXDKZHYZi5c X-Proofpoint-GUID: JBVTBqzWGJ9MClGzfueuEnXDKZHYZi5c X-Stat-Signature: g3jqt7jay3rnohkeyppnes1ifq38gnfa X-Rspamd-Server: rspam05 X-Rspam-User: X-Rspamd-Queue-Id: 4C40FA000E X-HE-Tag: 1741645280-818432 X-HE-Meta: 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 dhN9GeWN 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000355, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Consider the case of a partial mremap() (that results in a VMA split) of an accountable VMA (i.e. which has the VM_ACCOUNT flag set) whose start address is zero, with the MREMAP_MAYMOVE flag specified and a scenario where a move does in fact occur: addr end | | v v |-------------| | vma | |-------------| 0 This move is affected by unmapping the range [addr, end). In order to prevent an incorrect decrement of accounted memory which has already been determined, the mremap() code in move_vma() clears VM_ACCOUNT from the VMA prior to doing so, before reestablishing it in each of the VMAs post-split: addr end | | v v |---| |---| | A | | B | |---| |---| Commit 6b73cff239e5 ("mm: change munmap splitting order and move_vma()") changed this logic such as to determine whether there is a need to do so by establishing account_start and account_end and, in the instance where such an operation is required, assigning them to vma->vm_start and vma->vm_end. Later the code checks if the operation is required for 'A' referenced above thusly: if (account_start) { ... } However, if the VMA described above has vma->vm_start == 0, which is now assigned to account_start, this branch will not be executed. As a result, the VMA 'A' above will remain stripped of its VM_ACCOUNT flag, incorrectly. The fix is to simply convert these variables to booleans and set them as required. Fixes: 6b73cff239e5 ("mm: change munmap splitting order and move_vma()") Signed-off-by: Lorenzo Stoakes Reviewed-by: Harry Yoo Reviewed-by: Liam R. Howlett Reviewed-by: Vlastimil Babka Cc: --- mm/mremap.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index cff7f552f909..c3e4c86d0b8d 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -705,8 +705,8 @@ static unsigned long move_vma(struct vm_area_struct *vma, unsigned long vm_flags = vma->vm_flags; unsigned long new_pgoff; unsigned long moved_len; - unsigned long account_start = 0; - unsigned long account_end = 0; + bool account_start = false; + bool account_end = false; unsigned long hiwater_vm; int err = 0; bool need_rmap_locks; @@ -790,9 +790,9 @@ static unsigned long move_vma(struct vm_area_struct *vma, if (vm_flags & VM_ACCOUNT && !(flags & MREMAP_DONTUNMAP)) { vm_flags_clear(vma, VM_ACCOUNT); if (vma->vm_start < old_addr) - account_start = vma->vm_start; + account_start = true; if (vma->vm_end > old_addr + old_len) - account_end = vma->vm_end; + account_end = true; } /* @@ -832,7 +832,7 @@ static unsigned long move_vma(struct vm_area_struct *vma, /* OOM: unable to split vma, just get accounts right */ if (vm_flags & VM_ACCOUNT && !(flags & MREMAP_DONTUNMAP)) vm_acct_memory(old_len >> PAGE_SHIFT); - account_start = account_end = 0; + account_start = account_end = false; } if (vm_flags & VM_LOCKED) { From patchwork Mon Mar 10 20:50:35 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 14010662 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8251FC282DE for ; Mon, 10 Mar 2025 20:51:39 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id F16D3280006; Mon, 10 Mar 2025 16:51:36 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id EC5F2280004; Mon, 10 Mar 2025 16:51:36 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id CC9D6280006; Mon, 10 Mar 2025 16:51:36 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 9FA92280004 for ; Mon, 10 Mar 2025 16:51:36 -0400 (EDT) Received: from smtpin21.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 1D55C56D01 for ; Mon, 10 Mar 2025 20:51:38 +0000 (UTC) X-FDA: 83206837476.21.BC6BFAD Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf29.hostedemail.com (Postfix) with ESMTP id 0038A120008 for ; Mon, 10 Mar 2025 20:51:33 +0000 (UTC) Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=eHXNzQOq; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=pe1mW3Ql; spf=pass (imf29.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741639894; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=lPIlvW4NVmibYfzg4WPczV9X5P42nRAQz3FSSwbojDY=; b=zksR0xR3tUB8TDgWAPFF/ib9yfcK3MNDCEXfC8xNM7DiDdi/HOtqmSoH3amPiUaZ4Wq6iT vUDVVN2Tdy+dVP2RX48svN6GdUQqsaHXbtBN83sDZvIzyLcIy3DvIQmLeeVsz8BM/R1KAl FAAj/bf48Pzk0+h/2Kcx9InZ+fKx2Sw= ARC-Authentication-Results: i=2; imf29.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=eHXNzQOq; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=pe1mW3Ql; spf=pass (imf29.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741639894; a=rsa-sha256; cv=pass; b=dt/CIgwrAd8Q5fAQ9qnQgdt9PFKKA0ILSNAXFVXw6Ug1zSR4HOnb16bUcUC7HRAQwWw1lU WjXtAQ1MDduYkJogV+lxsm0qzWTGc0k9Y6oJbPzCNt9s6yaaxr1Z3oK94ZLmDL/Q05Ye0h hsJhtZdDZk3yc2phuGoFM7UNGsRWHGo= Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJtmEq023148; Mon, 10 Mar 2025 20:51:30 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=lPIlvW4NVmibYfzg4WPczV9X5P42nRAQz3FSSwbojDY=; b= eHXNzQOqgegnAJk+Cy8flHc88DPL/6AHzz4C93bvd48T3Uu7mHb3jZkx8wLyYnD/ R8xQ+Zahb8CIcLXILC4YTGgl105u2AyCkoc4LsmBQYDfA22aJv3OWO4Vu8bScbOX 4Ui9cm7BdIz3/NEml2K+XXCXiW/tXOzGPJ4/RsoGs47Zb91uRS3fcz6SpL74nhEx HykP2cnMg6dNE+uvfb53hA0XYehxLYNt5GoirbuSOn75dTZnWd2J3NiGI3c7FFc0 g54mZoETahNIR/YjhQemCf0KfWffl6hT0VY5d98HwocSNc1rsUxlxfZtlKumBGTX fYEOCthDpkHUXsU2MJLN7Q== Received: from iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta02.appoci.oracle.com [147.154.18.20]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 458ds9kgu2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:30 +0000 (GMT) Received: from pps.filterd (iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 52AKne4w019250; Mon, 10 Mar 2025 20:51:28 GMT Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2176.outbound.protection.outlook.com [104.47.56.176]) by iadpaimrmta02.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 458cbeng0v-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:28 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=SGDVWcx1zbqsqJTxyOavmh3RW6pKrMtZXYvWPCGpOLDUHtqJZA+dhVRdlYJvevi+X3gnRc9Ga70wzGKCSRc9WQIRW+WWVB8ZvYUCV2bd9tg+eV+5IKVF4165Z3tU+4sejcixS0pNG79nzAXFNpP0OAF8ANgukv0kxjn/JBEd82bwiIcAZQ2H3pipSACrNsWqWMui0ijbi/rDeZGcnNBQYyCLyGEX+WuyRi31adWZ5qjo8HE0t90lS0VSUZkVILIVyTJPenU6Hd7M9VHgg7sypYC1MRi3RIlVG5tv14DluP7KdaxUi+KA8yHT+eYb7Wwi2ysw8f/umCMZpggUxd+7UA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lPIlvW4NVmibYfzg4WPczV9X5P42nRAQz3FSSwbojDY=; b=ZtA3lIr/O6ux/W4W0B/GF4KO924IRyKMfX12/VFRhhEeCcjns2xv1VnB38G7mQgxubHZYI6pi9PmUZWa2ifz2ed2Czubzt2IsjOv+cgIFQLgqhbgDZSbvH4Ucko/meiO7+hoZOBFdq9GTMj9uUIZ9VqWw7jb4R91hckTwoVViS3FSbfmxPf9JFiX5hXXPrH2YlTNUzjw3rjVtNrFrOO07zwMhhdbf04aCS11hmHpbqB4Tkg+ZItH3figFmaJv87SpZGCxZe1f7hTKe3DNOK/OiOsUYb9K92Ra7MwjM3fU+AEwpetF0Qov3TkGI6sRlq1cOn1uBf5DKRQpIN/COADXw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lPIlvW4NVmibYfzg4WPczV9X5P42nRAQz3FSSwbojDY=; b=pe1mW3Qly+SvoXzli4K4V7UH0hephW1uCLtOXdA9PwRHteKa201C/sXZhegvQxB+ZaPEIVjQOby5lQJHZyC37b8Lbbv466B8vArmLRkNh5jAzU71R8uxkN3BT/dv1nqNC8HSC+hsM5BGCzskLV4pah1H0DqanKy7M+qGDTlXDLk= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DS7PR10MB7250.namprd10.prod.outlook.com (2603:10b6:8:e0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8511.27; Mon, 10 Mar 2025 20:51:26 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 10 Mar 2025 20:51:26 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Harry Yoo , Yosry Ahmed , Oliver Sang Subject: [PATCH v3 2/7] mm/mremap: refactor mremap() system call implementation Date: Mon, 10 Mar 2025 20:50:35 +0000 Message-ID: X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P302CA0008.GBRP302.PROD.OUTLOOK.COM (2603:10a6:600:2c2::16) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DS7PR10MB7250:EE_ X-MS-Office365-Filtering-Correlation-Id: c301f52f-10ae-4cb9-17d6-08dd601552dd X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|366016; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 6qpmNcJGymKJjv7rDQAMpa5rsF34miOK34/to+qktAmFw/2vJe8ptLCmy/SOsFmxVU7g2tjthTHyttP17I1K2caXQAoPTvpWXCcKk1mA2qMuUS3AK2IYEfnlOgdIA91PlKaZ2IIXWDnsgCwvu4ybMvqg2MhrHYM+9CceCsR9Ts7Z8Qn+9LAZMb6IYyUs6rUs6C/gMZXJX9hb5YWrBljRCUkjoSdgXNl6RUPiH8CW/MLfeWJ2tKWMUFOtvsI/R0uycpOvQaXlKUeqpBvfejqRpo/1G2wVsqgvGGfKUkDqe9ELSuoEBOIynGtmcmA25ts+eCafCZ29PZyLAXA2gYP0aL1+b7StkYl1I93NHF4FNUDrv8fP/ak0aB62nbl5B28q2rUUx8ajBj38Q32weolhCfAsVDkPznziJAdOlMoBKkjEVWi9GWN4zJV5hQRFndUb/x45tqDCk1IfQ/wnMYRGcfuTvNElX+OR/7SpHk9KI+0Z6MfGzeSGHjpS0+h0+4RZbyz17J4fo0VXsxAmRduXTskA9AlWHSGoXV9P53Fnu+JsAo7uZ9HD8nW55vikA5PC8vYVc2RLmD2c0mqc9B4DncqPc0w6dfGLaYgzMA+NBgI= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: c301f52f-10ae-4cb9-17d6-08dd601552dd X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2025 20:51:25.9743 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: f6vhJayURDxaHsC3Gc7wGJGinSY4ZKfnZmc2F51vrqOy7tCuadhc1sTG4rELt2p/X9nULDRMEYzkYrM/uhtrKVXCtufi5fwuJ/+k3/TnYpA= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB7250 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-10_08,2025-03-07_03,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 phishscore=0 spamscore=0 suspectscore=0 mlxscore=0 mlxlogscore=999 malwarescore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503100159 X-Proofpoint-GUID: 7CtrwClCzbIXHVpe-5C2xzszkbvyyP9C X-Proofpoint-ORIG-GUID: 7CtrwClCzbIXHVpe-5C2xzszkbvyyP9C X-Rspam-User: X-Rspamd-Queue-Id: 0038A120008 X-Stat-Signature: rfq9bqz4b7p8etctm9bhxkmfqg4pejd6 X-Rspamd-Server: rspam09 X-HE-Tag: 1741639893-445745 X-HE-Meta: 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 MeUDkIt7 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Place checks into a separate function so the mremap() system call is less egregiously long, remove unnecessary mremap_to() offset_in_page() check and just check that earlier so we keep all such basic checks together. Separate out the VMA in-place expansion, hugetlb and expand/move logic into separate, readable functions. De-duplicate code where possible, add comments and ensure that all error handling explicitly specifies the error at the point of it occurring rather than setting a prefixed error value and implicitly setting (which is bug prone). This lays the groundwork for subsequent patches further simplifying and extending the mremap() implementation. Signed-off-by: Lorenzo Stoakes Reviewed-by: Harry Yoo Reviewed-by: Vlastimil Babka --- mm/mremap.c | 405 ++++++++++++++++++++++++++++++++-------------------- 1 file changed, 251 insertions(+), 154 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index c3e4c86d0b8d..c4abda8dfc57 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -942,33 +942,14 @@ static unsigned long mremap_to(unsigned long addr, unsigned long old_len, unsigned long ret; unsigned long map_flags = 0; - if (offset_in_page(new_addr)) - return -EINVAL; - + /* Is the new length or address silly? */ if (new_len > TASK_SIZE || new_addr > TASK_SIZE - new_len) return -EINVAL; - /* Ensure the old/new locations do not overlap */ + /* Ensure the old/new locations do not overlap. */ if (addr + old_len > new_addr && new_addr + new_len > addr) return -EINVAL; - /* - * move_vma() need us to stay 4 maps below the threshold, otherwise - * it will bail out at the very beginning. - * That is a problem if we have already unmaped the regions here - * (new_addr, and old_addr), because userspace will not know the - * state of the vma's after it gets -ENOMEM. - * So, to avoid such scenario we can pre-compute if the whole - * operation has high chances to success map-wise. - * Worst-scenario case is when both vma's (new_addr and old_addr) get - * split in 3 before unmapping it. - * That means 2 more maps (1 for each) to the ones we already hold. - * Check whether current map count plus 2 still leads us to 4 maps below - * the threshold, otherwise return -ENOMEM here to be more safe. - */ - if ((mm->map_count + 2) >= sysctl_max_map_count - 3) - return -ENOMEM; - if (flags & MREMAP_FIXED) { /* * In mremap_to(). @@ -1035,6 +1016,218 @@ static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) return 1; } +/* Do the mremap() flags require that the new_addr parameter be specified? */ +static bool implies_new_addr(unsigned long flags) +{ + return flags & (MREMAP_FIXED | MREMAP_DONTUNMAP); +} + +/* + * Are the parameters passed to mremap() valid? If so return 0, otherwise return + * error. + */ +static unsigned long check_mremap_params(unsigned long addr, + unsigned long flags, + unsigned long old_len, + unsigned long new_len, + unsigned long new_addr) +{ + /* Ensure no unexpected flag values. */ + if (flags & ~(MREMAP_FIXED | MREMAP_MAYMOVE | MREMAP_DONTUNMAP)) + return -EINVAL; + + /* Start address must be page-aligned. */ + if (offset_in_page(addr)) + return -EINVAL; + + /* + * We allow a zero old-len as a special case + * for DOS-emu "duplicate shm area" thing. But + * a zero new-len is nonsensical. + */ + if (!PAGE_ALIGN(new_len)) + return -EINVAL; + + /* Remainder of checks are for cases with specific new_addr. */ + if (!implies_new_addr(flags)) + return 0; + + /* The new address must be page-aligned. */ + if (offset_in_page(new_addr)) + return -EINVAL; + + /* A fixed address implies a move. */ + if (!(flags & MREMAP_MAYMOVE)) + return -EINVAL; + + /* MREMAP_DONTUNMAP does not allow resizing in the process. */ + if (flags & MREMAP_DONTUNMAP && old_len != new_len) + return -EINVAL; + + /* + * move_vma() need us to stay 4 maps below the threshold, otherwise + * it will bail out at the very beginning. + * That is a problem if we have already unmaped the regions here + * (new_addr, and old_addr), because userspace will not know the + * state of the vma's after it gets -ENOMEM. + * So, to avoid such scenario we can pre-compute if the whole + * operation has high chances to success map-wise. + * Worst-scenario case is when both vma's (new_addr and old_addr) get + * split in 3 before unmapping it. + * That means 2 more maps (1 for each) to the ones we already hold. + * Check whether current map count plus 2 still leads us to 4 maps below + * the threshold, otherwise return -ENOMEM here to be more safe. + */ + if ((current->mm->map_count + 2) >= sysctl_max_map_count - 3) + return -ENOMEM; + + return 0; +} + +/* + * We know we can expand the VMA in-place by delta pages, so do so. + * + * If we discover the VMA is locked, update mm_struct statistics accordingly and + * indicate so to the caller. + */ +static unsigned long expand_vma_inplace(struct vm_area_struct *vma, + unsigned long delta, bool *locked) +{ + struct mm_struct *mm = current->mm; + long pages = delta >> PAGE_SHIFT; + VMA_ITERATOR(vmi, mm, vma->vm_end); + long charged = 0; + + if (vma->vm_flags & VM_ACCOUNT) { + if (security_vm_enough_memory_mm(mm, pages)) + return -ENOMEM; + + charged = pages; + } + + /* + * Function vma_merge_extend() is called on the + * extension we are adding to the already existing vma, + * vma_merge_extend() will merge this extension with the + * already existing vma (expand operation itself) and + * possibly also with the next vma if it becomes + * adjacent to the expanded vma and otherwise + * compatible. + */ + vma = vma_merge_extend(&vmi, vma, delta); + if (!vma) { + vm_unacct_memory(charged); + return -ENOMEM; + } + + vm_stat_account(mm, vma->vm_flags, pages); + if (vma->vm_flags & VM_LOCKED) { + mm->locked_vm += pages; + *locked = true; + } + + return 0; +} + +static bool align_hugetlb(struct vm_area_struct *vma, + unsigned long addr, + unsigned long new_addr, + unsigned long *old_len_ptr, + unsigned long *new_len_ptr, + unsigned long *delta_ptr) +{ + unsigned long old_len = *old_len_ptr; + unsigned long new_len = *new_len_ptr; + struct hstate *h __maybe_unused = hstate_vma(vma); + + old_len = ALIGN(old_len, huge_page_size(h)); + new_len = ALIGN(new_len, huge_page_size(h)); + + /* addrs must be huge page aligned */ + if (addr & ~huge_page_mask(h)) + return false; + if (new_addr & ~huge_page_mask(h)) + return false; + + /* + * Don't allow remap expansion, because the underlying hugetlb + * reservation is not yet capable to handle split reservation. + */ + if (new_len > old_len) + return false; + + *old_len_ptr = old_len; + *new_len_ptr = new_len; + *delta_ptr = abs_diff(old_len, new_len); + return true; +} + +/* + * We are mremap()'ing without specifying a fixed address to move to, but are + * requesting that the VMA's size be increased. + * + * Try to do so in-place, if this fails, then move the VMA to a new location to + * action the change. + */ +static unsigned long expand_vma(struct vm_area_struct *vma, + unsigned long addr, unsigned long old_len, + unsigned long new_len, unsigned long flags, + bool *locked_ptr, unsigned long *new_addr_ptr, + struct vm_userfaultfd_ctx *uf_ptr, + struct list_head *uf_unmap_ptr) +{ + unsigned long err; + unsigned long map_flags; + unsigned long new_addr; /* We ignore any user-supplied one. */ + pgoff_t pgoff; + + err = resize_is_valid(vma, addr, old_len, new_len, flags); + if (err) + return err; + + /* + * [addr, old_len) spans precisely to the end of the VMA, so try to + * expand it in-place. + */ + if (old_len == vma->vm_end - addr && + vma_expandable(vma, new_len - old_len)) { + err = expand_vma_inplace(vma, new_len - old_len, locked_ptr); + if (IS_ERR_VALUE(err)) + return err; + + /* + * We want to populate the newly expanded portion of the VMA to + * satisfy the expectation that mlock()'ing a VMA maintains all + * of its pages in memory. + */ + if (*locked_ptr) + *new_addr_ptr = addr; + + /* OK we're done! */ + return addr; + } + + /* + * We weren't able to just expand or shrink the area, + * we need to create a new one and move it. + */ + + /* We're not allowed to move the VMA, so error out. */ + if (!