]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - mm/hmm.c
KVM: x86/speculation: Disable Fill buffer clear within guests
[mirror_ubuntu-jammy-kernel.git] / mm / hmm.c
CommitLineData
c942fddf 1// SPDX-License-Identifier: GPL-2.0-or-later
133ff0ea
JG
2/*
3 * Copyright 2013 Red Hat Inc.
4 *
f813f219 5 * Authors: Jérôme Glisse <jglisse@redhat.com>
133ff0ea
JG
6 */
7/*
8 * Refer to include/linux/hmm.h for information about heterogeneous memory
9 * management or HMM for short.
10 */
a520110e 11#include <linux/pagewalk.h>
133ff0ea 12#include <linux/hmm.h>
858b54da 13#include <linux/init.h>
da4c3c73
JG
14#include <linux/rmap.h>
15#include <linux/swap.h>
133ff0ea
JG
16#include <linux/slab.h>
17#include <linux/sched.h>
4ef589dc
JG
18#include <linux/mmzone.h>
19#include <linux/pagemap.h>
da4c3c73
JG
20#include <linux/swapops.h>
21#include <linux/hugetlb.h>
4ef589dc 22#include <linux/memremap.h>
c8a53b2d 23#include <linux/sched/mm.h>
7b2d55d2 24#include <linux/jump_label.h>
55c0ece8 25#include <linux/dma-mapping.h>
c0b12405 26#include <linux/mmu_notifier.h>
4ef589dc
JG
27#include <linux/memory_hotplug.h>
28
b756a3b5
AP
29#include "internal.h"
30
74eee180
JG
31struct hmm_vma_walk {
32 struct hmm_range *range;
33 unsigned long last;
74eee180
JG
34};
35
a3eb13c1
JG
36enum {
37 HMM_NEED_FAULT = 1 << 0,
38 HMM_NEED_WRITE_FAULT = 1 << 1,
39 HMM_NEED_ALL_BITS = HMM_NEED_FAULT | HMM_NEED_WRITE_FAULT,
40};
41
d28c2c9a 42static int hmm_pfns_fill(unsigned long addr, unsigned long end,
2733ea14 43 struct hmm_range *range, unsigned long cpu_flags)
da4c3c73 44{
2733ea14 45 unsigned long i = (addr - range->start) >> PAGE_SHIFT;
da4c3c73 46
da4c3c73 47 for (; addr < end; addr += PAGE_SIZE, i++)
2733ea14 48 range->hmm_pfns[i] = cpu_flags;
da4c3c73
JG
49 return 0;
50}
51
5504ed29 52/*
f8c888a3 53 * hmm_vma_fault() - fault in a range lacking valid pmd or pte(s)
d2e8d551 54 * @addr: range virtual start address (inclusive)
5504ed29 55 * @end: range virtual end address (exclusive)
a3eb13c1 56 * @required_fault: HMM_NEED_* flags
5504ed29 57 * @walk: mm_walk structure
f8c888a3 58 * Return: -EBUSY after page fault, or page fault error
5504ed29
JG
59 *
60 * This function will be called whenever pmd_none() or pte_none() returns true,
61 * or whenever there is no page directory covering the virtual address range.
62 */
f8c888a3 63static int hmm_vma_fault(unsigned long addr, unsigned long end,
a3eb13c1 64 unsigned int required_fault, struct mm_walk *walk)
da4c3c73 65{
74eee180 66 struct hmm_vma_walk *hmm_vma_walk = walk->private;
5a0c38d3 67 struct vm_area_struct *vma = walk->vma;
5a0c38d3 68 unsigned int fault_flags = FAULT_FLAG_REMOTE;
da4c3c73 69
a3eb13c1 70 WARN_ON_ONCE(!required_fault);
74eee180 71 hmm_vma_walk->last = addr;
63d5066f 72
a3eb13c1 73 if (required_fault & HMM_NEED_WRITE_FAULT) {
5a0c38d3
CH
74 if (!(vma->vm_flags & VM_WRITE))
75 return -EPERM;
76 fault_flags |= FAULT_FLAG_WRITE;
74eee180
JG
77 }
78
53bfe17f 79 for (; addr < end; addr += PAGE_SIZE)
bce617ed
PX
80 if (handle_mm_fault(vma, addr, fault_flags, NULL) &
81 VM_FAULT_ERROR)
53bfe17f 82 return -EFAULT;
f8c888a3 83 return -EBUSY;
2aee09d8
JG
84}
85
a3eb13c1 86static unsigned int hmm_pte_need_fault(const struct hmm_vma_walk *hmm_vma_walk,
2733ea14
JG
87 unsigned long pfn_req_flags,
88 unsigned long cpu_flags)
2aee09d8 89{
f88a1e90
JG
90 struct hmm_range *range = hmm_vma_walk->range;
91
023a019a
JG
92 /*
93 * So we not only consider the individual per page request we also
94 * consider the default flags requested for the range. The API can
d2e8d551
RC
95 * be used 2 ways. The first one where the HMM user coalesces
96 * multiple page faults into one request and sets flags per pfn for
97 * those faults. The second one where the HMM user wants to pre-
023a019a
JG
98 * fault a range with specific flags. For the latter one it is a
99 * waste to have the user pre-fill the pfn arrays with a default
100 * flags value.