(flags & MREMAP_MAYMOVE)) + return -ENOMEM; + + /* Find a new location to move the VMA to. */ + map_flags = (vma->vm_flags & VM_MAYSHARE) ? MAP_SHARED : 0; + pgoff = vma->vm_pgoff + ((addr - vma->vm_start) >> PAGE_SHIFT); + new_addr = get_unmapped_area(vma->vm_file, 0, new_len, pgoff, map_flags); + if (IS_ERR_VALUE(new_addr)) + return new_addr; + *new_addr_ptr = new_addr; + + return move_vma(vma, addr, old_len, new_len, new_addr, + locked_ptr, flags, uf_ptr, uf_unmap_ptr); +} + /* * Expand (or shrink) an existing mapping, potentially moving it at the * same time (controlled by the MREMAP_MAYMOVE flag and available VM space) @@ -1048,7 +1241,8 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, { struct mm_struct *mm = current->mm; struct vm_area_struct *vma; - unsigned long ret = -EINVAL; + unsigned long ret; + unsigned long delta; bool locked = false; struct vm_userfaultfd_ctx uf = NULL_VM_UFFD_CTX; LIST_HEAD(uf_unmap_early); @@ -1067,70 +1261,38 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, */ addr = untagged_addr(addr); - if (flags & ~(MREMAP_FIXED | MREMAP_MAYMOVE | MREMAP_DONTUNMAP)) - return ret; - - if (flags & MREMAP_FIXED && !(flags & MREMAP_MAYMOVE)) - return ret; - - /* - * MREMAP_DONTUNMAP is always a move and it does not allow resizing - * in the process. - */ - if (flags & MREMAP_DONTUNMAP && - (!(flags & MREMAP_MAYMOVE) || old_len != new_len)) - return ret; - - - if (offset_in_page(addr)) + ret = check_mremap_params(addr, flags, old_len, new_len, new_addr); + if (ret) return ret; old_len = PAGE_ALIGN(old_len); new_len = PAGE_ALIGN(new_len); + delta = abs_diff(old_len, new_len); - /* - * We allow a zero old-len as a special case - * for DOS-emu "duplicate shm area" thing. But - * a zero new-len is nonsensical. - */ - if (!new_len) - return ret; - - if (mmap_write_lock_killable(current->mm)) + if (mmap_write_lock_killable(mm)) return -EINTR; + vma = vma_lookup(mm, addr); if (!vma) { ret = -EFAULT; goto out; } - /* Don't allow remapping vmas when they have already been sealed */ + /* If mseal()'d, mremap() is prohibited. */ if (!can_modify_vma(vma)) { ret = -EPERM; goto out; } - if (is_vm_hugetlb_page(vma)) { - struct hstate *h __maybe_unused = hstate_vma(vma); - - old_len = ALIGN(old_len, huge_page_size(h)); - new_len = ALIGN(new_len, huge_page_size(h)); - - /* addrs must be huge page aligned */ - if (addr & ~huge_page_mask(h)) - goto out; - if (new_addr & ~huge_page_mask(h)) - goto out; - - /* - * Don't allow remap expansion, because the underlying hugetlb - * reservation is not yet capable to handle split reservation. - */ - if (new_len > old_len) - goto out; + /* Align to hugetlb page size, if required. */ + if (is_vm_hugetlb_page(vma) && + !align_hugetlb(vma, addr, new_addr, &old_len, &new_len, &delta)) { + ret = -EINVAL; + goto out; } - if (flags & (MREMAP_FIXED | MREMAP_DONTUNMAP)) { + /* Are we RELOCATING the VMA to a SPECIFIC address? */ + if (implies_new_addr(flags)) { ret = mremap_to(addr, old_len, new_addr, new_len, &locked, flags, &uf, &uf_unmap_early, &uf_unmap); @@ -1138,109 +1300,44 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, } /* - * Always allow a shrinking remap: that just unmaps - * the unnecessary pages.. - * do_vmi_munmap does all the needed commit accounting, and - * unlocks the mmap_lock if so directed. + * From here on in we are only RESIZING the VMA, attempting to do so + * in-place, moving the VMA if we cannot. */ - if (old_len >= new_len) { - VMA_ITERATOR(vmi, mm, addr + new_len); - if (old_len == new_len) { - ret = addr; - goto out; - } + /* NO-OP CASE - resizing to the same size. */ + if (new_len == old_len) { + ret = addr; + goto out; + } + + /* SHRINK CASE. Can always be done in-place. */ + if (new_len < old_len) { + VMA_ITERATOR(vmi, mm, addr + new_len); - ret = do_vmi_munmap(&vmi, mm, addr + new_len, old_len - new_len, + /* + * Simply unmap the shrunken portion of the VMA. This does all + * the needed commit accounting, unlocking the mmap lock. + */ + ret = do_vmi_munmap(&vmi, mm, addr + new_len, delta, &uf_unmap, true); if (ret) goto out; + /* We succeeded, mmap lock released for us. */ ret = addr; goto out_unlocked; } - /* - * Ok, we need to grow.. - */ - ret = resize_is_valid(vma, addr, old_len, new_len, flags); - if (ret) - goto out; - - /* old_len exactly to the end of the area.. - */ - if (old_len == vma->vm_end - addr) { - unsigned long delta = new_len - old_len; - - /* can we just expand the current mapping? */ - if (vma_expandable(vma, delta)) { - long pages = delta >> PAGE_SHIFT; - VMA_ITERATOR(vmi, mm, vma->vm_end); - long charged = 0; - - if (vma->vm_flags & VM_ACCOUNT) { - if (security_vm_enough_memory_mm(mm, pages)) { - ret = -ENOMEM; - goto out; - } - charged = pages; - } - - /* - * Function vma_merge_extend() is called on the - * extension we are adding to the already existing vma, - * vma_merge_extend() will merge this extension with the - * already existing vma (expand operation itself) and - * possibly also with the next vma if it becomes - * adjacent to the expanded vma and otherwise - * compatible. - */ - vma = vma_merge_extend(&vmi, vma, delta); - if (!vma) { - vm_unacct_memory(charged); - ret = -ENOMEM; - goto out; - } + /* EXPAND case. We try to do in-place, if we can't, then we move it. */ + ret = expand_vma(vma, addr, old_len, new_len, flags, &locked, &new_addr, + &uf, &uf_unmap); - vm_stat_account(mm, vma->vm_flags, pages); - if (vma->vm_flags & VM_LOCKED) { - mm->locked_vm += pages; - locked = true; - new_addr = addr; - } - ret = addr; - goto out; - } - } - - /* - * We weren't able to just expand or shrink the area, - * we need to create a new one and move it.. - */ - ret = -ENOMEM; - if (flags & MREMAP_MAYMOVE) { - unsigned long map_flags = 0; - if (vma->vm_flags & VM_MAYSHARE) - map_flags |= MAP_SHARED; - - new_addr = get_unmapped_area(vma->vm_file, 0, new_len, - vma->vm_pgoff + - ((addr - vma->vm_start) >> PAGE_SHIFT), - map_flags); - if (IS_ERR_VALUE(new_addr)) { - ret = new_addr; - goto out; - } - - ret = move_vma(vma, addr, old_len, new_len, new_addr, - &locked, flags, &uf, &uf_unmap); - } out: if (offset_in_page(ret)) locked = false; - mmap_write_unlock(current->mm); + mmap_write_unlock(mm); if (locked && new_len > old_len) - mm_populate(new_addr + old_len, new_len - old_len); + mm_populate(new_addr + old_len, delta); out_unlocked: userfaultfd_unmap_complete(mm, &uf_unmap_early); mremap_userfaultfd_complete(&uf, addr, ret, old_len); From patchwork Mon Mar 10 20:50:36 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 14010663 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 01E27C2BA1B for ; Mon, 10 Mar 2025 20:51:40 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id AE956280007; Mon, 10 Mar 2025 16:51:38 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A9A28280004; Mon, 10 Mar 2025 16:51:38 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8538A280007; Mon, 10 Mar 2025 16:51:38 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 5A3D4280004 for ; Mon, 10 Mar 2025 16:51:38 -0400 (EDT) Received: from smtpin27.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id CE27556D89 for ; Mon, 10 Mar 2025 20:51:39 +0000 (UTC) X-FDA: 83206837518.27.52D5FCB Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf04.hostedemail.com (Postfix) with ESMTP id 6D8344000A for ; Mon, 10 Mar 2025 20:51:36 +0000 (UTC) Authentication-Results: imf04.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=eVwVHUsP; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=LqfXcSL2; spf=pass (imf04.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741639896; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=KkJ1hYyM1bPxyqbnxzKgf3ulFFMsyMbbAPot2MbGbzQ=; b=1nCtBw6lVShSKC9h66GWOw2j2FtgJ4Chfb8H0kiRe4vD2EKftTMVyKJtStmzoXvaUQoybm O3lo5dsvmAyh6qw0M1Y2XY8wR7DSYn6kDI/P4eJvcog6kKyUgaFb4u4DbObBA3DCIMnPDp 4I+Q0EY5xwOtkkQAUO483ycrNKrRL6Y= ARC-Authentication-Results: i=2; imf04.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=eVwVHUsP; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=LqfXcSL2; spf=pass (imf04.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741639896; a=rsa-sha256; cv=pass; b=rMr8umxVww7JSVSp6/EPL/uoN9bvu7bfZjWgeNaoh41wAzOCgG+H3fQ+YxSUHu4dQyhirl T2sf2WdOt9hZvLOlGSKeJFWznN8HBAgewmUOuHarRpZZuA4wFYCgapF3V2pAx9tnqiwQlF i9aiYH0m1NoX9wmWuFcU4sBm6Bd1UNg= Received: from pps.filterd (m0246627.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJtkMM015556; Mon, 10 Mar 2025 20:51:33 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=KkJ1hYyM1bPxyqbnxzKgf3ulFFMsyMbbAPot2MbGbzQ=; b= eVwVHUsPPK146PFVabwCCFX9jKK2I9KTZzcEG7LkUmQBTJ5QIOXUoubNqp5jMYo5 MnZ1G+Iu2rFHEfXQSA4t2YJRBAXrnj10c7TT/ZGqzNpDGQv3lZOpxdJruuVkHDCG RO0WS/T9mKr1aLPnfkY4uMm+hT6x42ujzGSVe+qAYMZdck7gNTJnSgo7DJb0cM5w +RHD+y4hTENv2mO28GGawUeiL0v41OU+D0VKHjo0G8HhPGKVr5aVCco3kiJA/jqh pqIYD9gll22oF2yHZEp3IOXJ6TIDFzDnZ4mazJ544wg8gN4SJO07Cs13KdV2XEoQ CmkyPbhnet/m/NYCadkKNQ== Received: from phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta03.appoci.oracle.com [138.1.37.129]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 458cg0uke9-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:32 +0000 (GMT) Received: from pps.filterd (phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 52AKVsuD019748; Mon, 10 Mar 2025 20:51:32 GMT Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2168.outbound.protection.outlook.com [104.47.56.168]) by phxpaimrmta03.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 458cb84r55-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:32 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=KsfrPO/QJI6lxhRtl5n7Yf2djhp9V1TyWs370ZmBApI3P/3oq23qqZYEXBE/++MOxcwT6FLCuCOwoVnFgzkRuLG9+ops2QeEyRhXfzRqqjCYz0xVJEirL+wRAdUU2azTnusSWS/7xWJW3lDs9AZjTZJVEJ2daMn8xWxjvujkOT/9DGaijtmCXZbc9Yc67cQhodMMn3zckFHkVulSYp48BBiXDh3GUxjvra7pfpp7ByZ9ID4XWu23FUN6AfZrZwKndZG6vwn5GgvCN+3uAIwg5d1TNqhDsw+Q+GR/SJ4IHd+WsuYpWrfH1X2VAaM54qveVrTQYdj/zsxBr8h1oTHcHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KkJ1hYyM1bPxyqbnxzKgf3ulFFMsyMbbAPot2MbGbzQ=; b=tZ6aAePusdVRVEhIuEFYmyvzj5VMXIMNE3yDdpjD2VW2G9RRqqGNisYtykSnVMI5gGt17wKFL9uzf8y7uTlxV+t0FQxVqvCGaQMTEf0jo4tleB8E17C7HXEjl1YHkclx96eV00bIV+sq59/8nW14IQNRTB8+ipOs2cS0ZMyFRYiR8mHxrueI8DmpWtawa54pvhLOwk73caO2RJhB6NNTVHs+JuN9S9BfhdQ1rcyl3A8II9eo7x0rs8uasUue/w9hjmGX+gtw99Uwy5WFH+AtrK8rPcipKvVBUbhfnzyyNbOvrerWk1zKwMJGqnpvaeGY1mAMganFmH0zuYV0OlAoQQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KkJ1hYyM1bPxyqbnxzKgf3ulFFMsyMbbAPot2MbGbzQ=; b=LqfXcSL2nMd8Q7numuwj7hK4uqvtW+lUBhG6rhY6/C6XXYaduMp2tQCrYkxnxS1htiynI9elC8Ov/QgZioa+BFWYCzzhp69hauPamYuE5J+X02GKFyRQj9k0RJhAatHRwR5kk/QmRi3MAmBI1pslGs8NkGzJtb6eFKN+jHWIxTc= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DS7PR10MB7250.namprd10.prod.outlook.com (2603:10b6:8:e0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8511.27; Mon, 10 Mar 2025 20:51:29 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 10 Mar 2025 20:51:29 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Harry Yoo , Yosry Ahmed , Oliver Sang Subject: [PATCH v3 3/7] mm/mremap: introduce and use vma_remap_struct threaded state Date: Mon, 10 Mar 2025 20:50:36 +0000 Message-ID: <27951739dc83b2b1523b81fa9c009ba348388d40.1741639347.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO3P265CA0022.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:387::13) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DS7PR10MB7250:EE_ X-MS-Office365-Filtering-Correlation-Id: df31eb2f-2262-432a-aa1b-08dd601554ef X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|366016; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: df31eb2f-2262-432a-aa1b-08dd601554ef X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2025 20:51:29.7793 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: BFdBH2WGWRuxkcCRYA3cFtlxGwv+uY31NVXf33fGnE2qNRAG/JsKOko+JSqXRk40Qvm63jPQ1ArVxDJW9rcdw2jW3HJBvBNW9jCPYhVEnyg= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB7250 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-10_08,2025-03-07_03,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 mlxlogscore=999 suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 spamscore=0 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503100159 X-Proofpoint-GUID: EeHnw_yiJYHUr4N8DfOmFup4xnBX9ZZu X-Proofpoint-ORIG-GUID: EeHnw_yiJYHUr4N8DfOmFup4xnBX9ZZu X-Rspamd-Server: rspam06 X-Rspamd-Queue-Id: 6D8344000A X-Stat-Signature: syz5k6drb9u7itf6d6amk3nhm6m8rup6 X-Rspam-User: X-HE-Tag: 1741639896-989604 X-HE-Meta: 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 CoP0e8hq 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: A number of mremap() calls both pass around and modify a large number of parameters, making the code less readable and often repeatedly having to determine things such as VMA, size delta, and more. Avoid this by using the common pattern of passing a state object through the operation, updating it as we go. We introduce the vma_remap_struct or 'VRM' for this purpose. This also gives us the ability to accumulate further state through the operation that would otherwise require awkward and error-prone pointer passing. We can also now trivially define helper functions that operate on a VRM object. This pattern has proven itself to be very powerful when implemented for VMA merge, VMA unmapping and memory mapping operations, so it is battle-tested and functional. We both introduce the data structure and use it, introducing helper functions as needed to make things readable, we move some state such as mmap lock and mlock() status to the VRM, we introduce a means of classifying the type of mremap() operation and de-duplicate the get_unmapped_area() lookup. We also neatly thread userfaultfd state throughout the operation. Note that there is further refactoring to be done, chiefly adjust move_vma() to accept a VRM parameter. We defer this as there is pre-requisite work required to be able to do so which we will do in a subsequent patch. Signed-off-by: Lorenzo Stoakes Reviewed-by: Vlastimil Babka --- mm/mremap.c | 570 +++++++++++++++++++++++++++++++++------------------- 1 file changed, 363 insertions(+), 207 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index c4abda8dfc57..af022e3b89e2 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -32,6 +32,44 @@ #include "internal.h" +/* Classify the kind of remap operation being performed. */ +enum mremap_type { + MREMAP_INVALID, /* Initial state. */ + MREMAP_NO_RESIZE, /* old_len == new_len, if not moved, do nothing. */ + MREMAP_SHRINK, /* old_len > new_len. */ + MREMAP_EXPAND, /* old_len < new_len. */ +}; + +/* + * Describes a VMA mremap() operation and is threaded throughout it. + * + * Any of the fields may be mutated by the operation, however these values will + * always accurately reflect the remap (for instance, we may adjust lengths and + * delta to account for hugetlb alignment). + */ +struct vma_remap_struct { + /* User-provided state. */ + unsigned long addr; /* User-specified address from which we remap. */ + unsigned long old_len; /* Length of range being remapped. */ + unsigned long new_len; /* Desired new length of mapping. */ + unsigned long flags; /* user-specified MREMAP_* flags. */ + unsigned long new_addr; /* Optionally, desired new address. */ + + /* uffd state. */ + struct vm_userfaultfd_ctx *uf; + struct list_head *uf_unmap_early; + struct list_head *uf_unmap; + + /* VMA state, determined in do_mremap(). */ + struct vm_area_struct *vma; + + /* Internal state, determined in do_mremap(). */ + unsigned long delta; /* Absolute delta of old_len,new_len. */ + bool mlocked; /* Was the VMA mlock()'d? */ + enum mremap_type remap_type; /* expand, shrink, etc. */ + bool mmap_locked; /* Is mm currently write-locked? */ +}; + static pud_t *get_old_pud(struct mm_struct *mm, unsigned long addr) { pgd_t *pgd; @@ -693,10 +731,95 @@ unsigned long move_page_tables(struct vm_area_struct *vma, return len + old_addr - old_end; /* how much done */ } +/* Set vrm->delta to the difference in VMA size specified by user. */ +static void vrm_set_delta(struct vma_remap_struct *vrm) +{ + vrm->delta = abs_diff(vrm->old_len, vrm->new_len); +} + +/* Determine what kind of remap this is - shrink, expand or no resize at all. */ +static enum mremap_type vrm_remap_type(struct vma_remap_struct *vrm) +{ + if (vrm->delta == 0) + return MREMAP_NO_RESIZE; + + if (vrm->old_len > vrm->new_len) + return MREMAP_SHRINK; + + return MREMAP_EXPAND; +} + +/* + * When moving a VMA to vrm->new_adr, does this result in the new and old VMAs + * overlapping? + */ +static bool vrm_overlaps(struct vma_remap_struct *vrm) +{ + unsigned long start_old = vrm->addr; + unsigned long start_new = vrm->new_addr; + unsigned long end_old = vrm->addr + vrm->old_len; + unsigned long end_new = vrm->new_addr + vrm->new_len; + + /* + * start_old end_old + * |-----------| + * | | + * |-----------| + * |-------------| + * | | + * |-------------| + * start_new end_new + */ + if (end_old > start_new && end_new > start_old) + return true; + + return false; +} + +/* Do the mremap() flags require that the new_addr parameter be specified? */ +static bool vrm_implies_new_addr(struct vma_remap_struct *vrm) +{ + return vrm->flags & (MREMAP_FIXED | MREMAP_DONTUNMAP); +} + +/* + * Find an unmapped area for the requested vrm->new_addr. + * + * If MREMAP_FIXED then this is equivalent to a MAP_FIXED mmap() call. If only + * MREMAP_DONTUNMAP is set, then this is equivalent to providing a hint to + * mmap(), otherwise this is equivalent to mmap() specifying a NULL address. + * + * Returns 0 on success (with vrm->new_addr updated), or an error code upon + * failure. + */ +static unsigned long vrm_set_new_addr(struct vma_remap_struct *vrm) +{ + struct vm_area_struct *vma = vrm->vma; + unsigned long map_flags = 0; + /* Page Offset _into_ the VMA. */ + pgoff_t internal_pgoff = (vrm->addr - vma->vm_start) >> PAGE_SHIFT; + pgoff_t pgoff = vma->vm_pgoff + internal_pgoff; + unsigned long new_addr = vrm_implies_new_addr(vrm) ? vrm->new_addr : 0; + unsigned long res; + + if (vrm->flags & MREMAP_FIXED) + map_flags |= MAP_FIXED; + if (vma->vm_flags & VM_MAYSHARE) + map_flags |= MAP_SHARED; + + res = get_unmapped_area(vma->vm_file, new_addr, vrm->new_len, pgoff, + map_flags); + if (IS_ERR_VALUE(res)) + return res; + + vrm->new_addr = res; + return 0; +} + static unsigned long move_vma(struct vm_area_struct *vma, unsigned long old_addr, unsigned long old_len, unsigned long new_len, unsigned long new_addr, - bool *locked, unsigned long flags, + bool *mlocked, unsigned long flags, struct vm_userfaultfd_ctx *uf, struct list_head *uf_unmap) { long to_account = new_len - old_len; @@ -837,7 +960,7 @@ static unsigned long move_vma(struct vm_area_struct *vma, if (vm_flags & VM_LOCKED) { mm->locked_vm += new_len >> PAGE_SHIFT; - *locked = true; + *mlocked = true; } mm->hiwater_vm = hiwater_vm; @@ -860,18 +983,15 @@ static unsigned long move_vma(struct vm_area_struct *vma, * resize_is_valid() - Ensure the vma can be resized to the new length at the give * address. * - * @vma: The vma to resize - * @addr: The old address - * @old_len: The current size - * @new_len: The desired size - * @flags: The vma flags - * * Return 0 on success, error otherwise. */ -static int resize_is_valid(struct vm_area_struct *vma, unsigned long addr, - unsigned long old_len, unsigned long new_len, unsigned long flags) +static int resize_is_valid(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; + struct vm_area_struct *vma = vrm->vma; + unsigned long addr = vrm->addr; + unsigned long old_len = vrm->old_len; + unsigned long new_len = vrm->new_len; unsigned long pgoff; /* @@ -883,11 +1003,12 @@ static int resize_is_valid(struct vm_area_struct *vma, unsigned long addr, * behavior. As a result, fail such attempts. */ if (!old_len && !