101 */
2733ea14
JG
102 pfn_req_flags &= range->pfn_flags_mask;
103 pfn_req_flags |= range->default_flags;
023a019a 104
2aee09d8 105 /* We aren't ask to do anything ... */
2733ea14 106 if (!(pfn_req_flags & HMM_PFN_REQ_FAULT))
a3eb13c1 107 return 0;
f88a1e90 108
f88a1e90 109 /* Need to write fault ? */
2733ea14
JG
110 if ((pfn_req_flags & HMM_PFN_REQ_WRITE) &&
111 !(cpu_flags & HMM_PFN_WRITE))
a3eb13c1
JG
112 return HMM_NEED_FAULT | HMM_NEED_WRITE_FAULT;
113
114 /* If CPU page table is not valid then we need to fault */
2733ea14 115 if (!(cpu_flags & HMM_PFN_VALID))
a3eb13c1
JG
116 return HMM_NEED_FAULT;
117 return 0;
2aee09d8
JG
118}
119
a3eb13c1
JG
120static unsigned int
121hmm_range_need_fault(const struct hmm_vma_walk *hmm_vma_walk,
2733ea14
JG
122 const unsigned long hmm_pfns[], unsigned long npages,
123 unsigned long cpu_flags)
2aee09d8 124{
6bfef2f9 125 struct hmm_range *range = hmm_vma_walk->range;
a3eb13c1 126 unsigned int required_fault = 0;
2aee09d8
JG
127 unsigned long i;
128
6bfef2f9
JG
129 /*
130 * If the default flags do not request to fault pages, and the mask does
131 * not allow for individual pages to be faulted, then
132 * hmm_pte_need_fault() will always return 0.
133 */
134 if (!((range->default_flags | range->pfn_flags_mask) &
2733ea14 135 HMM_PFN_REQ_FAULT))
a3eb13c1 136 return 0;
2aee09d8
JG
137
138 for (i = 0; i < npages; ++i) {
2733ea14
JG
139 required_fault |= hmm_pte_need_fault(hmm_vma_walk, hmm_pfns[i],
140 cpu_flags);
a3eb13c1
JG
141 if (required_fault == HMM_NEED_ALL_BITS)
142 return required_fault;
2aee09d8 143 }
a3eb13c1 144 return required_fault;
2aee09d8
JG
145}
146
147static int hmm_vma_walk_hole(unsigned long addr, unsigned long end,
b7a16c7a 148 __always_unused int depth, struct mm_walk *walk)
2aee09d8
JG
149{
150 struct hmm_vma_walk *hmm_vma_walk = walk->private;
151 struct hmm_range *range = hmm_vma_walk->range;
a3eb13c1 152 unsigned int required_fault;
2aee09d8 153 unsigned long i, npages;
2733ea14 154 unsigned long *hmm_pfns;
2aee09d8
JG
155
156 i = (addr - range->start) >> PAGE_SHIFT;
157 npages = (end - addr) >> PAGE_SHIFT;
2733ea14
JG
158 hmm_pfns = &range->hmm_pfns[i];
159 required_fault =
160 hmm_range_need_fault(hmm_vma_walk, hmm_pfns, npages, 0);
bd5d3587
JG
161 if (!walk->vma) {
162 if (required_fault)
163 return -EFAULT;
164 return hmm_pfns_fill(addr, end, range, HMM_PFN_ERROR);
165 }
a3eb13c1
JG
166 if (required_fault)
167 return hmm_vma_fault(addr, end, required_fault, walk);
2733ea14 168 return hmm_pfns_fill(addr, end, range, 0);
2aee09d8
JG
169}
170
3b50a6e5
RC
171static inline unsigned long hmm_pfn_flags_order(unsigned long order)
172{
173 return order << HMM_PFN_ORDER_SHIFT;
174}
175
2733ea14
JG
176static inline unsigned long pmd_to_hmm_pfn_flags(struct hmm_range *range,
177 pmd_t pmd)
2aee09d8
JG
178{
179 if (pmd_protnone(pmd))
180 return 0;
3b50a6e5
RC
181 return (pmd_write(pmd) ? (HMM_PFN_VALID | HMM_PFN_WRITE) :
182 HMM_PFN_VALID) |
183 hmm_pfn_flags_order(PMD_SHIFT - PAGE_SHIFT);
da4c3c73
JG
184}
185
992de9a8 186#ifdef CONFIG_TRANSPARENT_HUGEPAGE
9d3973d6 187static int hmm_vma_handle_pmd(struct mm_walk *walk, unsigned long addr,
2733ea14
JG
188 unsigned long end, unsigned long hmm_pfns[],
189 pmd_t pmd)
9d3973d6 190{
53f5c3f4 191 struct hmm_vma_walk *hmm_vma_walk = walk->private;
f88a1e90 192 struct hmm_range *range = hmm_vma_walk->range;
2aee09d8 193 unsigned long pfn, npages, i;
a3eb13c1 194 unsigned int required_fault;
2733ea14 195 unsigned long cpu_flags;
53f5c3f4 196
2aee09d8 197 npages = (end - addr) >> PAGE_SHIFT;
f88a1e90 198 cpu_flags = pmd_to_hmm_pfn_flags(range, pmd);
a3eb13c1 199 required_fault =
2733ea14 200 hmm_range_need_fault(hmm_vma_walk, hmm_pfns, npages, cpu_flags);
a3eb13c1
JG
201 if (required_fault)
202 return hmm_vma_fault(addr, end, required_fault, walk);
53f5c3f4 203
309f9a4f 204 pfn = pmd_pfn(pmd) + ((addr & ~PMD_MASK) >> PAGE_SHIFT);
068354ad 205 for (i = 0; addr < end; addr += PAGE_SIZE, i++, pfn++)
2733ea14 206 hmm_pfns[i] = pfn | cpu_flags;
53f5c3f4
JG
207 return 0;
208}
9d3973d6
CH
209#else /* CONFIG_TRANSPARENT_HUGEPAGE */
210/* stub to allow the code below to compile */
211int hmm_vma_handle_pmd(struct mm_walk *walk, unsigned long addr,
2733ea14 212 unsigned long end, unsigned long hmm_pfns[], pmd_t pmd);
9d3973d6 213#endif /* CONFIG_TRANSPARENT_HUGEPAGE */
53f5c3f4 214
08ddddda
CH
215static inline bool hmm_is_device_private_entry(struct hmm_range *range,
216 swp_entry_t entry)
217{
218 return is_device_private_entry(entry) &&
af5cdaf8 219 pfn_swap_entry_to_page(entry)->pgmap->owner ==
08ddddda
CH
220 range->dev_private_owner;
221}
222
2733ea14
JG
223static inline unsigned long pte_to_hmm_pfn_flags(struct hmm_range *range,
224 pte_t pte)
2aee09d8 225{
789c2af8 226 if (pte_none(pte) || !pte_present(pte) || pte_protnone(pte))
2aee09d8 227 return 0;
2733ea14 228 return pte_write(pte) ? (HMM_PFN_VALID | HMM_PFN_WRITE) : HMM_PFN_VALID;
2aee09d8
JG
229}
230
53f5c3f4
JG
231static int hmm_vma_handle_pte(struct mm_walk *walk, unsigned long addr,
232 unsigned long end, pmd_t *pmdp, pte_t *ptep,
2733ea14 233 unsigned long *hmm_pfn)
53f5c3f4
JG
234{
235 struct hmm_vma_walk *hmm_vma_walk = walk->private;
f88a1e90 236 struct hmm_range *range = hmm_vma_walk->range;
a3eb13c1 237 unsigned int required_fault;
2733ea14 238 unsigned long cpu_flags;
53f5c3f4 239 pte_t pte = *ptep;
2733ea14 240 uint64_t pfn_req_flags = *hmm_pfn;
53f5c3f4 241
53f5c3f4 242 if (pte_none(pte)) {
2733ea14
JG
243 required_fault =
244 hmm_pte_need_fault(hmm_vma_walk, pfn_req_flags, 0);
a3eb13c1 245 if (required_fault)
53f5c3f4 246 goto fault;
2733ea14 247 *hmm_pfn = 0;
53f5c3f4
JG
248 return 0;
249 }
250
251 if (!pte_present(pte)) {
252 swp_entry_t entry = pte_to_swp_entry(pte);
253
53f5c3f4 254 /*
0cb80a2f 255 * Never fault in device private pages, but just report
17ffdc48 256 * the PFN even if not present.