(vma->vm_flags & (VM_SHARED | VM_MAYSHARE))) { - pr_warn_once("%s (%d): attempted to duplicate a private mapping with mremap. This is not supported.\n", current->comm, current->pid); + pr_warn_once("%s (%d): attempted to duplicate a private mapping with mremap. This is not supported.\n", + current->comm, current->pid); return -EINVAL; } - if ((flags & MREMAP_DONTUNMAP) && + if ((vrm->flags & MREMAP_DONTUNMAP) && (vma->vm_flags & (VM_DONTEXPAND | VM_PFNMAP))) return -EINVAL; @@ -907,99 +1028,122 @@ static int resize_is_valid(struct vm_area_struct *vma, unsigned long addr, if (vma->vm_flags & (VM_DONTEXPAND | VM_PFNMAP)) return -EFAULT; - if (!mlock_future_ok(mm, vma->vm_flags, new_len - old_len)) + if (!mlock_future_ok(mm, vma->vm_flags, vrm->delta)) return -EAGAIN; - if (!may_expand_vm(mm, vma->vm_flags, - (new_len - old_len) >> PAGE_SHIFT)) + if (!may_expand_vm(mm, vma->vm_flags, vrm->delta >> PAGE_SHIFT)) return -ENOMEM; return 0; } /* - * mremap_to() - remap a vma to a new location - * @addr: The old address - * @old_len: The old size - * @new_addr: The target address - * @new_len: The new size - * @locked: If the returned vma is locked (VM_LOCKED) - * @flags: the mremap flags - * @uf: The mremap userfaultfd context - * @uf_unmap_early: The userfaultfd unmap early context - * @uf_unmap: The userfaultfd unmap context + * The user has requested that the VMA be shrunk (i.e., old_len > new_len), so + * execute this, optionally dropping the mmap lock when we do so. * + * In both cases this invalidates the VMA, however if we don't drop the lock, + * then load the correct VMA into vrm->vma afterwards. + */ +static unsigned long shrink_vma(struct vma_remap_struct *vrm, + bool drop_lock) +{ + struct mm_struct *mm = current->mm; + unsigned long unmap_start = vrm->addr + vrm->new_len; + unsigned long unmap_bytes = vrm->delta; + unsigned long res; + VMA_ITERATOR(vmi, mm, unmap_start); + + VM_BUG_ON(vrm->remap_type != MREMAP_SHRINK); + + res = do_vmi_munmap(&vmi, mm, unmap_start, unmap_bytes, + vrm->uf_unmap, drop_lock); + vrm->vma = NULL; /* Invalidated. */ + if (res) + return res; + + /* + * If we've not dropped the lock, then we should reload the VMA to + * replace the invalidated VMA with the one that may have now been + * split. + */ + if (drop_lock) { + vrm->mmap_locked = false; + } else { + vrm->vma = vma_lookup(mm, vrm->addr); + if (!vrm->vma) + return -EFAULT; + } + + return 0; +} + +/* + * mremap_to() - remap a vma to a new location. * Returns: The new address of the vma or an error. */ -static unsigned long mremap_to(unsigned long addr, unsigned long old_len, - unsigned long new_addr, unsigned long new_len, bool *locked, - unsigned long flags, struct vm_userfaultfd_ctx *uf, - struct list_head *uf_unmap_early, - struct list_head *uf_unmap) +static unsigned long mremap_to(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; - struct vm_area_struct *vma; - unsigned long ret; - unsigned long map_flags = 0; + unsigned long err; /* Is the new length or address silly? */ - if (new_len > TASK_SIZE || new_addr > TASK_SIZE - new_len) + if (vrm->new_len > TASK_SIZE || + vrm->new_addr > TASK_SIZE - vrm->new_len) return -EINVAL; - /* Ensure the old/new locations do not overlap. */ - if (addr + old_len > new_addr && new_addr + new_len > addr) + if (vrm_overlaps(vrm)) return -EINVAL; - if (flags & MREMAP_FIXED) { + if (vrm->flags & MREMAP_FIXED) { /* * In mremap_to(). * VMA is moved to dst address, and munmap dst first. * do_munmap will check if dst is sealed. */ - ret = do_munmap(mm, new_addr, new_len, uf_unmap_early); - if (ret) - return ret; - } + err = do_munmap(mm, vrm->new_addr, vrm->new_len, + vrm->uf_unmap_early); + vrm->vma = NULL; /* Invalidated. */ + if (err) + return err; - if (old_len > new_len) { - ret = do_munmap(mm, addr+new_len, old_len - new_len, uf_unmap); - if (ret) - return ret; - old_len = new_len; + /* + * If we remap a portion of a VMA elsewhere in the same VMA, + * this can invalidate the old VMA. Reset. + */ + vrm->vma = vma_lookup(mm, vrm->addr); + if (!vrm->vma) + return -EFAULT; } - vma = vma_lookup(mm, addr); - if (!vma) - return -EFAULT; - - ret = resize_is_valid(vma, addr, old_len, new_len, flags); - if (ret) - return ret; + if (vrm->remap_type == MREMAP_SHRINK) { + err = shrink_vma(vrm, /* drop_lock= */false); + if (err) + return err; - /* MREMAP_DONTUNMAP expands by old_len since old_len == new_len */ - if (flags & MREMAP_DONTUNMAP && - !may_expand_vm(mm, vma->vm_flags, old_len >> PAGE_SHIFT)) { - return -ENOMEM; + /* Set up for the move now shrink has been executed. */ + vrm->old_len = vrm->new_len; } - if (flags & MREMAP_FIXED) - map_flags |= MAP_FIXED; + err = resize_is_valid(vrm); + if (err) + return err; - if (vma->vm_flags & VM_MAYSHARE) - map_flags |= MAP_SHARED; + /* MREMAP_DONTUNMAP expands by old_len since old_len == new_len */ + if (vrm->flags & MREMAP_DONTUNMAP) { + vm_flags_t vm_flags = vrm->vma->vm_flags; + unsigned long pages = vrm->old_len >> PAGE_SHIFT; - ret = get_unmapped_area(vma->vm_file, new_addr, new_len, vma->vm_pgoff + - ((addr - vma->vm_start) >> PAGE_SHIFT), - map_flags); - if (IS_ERR_VALUE(ret)) - return ret; + if (!may_expand_vm(mm, vm_flags, pages)) + return -ENOMEM; + } - /* We got a new mapping */ - if (!(flags & MREMAP_FIXED)) - new_addr = ret; + err = vrm_set_new_addr(vrm); + if (err) + return err; - return move_vma(vma, addr, old_len, new_len, new_addr, locked, flags, - uf, uf_unmap); + return move_vma(vrm->vma, vrm->addr, vrm->old_len, vrm->new_len, + vrm->new_addr, &vrm->mlocked, vrm->flags, + vrm->uf, vrm->uf_unmap); } static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) @@ -1016,22 +1160,33 @@ static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) return 1; } -/* Do the mremap() flags require that the new_addr parameter be specified? */ -static bool implies_new_addr(unsigned long flags) +/* Determine whether we are actually able to execute an in-place expansion. */ +static bool vrm_can_expand_in_place(struct vma_remap_struct *vrm) { - return flags & (MREMAP_FIXED | MREMAP_DONTUNMAP); + /* Number of bytes from vrm->addr to end of VMA. */ + unsigned long suffix_bytes = vrm->vma->vm_end - vrm->addr; + + /* If end of range aligns to end of VMA, we can just expand in-place. */ + if (suffix_bytes != vrm->old_len) + return false; + + /* Check whether this is feasible. */ + if (!vma_expandable(vrm->vma, vrm->delta)) + return false; + + return true; } /* * Are the parameters passed to mremap() valid? If so return 0, otherwise return * error. */ -static unsigned long check_mremap_params(unsigned long addr, - unsigned long flags, - unsigned long old_len, - unsigned long new_len, - unsigned long new_addr) +static unsigned long check_mremap_params(struct vma_remap_struct *vrm) + { + unsigned long addr = vrm->addr; + unsigned long flags = vrm->flags; + /* Ensure no unexpected flag values. */ if (flags & ~(MREMAP_FIXED | MREMAP_MAYMOVE | MREMAP_DONTUNMAP)) return -EINVAL; @@ -1045,15 +1200,15 @@ static unsigned long check_mremap_params(unsigned long addr, * for DOS-emu "duplicate shm area" thing. But * a zero new-len is nonsensical. */ - if (!PAGE_ALIGN(new_len)) + if (!PAGE_ALIGN(vrm->new_len)) return -EINVAL; /* Remainder of checks are for cases with specific new_addr. */ - if (!implies_new_addr(flags)) + if (!vrm_implies_new_addr(vrm)) return 0; /* The new address must be page-aligned. */ - if (offset_in_page(new_addr)) + if (offset_in_page(vrm->new_addr)) return -EINVAL; /* A fixed address implies a move. */ @@ -1061,7 +1216,7 @@ static unsigned long check_mremap_params(unsigned long addr, return -EINVAL; /* MREMAP_DONTUNMAP does not allow resizing in the process. */ - if (flags & MREMAP_DONTUNMAP && old_len != new_len) + if (flags & MREMAP_DONTUNMAP && vrm->old_len != vrm->new_len) return -EINVAL; /* @@ -1090,11 +1245,11 @@ static unsigned long check_mremap_params(unsigned long addr, * If we discover the VMA is locked, update mm_struct statistics accordingly and * indicate so to the caller. */ -static unsigned long expand_vma_inplace(struct vm_area_struct *vma, - unsigned long delta, bool *locked) +static unsigned long expand_vma_in_place(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; - long pages = delta >> PAGE_SHIFT; + long pages = vrm->delta >> PAGE_SHIFT; + struct vm_area_struct *vma = vrm->vma; VMA_ITERATOR(vmi, mm, vma->vm_end); long charged = 0; @@ -1114,7 +1269,7 @@ static unsigned long expand_vma_inplace(struct vm_area_struct *vma, * adjacent to the expanded vma and otherwise * compatible. */ - vma = vma_merge_extend(&vmi, vma, delta); + vma = vrm->vma = vma_merge_extend(&vmi, vma, vrm->delta); if (!vma) { vm_unacct_memory(charged); return -ENOMEM; @@ -1123,42 +1278,34 @@ static unsigned long expand_vma_inplace(struct vm_area_struct *vma, vm_stat_account(mm, vma->vm_flags, pages); if (vma->vm_flags & VM_LOCKED) { mm->locked_vm += pages; - *locked = true; + vrm->mlocked = true; } return 0; } -static bool align_hugetlb(struct vm_area_struct *vma, - unsigned long addr, - unsigned long new_addr, - unsigned long *old_len_ptr, - unsigned long *new_len_ptr, - unsigned long *delta_ptr) +static bool align_hugetlb(struct vma_remap_struct *vrm) { - unsigned long old_len = *old_len_ptr; - unsigned long new_len = *new_len_ptr; - struct hstate *h __maybe_unused = hstate_vma(vma); + struct hstate *h __maybe_unused = hstate_vma(vrm->vma); - old_len = ALIGN(old_len, huge_page_size(h)); - new_len = ALIGN(new_len, huge_page_size(h)); + vrm->old_len = ALIGN(vrm->old_len, huge_page_size(h)); + vrm->new_len = ALIGN(vrm->new_len, huge_page_size(h)); /* addrs must be huge page aligned */ - if (addr & ~huge_page_mask(h)) + if (vrm->addr & ~huge_page_mask(h)) return false; - if (new_addr & ~huge_page_mask(h)) + if (vrm->new_addr & ~huge_page_mask(h)) return false; /* * Don't allow remap expansion, because the underlying hugetlb * reservation is not yet capable to handle split reservation. */ - if (new_len > old_len) + if (vrm->new_len > vrm->old_len) return false; - *old_len_ptr = old_len; - *new_len_ptr = new_len; - *delta_ptr = abs_diff(old_len, new_len); + vrm_set_delta(vrm); + return true; } @@ -1169,19 +1316,16 @@ static bool align_hugetlb(struct vm_area_struct *vma, * Try to do so in-place, if this fails, then move the VMA to a new location to * action the change. */ -static unsigned long expand_vma(struct vm_area_struct *vma, - unsigned long addr, unsigned long old_len, - unsigned long new_len, unsigned long flags, - bool *locked_ptr, unsigned long *new_addr_ptr, - struct vm_userfaultfd_ctx *uf_ptr, - struct list_head *uf_unmap_ptr) +static unsigned long expand_vma(struct vma_remap_struct *vrm) { unsigned long err; - unsigned long map_flags; - unsigned long new_addr; /* We ignore any user-supplied one. */ - pgoff_t pgoff; + struct vm_area_struct *vma = vrm->vma; + unsigned long addr = vrm->addr; + unsigned long old_len = vrm->old_len; + unsigned long new_len = vrm->new_len; + unsigned long flags = vrm->flags; - err = resize_is_valid(vma, addr, old_len, new_len, flags); + err = resize_is_valid(vrm); if (err) return err; @@ -1189,10 +1333,9 @@ static unsigned long expand_vma(struct vm_area_struct *vma, * [addr, old_len) spans precisely to the end of the VMA, so try to * expand it in-place. */ - if (old_len == vma->vm_end - addr && - vma_expandable(vma, new_len - old_len)) { - err = expand_vma_inplace(vma, new_len - old_len, locked_ptr); - if (IS_ERR_VALUE(err)) + if (vrm_can_expand_in_place(vrm)) { + err = expand_vma_in_place(vrm); + if (err) return err; /* @@ -1200,8 +1343,8 @@ static unsigned long expand_vma(struct vm_area_struct *vma, * satisfy the expectation that mlock()'ing a VMA maintains all * of its pages in memory. */ - if (*locked_ptr) - *new_addr_ptr = addr; + if (vrm->mlocked) + vrm->new_addr = addr; /* OK we're done! */ return addr; @@ -1217,62 +1360,67 @@ static unsigned long expand_vma(struct vm_area_struct *vma, return -ENOMEM; /* Find a new location to move the VMA to. */ - map_flags = (vma->vm_flags & VM_MAYSHARE) ? MAP_SHARED : 0; - pgoff = vma->vm_pgoff + ((addr - vma->vm_start) >> PAGE_SHIFT); - new_addr = get_unmapped_area(vma->vm_file, 0, new_len, pgoff, map_flags); - if (IS_ERR_VALUE(new_addr)) - return new_addr; - *new_addr_ptr = new_addr; + err = vrm_set_new_addr(vrm); + if (err) + return err; - return move_vma(vma, addr, old_len, new_len, new_addr, - locked_ptr, flags, uf_ptr, uf_unmap_ptr); + return move_vma(vma, addr, old_len, new_len, vrm->new_addr, + &vrm->mlocked, flags, vrm->uf, vrm->uf_unmap); } /* - * Expand (or shrink) an existing mapping, potentially moving it at the - * same time (controlled by the MREMAP_MAYMOVE flag and available VM space) - * - * MREMAP_FIXED option added 5-Dec-1999 by Benjamin LaHaise - * This option implies MREMAP_MAYMOVE. + * Attempt to resize the VMA in-place, if we cannot, then move the VMA to the + * first available address to perform the operation. */ -SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, - unsigned long, new_len, unsigned long, flags, - unsigned long, new_addr) +static unsigned long mremap_at(struct vma_remap_struct *vrm) +{ + unsigned long res; + + switch (vrm->remap_type) { + case MREMAP_INVALID: + break; + case MREMAP_NO_RESIZE: + /* NO-OP CASE - resizing to the same size. */ + return vrm->addr; + case MREMAP_SHRINK: + /* + * SHRINK CASE. Can always be done in-place. + * + * Simply unmap the shrunken portion of the VMA. This does all + * the needed commit accounting, and we indicate that the mmap + * lock should be dropped. + */ + res = shrink_vma(vrm, /* drop_lock= */true); + if (res) + return res; + + return vrm->addr; + case MREMAP_EXPAND: + return expand_vma(vrm); + } + + BUG(); +} + +static unsigned long do_mremap(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; struct vm_area_struct *vma; unsigned long ret; - unsigned long delta; - bool locked = false; - struct vm_userfaultfd_ctx uf = NULL_VM_UFFD_CTX; - LIST_HEAD(uf_unmap_early); - LIST_HEAD(uf_unmap); - - /* - * There is a deliberate asymmetry here: we strip the pointer tag - * from the old address but leave the new address alone. This is - * for consistency with mmap(), where we prevent the creation of - * aliasing mappings in userspace by leaving the tag bits of the - * mapping address intact. A non-zero tag will cause the subsequent - * range checks to reject the address as invalid. - * - * See Documentation/arch/arm64/tagged-address-abi.rst for more - * information. - */ - addr = untagged_addr(addr); - ret = check_mremap_params(addr, flags, old_len, new_len, new_addr); + ret = check_mremap_params(vrm); if (ret) return ret; - old_len = PAGE_ALIGN(old_len); - new_len = PAGE_ALIGN(new_len); - delta = abs_diff(old_len, new_len); + vrm->old_len = PAGE_ALIGN(vrm->old_len); + vrm->new_len = PAGE_ALIGN(vrm->new_len); + vrm_set_delta(vrm); if (mmap_write_lock_killable(mm)) return -EINTR; + vrm->mmap_locked = true; - vma = vma_lookup(mm, addr); + vma = vrm->vma = vma_lookup(mm, vrm->addr); if (!vma) { ret = -EFAULT; goto out; @@ -1285,62 +1433,70 @@ SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, } /* Align to hugetlb page size, if required. */ - if (is_vm_hugetlb_page(vma) && - !align_hugetlb(vma, addr, new_addr, &old_len, &new_len, &delta)) { + if (is_vm_hugetlb_page(vma) && !align_hugetlb(vrm)) { ret = -EINVAL; goto out; } - /* Are we RELOCATING the VMA to a SPECIFIC address? */ - if (implies_new_addr(flags)) { - ret = mremap_to(addr, old_len, new_addr, new_len, - &locked, flags, &uf, &uf_unmap_early, - &uf_unmap); - goto out; - } - - /* - * From here on in we are only RESIZING the VMA, attempting to do so - * in-place, moving the VMA if we cannot. - */ + vrm->remap_type = vrm_remap_type(vrm); - /* NO-OP CASE - resizing to the same size. */ - if (new_len == old_len) { - ret = addr; - goto out; - } + /* Actually execute mremap. */ + ret = vrm_implies_new_addr(vrm) ? mremap_to(vrm) : mremap_at(vrm); - /* SHRINK CASE. Can always be done in-place. */ - if (new_len < old_len) { - VMA_ITERATOR(vmi, mm, addr + new_len); +out: + if (vrm->mmap_locked) { + mmap_write_unlock(mm); + vrm->mmap_locked = false; - /* - * Simply unmap the shrunken portion of the VMA. This does all - * the needed commit accounting, unlocking the mmap lock. - */ - ret = do_vmi_munmap(&vmi, mm, addr + new_len, delta, - &uf_unmap, true); - if (ret) - goto out; - - /* We succeeded, mmap lock released for us. */ - ret = addr; - goto out_unlocked; + if (!offset_in_page(ret) && vrm->mlocked && vrm->new_len > vrm->old_len) + mm_populate(vrm->new_addr + vrm->old_len, vrm->delta); } - /* EXPAND case. We try to do in-place, if we can't, then we move it. */ - ret = expand_vma(vma, addr, old_len, new_len, flags, &locked, &new_addr, - &uf, &uf_unmap); + userfaultfd_unmap_complete(mm, vrm->uf_unmap_early); + mremap_userfaultfd_complete(vrm->uf, vrm->addr, ret, vrm->old_len); + userfaultfd_unmap_complete(mm, vrm->uf_unmap); -out: - if (offset_in_page(ret)) - locked = false; - mmap_write_unlock(mm); - if (locked && new_len > old_len) - mm_populate(new_addr + old_len, delta); -out_unlocked: - userfaultfd_unmap_complete(mm, &uf_unmap_early); - mremap_userfaultfd_complete(&uf, addr, ret, old_len); - userfaultfd_unmap_complete(mm, &uf_unmap); return ret; } + +/* + * Expand (or shrink) an existing mapping, potentially moving it at the + * same time (controlled by the MREMAP_MAYMOVE flag and available VM space) + * + * MREMAP_FIXED option added 5-Dec-1999 by Benjamin LaHaise + * This option implies MREMAP_MAYMOVE. + */ +SYSCALL_DEFINE5(mremap, unsigned long, addr, unsigned long, old_len, + unsigned long, new_len, unsigned long, flags, + unsigned long, new_addr) +{ + struct vm_userfaultfd_ctx uf = NULL_VM_UFFD_CTX; + LIST_HEAD(uf_unmap_early); + LIST_HEAD(uf_unmap); + /* + * There is a deliberate asymmetry here: we strip the pointer tag + * from the old address but leave the new address alone. This is + * for consistency with mmap(), where we prevent the creation of + * aliasing mappings in userspace by leaving the tag bits of the + * mapping address intact. A non-zero tag will cause the subsequent + * range checks to reject the address as invalid. + * + * See Documentation/arch/arm64/tagged-address-abi.rst for more + * information. + */ + struct vma_remap_struct vrm = { + .addr = untagged_addr(addr), + .old_len = old_len, + .new_len = new_len, + .flags = flags, + .new_addr = new_addr, + + .uf = &uf, + .uf_unmap_early = &uf_unmap_early, + .uf_unmap = &uf_unmap, + + .remap_type = MREMAP_INVALID, /* We set later. */ + }; + + return do_mremap(&vrm); +} From patchwork Mon Mar 10 20:50:37 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 14010664 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1DCAEC282DE for ; Mon, 10 Mar 2025 20:51:44 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id CF9CB280008; Mon, 10 Mar 2025 16:51:41 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id CA536280004; Mon, 10 Mar 2025 16:51:41 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id A84FA280008; Mon, 10 Mar 2025 16:51:41 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 8183A280004 for ; Mon, 10 Mar 2025 16:51:41 -0400 (EDT) Received: from smtpin26.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay09.hostedemail.com (Postfix) with ESMTP id C52A78150E for ; Mon, 10 Mar 2025 20:51:42 +0000 (UTC) X-FDA: 83206837644.26.DB2D540 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by imf29.hostedemail.com (Postfix) with ESMTP id C9D3D120009 for ; Mon, 10 Mar 2025 20:51:38 +0000 (UTC) Authentication-Results: imf29.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=NRjcTaTr; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=DXLdL6+0; spf=pass (imf29.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741639898; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=3IEXdrd+htUza/gi+AInBAhDpe7VVvHgfAnuFGhv4vc=; b=AlN9lJZ7uGax8U8jpbxH9QvUeiNS7ZlUIiKcaoU8zh8JV6CToDDZlrB0ZVSB8Jv38FGzIr FuAYOnl+mxzGSosu6QpoZJ4sfnYNr1Kh2ecYnZQglpBkuyAUsN+lkny5DAulc3/viX1Npm gjD6+5QczPjpXUSQY/l4aLzqx/M8MpM= ARC-Authentication-Results: i=2; imf29.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=NRjcTaTr; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=DXLdL6+0; spf=pass (imf29.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1") ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741639898; a=rsa-sha256; cv=pass; b=KzVsM/fUjJcENkMkee8W7I+kbLYZOxQYrVHbUxEgrhQWCWpT48pbnJrsadHEugj4ZTp2gV MK/X1gkkXqdym1nRG/W2shDAdh7guU7RZcf62x5FE5Y7PNBNM8aqbC08t23Q18IOXFBO50 owVluS4BBiRQKVadDkoSN9cmGtPXYJo= Received: from pps.filterd (m0246632.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJtwlY002661; Mon, 10 Mar 2025 20:51:35 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=3IEXdrd+htUza/gi+AInBAhDpe7VVvHgfAnuFGhv4vc=; b= NRjcTaTrCLMhvl9M8xNs3cpC94b5sHvqbWQL/yp45xnba6Tsh5FgETDFMTyUXEsm 0CDT5ViW8jpauD0v+ISzYaoqKfzDIyS248UBejGlOYTCOJsFFdtu3p4TXlr09nOk dQk+rAl46y3rtTJe6zgq5pUo7b1FCWg6ubnJnaIvWiPYMRs6DSHEniiLXq+l9Qx+ RWY1L9uTsSDbHKNroiEJW2uxJV4dWOsBOJ1gHO90zmg6dq1bc5tQjWgda8YSHG7P aU5gbqLFRsJ7dSKspDb+dQ9BBN6I4qq+fR9B1T9JyPrNcc4L5CopCQAaVYNyJzq7 ZuCg29P9UASb8VSb0TPgdQ== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 458dgt3gff-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:35 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJupWj021906; Mon, 10 Mar 2025 20:51:34 GMT Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2174.outbound.protection.outlook.com [104.47.56.174]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 458wmnm5gu-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:34 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=LjbBmK8h/sPUftQg2RG5L/OgZXleEnEfO1ITW4P5a9EJKiX2TqGf80Aaw4+UbpqNPsFwUFF0iVogZKkG932MG54YA592ufIYpyiLSkcYVDZCf9gyw/Yck054vlnmO5VLRIiPvwZAZonLXzQq2XZXWuVp3rpsd15BtcaWoQpByFsQ643sXhbZIHUFT0zDLBojJA54eXkjdSqT+erIs25LQZwKH7I6o9vAJCiqK2GqRiHef0wHmYWJf0pIUJqzUeTnmTyiuvkEOxPuANj/om9MZUWuGm53S4kwBzi1ya8lhr3gKaTlu9lDGBS1KavLv2nA+VWNL2gf8XJ/MsxpXrGcQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3IEXdrd+htUza/gi+AInBAhDpe7VVvHgfAnuFGhv4vc=; b=gcqTElkCW1+SQXqvDJzRdQbGJj0mQZdEVJD6BpcHTAsTtA5okUT6qvyRjACKLMmDLLG4H/a8y0DJeXw/BSCUk8cLhPEmCdURWuqPMYH+f2CS+FuDsJzcLmMEFCzcg798U4isFC0gRfvI2xIGqwLRWhObJvIgw3v0r1Ou/qKHctYObcNWv9CuSikgGnNXotT6ldcfm2pXz+GviQDLvSYPo7I5bxR7l9tZCjqEyhL/oxYOQ9ZAbhrh9ro+KBrAsaOGdb2dPGGNT/HY7yQJQLzRNjwvZI5x/xmk/XEzIE3+l9eOUbIyknkXSSDuRc0ABrDHbjybWV+KXLszbJ/nfeyHqw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3IEXdrd+htUza/gi+AInBAhDpe7VVvHgfAnuFGhv4vc=; b=DXLdL6+09+nyRFAu1rHTyW614sg47hXkM6u+wwFH6lDVq05nFLYJn5pMyZoLyyCLfnkFsOUJGLY3DebnXi/LBgdYZJi/++Iu/CzF5I06vBT11Z9M39isFTFv+sQnS8hZsQPQnieSdahttE9qJOa/1RV5JiJeaUab3NpNGduC9WQ= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DS7PR10MB7250.namprd10.prod.outlook.com (2603:10b6:8:e0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8511.27; Mon, 10 Mar 2025 20:51:32 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 10 Mar 2025 20:51:31 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Harry Yoo , Yosry Ahmed , Oliver Sang Subject: [PATCH v3 4/7] mm/mremap: initial refactor of move_vma() Date: Mon, 10 Mar 2025 20:50:37 +0000 Message-ID: X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P123CA0463.GBRP123.PROD.OUTLOOK.COM (2603:10a6:600:1aa::18) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DS7PR10MB7250:EE_ X-MS-Office365-Filtering-Correlation-Id: 9e883ffb-cf55-44b7-e703-08dd60155669 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|366016; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: mbvSt9Xd29FalN4RkvoVf9jbzN5wZ8N5iQSx6r6XW9q8Q5pAeUJj9hJDHV39mo7THO6s/sdvL5skMjAJsfudLOVjbOFU43RFf+pukUD019glX4yAC9ckBlVhoTBDqqDTjfOA5mwznibXvcAsPDzFXAMOzDkdvDk+uF8e+6xQaa5cPY7Ekk4lN5k0ctvwHHBNu+DRVJjbrmpJB0m9p2MuENu1CkQUdDsNJ7rHcxliKyaFzOrM+HMu8G1OtXKFtRzgkz+uZs5bzYNHpEligoIebTcklAvC0COXQP4TavKW7IzferkQeMpKEoN/Y4XLAnPgcaMDy43MxsXTwQKGA55jNN5W7gHZIdQGWpNaCYA/jHJiT6FxG0dkOLWykXtU6mx9K1fkrEWB76EJ6XQThOfWqEdoUud+syn1kpkSIe2oUFNueN12WdY151netoz97aRwEFM92yrA/mW5CwYupPRjVBPyW0f/N2SXtOxzbCLYauweFB+c39/qJ6Ai9NI/OJI4kQM/L2sGvIyZJYX0R/0PGJrPOsfpYGiOL4sgqfa2zP9bL56S0eCz8N7+blw942lw/oN0EFMOdey86tpumsvpMi6t4LgDpZ2fkvNVsly5OXs= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9e883ffb-cf55-44b7-e703-08dd60155669 X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2025 20:51:31.9076 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: dmXiPmuh6adUxMRH02U1UHvZv6Y48TANT/wfjj3InLKE3ydNt0Z0FJY8sm6z0OEKUuLHUFd1i/5uQTKxJElz7yhbNI7GqT5SPt5q4BMCelM= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB7250 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-10_08,2025-03-07_03,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 spamscore=0 adultscore=0 malwarescore=0 phishscore=0 mlxlogscore=999 bulkscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503100159 X-Proofpoint-GUID: IHmFU78Knw3zo7l0vE2w-Dmc8cjUIbGO X-Proofpoint-ORIG-GUID: IHmFU78Knw3zo7l0vE2w-Dmc8cjUIbGO X-Rspamd-Server: rspam07 X-Rspamd-Queue-Id: C9D3D120009 X-Stat-Signature: kxmhgexn6t7inkcph8dqpmkfd4dmkzis X-Rspam-User: X-HE-Tag: 1741639898-273390 X-HE-Meta: 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 rJrjMR9g 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Update move_vma() to use the threaded VRM object, de-duplicate code and separate into smaller functions to aid readability and debug-ability. This in turn allows further simplification of expand_vma() as we can simply thread VRM through the function. We also take the opportunity to abstract the account charging page count into the VRM in order that we can correctly thread this through the operation. We additionally do the same for tracking mm statistics - exec_vm, stack_vm, data_vm, and locked_vm. As part of this change, we slightly modify when locked pages statistics are counted for in mm_struct statistics. However this should cause no issues, as there is no chance of underflow, nor will any rlimit failures occur as a result. This is an intermediate step before a further refactoring of move_vma() in order to aid review. Signed-off-by: Lorenzo Stoakes Reviewed-by: Liam R. Howlett Reviewed-by: Vlastimil Babka --- mm/mremap.c | 186 ++++++++++++++++++++++++++++++++++------------------ 1 file changed, 122 insertions(+), 64 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index af022e3b89e2..6305cb9a86f6 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -68,6 +68,7 @@ struct vma_remap_struct { bool mlocked; /* Was the VMA mlock()'d? */ enum mremap_type remap_type; /* expand, shrink, etc. */ bool mmap_locked; /* Is mm currently write-locked? */ + unsigned long charged; /* If VM_ACCOUNT, # pages to account. */ }; static pud_t *get_old_pud(struct mm_struct *mm, unsigned long addr) @@ -816,35 +817,88 @@ static unsigned long vrm_set_new_addr(struct vma_remap_struct *vrm) return 0; } -static unsigned long move_vma(struct vm_area_struct *vma, - unsigned long old_addr, unsigned long old_len, - unsigned long new_len, unsigned long new_addr, - bool *mlocked, unsigned long flags, - struct vm_userfaultfd_ctx *uf, struct list_head *uf_unmap) +/* + * Keep track of pages which have been added to the memory mapping. If the VMA + * is accounted, also check to see if there is sufficient memory. + * + * Returns true on success, false if insufficient memory to charge. + */ +static bool vrm_charge(struct vma_remap_struct *vrm) { - long to_account = new_len - old_len; - struct mm_struct *mm = vma->vm_mm; - struct vm_area_struct *new_vma; - unsigned long vm_flags = vma->vm_flags; - unsigned long new_pgoff; - unsigned long moved_len; - bool account_start = false; - bool account_end = false; - unsigned long hiwater_vm; - int err = 0; - bool need_rmap_locks; - struct vma_iterator vmi; + unsigned long charged; + + if (!(vrm->vma->vm_flags & VM_ACCOUNT)) + return true; + + /* + * If we don't unmap the old mapping, then we account the entirety of + * the length of the new one. Otherwise it's just the delta in size. + */ + if (vrm->flags & MREMAP_DONTUNMAP) + charged = vrm->new_len >> PAGE_SHIFT; + else + charged = vrm->delta >> PAGE_SHIFT; + + + /* This accounts 'charged' pages of memory. */ + if (security_vm_enough_memory_mm(current->mm, charged)) + return false; + + vrm->charged = charged; + return true; +} + +/* + * an error has occurred so we will not be using vrm->charged memory. Unaccount + * this memory if the VMA is accounted. + */ +static void vrm_uncharge(struct vma_remap_struct *vrm) +{ + if (!(vrm->vma->vm_flags & VM_ACCOUNT)) + return; + + vm_unacct_memory(vrm->charged); + vrm->charged = 0; +} + +/* + * Update mm exec_vm, stack_vm, data_vm, and locked_vm fields as needed to + * account for 'bytes' memory used, and if locked, indicate this in the VRM so + * we can handle this correctly later. + */ +static void vrm_stat_account(struct vma_remap_struct *vrm, + unsigned long bytes) +{ + unsigned long pages = bytes >> PAGE_SHIFT; + struct mm_struct *mm = current->mm; + struct vm_area_struct *vma = vrm->vma; + + vm_stat_account(mm, vma->vm_flags, pages); + if (vma->vm_flags & VM_LOCKED) { + mm->locked_vm += pages; + vrm->mlocked = true; + } +} + +/* + * Perform checks before attempting to write a VMA prior to it being + * moved. + */ +static unsigned long prep_move_vma(struct vma_remap_struct *vrm, + unsigned long *vm_flags_ptr) +{ + unsigned long err = 0; + struct vm_area_struct *vma = vrm->vma; + unsigned long old_addr = vrm->addr; + unsigned long old_len = vrm->old_len; /* * We'd prefer to avoid failure later on in do_munmap: * which may split one vma into three before unmapping. */ - if (mm->map_count >= sysctl_max_map_count - 3) + if (current->mm->map_count >= sysctl_max_map_count - 3) return -ENOMEM; - if (unlikely(flags & MREMAP_DONTUNMAP)) - to_account = new_len; - if (vma->vm_ops && vma->vm_ops->may_split) { if (vma->vm_start != old_addr) err = vma->vm_ops->may_split(vma, old_addr); @@ -862,22 +916,46 @@ static unsigned long move_vma(struct vm_area_struct *vma, * so KSM can come around to merge on vma and new_vma afterwards. */ err = ksm_madvise(vma, old_addr, old_addr + old_len, - MADV_UNMERGEABLE, &vm_flags); + MADV_UNMERGEABLE, vm_flags_ptr); if (err) return err; - if (vm_flags & VM_ACCOUNT) { - if (security_vm_enough_memory_mm(mm, to_account >> PAGE_SHIFT)) - return -ENOMEM; - } + return 0; +} + +static unsigned long move_vma(struct vma_remap_struct *vrm) +{ + struct mm_struct *mm = current->mm; + struct vm_area_struct *vma = vrm->vma; + struct vm_area_struct *new_vma; + unsigned long vm_flags = vma->vm_flags; + unsigned long old_addr = vrm->addr, new_addr = vrm->new_addr; + unsigned long old_len = vrm->old_len, new_len = vrm->new_len; + unsigned long new_pgoff; + unsigned long moved_len; + unsigned long account_start = false; + unsigned long account_end = false; + unsigned long hiwater_vm; + int err; + bool need_rmap_locks; + struct vma_iterator vmi; + + err = prep_move_vma(vrm, &vm_flags); + if (err) + return err; + + /* If accounted, charge the number of bytes the operation will use. */ + if (!vrm_charge(vrm)) + return -ENOMEM; vma_start_write(vma); new_pgoff = vma->vm_pgoff + ((old_addr - vma->vm_start) >> PAGE_SHIFT); - new_vma = copy_vma(&vma, new_addr, new_len, new_pgoff, + new_vma = copy_vma(&vrm->vma, new_addr, new_len, new_pgoff, &need_rmap_locks); + /* This may have been updated. */ + vma = vrm->vma; if (!new_vma) { - if (vm_flags & VM_ACCOUNT) - vm_unacct_memory(to_account >> PAGE_SHIFT); + vrm_uncharge(vrm); return -ENOMEM; } @@ -902,7 +980,7 @@ static unsigned long move_vma(struct vm_area_struct *vma, old_addr = new_addr; new_addr = err; } else { - mremap_userfaultfd_prep(new_vma, uf); + mremap_userfaultfd_prep(new_vma, vrm->uf); } if (is_vm_hugetlb_page(vma)) { @@ -910,7 +988,7 @@ static unsigned long move_vma(struct vm_area_struct *vma, } /* Conceal VM_ACCOUNT so old reservation is not undone */ - if (vm_flags & VM_ACCOUNT && !(flags & MREMAP_DONTUNMAP)) { + if (vm_flags & VM_ACCOUNT && !(vrm->flags & MREMAP_DONTUNMAP)) { vm_flags_clear(vma, VM_ACCOUNT); if (vma->vm_start < old_addr) account_start = true; @@ -928,13 +1006,12 @@ static unsigned long move_vma(struct vm_area_struct *vma, * If this were a serious issue, we'd add a flag to do_munmap(). */ hiwater_vm = mm->hiwater_vm; - vm_stat_account(mm, vma->vm_flags, new_len >> PAGE_SHIFT); /* Tell pfnmap has moved from this vma */ if (unlikely(vma->vm_flags & VM_PFNMAP)) untrack_pfn_clear(vma); - if (unlikely(!err && (flags & MREMAP_DONTUNMAP))) { + if (unlikely(!err && (vrm->flags & MREMAP_DONTUNMAP))) { /* We always clear VM_LOCKED[ONFAULT] on the old vma */ vm_flags_clear(vma, VM_LOCKED_MASK); @@ -947,22 +1024,20 @@ static unsigned long move_vma(struct vm_area_struct *vma, unlink_anon_vmas(vma); /* Because we won't unmap we don't need to touch locked_vm */ + vrm_stat_account(vrm, new_len); return new_addr; } + vrm_stat_account(vrm, new_len); + vma_iter_init(&vmi, mm, old_addr); - if (do_vmi_munmap(&vmi, mm, old_addr, old_len, uf_unmap, false) < 0) { + if (do_vmi_munmap(&vmi, mm, old_addr, old_len, vrm->uf_unmap, false) < 0) { /* OOM: unable to split vma, just get accounts right */ - if (vm_flags & VM_ACCOUNT && !