53f5c3f4 257 */
08ddddda 258 if (hmm_is_device_private_entry(range, entry)) {
2733ea14 259 cpu_flags = HMM_PFN_VALID;
4dd845b5 260 if (is_writable_device_private_entry(entry))
2733ea14 261 cpu_flags |= HMM_PFN_WRITE;
af5cdaf8 262 *hmm_pfn = swp_offset(entry) | cpu_flags;
53f5c3f4
JG
263 return 0;
264 }
265
2733ea14
JG
266 required_fault =
267 hmm_pte_need_fault(hmm_vma_walk, pfn_req_flags, 0);
846babe8 268 if (!required_fault) {
2733ea14 269 *hmm_pfn = 0;
53f5c3f4 270 return 0;
846babe8 271 }
76612d6c
JG
272
273 if (!non_swap_entry(entry))
274 goto fault;
275
b756a3b5
AP
276 if (is_device_exclusive_entry(entry))
277 goto fault;
278
76612d6c
JG
279 if (is_migration_entry(entry)) {
280 pte_unmap(ptep);
281 hmm_vma_walk->last = addr;
282 migration_entry_wait(walk->mm, pmdp, addr);
283 return -EBUSY;
53f5c3f4
JG
284 }
285
286 /* Report error for everything else */
dfdc2207 287 pte_unmap(ptep);
53f5c3f4
JG
288 return -EFAULT;
289 }
290
76612d6c 291 cpu_flags = pte_to_hmm_pfn_flags(range, pte);
2733ea14
JG
292 required_fault =
293 hmm_pte_need_fault(hmm_vma_walk, pfn_req_flags, cpu_flags);
a3eb13c1 294 if (required_fault)
53f5c3f4
JG
295 goto fault;
296
40550627 297 /*
4b42fb21
LZ
298 * Bypass devmap pte such as DAX page when all pfn requested
299 * flags(pfn_req_flags) are fulfilled.
40550627
JG
300 * Since each architecture defines a struct page for the zero page, just
301 * fall through and treat it like a normal page.
302 */
6d398b0f
AP
303 if (!vm_normal_page(walk->vma, addr, pte) &&
304 !pte_devmap(pte) &&
4b42fb21 305 !is_zero_pfn(pte_pfn(pte))) {
2733ea14 306 if (hmm_pte_need_fault(hmm_vma_walk, pfn_req_flags, 0)) {
dfdc2207 307 pte_unmap(ptep);
ac541f25
RC
308 return -EFAULT;
309 }
2733ea14 310 *hmm_pfn = HMM_PFN_ERROR;
40550627 311 return 0;
992de9a8
JG
312 }
313
2733ea14 314 *hmm_pfn = pte_pfn(pte) | cpu_flags;
53f5c3f4
JG
315 return 0;
316
317fault:
318 pte_unmap(ptep);
319 /* Fault any virtual address we were asked to fault */
a3eb13c1 320 return hmm_vma_fault(addr, end, required_fault, walk);
53f5c3f4
JG
321}
322
da4c3c73
JG
323static int hmm_vma_walk_pmd(pmd_t *pmdp,
324 unsigned long start,
325 unsigned long end,
326 struct mm_walk *walk)
327{
74eee180
JG
328 struct hmm_vma_walk *hmm_vma_walk = walk->private;
329 struct hmm_range *range = hmm_vma_walk->range;
2733ea14
JG
330 unsigned long *hmm_pfns =
331 &range->hmm_pfns[(start - range->start) >> PAGE_SHIFT];
2288a9a6
JG
332 unsigned long npages = (end - start) >> PAGE_SHIFT;
333 unsigned long addr = start;
da4c3c73 334 pte_t *ptep;
d08faca0 335 pmd_t pmd;
da4c3c73 336
da4c3c73 337again:
d08faca0
JG
338 pmd = READ_ONCE(*pmdp);
339 if (pmd_none(pmd))
b7a16c7a 340 return hmm_vma_walk_hole(start, end, -1, walk);
da4c3c73 341