(flags & MREMAP_DONTUNMAP)) + if (vm_flags & VM_ACCOUNT && !(vrm->flags & MREMAP_DONTUNMAP)) vm_acct_memory(old_len >> PAGE_SHIFT); account_start = account_end = false; } - if (vm_flags & VM_LOCKED) { - mm->locked_vm += new_len >> PAGE_SHIFT; - *mlocked = true; - } - mm->hiwater_vm = hiwater_vm; /* Restore VM_ACCOUNT if one or two pieces of vma left */ @@ -1141,9 +1216,7 @@ static unsigned long mremap_to(struct vma_remap_struct *vrm) if (err) return err; - return move_vma(vrm->vma, vrm->addr, vrm->old_len, vrm->new_len, - vrm->new_addr, &vrm->mlocked, vrm->flags, - vrm->uf, vrm->uf_unmap); + return move_vma(vrm); } static int vma_expandable(struct vm_area_struct *vma, unsigned long delta) @@ -1248,17 +1321,11 @@ static unsigned long check_mremap_params(struct vma_remap_struct *vrm) static unsigned long expand_vma_in_place(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; - long pages = vrm->delta >> PAGE_SHIFT; struct vm_area_struct *vma = vrm->vma; VMA_ITERATOR(vmi, mm, vma->vm_end); - long charged = 0; - - if (vma->vm_flags & VM_ACCOUNT) { - if (security_vm_enough_memory_mm(mm, pages)) - return -ENOMEM; - charged = pages; - } + if (!vrm_charge(vrm)) + return -ENOMEM; /* * Function vma_merge_extend() is called on the @@ -1271,15 +1338,11 @@ static unsigned long expand_vma_in_place(struct vma_remap_struct *vrm) */ vma = vrm->vma = vma_merge_extend(&vmi, vma, vrm->delta); if (!vma) { - vm_unacct_memory(charged); + vrm_uncharge(vrm); return -ENOMEM; } - vm_stat_account(mm, vma->vm_flags, pages); - if (vma->vm_flags & VM_LOCKED) { - mm->locked_vm += pages; - vrm->mlocked = true; - } + vrm_stat_account(vrm, vrm->delta); return 0; } @@ -1319,11 +1382,7 @@ static bool align_hugetlb(struct vma_remap_struct *vrm) static unsigned long expand_vma(struct vma_remap_struct *vrm) { unsigned long err; - struct vm_area_struct *vma = vrm->vma; unsigned long addr = vrm->addr; - unsigned long old_len = vrm->old_len; - unsigned long new_len = vrm->new_len; - unsigned long flags = vrm->flags; err = resize_is_valid(vrm); if (err) @@ -1356,7 +1415,7 @@ static unsigned long expand_vma(struct vma_remap_struct *vrm) */ /* We're not allowed to move the VMA, so error out. */ - if (!(flags & MREMAP_MAYMOVE)) + if (!(vrm->flags & MREMAP_MAYMOVE)) return -ENOMEM; /* Find a new location to move the VMA to. */ @@ -1364,8 +1423,7 @@ static unsigned long expand_vma(struct vma_remap_struct *vrm) if (err) return err; - return move_vma(vma, addr, old_len, new_len, vrm->new_addr, - &vrm->mlocked, flags, vrm->uf, vrm->uf_unmap); + return move_vma(vrm); } /* From patchwork Mon Mar 10 20:50:38 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 14010665 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id C0A0BC28B30 for ; Mon, 10 Mar 2025 20:51:46 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 76DE028000A; Mon, 10 Mar 2025 16:51:43 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 6F4B6280004; Mon, 10 Mar 2025 16:51:43 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 45F4728000A; Mon, 10 Mar 2025 16:51:43 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 188D7280004 for ; Mon, 10 Mar 2025 16:51:43 -0400 (EDT) Received: from smtpin16.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id 721B9C1224 for ; Mon, 10 Mar 2025 20:51:44 +0000 (UTC) X-FDA: 83206837728.16.6458677 Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by imf26.hostedemail.com (Postfix) with ESMTP id E13E714000B for ; Mon, 10 Mar 2025 20:51:40 +0000 (UTC) Authentication-Results: imf26.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=JPG8LQpy; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=uh92e+t3; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf26.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741639901; a=rsa-sha256; cv=pass; b=pGhmukkqLMd12uVA/cBlmLFFMm/jvXGH117Yef2M2o0N3viTFIkJDtkP9KPe9LlyVUWqDt P86263ZOl8aslvAVijV7m+9BXdMPM3YgTXuYxAzUjotS2NJWx2i9HJDb2ncrQ/qSOtpp8Q 0S5FCKpDVWlytapt51sYvNI6etruZFk= ARC-Authentication-Results: i=2; imf26.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=JPG8LQpy; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=uh92e+t3; arc=pass ("microsoft.com:s=arcselector10001:i=1"); dmarc=pass (policy=reject) header.from=oracle.com; spf=pass (imf26.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.165.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741639901; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=kYvPH1xqsucyarxMcUO2+UA36cQxvVaeGgCKwzhQaf0=; b=3aPlZiz6bKIO3BnheCpkRF0k+wIitHiH8qTvvPlwb+o450kza7Xnsx+HPA9yrRWkFwI7J7 aFiHRyKCr/lK87ldA6msJxGsyB/TaSqHGXRpNPHdexGmPU9aldrP5FBClesmmi+qlNEf/O ZEs5wyDCYKMQhSQi9RN2wk7NdpSO9HM= Received: from pps.filterd (m0333521.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJtlPc023523; Mon, 10 Mar 2025 20:51:38 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=kYvPH1xqsucyarxMcUO2+UA36cQxvVaeGgCKwzhQaf0=; b= JPG8LQpyulAtBEODvzZ9K8fb4TMlpMOZE6jOV3A6h9YK1e5PYZd1eyUoyBWlxFWq grd6QqvPoj6ltdzKff+9uOP1miRKf0gJZG9T29EAFM017vsbQsLJYSOfBcLge7ZJ lSqc2zebe3XuHEgHLy0oSNQrYIjbTvRNDF5eJLlouucPaBUzMbQ4fiCI2KDevuhS LBdT3MqHWUeFOcfLm00r5pGjUaKCwn5nHnDr/8M+q+athXH69A8THyszVNnM5pYM zLTPsn6e9d7xsAeu27dCiN3bGWjv8U42eUk2sePWNVdtmczFX2CE6MwkfXCR/Fkn ExM2NCVeFi04Kf6BwmbHpQ== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 458ctb3m7a-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:37 +0000 (GMT) Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJmvP4030644; Mon, 10 Mar 2025 20:51:36 GMT Received: from nam11-dm6-obe.outbound.protection.outlook.com (mail-dm6nam11lp2169.outbound.protection.outlook.com [104.47.57.169]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 458gcmgcuc-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:36 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=inID2LYUTqQwsaTgjdGveTDKVfpkCkH0kzkI28kD3Pzqu8Mvhm+sHJ0Hbao8NmmBLvXkVCSXRTh41Q1btOJTHPAfJdW9SNEfRAagKW7tEZglcFtu9SKNaWBBf3dlTJQ4lhw3xNNnidJqzbBa0xrltQbu06gGmiuhoFNwzYptzDzP3EaCBz8zqM2U/gIw3OmtAZCgslXgEDLVL7WOgQdq/34HwlYIXC1FsKHMp3t+vZsMNUvZpsRt4vaBTkO00wFQjw2jI7nhA+0BLFHrKFcxQwHnU+tnOgxWjgPbVkpwy1t/w51jVOHSep4v6r3vq3bW01EiJjsF1zbWYfSlJrWLYA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kYvPH1xqsucyarxMcUO2+UA36cQxvVaeGgCKwzhQaf0=; b=koM6tBriC3P/GwCGFvh8cV2b0uH4msrZa5OkWltwANNpzzYNsgGUFVwjxAwCspm/cDbZ6FJPGwtC7sTVzVu7R27g2s3HHBNT9WdM8nITuetg0dsyGVutehmAJluh4ZlcDgh2zrp6Yjjta2w5JQ9MVLdIOKiu/I9//JcTN0tYUw4etFM4dp1dBJTuDppOeNTot5euXOnhkmS1UK48Yjxt1umEryvLhTvPHcppAGWNlOfDFn6IediaLftnEalZslvVEUc3+Oj89x9+KUjvcHCyDspkCH3o2aT62id6aBabUHz7U/0voW6ICdJ2uycNn/RT+f69Mpa+nLiv/p+jysyWNg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kYvPH1xqsucyarxMcUO2+UA36cQxvVaeGgCKwzhQaf0=; b=uh92e+t3g+mzJaQ64QRT5O5uNafRtNt7UK/sww6OepTWm7kwFmgoaTecURo3QMtydDXBRebqBiKYuSxT44Blt5QTCv0sBIxN6U8aU0fJGTxGas81fHr7fFw0uuE+tOMQJgwAOCDT5rR6jsEzYM+GLiWunHEpDv+ylMSzPT/BegM= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DS7PR10MB7250.namprd10.prod.outlook.com (2603:10b6:8:e0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8511.27; Mon, 10 Mar 2025 20:51:34 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 10 Mar 2025 20:51:34 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Harry Yoo , Yosry Ahmed , Oliver Sang Subject: [PATCH v3 5/7] mm/mremap: complete refactor of move_vma() Date: Mon, 10 Mar 2025 20:50:38 +0000 Message-ID: X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO2P265CA0432.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:a0::36) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DS7PR10MB7250:EE_ X-MS-Office365-Filtering-Correlation-Id: 0593843c-9e42-4989-cc7f-08dd6015579e X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|366016; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: 0593843c-9e42-4989-cc7f-08dd6015579e X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2025 20:51:33.9355 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 60/YD7pzpUdPk8ECfdJ7pueLkojXU2uiFC64QVfPUOeWQGQbxB1s98o5v6bKADI+LoPm+BhUHaMK4KtThb5mGAI803ATRoEpoXyX1GULByI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB7250 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-10_08,2025-03-07_03,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 spamscore=0 phishscore=0 adultscore=0 mlxscore=0 mlxlogscore=999 malwarescore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503100159 X-Proofpoint-GUID: hzCifiA9qfLwkauq-OUaxv_zvqcjJCAw X-Proofpoint-ORIG-GUID: hzCifiA9qfLwkauq-OUaxv_zvqcjJCAw X-Rspamd-Queue-Id: E13E714000B X-Rspamd-Server: rspam11 X-Stat-Signature: g5bnjqkbwywknsf5gz6hi4w8ad45ue9h X-Rspam-User: X-HE-Tag: 1741639900-372627 X-HE-Meta: U2FsdGVkX1+q8XzjX3BN4Qf3/Y0HLBws5QI7+VVzMXfdAaRGtxEgI16vmahIpsu4wHN4Lz96dFTb0Eqp6kHQ4RNwTdtB28tu0pvJK30agxwl5Hl0YqAaJSh0t+EULbSwj8jnvbfT4cHAQbsJyyWWo8q8PG+iYYVCTlHd+7rixrQECxbB2KBp0PzOPqwyP1NJjd2xf7Aupw5Naoz7ZGboNNm3uO3Ho2fvOrxJoTlbyytsaLUAj4ZufykM0IDlgx/HA9cXhZgfaVsyJBczRevrNm8Hn2VYz1HzHhgtMoHTFCcXBPFJ/4g8FpjrQ9IExxX9T7QJ8/6I+NklvEQ7sPlqHiqzK8yPOwS6g4l0l3a4BlmU6zqqrdd109L73V7aIFISefV55270Qw07WHXGmdG/Rvdp6kUnTI13BFPIWI7+I4anyDg603Xm68O2N4dbz4kwoq3HtWD5GhHnAIHv3+X9JaNIyQ9gJmS6jF1lm6IxnxB1AQT/6ot6sBTQ/POpRnUitomQdy40NOZtWRM0Ve7Q1nYtQS8wNOr7wTY5Np7+vmekJme4gaKdlKm4Rh4l1CAyC9P9R4PzM6HndM/MPNHFuYG0DKogcnTmAsVERyyQ9egIgpsAtYgIOmTOlBjMIjfId7+MshXJScnUlnYEjqJiNOWq/PHNmacBMAn7s5JF5rM2jsFXiefVgX0bm3DTaXZv0jw941Bgb1/ouRQQCgmGScJ+G7vCOUOpxOLnVM+XS0LNyVPpHUT70yfH8r2DXTM0mU2BMqaMtR4xpnyZcPCvnbJzHn16bWQrtVFnCHxUchRjO/9+QbvjW7pAvGx5PhEYT8ZDSG0bt1nmEtJmMTJP3x1JKDyrpg5MWBxbwmRx748ln5w/cmNHqZjXZSovizxncoGs4ASQpKtZp4tiAejdZ7NVB5StWV/wpLPXszzWjlvgdTKFEV4/hnCF76a/hIA7OfWu67qefuFPlxYIG/y DA3h4oGj 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: We invoke ksm_madvise() with an intentionally dummy flags field, so no need to pass around. Additionally, the code tries to be 'clever' with account_start, account_end, using these to both check that vma->vm_start != 0 and that we ought to account the newly split portion of VMA post-move, either before or after it. We need to do this because we intentionally removed VM_ACCOUNT on the VMA prior to unmapping, so we don't erroneously unaccount memory (we have already calculated the correct amount to account and accounted it, any subsequent subtraction will be incorrect). This patch significantly expands the comment (from 2002!) about 'concealing' the flag to make it abundantly clear what's going on, as well as adding and expanding a number of other comments also. We can remove account_start, account_end by instead tracking when we account (i.e. vma->vm_flags has the VM_ACCOUNT flag set, and this is not an MREMAP_DONTUNMAP operation), and figuring out when to reinstate the VM_ACCOUNT flag on prior/subsequent VMAs separately. We additionally break the function into logical pieces and attack the very confusing error handling logic (where, for instance, new_addr is set to err). After this change the code is considerably more readable and easy to manipulate. Signed-off-by: Lorenzo Stoakes Reviewed-by: Vlastimil Babka --- mm/mremap.c | 293 ++++++++++++++++++++++++++++++++++++---------------- 1 file changed, 204 insertions(+), 89 deletions(-) diff --git a/mm/mremap.c b/mm/mremap.c index 6305cb9a86f6..7dc058d5d5e2 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -884,13 +884,13 @@ static void vrm_stat_account(struct vma_remap_struct *vrm, * Perform checks before attempting to write a VMA prior to it being * moved. */ -static unsigned long prep_move_vma(struct vma_remap_struct *vrm, - unsigned long *vm_flags_ptr) +static unsigned long prep_move_vma(struct vma_remap_struct *vrm) { unsigned long err = 0; struct vm_area_struct *vma = vrm->vma; unsigned long old_addr = vrm->addr; unsigned long old_len = vrm->old_len; + unsigned long dummy = vma->vm_flags; /* * We'd prefer to avoid failure later on in do_munmap: @@ -916,56 +916,151 @@ static unsigned long prep_move_vma(struct vma_remap_struct *vrm, * so KSM can come around to merge on vma and new_vma afterwards. */ err = ksm_madvise(vma, old_addr, old_addr + old_len, - MADV_UNMERGEABLE, vm_flags_ptr); + MADV_UNMERGEABLE, &dummy); if (err) return err; return 0; } -static unsigned long move_vma(struct vma_remap_struct *vrm) +/* + * Unmap source VMA for VMA move, turning it from a copy to a move, being + * careful to ensure we do not underflow memory account while doing so if an + * accountable move. + * + * This is best effort, if we fail to unmap then we simply try to correct + * accounting and exit. + */ +static void unmap_source_vma(struct vma_remap_struct *vrm) { struct mm_struct *mm = current->mm; + unsigned long addr = vrm->addr; + unsigned long len = vrm->old_len; struct vm_area_struct *vma = vrm->vma; - struct vm_area_struct *new_vma; - unsigned long vm_flags = vma->vm_flags; - unsigned long old_addr = vrm->addr, new_addr = vrm->new_addr; - unsigned long old_len = vrm->old_len, new_len = vrm->new_len; - unsigned long new_pgoff; - unsigned long moved_len; - unsigned long account_start = false; - unsigned long account_end = false; - unsigned long hiwater_vm; + VMA_ITERATOR(vmi, mm, addr); int err; - bool need_rmap_locks; - struct vma_iterator vmi; + unsigned long vm_start; + unsigned long vm_end; + /* + * It might seem odd that we check for MREMAP_DONTUNMAP here, given this + * function implies that we unmap the original VMA, which seems + * contradictory. + * + * However, this occurs when this operation was attempted and an error + * arose, in which case we _do_ wish to unmap the _new_ VMA, which means + * we actually _do_ want it be unaccounted. + */ + bool accountable_move = (vma->vm_flags & VM_ACCOUNT) && + !(vrm->flags & MREMAP_DONTUNMAP); - err = prep_move_vma(vrm, &vm_flags); - if (err) - return err; + /* + * So we perform a trick here to prevent incorrect accounting. Any merge + * or new VMA allocation performed in copy_vma() does not adjust + * accounting, it is expected that callers handle this. + * + * And indeed we already have, accounting appropriately in the case of + * both in vrm_charge(). + * + * However, when we unmap the existing VMA (to effect the move), this + * code will, if the VMA has VM_ACCOUNT set, attempt to unaccount + * removed pages. + * + * To avoid this we temporarily clear this flag, reinstating on any + * portions of the original VMA that remain. + */ + if (accountable_move) { + vm_flags_clear(vma, VM_ACCOUNT); + /* We are about to split vma, so store the start/end. */ + vm_start = vma->vm_start; + vm_end = vma->vm_end; + } - /* If accounted, charge the number of bytes the operation will use. */ - if (!vrm_charge(vrm)) - return -ENOMEM; + err = do_vmi_munmap(&vmi, mm, addr, len, vrm->uf_unmap, /* unlock= */false); + vrm->vma = NULL; /* Invalidated. */ + if (err) { + /* OOM: unable to split vma, just get accounts right */ + vm_acct_memory(len >> PAGE_SHIFT); + return; + } - vma_start_write(vma); - new_pgoff = vma->vm_pgoff + ((old_addr - vma->vm_start) >> PAGE_SHIFT); - new_vma = copy_vma(&vrm->vma, new_addr, new_len, new_pgoff, + /* + * If we mremap() from a VMA like this: + * + * addr end + * | | + * v v + * |-------------| + * | | + * |-------------| + * + * Having cleared VM_ACCOUNT from the whole VMA, after we unmap above + * we'll end up with: + * + * addr end + * | | + * v v + * |---| |---| + * | A | | B | + * |---| |---| + * + * The VMI is still pointing at addr, so vma_prev() will give us A, and + * a subsequent or lone vma_next() will give as B. + * + * do_vmi_munmap() will have restored the VMI back to addr. + */ + if (accountable_move) { + unsigned long end = addr + len; + + if (vm_start < addr) { + struct vm_area_struct *prev = vma_prev(&vmi); + + vm_flags_set(prev, VM_ACCOUNT); /* Acquires VMA lock. */ + } + + if (vm_end > end) { + struct vm_area_struct *next = vma_next(&vmi); + + vm_flags_set(next, VM_ACCOUNT); /* Acquires VMA lock. */ + } + } +} + +/* + * Copy vrm->vma over to vrm->new_addr possibly adjusting size as part of the + * process. Additionally handle an error occurring on moving of page tables, + * where we reset vrm state to cause unmapping of the new VMA. + * + * Outputs the newly installed VMA to new_vma_ptr. Returns 0 on success or an + * error code. + */ +static int copy_vma_and_data(struct vma_remap_struct *vrm, + struct vm_area_struct **new_vma_ptr) +{ + unsigned long internal_offset = vrm->addr - vrm->vma->vm_start; + unsigned long internal_pgoff = internal_offset >> PAGE_SHIFT; + unsigned long new_pgoff = vrm->vma->vm_pgoff + internal_pgoff; + unsigned long moved_len; + bool need_rmap_locks; + struct vm_area_struct *vma; + struct vm_area_struct *new_vma; + int err = 0; + + new_vma = copy_vma(&vrm->vma, vrm->new_addr, vrm->new_len, new_pgoff, &need_rmap_locks); - /* This may have been updated. */ - vma = vrm->vma; if (!new_vma) { vrm_uncharge(vrm); + *new_vma_ptr = NULL; return -ENOMEM; } + vma = vrm->vma; - moved_len = move_page_tables(vma, old_addr, new_vma, new_addr, old_len, - need_rmap_locks, false); - if (moved_len < old_len) { + moved_len = move_page_tables(vma, vrm->addr, new_vma, + vrm->new_addr, vrm->old_len, + need_rmap_locks, /* for_stack= */false); + if (moved_len < vrm->old_len) err = -ENOMEM; - } else if (vma->vm_ops && vma->vm_ops->mremap) { + else if (vma->vm_ops && vma->vm_ops->mremap) err = vma->vm_ops->mremap(new_vma); - } if (unlikely(err)) { /* @@ -973,28 +1068,84 @@ static unsigned long move_vma(struct vma_remap_struct *vrm) * which will succeed since page tables still there, * and then proceed to unmap new area instead of old. */ - move_page_tables(new_vma, new_addr, vma, old_addr, moved_len, - true, false); - vma = new_vma; - old_len = new_len; - old_addr = new_addr; - new_addr = err; + move_page_tables(new_vma, vrm->new_addr, vma, vrm->addr, + moved_len, /* need_rmap_locks = */true, + /* for_stack= */false); + vrm->vma = new_vma; + vrm->old_len = vrm->new_len; + vrm->addr = vrm->new_addr; } else { mremap_userfaultfd_prep(new_vma, vrm->uf); } - if (is_vm_hugetlb_page(vma)) { + if (is_vm_hugetlb_page(vma)) clear_vma_resv_huge_pages(vma); - } - /* Conceal VM_ACCOUNT so old reservation is not undone */ - if (vm_flags & VM_ACCOUNT && !