d08faca0 342 if (thp_migration_supported() && is_pmd_migration_entry(pmd)) {
2733ea14 343 if (hmm_range_need_fault(hmm_vma_walk, hmm_pfns, npages, 0)) {
d08faca0 344 hmm_vma_walk->last = addr;
d2e8d551 345 pmd_migration_entry_wait(walk->mm, pmdp);
73231612 346 return -EBUSY;
d08faca0 347 }
2733ea14 348 return hmm_pfns_fill(start, end, range, 0);
2288a9a6
JG
349 }
350
351 if (!pmd_present(pmd)) {
2733ea14 352 if (hmm_range_need_fault(hmm_vma_walk, hmm_pfns, npages, 0))
2288a9a6 353 return -EFAULT;
d28c2c9a 354 return hmm_pfns_fill(start, end, range, HMM_PFN_ERROR);
2288a9a6 355 }
da4c3c73 356
d08faca0 357 if (pmd_devmap(pmd) || pmd_trans_huge(pmd)) {
da4c3c73 358 /*
d2e8d551 359 * No need to take pmd_lock here, even if some other thread
da4c3c73
JG
360 * is splitting the huge pmd we will get that event through
361 * mmu_notifier callback.
362 *
d2e8d551 363 * So just read pmd value and check again it's a transparent
da4c3c73
JG
364 * huge or device mapping one and compute corresponding pfn
365 * values.
366 */
367 pmd = pmd_read_atomic(pmdp);
368 barrier();
369 if (!pmd_devmap(pmd) && !pmd_trans_huge(pmd))
370 goto again;
74eee180 371
2733ea14 372 return hmm_vma_handle_pmd(walk, addr, end, hmm_pfns, pmd);
da4c3c73
JG
373 }
374
d08faca0 375 /*
d2e8d551 376 * We have handled all the valid cases above ie either none, migration,
d08faca0
JG
377 * huge or transparent huge. At this point either it is a valid pmd
378 * entry pointing to pte directory or it is a bad pmd that will not
379 * recover.
380 */
2288a9a6 381 if (pmd_bad(pmd)) {
2733ea14 382 if (hmm_range_need_fault(hmm_vma_walk, hmm_pfns, npages, 0))
2288a9a6 383 return -EFAULT;
d28c2c9a 384 return hmm_pfns_fill(start, end, range, HMM_PFN_ERROR);
2288a9a6 385 }
da4c3c73
JG
386
387 ptep = pte_offset_map(pmdp, addr);
2733ea14 388 for (; addr < end; addr += PAGE_SIZE, ptep++, hmm_pfns++) {
53f5c3f4 389 int r;
74eee180 390
2733ea14 391 r = hmm_vma_handle_pte(walk, addr, end, pmdp, ptep, hmm_pfns);
53f5c3f4 392 if (r) {
dfdc2207 393 /* hmm_vma_handle_pte() did pte_unmap() */
53f5c3f4 394 return r;
74eee180 395 }
da4c3c73
JG
396 }
397 pte_unmap(ptep - 1);
da4c3c73
JG
398 return 0;
399}
400
f0b3c45c
CH
401#if defined(CONFIG_ARCH_HAS_PTE_DEVMAP) && \
402 defined(CONFIG_HAVE_ARCH_TRANSPARENT_HUGEPAGE_PUD)
2733ea14
JG
403static inline unsigned long pud_to_hmm_pfn_flags(struct hmm_range *range,
404 pud_t pud)
f0b3c45c
CH
405{
406 if (!pud_present(pud))
407 return 0;
3b50a6e5
RC
408 return (pud_write(pud) ? (HMM_PFN_VALID | HMM_PFN_WRITE) :
409 HMM_PFN_VALID) |
410 hmm_pfn_flags_order(PUD_SHIFT - PAGE_SHIFT);
f0b3c45c
CH
411}
412
413static int hmm_vma_walk_pud(pud_t *pudp, unsigned long start, unsigned long end,
414 struct mm_walk *walk)
992de9a8
JG
415{