(vrm->flags & MREMAP_DONTUNMAP)) { - vm_flags_clear(vma, VM_ACCOUNT); - if (vma->vm_start < old_addr) - account_start = true; - if (vma->vm_end > old_addr + old_len) - account_end = true; - } + /* Tell pfnmap has moved from this vma */ + if (unlikely(vma->vm_flags & VM_PFNMAP)) + untrack_pfn_clear(vma); + + *new_vma_ptr = new_vma; + return err; +} + +/* + * Perform final tasks for MADV_DONTUNMAP operation, clearing mlock() and + * account flags on remaining VMA by convention (it cannot be mlock()'d any + * longer, as pages in range are no longer mapped), and removing anon_vma_chain + * links from it (if the entire VMA was copied over). + */ +static void dontunmap_complete(struct vma_remap_struct *vrm, + struct vm_area_struct *new_vma) +{ + unsigned long start = vrm->addr; + unsigned long end = vrm->addr + vrm->old_len; + unsigned long old_start = vrm->vma->vm_start; + unsigned long old_end = vrm->vma->vm_end; + + /* + * We always clear VM_LOCKED[ONFAULT] | VM_ACCOUNT on the old + * vma. + */ + vm_flags_clear(vrm->vma, VM_LOCKED_MASK | VM_ACCOUNT); + + /* + * anon_vma links of the old vma is no longer needed after its page + * table has been moved. + */ + if (new_vma != vrm->vma && start == old_start && end == old_end) + unlink_anon_vmas(vrm->vma); + + /* Because we won't unmap we don't need to touch locked_vm. */ +} + +static unsigned long move_vma(struct vma_remap_struct *vrm) +{ + struct mm_struct *mm = current->mm; + struct vm_area_struct *new_vma; + unsigned long hiwater_vm; + int err; + + err = prep_move_vma(vrm); + if (err) + return err; + + /* If accounted, charge the number of bytes the operation will use. */ + if (!vrm_charge(vrm)) + return -ENOMEM; + + /* We don't want racing faults. */ + vma_start_write(vrm->vma); + + /* Perform copy step. */ + err = copy_vma_and_data(vrm, &new_vma); + /* + * If we established the copied-to VMA, we attempt to recover from the + * error by setting the destination VMA to the source VMA and unmapping + * it below. + */ + if (err && !new_vma) + return err; /* * If we failed to move page tables we still do total_vm increment @@ -1007,51 +1158,15 @@ static unsigned long move_vma(struct vma_remap_struct *vrm) */ hiwater_vm = mm->hiwater_vm; - /* Tell pfnmap has moved from this vma */ - if (unlikely(vma->vm_flags & VM_PFNMAP)) - untrack_pfn_clear(vma); - - if (unlikely(!err && (vrm->flags & MREMAP_DONTUNMAP))) { - /* We always clear VM_LOCKED[ONFAULT] on the old vma */ - vm_flags_clear(vma, VM_LOCKED_MASK); - - /* - * anon_vma links of the old vma is no longer needed after its page - * table has been moved. - */ - if (new_vma != vma && vma->vm_start == old_addr && - vma->vm_end == (old_addr + old_len)) - unlink_anon_vmas(vma); - - /* Because we won't unmap we don't need to touch locked_vm */ - vrm_stat_account(vrm, new_len); - return new_addr; - } - - vrm_stat_account(vrm, new_len); - - vma_iter_init(&vmi, mm, old_addr); - if (do_vmi_munmap(&vmi, mm, old_addr, old_len, vrm->uf_unmap, false) < 0) { - /* OOM: unable to split vma, just get accounts right */ - if (vm_flags & VM_ACCOUNT && !(vrm->flags & MREMAP_DONTUNMAP)) - vm_acct_memory(old_len >> PAGE_SHIFT); - account_start = account_end = false; - } + vrm_stat_account(vrm, vrm->new_len); + if (unlikely(!err && (vrm->flags & MREMAP_DONTUNMAP))) + dontunmap_complete(vrm, new_vma); + else + unmap_source_vma(vrm); mm->hiwater_vm = hiwater_vm; - /* Restore VM_ACCOUNT if one or two pieces of vma left */ - if (account_start) { - vma = vma_prev(&vmi); - vm_flags_set(vma, VM_ACCOUNT); - } - - if (account_end) { - vma = vma_next(&vmi); - vm_flags_set(vma, VM_ACCOUNT); - } - - return new_addr; + return err ? (unsigned long)err : vrm->new_addr; } /* From patchwork Mon Mar 10 20:50:39 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 14010666 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 1787CC282DE for ; Mon, 10 Mar 2025 20:51:50 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 2F8E028000B; Mon, 10 Mar 2025 16:51:45 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 254E6280004; Mon, 10 Mar 2025 16:51:45 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id EDD6528000B; Mon, 10 Mar 2025 16:51:44 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id C840F280004 for ; Mon, 10 Mar 2025 16:51:44 -0400 (EDT) Received: from smtpin22.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay04.hostedemail.com (Postfix) with ESMTP id 4462F1A15A4 for ; Mon, 10 Mar 2025 20:51:46 +0000 (UTC) X-FDA: 83206837812.22.AFFF3C3 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by imf27.hostedemail.com (Postfix) with ESMTP id DC3434000C for ; Mon, 10 Mar 2025 20:51:42 +0000 (UTC) Authentication-Results: imf27.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=NclxpUOT; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=jm6CEn5+; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf27.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741639903; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=JPOo9icsVe9FPtrCOi5izqjFol1FmDVgMlGw/SXOrb8=; b=OMHFYdI5sfd/zxq4cIMkC4reZNO9RIBRNYvpwT5J87iOjJTl6V+fGCZjQhyq6YXj/Lk1ce 50tXRw1ARy2sS7jwKv+4cBQj6eTvaXoKXFCj/mOpnbjbs5zux4A5ZZ/FF3wZpaJI83GF50 lMuiqD7SqaC49699I9MUFr20WBKzZ5A= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741639903; a=rsa-sha256; cv=pass; b=2neTmJSOzwkJsAFZgF1RhwYJrYhLf6KjUTMWTE/pXCRaHrtg/Yb3N+cDburrMBE2VZ/+go 8w5w9ZJKl85K/Hvbnb78cX0hX4VOXq87zU8Jz8P6CXky8Yl17JjgM4jisYwwqt6Xu7OAwq DudOqxI2kjxcxtZpvjSdTZS2nOhgbYE= ARC-Authentication-Results: i=2; imf27.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=NclxpUOT; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=jm6CEn5+; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf27.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com Received: from pps.filterd (m0333520.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJthkk014325; Mon, 10 Mar 2025 20:51:40 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=JPOo9icsVe9FPtrCOi5izqjFol1FmDVgMlGw/SXOrb8=; b= NclxpUOTKpXuqbIYbkBMu3gI5dAIzbPBVfAf5bGoqMQXnHT81w/ghE7tH0R3+E/k t0PYig37Rk1ekFpe/6tBUSycJgmDmOcXW4NqiIK0rwDmS+jm75OFogFBMl/hT1Im iOTaOKZJIqf+4jz4WynH5dR5SdmYaxNOXZdYQmHbIfnQqQE05xjOelIxNQ7P+oNn K1lfY4gret0aoeCMxJnIbyLR+SIlsf8GyvLL12Zhx/2ydCMwI18CMrM7sTXyDcXS 5iSXKnYFhAYJSHYcaI2sGUow/XQ1/EjRuHzZhNwk7GZib0lxlB/F+z3V06wJaz7c LrAB2kFYYWv+TqUUvlbCSA== Received: from phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (phxpaimrmta01.appoci.oracle.com [138.1.114.2]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 458dxckj69-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:39 +0000 (GMT) Received: from pps.filterd (phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com [127.0.0.1]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 52AKPaFk030679; Mon, 10 Mar 2025 20:51:39 GMT Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2168.outbound.protection.outlook.com [104.47.56.168]) by phxpaimrmta01.imrmtpd1.prodappphxaev1.oraclevcn.com (PPS) with ESMTPS id 458gcmgcvx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:38 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=qBrgATb//mDbfKe2PRXIAM4xOS9m27P9vw70PxTdat/2rNl+wflQVKuy8QjJccnx0OR+sUbpxiWNIFl5ORdb/XZuHavZxSLKqM6j9dk1Ggva0oBgyhBJjNX7SkVNkAFA8PIornp/hFqBQWmYBzkkNZs4uiAXjmvH3w3KVRzmvmMKJ9QVEgz3fQhQlTJZRg1TrqgkaVcvV//+bz+moln9oSgQnKJ164qKVuNteYEz404UEB5+JZO1TIQzzG9FQzSicbmskMBCDYU2WNt7OZjfWVqPODiiQipgy+tuHjrK1/31gFeqtnDFkdsf88xIiyQG7f4qqq6ESNp6A7VbZyfw6g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JPOo9icsVe9FPtrCOi5izqjFol1FmDVgMlGw/SXOrb8=; b=a8ldGpRKDZ9ONaef1Yzh7n74v1pH93xZG/86OuokWiOAj63ZlSuPAnizn4FMpKxQMf+kqesMP+0CFUK9WK1zSXPFd2JQuI0d3/ET3rZrAU7p1Mu3PEeHQL+XWcyr9osTns/Trf4SMh7k9I3KQB7t+hkowJveFnIMW6lNYNsJX/04iIA96UiqoK2q7MgHMpOlCz+PoLnb+AFXk99TG8SJnnWJprxz0OLr6N1PPSZkR9MJPT1Z28lclMobg0IXYxWXVa36dPl2S406y8UgL38NnT5P5GfOcy+R1UwGiwDpQCO4sATMfMmLhTs8MvA7voSXwrWrbJ/4jUzJAB+YfEuFaQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JPOo9icsVe9FPtrCOi5izqjFol1FmDVgMlGw/SXOrb8=; b=jm6CEn5+Oj5/lkmRLcGYdGRXUYGNSQA8ZvVdXFUx+ed5sXL3RlnnOt4drdGErsA7GMhAzG6nb7cXt+DSmMGpwZnz6G815Xj+NUtItNMsr1RWObYghusAgdUQkR5tObA0+95HZZOczz59vBW5w2ulFqyhFx1nAR2Yso01mcmsR8U= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DS7PR10MB7250.namprd10.prod.outlook.com (2603:10b6:8:e0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8511.27; Mon, 10 Mar 2025 20:51:36 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 10 Mar 2025 20:51:36 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Harry Yoo , Yosry Ahmed , Oliver Sang Subject: [PATCH v3 6/7] mm/mremap: refactor move_page_tables(), abstracting state Date: Mon, 10 Mar 2025 20:50:39 +0000 Message-ID: X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: LO4P265CA0281.GBRP265.PROD.OUTLOOK.COM (2603:10a6:600:37a::13) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DS7PR10MB7250:EE_ X-MS-Office365-Filtering-Correlation-Id: b85fc2bd-f14b-4f90-88bf-08dd6015593f X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|366016; X-Microsoft-Antispam-Message-Info: YtNObvxi89U+OzjIld2qva33jH5751FhLBVU7rHcYRLga1r8pOVobV1JEcTNmj4qOUVmq0uxFSmbv/NRrgTFHfRUNamU2sEzSjeVKJZJy7riMQz1hQGYkuA66QMm8+WqxCJc6M7Hu3r8VBeQZpktPfPat+qAcMoUh4YeaiPanEKidTz1Ii3oh/XOQdaOPRV7X9bNgzZSDldLnxTrbShchwTOKS5CUqzguH+I4ngCguwqXKvI9xeYRIvNPt1h7r8BGU4c7+JM9Sk0g0CQgar8Fr6iOba/bBBRn+1f0086NQDQQxAqgvj7LwWnUiGw6z4eH88QBtmtObUT6idGGnIZmSi3PERpWR59qXPXStEozOZznx+zE/HptC6xle8VddQJvzFrn2bfLwJReMtJFlJmvu6a6BDEikirjWMC4TqpcLwpDbkpuOa9Lvz21ojzbklPGbquqxJAMF4aCCy3HN9Rk33SSGhWpgXEXTtFzBTvZ8hDGjpd0LU6nlHFjpMj33EE1gZRkP0Hzl6obJbHl2BAh9cyHDKtvbjOCNIzuAlH5AxgMkm21hbBzovcHRaSA3bvtAZ5j/RTcoc7bmYJEBawc5xad4EwDSl+8VuQfVDXfMbUbotkdeJfkPiN88lX1WSXyR2Mne+MwIId3TlHNh/71/1VKgbGiU74f2/LDYLf+r21ge/sRssN24RAu5+M6Vxqq5nNOS4IHE2QAc/0n3c3sXKc9aP7jCUm6JaB1UrclXKHSRITExbgK8dml5+n8DKmgEQljdAx9DAgVqcCpm7gxT+GFwkhRbeXZ+iUNhKIeArXsmRh/B7ERoHNSVKHbRQP4kanGhAimHyCdgv0KM3xwEXmQxBWdVs0s08OA/W6jhS5CDfN101fNqNI8CckxN8OkPhR6pBKrJUFX7rjyo18TN1kw5lC80MeATtTyoqFQSNdUbu8qZKCYtDgQjyI6VdMi6S0lB4m2f7YsrTnI2d0cifJpoA3P7VuDVQSpSbKKCkh0DlKa3zBkjd1csj9M1zTccsmfj8AmGN1TWupWtPRAUPLRguD3zd76iJO3y3YjsHJdOlbiD/Blltv06h6Tm66UM10qRiv8RT712SQSo33freVwTGEyNzXfX3bhb/tiSgOmgBc0wpIjbAMul2Sm6h1Va6LwIeCNpRw7xrPTPv7UlByL/7arbxdrxPz/CHikoF38lkM4PEXDo23spdMyQSl0YLHCuoszdEG7vplbLXymXPnhFGIJWSq4t3+vQi5N/v3JXzZNSouEHCE28xtKab1yoSkqOjcLKOuVsf145wJ4BcPpqCC/WmRblH5HxNIuGjvb9mhmloJMwiXmT5u7/drF0lTFzXWQw4LvNbBg74ng1RrR/llBhGZsdhBipF6pP7QhJpa5WVgkNkF0bGoinbS X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: 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 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: YdvB/qhuSe6EK+adjvnWtRClzNgVDzas43ZlziIDAhKT44HVfzgFlV9jKwVglUyi4DM/nqDv/Hy4fI6hpEShV2QDjZxLAhes/cZTdIMK8nuE47WpfKCPuSegV/7uRsaJMBjrRukiUM2IMn5iu1WP7WDP7HmLYme6So5yfq3pjTu7jEScs2nYHo/wiwHezU+lj+juUug/qRE6JDF0V5VepjVR8aQxX5EPWrHIc/Zl3l+t4Pn2GWz3C1UzKLMprj1MuD2Q0qMqVr7ubvZnVBN5dahOVEUyp4WwT36x2bLFh//6CejbHkzdO3kK2Fp2hAZ7i3ClZxemckcCUEByMKbzLikKZa4GzfuxrqEgs0rheQOmw8kwUU7HPiDs6y/ttA60OKUQWbTiZaOoV3H/4CRd4aRlj0im6WD1h2Xz+9Kfa1wg6u09ntzD5uEcx6rNVvoyfrZvIRkzGfUF6J6uh0nxwnvd32hCTvQkaWsAL/QUOPC8mtVy/vOI30pe9kXraNdtK0HQnLbFgfxHTvHF7axceW/0MsAg6IAT5A5lczsfd6n8qbIxN12KXJa4D37xUFtgoJvD/tuzhJ6jUDcnnWVojlY57t+2zjvJoBKAyvH3DAQ= X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: b85fc2bd-f14b-4f90-88bf-08dd6015593f X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2025 20:51:36.6216 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: naIrZXzpguM9t4qZaJbE4fe/8MC1mRK76v1SpXVN8H0UVkfhGaTcoYRSmQ86ZbMN2Cp9f1PIda2K6SlPNtUN9ZpKT938BSnXQ1gGlTgC5n8= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB7250 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-10_08,2025-03-07_03,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 bulkscore=0 spamscore=0 phishscore=0 adultscore=0 mlxscore=0 mlxlogscore=999 malwarescore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503100159 X-Proofpoint-ORIG-GUID: f_l22NFSamZdvVBI-lOHesr1BF3UVZLn X-Proofpoint-GUID: f_l22NFSamZdvVBI-lOHesr1BF3UVZLn X-Stat-Signature: di5ptb67if31e9o5aapttet4u4sa4gh7 X-Rspamd-Server: rspam05 X-Rspam-User: X-Rspamd-Queue-Id: DC3434000C X-HE-Tag: 1741639902-671387 X-HE-Meta: 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 nJgCiJLB DXXJ+6a9qyqa6cKXbMcXtPK7jd7LshzhhfauKQhRpNn3XHL8Up0tgYRbUm7lFXScT2tGNIR5m8aEWtgW0U4ynEyyWJWvNbLIbh7eUiQqxOko9LQZc65uO15IhF/8Z2I6TVqScArEzev1EqPPrEy+m1sFadIdI7gM4jKRit2Dqr80j6XwS4PultKS17tsODbN4JgAbR+yNTfLcefrZSNbvoBtpck2W/Tp4FvAukesMJkz4eNlrMyE4fuNRD09TV1t2vJrnBJHkzBATv8K3GKdzW6JeEilzVpoRta5dkbVTKchha2Lj0RyqTy6jW3MvvORNL0LVolmYUVHYLEA9qIo5fVkP51x+ElPGb0pSuAj2OXyjsq3LWDc3pIWUDo5znSzLsocgsRmtC14mYowMI4/yH2irInYBKDfYnK9LoVSg90IrlTE4ux1IojeKf0NQamL1TrtLvFB+dvpYF9JEcdGR2B+2id/HuwOONafNrDOS2+iPCzjOr0XV4KV0sfEs9DVhGEAiluSIvcgux7HoZqZEgR4BxvQ9MrxVXLI9d++FLMAJKcbUcRElWPoVerDwKDEKxivnxGgcxHFUcbbWASe6rmLjRAIDcujH0UOKeI2KeMzxgbLhnjD0uvmsRQGvAbB5gN7fL/8sw5vamW/+JRDYVMe8drfZxulLllaNcQQaqSkSVA4= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: A lot of state is threaded throughout the page table moving logic within the mremap code, including boolean values which control behaviour specifically in regard to whether rmap locks need be held over the operation and whether the VMA belongs to a temporary stack being moved by move_arg_pages() (and consequently, relocate_vma_down()). As we already transmit state throughout this operation, it is neater and more readable to maintain a small state object. We do so in the form of pagetable_move_control. In addition, this allows us to update parameters within the state as we manipulate things, for instance with regard to the page table realignment logic. In future I want to add additional functionality to the page table logic, so this is an additional motivation for making it easier to do so. This patch changes move_page_tables() to accept a pointer to a pagetable_move_control struct, and performs changes at this level only. Further page table logic will be updated in a subsequent patch. We additionally also take the opportunity to add significant comments describing the address realignment logic to make it abundantly clear what is going on in this code. Signed-off-by: Lorenzo Stoakes Reviewed-by: Vlastimil Babka --- mm/internal.h | 43 +++++++++++-- mm/mmap.c | 5 +- mm/mremap.c | 172 ++++++++++++++++++++++++++++++++++++-------------- 3 files changed, 168 insertions(+), 52 deletions(-) diff --git a/mm/internal.h b/mm/internal.h index b07550db2bfd..6c611ab8eee2 100644 --- a/mm/internal.h +++ b/mm/internal.h @@ -24,6 +24,44 @@ struct folio_batch; +/* + * Maintains state across a page table move. The operation assumes both source + * and destination VMAs already exist and are specified by the user. + * + * Partial moves are permitted, but the old and new ranges must both reside + * within a VMA. + * + * mmap lock must be held in write and VMA write locks must be held on any VMA + * that is visible. + * + * Use the PAGETABLE_MOVE() macro to initialise this struct. + * + * NOTE: The page table move is affected by reading from [old_addr, old_end), + * and old_addr may be updated for better page table alignment, so len_in + * represents the length of the range being copied as specified by the user. + */ +struct pagetable_move_control { + struct vm_area_struct *old; /* Source VMA. */ + struct vm_area_struct *new; /* Destination VMA. */ + unsigned long old_addr; /* Address from which the move begins. */ + unsigned long old_end; /* Exclusive address at which old range ends. */ + unsigned long new_addr; /* Address to move page tables to. */ + unsigned long len_in; /* Bytes to remap specified by user. */ + + bool need_rmap_locks; /* Do rmap locks need to be taken? */ + bool for_stack; /* Is this an early temp stack being moved? */ +}; + +#define PAGETABLE_MOVE(name, old_, new_, old_addr_, new_addr_, len_) \ + struct pagetable_move_control name = { \ + .old = old_, \ + .new = new_, \ + .old_addr = old_addr_, \ + .old_end = (old_addr_) + (len_), \ + .new_addr = new_addr_, \ + .len_in = len_, \ + } + /* * The set of flags that only affect watermark checking and reclaim * behaviour. This is used by the MM to obey the caller constraints @@ -1527,10 +1565,7 @@ extern struct list_lru shadow_nodes; } while (0) /* mremap.c */ -unsigned long move_page_tables(struct vm_area_struct *vma, - unsigned long old_addr, struct vm_area_struct *new_vma, - unsigned long new_addr, unsigned long len, - bool need_rmap_locks, bool for_stack); +unsigned long move_page_tables(struct pagetable_move_control *pmc); #ifdef CONFIG_UNACCEPTED_MEMORY void accept_page(struct page *page); diff --git a/mm/mmap.c b/mm/mmap.c index 15d6cd7cc845..efcc4ca7500d 100644 --- a/mm/mmap.c +++ b/mm/mmap.c @@ -1694,6 +1694,7 @@ int relocate_vma_down(struct vm_area_struct *vma, unsigned long shift) VMG_STATE(vmg, mm, &vmi, new_start, old_end, 0, vma->vm_pgoff); struct vm_area_struct *next; struct mmu_gather tlb; + PAGETABLE_MOVE(pmc, vma, vma, old_start, new_start, length); BUG_ON(new_start > new_end); @@ -1716,8 +1717,8 @@ int relocate_vma_down(struct vm_area_struct *vma, unsigned long shift) * move the page tables downwards, on failure we rely on * process cleanup to remove whatever mess we made. */ - if (length != move_page_tables(vma, old_start, - vma, new_start, length, false, true)) + pmc.for_stack = true; + if (length != move_page_tables(&pmc)) return -ENOMEM; tlb_gather_mmu(&tlb, mm); diff --git a/mm/mremap.c b/mm/mremap.c index 7dc058d5d5e2..3a2ac167e876 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -580,8 +580,9 @@ static bool move_pgt_entry(enum pgt_entry entry, struct vm_area_struct *vma, * the VMA that is created to span the source and destination of the move, * so we make an exception for it. */ -static bool can_align_down(struct vm_area_struct *vma, unsigned long addr_to_align, - unsigned long mask, bool for_stack) +static bool can_align_down(struct pagetable_move_control *pmc, + struct vm_area_struct *vma, unsigned long addr_to_align, + unsigned long mask) { unsigned long addr_masked = addr_to_align & mask; @@ -590,11 +591,11 @@ static bool can_align_down(struct vm_area_struct *vma, unsigned long addr_to_ali * of the corresponding VMA, we can't align down or we will destroy part * of the current mapping. */ - if (!for_stack && vma->vm_start != addr_to_align) + if (!pmc->for_stack && vma->vm_start != addr_to_align) return false; /* In the stack case we explicitly permit in-VMA alignment. */ - if (for_stack && addr_masked >= vma->vm_start) + if (pmc->for_stack && addr_masked >= vma->vm_start) return true; /* @@ -604,54 +605,131 @@ static bool can_align_down(struct vm_area_struct *vma, unsigned long addr_to_ali return find_vma_intersection(vma->vm_mm, addr_masked, vma->vm_start) == NULL; } -/* Opportunistically realign to specified boundary for faster copy. */ -static void try_realign_addr(unsigned long *old_addr, struct vm_area_struct *old_vma, - unsigned long *new_addr, struct vm_area_struct *new_vma, - unsigned long mask, bool for_stack) +/* + * Determine if are in fact able to realign for efficiency to a higher page + * table boundary. + */ +static bool can_realign_addr(struct pagetable_move_control *pmc, + unsigned long pagetable_mask) { + unsigned long align_mask = ~pagetable_mask; + unsigned long old_align = pmc->old_addr & align_mask; + unsigned long new_align = pmc->new_addr & align_mask; + unsigned long pagetable_size = align_mask + 1; + unsigned long old_align_next = pagetable_size - old_align; + + /* + * We don't want to have to go hunting for VMAs from the end of the old + * VMA to the next page table boundary, also we want to make sure the + * operation is wortwhile. + * + * So ensure that we only perform this realignment if the end of the + * range being copied reaches or crosses the page table boundary. + * + * boundary boundary + * .<- old_align -> . + * . |----------------.-----------| + * . | vma . | + * . |----------------.-----------| + * . <----------------.-----------> + * . len_in + * <-------------------------------> + * . pagetable_size . + * . <----------------> + * . old_align_next . + */ + if (pmc->len_in < old_align_next) + return false; + /* Skip if the addresses are already aligned. */ - if ((*old_addr & ~mask) == 0) - return; + if (old_align == 0) + return false; /* Only realign if the new and old addresses are mutually aligned. */ - if ((*old_addr & ~mask) != (*new_addr & ~mask)) - return; + if (old_align != new_align) + return false; /* Ensure realignment doesn't cause overlap with existing mappings. */ - if (!can_align_down(old_vma, *old_addr, mask, for_stack) || - !can_align_down(new_vma, *new_addr, mask, for_stack)) + if (!can_align_down(pmc, pmc->old, pmc->old_addr, pagetable_mask) || + !can_align_down(pmc, pmc->new, pmc->new_addr, pagetable_mask)) + return false; + + return true; +} + +/* + * Opportunistically realign to specified boundary for faster copy. + * + * Consider an mremap() of a VMA with page table boundaries as below, and no + * preceding VMAs from the lower page table boundary to the start of the VMA, + * with the end of the range reaching or crossing the page table boundary. + * + * boundary boundary + * . |----------------.-----------| + * . | vma . | + * . |----------------.-----------| + * . pmc->old_addr . pmc->old_end + * . <----------------------------> + * . move these page tables + * + * If we proceed with moving page tables in this scenario, we will have a lot of + * work to do traversing old page tables and establishing new ones in the + * destination across multiple lower level page tables. + * + * The idea here is simply to align pmc->old_addr, pmc->new_addr down to the + * page table boundary, so we can simply copy a single page table entry for the + * aligned portion of the VMA instead: + * + * boundary boundary + * . |----------------.-----------| + * . | vma . | + * . |----------------.-----------| + * pmc->old_addr . pmc->old_end + * <-------------------------------------------> + * . move these page tables + */ +static void try_realign_addr(struct pagetable_move_control *pmc, + unsigned long pagetable_mask) +{ + + if (!can_realign_addr(pmc, pagetable_mask)) return; - *old_addr = *old_addr & mask; - *new_addr = *new_addr & mask; + /* + * Simply align to page table boundaries. Note that we do NOT update the + * pmc->old_end value, and since the move_page_tables() operation spans + * from [old_addr, old_end) (offsetting new_addr as it is performed), + * this simply changes the start of the copy, not the end. + */ + pmc->old_addr &= pagetable_mask; + pmc->new_addr &= pagetable_mask; } -unsigned long move_page_tables(struct vm_area_struct *vma, - unsigned long old_addr, struct vm_area_struct *new_vma, - unsigned long new_addr, unsigned long len, - bool need_rmap_locks, bool for_stack) +unsigned long move_page_tables(struct pagetable_move_control *pmc) { unsigned long extent, old_end; struct mmu_notifier_range range; pmd_t *old_pmd, *new_pmd; pud_t *old_pud, *new_pud; + unsigned long old_addr, new_addr; + struct vm_area_struct *vma = pmc->old; - if (!len) + if (!pmc->len_in) return 0; - old_end = old_addr + len; - if (is_vm_hugetlb_page(vma)) - return move_hugetlb_page_tables(vma, new_vma, old_addr, - new_addr, len); + return move_hugetlb_page_tables(pmc->old, pmc->new, pmc->old_addr, + pmc->new_addr, pmc->len_in); + old_end = pmc->old_end; /* * If possible, realign addresses to PMD boundary for faster copy. * Only realign if the mremap copying hits a PMD boundary. */ - if (len >= PMD_SIZE - (old_addr & ~PMD_MASK)) - try_realign_addr(&old_addr, vma, &new_addr, new_vma, PMD_MASK, - for_stack); + try_realign_addr(pmc, PMD_MASK); + /* These may have been changed. */ + old_addr = pmc->old_addr; + new_addr = pmc->new_addr; flush_cache_range(vma, old_addr, old_end); mmu_notifier_range_init(&range, MMU_NOTIFY_UNMAP, 0, vma->vm_mm, @@ -675,12 +753,11 @@ unsigned long move_page_tables(struct vm_area_struct *vma, if (pud_trans_huge(*old_pud) || pud_devmap(*old_pud)) { if (extent == HPAGE_PUD_SIZE) { move_pgt_entry(HPAGE_PUD, vma, old_addr, new_addr, - old_pud, new_pud, need_rmap_locks); + old_pud, new_pud, pmc->need_rmap_locks); /* We ignore and continue on error? */ continue; } } else if (IS_ENABLED(CONFIG_HAVE_MOVE_PUD) && extent == PUD_SIZE) { - if (move_pgt_entry(NORMAL_PUD, vma, old_addr, new_addr, old_pud, new_pud, true)) continue; @@ -698,7 +775,7 @@ unsigned long move_page_tables(struct vm_area_struct *vma, pmd_devmap(*old_pmd)) { if (extent == HPAGE_PMD_SIZE && move_pgt_entry(HPAGE_PMD, vma, old_addr, new_addr, - old_pmd, new_pmd, need_rmap_locks)) + old_pmd, new_pmd, pmc->need_rmap_locks)) continue; split_huge_pmd(vma, old_pmd, old_addr); } else if (IS_ENABLED(CONFIG_HAVE_MOVE_PMD) && @@ -713,10 +790,10 @@ unsigned long move_page_tables(struct vm_area_struct *vma, } if (pmd_none(*old_pmd)) continue; - if (pte_alloc(new_vma->vm_mm, new_pmd)) + if (pte_alloc(pmc->new->vm_mm, new_pmd)) break; if (move_ptes(vma, old_pmd, old_addr, old_addr + extent, - new_vma, new_pmd, new_addr, need_rmap_locks) < 0) + pmc->new, new_pmd, new_addr, pmc->need_rmap_locks) < 0) goto again; } @@ -726,10 +803,10 @@ unsigned long move_page_tables(struct vm_area_struct *vma, * Prevent negative return values when {old,new}_addr was realigned * but we broke out of the above loop for the first PMD itself. */ - if (old_addr < old_end - len) + if (old_addr < old_end - pmc->len_in) return 0; - return len + old_addr - old_end; /* how much done */ + return pmc->len_in + old_addr - old_end; /* how much done */ } /* Set vrm->delta to the difference in VMA size specified by user. */ @@ -1040,37 +1117,40 @@ static int copy_vma_and_data(struct vma_remap_struct *vrm, unsigned long internal_pgoff = internal_offset >> PAGE_SHIFT; unsigned long new_pgoff = vrm->vma->vm_pgoff + internal_pgoff; unsigned long moved_len; - bool need_rmap_locks; - struct vm_area_struct *vma; + struct vm_area_struct *vma = vrm->vma; struct vm_area_struct *new_vma; int err = 0; + PAGETABLE_MOVE(pmc, NULL, NULL, vrm->addr, vrm->new_addr, vrm->old_len); - new_vma = copy_vma(&vrm->vma, vrm->new_addr, vrm->new_len, new_pgoff, - &need_rmap_locks); + new_vma = copy_vma(&vma, vrm->new_addr, vrm->new_len, new_pgoff, + &pmc.need_rmap_locks); if (!new_vma) { vrm_uncharge(vrm); *new_vma_ptr = NULL; return -ENOMEM; } - vma = vrm->vma; + vrm->vma = vma; + pmc.old = vma; + pmc.new = new_vma; - moved_len = move_page_tables(vma, vrm->addr, new_vma, - vrm->new_addr, vrm->old_len, - need_rmap_locks, /* for_stack= */false); + moved_len = move_page_tables(&pmc); if (moved_len < vrm->old_len) err = -ENOMEM; else if (vma->vm_ops && vma->vm_ops->mremap) err = vma->vm_ops->mremap(new_vma); if (unlikely(err)) { + PAGETABLE_MOVE(pmc_revert, new_vma, vma, vrm->new_addr, + vrm->addr, moved_len); + /* * On error, move entries back from new area to old, * which will succeed since page tables still there, * and then proceed to unmap new area instead of old. */ - move_page_tables(new_vma, vrm->new_addr, vma, vrm->addr, - moved_len, /* need_rmap_locks = */true, - /* for_stack= */false); + pmc_revert.need_rmap_locks = true; + move_page_tables(&pmc_revert); + vrm->vma = new_vma; vrm->old_len = vrm->new_len; vrm->addr = vrm->new_addr; From patchwork Mon Mar 10 20:50:40 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Lorenzo Stoakes X-Patchwork-Id: 14010667 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 487BAC28B30 for ; Mon, 10 Mar 2025 20:51:53 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 0F65D280011; Mon, 10 Mar 2025 16:51:50 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 0A922280004; Mon, 10 Mar 2025 16:51:50 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D2AC8280011; Mon, 10 Mar 2025 16:51:49 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0010.hostedemail.com [216.40.44.10]) by kanga.kvack.org (Postfix) with ESMTP id AD34D280004 for ; Mon, 10 Mar 2025 16:51:49 -0400 (EDT) Received: from smtpin02.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id E224FC1224 for ; Mon, 10 Mar 2025 20:51:50 +0000 (UTC) X-FDA: 83206837980.02.45E8B85 Received: from mx0b-00069f02.pphosted.com (mx0b-00069f02.pphosted.com [205.220.177.32]) by imf04.hostedemail.com (Postfix) with ESMTP id 422C740003 for ; Mon, 10 Mar 2025 20:51:47 +0000 (UTC) Authentication-Results: imf04.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=ij+nd0oE; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=pWcQ+HS1; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf04.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1741639907; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Sf8fmvWfkBvcymcN2DsZh62QU2fWxDWL0y/TmPHxYzA=; b=Y2e6zBfjQHKTXByI+kEslZrCXpVseGNCRVt+LVDMHCkhF2hLsdWw2VaKDBuobboqtdRq/o HmgPdKjJTp0BR6RakSHuXMgFAxS1VwTpmLyNkzsb0a4YScWJ1el2kfSwHqLBAR/1U7/YBw IvvWYq9QAyJmP+eePmZBQQSmfwjlHWk= ARC-Seal: i=2; s=arc-20220608; d=hostedemail.com; t=1741639907; a=rsa-sha256; cv=pass; b=EsJ8GW3rNaryJSeU1Uu9BANWGXlaERbTbNKzuo4H+ZelnLEcJHYbfLAAcqIy70Y7WNE7Gb w4m3GyurLH06BB1P2L5zOtWdJLbrfQuoMdkNDwhNFMJXwqfCK8UqIAE6BoUs75ggkeZfqK GFuzK24TMRwEjYul+4y51ttK2N0Bpuk= ARC-Authentication-Results: i=2; imf04.hostedemail.com; dkim=pass header.d=oracle.com header.s=corp-2023-11-20 header.b=ij+nd0oE; dkim=pass header.d=oracle.onmicrosoft.com header.s=selector2-oracle-onmicrosoft-com header.b=pWcQ+HS1; dmarc=pass (policy=reject) header.from=oracle.com; arc=pass ("microsoft.com:s=arcselector10001:i=1"); spf=pass (imf04.hostedemail.com: domain of lorenzo.stoakes@oracle.com designates 205.220.177.32 as permitted sender) smtp.mailfrom=lorenzo.stoakes@oracle.com Received: from pps.filterd (m0246631.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 52AJu3Rh007048; Mon, 10 Mar 2025 20:51:44 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s= corp-2023-11-20; bh=Sf8fmvWfkBvcymcN2DsZh62QU2fWxDWL0y/TmPHxYzA=; b= ij+nd0oEpzyON/oV4XaxWj1Sn2zjfOSXIWhkEGbI//3/FlBP4kYSyX1Z1gBLNHfE auyqM7Au0XDEjXUsJQqLBCIK4WnZ04bnPFw4jOGpV1nasdjo3+ZPdwrn41fHqFF8 E7M9HhCYeZfH1lMXY9zYkaal62LWQ4AFpfoxkonDYrQBGU0fNhA1SD/tJEdcoizU srl9/ylPTPaT6oZfBNhtf2D1nuWtJ9ugjwpEPQSN/QUVO/5c0Ea1Oda5YQ7x0KFT zdeb5pyHgTxH++IHC979UFd5UtDF8M4EKC8TDfzxoueWNqChhmtzYWmq8z4AYCyF /zhC9hYWnMVIWfOVNwFfbg== Received: from iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta01.appoci.oracle.com [130.35.100.223]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 458cp33j2j-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:43 +0000 (GMT) Received: from pps.filterd (iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (8.18.1.2/8.18.1.2) with ESMTP id 52AKdiPS021700; Mon, 10 Mar 2025 20:51:43 GMT Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2177.outbound.protection.outlook.com [104.47.56.177]) by iadpaimrmta01.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 458wmnm5nw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 10 Mar 2025 20:51:43 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=PzsplmlM6trh+ni22L28MXl6BeZ13WDB+yOoBimQAUn43DYkszVviPVUrVcjfgdWRGrM7gZjicJ7GzBNeRI1BXNjsK4PASSRFLyCDuP98ZioZK5E3rdm72fW3V+S+p27uI6tbXIwHHi5BUgQi5vt1T6JTZGiEtwny9uTYbt4snYIg427PsQOEF7Qkr7mh+5kPY8vq9z0LD6SZSMvkBqL2zi48UJL9/6VCRo3PiI28Ffkdqem/15lD2jYIWfCzuZtHa2mp2dFp+Y4Tp9jA/QcaF32Fk81l2VX+XoB3xoDcpSyckUDJHerI7DONA5EiBG2PzzNWvj6qQE6NloCXNwkLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Sf8fmvWfkBvcymcN2DsZh62QU2fWxDWL0y/TmPHxYzA=; b=b5GTj9iuPcsn23SO8vlFmyL+WIGgIQEAsR+6D5TLyTWroMP99l2G1RGr4jk8RGnY1M1V6uihGpKOSkPnFprvDi9AWI9UwJJdNJ4xzIJ2wTPhfK5lm31RRHBLeeJNomdZ3r7S4nv+I9/bRnr+uHiZ0+AuJ/PLPoIKHi9fbLkZnVB6ads7HXIKJh6ebhbqxy70AFiMVaTiEYYrELxwwEwnaFzjaRXoqO2XMdoSp8ORCTPldwAIgelRPZZTOX1jq+uZkuHo6RL/AEl7ieAA+/k7n0NBVgRn7RiFeFg5XvzGhPK4HgKwQap53kE1Z7oC7oyO790Xbl36LShorjqyRH2NUw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Sf8fmvWfkBvcymcN2DsZh62QU2fWxDWL0y/TmPHxYzA=; b=pWcQ+HS1iFpR7ANOdRYfGJV7ecAyslLeD1rMozgdVu9x9LH1DO5DJJTrVXk0+178qlIAWuT1bOVDpuPS+wrFX4hwQFx/hkx6OMj8sAo7mQ0RaJ7YjbL3wL8Ge35LRedtunhpd2NkKet8SXjXSXeH3svxiW1yZVOPm53wSISDOOI= Received: from MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) by DS7PR10MB7250.namprd10.prod.outlook.com (2603:10b6:8:e0::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8511.27; Mon, 10 Mar 2025 20:51:40 +0000 Received: from MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c]) by MN2PR10MB4112.namprd10.prod.outlook.com ([fe80::3256:3c8c:73a9:5b9c%7]) with mapi id 15.20.8489.025; Mon, 10 Mar 2025 20:51:40 +0000 From: Lorenzo Stoakes To: Andrew Morton Cc: "Liam R . Howlett" , Vlastimil Babka , Jann Horn , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Harry Yoo , Yosry Ahmed , Oliver Sang Subject: [PATCH v3 7/7] mm/mremap: thread state through move page table operation Date: Mon, 10 Mar 2025 20:50:40 +0000 Message-ID: <230dd7a2b7b01a6eef442678f284d575e800356e.1741639347.git.lorenzo.stoakes@oracle.com> X-Mailer: git-send-email 2.48.1 In-Reply-To: References: X-ClientProxiedBy: FR4P281CA0255.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:f5::18) To MN2PR10MB4112.namprd10.prod.outlook.com (2603:10b6:208:11e::33) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MN2PR10MB4112:EE_|DS7PR10MB7250:EE_ X-MS-Office365-Filtering-Correlation-Id: e9de0a9f-7ce0-4b79-b3d3-08dd60155b5b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|1800799024|366016; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:MN2PR10MB4112.namprd10.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016);DIR:OUT;SFP:1101; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: TISO0b2EC9tnewp2m81UlVPnGPlRJ6ZY/WHIkHmlfGg+75r3Od26hKlHQvJJSUF5hzNGBuyP37OTGkaMezSy74qY3Nsrw0BQCeZE/vbAb8kuQ0XXEUOVWVJmOCXFl0EC7x/PO5otQxg76v5QYxg8AhVoHjUPJGj2uoX8Cxgu+YZXPiBpt9AOrOZSAVS2J+fvrj7aFJeDeRptuK3geHiDeoYJq+YrxaMF0Ecnsw78bJEcOpjxCR6ICcDwqTTy8faClyJy5Be567oQbPMUDve1XmysHl3QKC8BlbkYhwpm8TlumQ82/d+IYv9Yz2YWaf5Vbk77ZvPXgB7iRlmTVkk+Ss2ZURspqsJRmsd2bT6X665fv9OEabqS1fEjczOUs3X9eyC4s8f+n5QQu94FD42rc0LYDWm7vNlJlm6QB6XYvVrMx4RFgiloY7xdUDgDDNTbSM804Vl8FaWALunDDmUH8x2ha5amoEuDm7DMyUR/58dhafZ2krYjOsGAFEKtbHitBIpa5pYd1Ufy9Bb7AHPFwp6qG4aOPyGzsahm1wEcslkVpLrz29k0Gv24mAOxXfakt0MKCSBS529h7JHGl9pkou0KMSzwN8yZNL/oFMglwUDkCVO2zeOlwAA2alv+ud76JDqcanZhNCIssc1qeIlWMfRTi7GZzRSPsCL4n/Ht9opPFGJ6LirlgTlKniuiAHz2MYmJpQzS8Ftwz66Veq9gGxTiiLdR2cXB+lcPyXiVpAeMdnW7QjFwqqxu3QVxr0Q/VHtTSoNEaFq5bgTUdryQHhiC7y8ah7KpUW+P6gdZnpe6xSYwqmWd2lAmRsjLmMGv+gecKr3+itNSPdwEhciLHGQaByf4or/faEL3ggT2jGgrPsS8BHWz3bpH4j4P4KvaFz5AfLs19+Btu6X6teyQ8/mYu9XAFordKWbqR5Z8Z/dAVD2k8a/5bb65dUQg2JSOAEqTG4EExUaj6MS3Jp62Mq7ttdYYxoFbdS+dEQHJ9s+5CDDRMRzk0pO6OwVIPlyS5Cj7vJ2iWti43kvDjNxjIImt8/yEFAoWsbg3fBTy+S0IuE8poAi3JJ3HE29h/czT7VDAl0okgOEsLxc8f5HoREV+q9+t2lDsZKl3mX86q4J32ztngIXK2pvgwJj7/4sMzKBjCGpoxj9jlhxqvI5H5rJ6UDTP7WBz2op3T0mGV/1YeSVoF7lBFTOpiAGEhhviNAKPoIROwEBMbgCL0Nh2uOtXNCBFZfzyrix8XtERTsaLSA3/EcUYQb0MXsBTsOF1ue7WR9b/+feQLLZsFkjl17gLWWUMOTxU7UUzup+OJiRCTosJXUzV+QJHkPVxmI0sDrgfpxnhc5BZmMhO8fgyJGk1ico2csTWdJ5QoFpbK88TQJEhUnUC432J5QJz6OvMRJBLaoEaqLN3K+QWONG0w8uqKPSn+jeVKNjQ8SgzNNV2m4od3f5PaoqKOPLWgf6XG4wa1RZyDB5+ncHTXVFeRrC4xynx8ouv9hddS3mF6m5cC/jnWAu7gvzXM7Eu8kqXKYxHTiJHYNlhirPSEKpctygq58e3v47vMRSX7Mjd1mGhni76EymsWzxCoFENVmkEib9k6WOEPKWUGjRj2lE9tw== X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-Network-Message-Id: e9de0a9f-7ce0-4b79-b3d3-08dd60155b5b X-MS-Exchange-CrossTenant-AuthSource: MN2PR10MB4112.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Mar 2025 20:51:40.1977 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: ErCqUx1ufaxBt+pIZlrJ39rnF3pj91iRaGK/fgAQhtasndfU+MSMq19vhJQpFPnx0pwmJojP9zVKdUcYNrHCiAshMN3c3E0hKAqY1e+agmQ= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR10MB7250 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1093,Hydra:6.0.680,FMLib:17.12.68.34 definitions=2025-03-10_08,2025-03-07_03,2024-11-22_01 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 mlxscore=0 spamscore=0 adultscore=0 malwarescore=0 phishscore=0 mlxlogscore=999 bulkscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2502100000 definitions=main-2503100159 X-Proofpoint-GUID: -KfhpcOEJfqaQg4Nj3La9JkoWsn1m5sM X-Proofpoint-ORIG-GUID: -KfhpcOEJfqaQg4Nj3La9JkoWsn1m5sM X-Stat-Signature: 1e39spsfz6nqi6u6riixki4h3xc9aciy X-Rspamd-Server: rspam05 X-Rspam-User: X-Rspamd-Queue-Id: 422C740003 X-HE-Tag: 1741639907-399539 X-HE-Meta: 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 7Ni2F25p 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: Finish refactoring the page table logic by threading the PMC state throughout the operation, allowing us to control the operation as we go. Additionally, update the old_addr, new_addr fields in move_page_tables() as we progress through the process making use of the fact we have this state object now to track this. With these changes made, not only is the code far more readable, but we can finally transmit state throughout the entire operation, which lays the groundwork for sensibly making changes in future to how the mremap() operation is performed. Additionally take the opportunity to refactor the means of determining the progress of the operation, abstracting this to pmc_progress() and simplifying the logic to make it clearer what's going on. Signed-off-by: Lorenzo Stoakes Reviewed-by: Vlastimil Babka --- mm/internal.h | 3 + mm/mremap.c | 196 +++++++++++++++++++++++++++++--------------------- 2 files changed, 116 insertions(+), 83 deletions(-) diff --git a/mm/internal.h b/mm/internal.h index 6c611ab8eee2..aa0beec14b04 100644 --- a/mm/internal.h +++ b/mm/internal.h @@ -36,6 +36,9 @@ struct folio_batch; * * Use the PAGETABLE_MOVE() macro to initialise this struct. * + * The old_addr and new_addr fields are updated as the page table move is + * executed. + * * NOTE: The page table move is affected by reading from [old_addr, old_end), * and old_addr may be updated for better page table alignment, so len_in * represents the length of the range being copied as specified by the user. diff --git a/mm/mremap.c b/mm/mremap.c index 3a2ac167e876..0865387531ed 100644 --- a/mm/mremap.c +++ b/mm/mremap.c @@ -108,8 +108,7 @@ static pmd_t *get_old_pmd(struct mm_struct *mm, unsigned long addr) return pmd; } -static pud_t *alloc_new_pud(struct mm_struct *mm, struct vm_area_struct *vma, - unsigned long addr) +static pud_t *alloc_new_pud(struct mm_struct *mm, unsigned long addr) { pgd_t *pgd; p4d_t *p4d; @@ -122,13 +121,12 @@ static pud_t *alloc_new_pud(struct mm_struct *mm, struct vm_area_struct *vma, return pud_alloc(mm, p4d, addr); } -static pmd_t *alloc_new_pmd(struct mm_struct *mm, struct vm_area_struct *vma, - unsigned long addr) +static pmd_t *alloc_new_pmd(struct mm_struct *mm, unsigned long addr) { pud_t *pud; pmd_t *pmd; - pud = alloc_new_pud(mm, vma, addr); + pud = alloc_new_pud(mm, addr); if (!pud) return NULL; @@ -172,17 +170,19 @@ static pte_t move_soft_dirty_pte(pte_t pte) return pte; } -static int move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, - unsigned long old_addr, unsigned long old_end, - struct vm_area_struct *new_vma, pmd_t *new_pmd, - unsigned long new_addr, bool need_rmap_locks) +static int move_ptes(struct pagetable_move_control *pmc, + unsigned long extent, pmd_t *old_pmd, pmd_t *new_pmd) { + struct vm_area_struct *vma = pmc->old; bool need_clear_uffd_wp = vma_has_uffd_without_event_remap(vma); struct mm_struct *mm = vma->vm_mm; pte_t *old_pte, *new_pte, pte; pmd_t dummy_pmdval; spinlock_t *old_ptl, *new_ptl; bool force_flush = false; + unsigned long old_addr = pmc->old_addr; + unsigned long new_addr = pmc->new_addr; + unsigned long old_end = old_addr + extent; unsigned long len = old_end - old_addr; int err = 0; @@ -204,7 +204,7 @@ static int move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, * serialize access to individual ptes, but only rmap traversal * order guarantees that we won't miss both the old and new ptes). */ - if (need_rmap_locks) + if (pmc->need_rmap_locks) take_rmap_locks(vma); /* @@ -278,7 +278,7 @@ static int move_ptes(struct vm_area_struct *vma, pmd_t *old_pmd, pte_unmap(new_pte - 1); pte_unmap_unlock(old_pte - 1, old_ptl); out: - if (need_rmap_locks) + if (pmc->need_rmap_locks) drop_rmap_locks(vma); return err; } @@ -293,10 +293,11 @@ static inline bool arch_supports_page_table_move(void) #endif #ifdef CONFIG_HAVE_MOVE_PMD -static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, - unsigned long new_addr, pmd_t *old_pmd, pmd_t *new_pmd) +static bool move_normal_pmd(struct pagetable_move_control *pmc, + pmd_t *old_pmd, pmd_t *new_pmd) { spinlock_t *old_ptl, *new_ptl; + struct vm_area_struct *vma = pmc->old; struct mm_struct *mm = vma->vm_mm; bool res = false; pmd_t pmd; @@ -342,7 +343,7 @@ static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, * We don't have to worry about the ordering of src and dst * ptlocks because exclusive mmap_lock prevents deadlock. */ - old_ptl = pmd_lock(vma->vm_mm, old_pmd); + old_ptl = pmd_lock(mm, old_pmd); new_ptl = pmd_lockptr(mm, new_pmd); if (new_ptl != old_ptl) spin_lock_nested(new_ptl, SINGLE_DEPTH_NESTING); @@ -359,7 +360,7 @@ static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, VM_BUG_ON(!pmd_none(*new_pmd)); pmd_populate(mm, new_pmd, pmd_pgtable(pmd)); - flush_tlb_range(vma, old_addr, old_addr + PMD_SIZE); + flush_tlb_range(vma, pmc->old_addr, pmc->old_addr + PMD_SIZE); out_unlock: if (new_ptl != old_ptl) spin_unlock(new_ptl); @@ -368,19 +369,19 @@ static bool move_normal_pmd(struct vm_area_struct *vma, unsigned long old_addr, return res; } #else -static inline bool move_normal_pmd(struct vm_area_struct *vma, - unsigned long old_addr, unsigned long new_addr, pmd_t *old_pmd, - pmd_t *new_pmd) +static inline bool move_normal_pmd(struct pagetable_move_control *pmc, + pmd_t *old_pmd, pmd_t *new_pmd) { return false; } #endif #if CONFIG_PGTABLE_LEVELS > 2 && defined(CONFIG_HAVE_MOVE_PUD) -static bool move_normal_pud(struct vm_area_struct *vma, unsigned long old_addr, - unsigned long new_addr, pud_t *old_pud, pud_t *new_pud) +static bool move_normal_pud(struct pagetable_move_control *pmc, + pud_t *old_pud, pud_t *new_pud) { spinlock_t *old_ptl, *new_ptl; + struct vm_area_struct *vma = pmc->old; struct mm_struct *mm = vma->vm_mm; pud_t pud; @@ -406,7 +407,7 @@ static bool move_normal_pud(struct vm_area_struct *vma, unsigned long old_addr, * We don't have to worry about the ordering of src and dst * ptlocks because exclusive mmap_lock prevents deadlock. */ - old_ptl = pud_lock(vma->vm_mm, old_pud); + old_ptl = pud_lock(mm, old_pud); new_ptl = pud_lockptr(mm, new_pud); if (new_ptl != old_ptl) spin_lock_nested(new_ptl, SINGLE_DEPTH_NESTING); @@ -418,7 +419,7 @@ static bool move_normal_pud(struct vm_area_struct *vma, unsigned long old_addr, VM_BUG_ON(!pud_none(*new_pud)); pud_populate(mm, new_pud, pud_pgtable(pud)); - flush_tlb_range(vma, old_addr, old_addr + PUD_SIZE); + flush_tlb_range(vma, pmc->old_addr, pmc->old_addr + PUD_SIZE); if (new_ptl != old_ptl) spin_unlock(new_ptl); spin_unlock(old_ptl); @@ -426,19 +427,19 @@ static bool move_normal_pud(struct vm_area_struct *vma, unsigned long old_addr, return true; } #else -static inline bool move_normal_pud(struct vm_area_struct *vma, - unsigned long old_addr, unsigned long new_addr, pud_t *old_pud, - pud_t *new_pud) +static inline bool move_normal_pud(struct pagetable_move_control *pmc, + pud_t *old_pud, pud_t *new_pud) { return false; } #endif #if defined(CONFIG_TRANSPARENT_HUGEPAGE) && defined(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD) -static bool move_huge_pud(struct vm_area_struct *vma, unsigned long old_addr, - unsigned long new_addr, pud_t *old_pud, pud_t *new_pud) +static bool move_huge_pud(struct pagetable_move_control *pmc, + pud_t *old_pud, pud_t *new_pud) { spinlock_t *old_ptl, *new_ptl; + struct vm_area_struct *vma = pmc->old; struct mm_struct *mm = vma->vm_mm; pud_t pud; @@ -453,7 +454,7 @@ static bool move_huge_pud(struct vm_area_struct *vma, unsigned long old_addr, * We don't have to worry about the ordering of src and dst * ptlocks because exclusive mmap_lock prevents deadlock. */ - old_ptl = pud_lock(vma->vm_mm, old_pud); + old_ptl = pud_lock(mm, old_pud); new_ptl = pud_lockptr(mm, new_pud); if (new_ptl != old_ptl) spin_lock_nested(new_ptl, SINGLE_DEPTH_NESTING); @@ -466,8 +467,8 @@ static bool move_huge_pud(struct vm_area_struct *vma, unsigned long old_addr, /* Set the new pud */ /* mark soft_ditry when we add pud level soft dirty support */ - set_pud_at(mm, new_addr, new_pud, pud); - flush_pud_tlb_range(vma, old_addr, old_addr + HPAGE_PUD_SIZE); + set_pud_at(mm, pmc->new_addr, new_pud, pud); + flush_pud_tlb_range(vma, pmc->old_addr, pmc->old_addr + HPAGE_PUD_SIZE); if (new_ptl != old_ptl) spin_unlock(new_ptl); spin_unlock(old_ptl); @@ -475,8 +476,9 @@ static bool move_huge_pud(struct vm_area_struct *vma, unsigned long old_addr, return true; } #else -static bool move_huge_pud(struct vm_area_struct *vma, unsigned long old_addr, - unsigned long new_addr, pud_t *old_pud, pud_t *new_pud) +static bool move_huge_pud(struct pagetable_move_control *pmc, + pud_t *old_pud, pud_t *new_pud) + { WARN_ON_ONCE(1); return false; @@ -497,10 +499,12 @@ enum pgt_entry { * destination pgt_entry. */ static __always_inline unsigned long get_extent(enum pgt_entry entry, - unsigned long old_addr, unsigned long old_end, - unsigned long new_addr) + struct pagetable_move_control *pmc) { unsigned long next, extent, mask, size; + unsigned long old_addr = pmc->old_addr; + unsigned long old_end = pmc->old_end; + unsigned long new_addr = pmc->new_addr; switch (entry) { case HPAGE_PMD: @@ -529,38 +533,51 @@ static __always_inline unsigned long get_extent(enum pgt_entry entry, return extent; } +/* + * Should move_pgt_entry() acquire the rmap locks? This is either expressed in + * the PMC, or overridden in the case of normal, larger page tables. + */ +static bool should_take_rmap_locks(struct pagetable_move_control *pmc, + enum pgt_entry entry) +{ + switch (entry) { + case NORMAL_PMD: + case NORMAL_PUD: + return true; + default: + return pmc->need_rmap_locks; + } +} + /* * Attempts to speedup the move by moving entry at the level corresponding to * pgt_entry. Returns true if the move was successful, else false. */ -static bool move_pgt_entry(enum pgt_entry entry, struct vm_area_struct *vma, - unsigned long old_addr, unsigned long new_addr, - void *old_entry, void *new_entry, bool need_rmap_locks) +static bool move_pgt_entry(struct pagetable_move_control *pmc, + enum pgt_entry entry, void *old_entry, void *new_entry) { bool moved = false; + bool need_rmap_locks = should_take_rmap_locks(pmc, entry); /* See comment in move_ptes() */ if (need_rmap_locks) - take_rmap_locks(vma); + take_rmap_locks(pmc->old); switch (entry) { case NORMAL_PMD: - moved = move_normal_pmd(vma, old_addr, new_addr, old_entry, - new_entry); + moved = move_normal_pmd(pmc, old_entry, new_entry); break; case NORMAL_PUD: - moved = move_normal_pud(vma, old_addr, new_addr, old_entry, - new_entry); + moved = move_normal_pud(pmc, old_entry, new_entry); break; case HPAGE_PMD: moved = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && - move_huge_pmd(vma, old_addr, new_addr, old_entry, + move_huge_pmd(pmc->old, pmc->old_addr, pmc->new_addr, old_entry, new_entry); break; case HPAGE_PUD: moved = IS_ENABLED(CONFIG_TRANSPARENT_HUGEPAGE) && - move_huge_pud(vma, old_addr, new_addr, old_entry, - new_entry); + move_huge_pud(pmc, old_entry, new_entry); break; default: @@ -569,7 +586,7 @@ static bool move_pgt_entry(enum pgt_entry entry, struct vm_area_struct *vma, } if (need_rmap_locks) - drop_rmap_locks(vma); + drop_rmap_locks(pmc->old); return moved; } @@ -705,108 +722,121 @@ static void try_realign_addr(struct pagetable_move_control *pmc, pmc->new_addr &= pagetable_mask; } +/* Is the page table move operation done? */ +static bool pmc_done(struct pagetable_move_control *pmc) +{ + return pmc->old_addr >= pmc->old_end; +} + +/* Advance to the next page table, offset by extent bytes. */ +static void pmc_next(struct pagetable_move_control *pmc, unsigned long extent) +{ + pmc->old_addr += extent; + pmc->new_addr += extent; +} + +/* + * Determine how many bytes in the specified input range have had their page + * tables moved so far. + */ +static unsigned long pmc_progress(struct pagetable_move_control *pmc) +{ + unsigned long orig_old_addr = pmc->old_end - pmc->len_in; + unsigned long old_addr = pmc->old_addr; + + /* + * Prevent negative return values when {old,new}_addr was realigned but + * we broke out of the loop in move_page_tables() for the first PMD + * itself. + */ + return old_addr < orig_old_addr ? 0 : old_addr - orig_old_addr; +} + unsigned long move_page_tables(struct pagetable_move_control *pmc) { - unsigned long extent, old_end; + unsigned long extent; struct mmu_notifier_range range; pmd_t *old_pmd, *new_pmd; pud_t *old_pud, *new_pud; - unsigned long old_addr, new_addr; - struct vm_area_struct *vma = pmc->old; + struct mm_struct *mm = pmc->old->vm_mm; if (!pmc->len_in) return 0; - if (is_vm_hugetlb_page(vma)) + if (is_vm_hugetlb_page(pmc->old)) return move_hugetlb_page_tables(pmc->old, pmc->new, pmc->old_addr, pmc->new_addr, pmc->len_in); - old_end = pmc->old_end; /* * If possible, realign addresses to PMD boundary for faster copy. * Only realign if the mremap copying hits a PMD boundary. */ try_realign_addr(pmc, PMD_MASK); - /* These may have been changed. */ - old_addr = pmc->old_addr; - new_addr = pmc->new_addr; - flush_cache_range(vma, old_addr, old_end); - mmu_notifier_range_init(&range, MMU_NOTIFY_UNMAP, 0, vma->vm_mm, - old_addr, old_end); + flush_cache_range(pmc->old, pmc->old_addr, pmc->old_end); + mmu_notifier_range_init(&range, MMU_NOTIFY_UNMAP, 0, mm, + pmc->old_addr, pmc->old_end); mmu_notifier_invalidate_range_start(&range); - for (; old_addr < old_end; old_addr += extent, new_addr += extent) { + for (; !pmc_done(pmc); pmc_next(pmc, extent)) { cond_resched(); /* * If extent is PUD-sized try to speed up the move by moving at the * PUD level if possible. */ - extent = get_extent(NORMAL_PUD, old_addr, old_end, new_addr); + extent = get_extent(NORMAL_PUD, pmc); - old_pud = get_old_pud(vma->vm_mm, old_addr); + old_pud = get_old_pud(mm, pmc->old_addr); if (!old_pud) continue; - new_pud = alloc_new_pud(vma->vm_mm, vma, new_addr); + new_pud = alloc_new_pud(mm, pmc->new_addr); if (!new_pud) break; if (pud_trans_huge(*old_pud) || pud_devmap(*old_pud)) { if (extent == HPAGE_PUD_SIZE) { - move_pgt_entry(HPAGE_PUD, vma, old_addr, new_addr, - old_pud, new_pud, pmc->need_rmap_locks); + move_pgt_entry(pmc, HPAGE_PUD, old_pud, new_pud); /* We ignore and continue on error? */ continue; } } else if (IS_ENABLED(CONFIG_HAVE_MOVE_PUD) && extent == PUD_SIZE) { - if (move_pgt_entry(NORMAL_PUD, vma, old_addr, new_addr, - old_pud, new_pud, true)) + if (move_pgt_entry(pmc, NORMAL_PUD, old_pud, new_pud)) continue; } - extent = get_extent(NORMAL_PMD, old_addr, old_end, new_addr); - old_pmd = get_old_pmd(vma->vm_mm, old_addr); + extent = get_extent(NORMAL_PMD, pmc); + old_pmd = get_old_pmd(mm, pmc->old_addr); if (!old_pmd) continue; - new_pmd = alloc_new_pmd(vma->vm_mm, vma, new_addr); + new_pmd = alloc_new_pmd(mm, pmc->new_addr); if (!new_pmd) break; again: if (is_swap_pmd(*old_pmd) || pmd_trans_huge(*old_pmd) || pmd_devmap(*old_pmd)) { if (extent == HPAGE_PMD_SIZE && - move_pgt_entry(HPAGE_PMD, vma, old_addr, new_addr, - old_pmd, new_pmd, pmc->need_rmap_locks)) + move_pgt_entry(pmc, HPAGE_PMD, old_pmd, new_pmd)) continue; - split_huge_pmd(vma, old_pmd, old_addr); + split_huge_pmd(pmc->old, old_pmd, pmc->old_addr); } else if (IS_ENABLED(CONFIG_HAVE_MOVE_PMD) && extent == PMD_SIZE) { /* * If the extent is PMD-sized, try to speed the move by * moving at the PMD level if possible. */ - if (move_pgt_entry(NORMAL_PMD, vma, old_addr, new_addr, - old_pmd, new_pmd, true)) + if (move_pgt_entry(pmc, NORMAL_PMD, old_pmd, new_pmd)) continue; } if (pmd_none(*old_pmd)) continue; if (pte_alloc(pmc->new->vm_mm, new_pmd)) break; - if (move_ptes(vma, old_pmd, old_addr, old_addr + extent, - pmc->new, new_pmd, new_addr, pmc->need_rmap_locks) < 0) + if (move_ptes(pmc, extent, old_pmd, new_pmd) < 0) goto again; } mmu_notifier_invalidate_range_end(&range); - /* - * Prevent negative return values when {old,new}_addr was realigned - * but we broke out of the above loop for the first PMD itself. - */ - if (old_addr < old_end - pmc->len_in) - return 0; - - return pmc->len_in + old_addr - old_end; /* how much done */ + return pmc_progress(pmc); } /* Set vrm->delta to the difference in VMA size specified by user. */