416 struct hmm_vma_walk *hmm_vma_walk = walk->private;
417 struct hmm_range *range = hmm_vma_walk->range;
3afc4236 418 unsigned long addr = start;
992de9a8 419 pud_t pud;
3afc4236
SP
420 int ret = 0;
421 spinlock_t *ptl = pud_trans_huge_lock(pudp, walk->vma);
422
423 if (!ptl)
424 return 0;
425
426 /* Normally we don't want to split the huge page */
427 walk->action = ACTION_CONTINUE;
992de9a8 428
992de9a8 429 pud = READ_ONCE(*pudp);
3afc4236 430 if (pud_none(pud)) {
05fc1df9
JG
431 spin_unlock(ptl);
432 return hmm_vma_walk_hole(start, end, -1, walk);
3afc4236 433 }
992de9a8
JG
434
435 if (pud_huge(pud) && pud_devmap(pud)) {
436 unsigned long i, npages, pfn;
a3eb13c1 437 unsigned int required_fault;
2733ea14
JG
438 unsigned long *hmm_pfns;
439 unsigned long cpu_flags;
992de9a8 440
3afc4236 441 if (!pud_present(pud)) {
05fc1df9
JG
442 spin_unlock(ptl);
443 return hmm_vma_walk_hole(start, end, -1, walk);
3afc4236 444 }
992de9a8
JG
445
446 i = (addr - range->start) >> PAGE_SHIFT;
447 npages = (end - addr) >> PAGE_SHIFT;
2733ea14 448 hmm_pfns = &range->hmm_pfns[i];
992de9a8
JG
449
450 cpu_flags = pud_to_hmm_pfn_flags(range, pud);
2733ea14 451 required_fault = hmm_range_need_fault(hmm_vma_walk, hmm_pfns,
a3eb13c1
JG
452 npages, cpu_flags);
453 if (required_fault) {
05fc1df9 454 spin_unlock(ptl);
a3eb13c1 455 return hmm_vma_fault(addr, end, required_fault, walk);
3afc4236 456 }
992de9a8 457
992de9a8 458 pfn = pud_pfn(pud) + ((addr & ~PUD_MASK) >> PAGE_SHIFT);
068354ad 459 for (i = 0; i < npages; ++i, ++pfn)
2733ea14 460 hmm_pfns[i] = pfn | cpu_flags;
3afc4236 461 goto out_unlock;
992de9a8
JG
462 }
463
3afc4236
SP
464 /* Ask for the PUD to be split */
465 walk->action = ACTION_SUBTREE;
992de9a8 466
3afc4236
SP
467out_unlock:
468 spin_unlock(ptl);
469 return ret;
992de9a8 470}
f0b3c45c
CH
471#else
472#define hmm_vma_walk_pud NULL
473#endif
992de9a8 474
251bbe59 475#ifdef CONFIG_HUGETLB_PAGE
63d5066f
JG
476static int hmm_vma_walk_hugetlb_entry(pte_t *pte, unsigned long hmask,
477 unsigned long start, unsigned long end,
478 struct mm_walk *walk)
479{
05c23af4 480 unsigned long addr = start, i, pfn;
63d5066f
JG
481 struct hmm_vma_walk *hmm_vma_walk = walk->private;
482 struct hmm_range *range = hmm_vma_walk->range;
483 struct vm_area_struct *vma = walk->vma;
a3eb13c1 484 unsigned int required_fault;
2733ea14
JG
485 unsigned long pfn_req_flags;
486 unsigned long cpu_flags;
63d5066f
JG
487 spinlock_t *ptl;
488 pte_t entry;
63d5066f 489
d2e8d551 490 ptl = huge_pte_lock(hstate_vma(vma), walk->mm, pte);
63d5066f
JG
491 entry = huge_ptep_get(pte);
492
7f08263d 493 i = (start - range->start) >> PAGE_SHIFT;
2733ea14 494 pfn_req_flags = range->hmm_pfns[i];
3b50a6e5
RC
495 cpu_flags = pte_to_hmm_pfn_flags(range, entry) |
496 hmm_pfn_flags_order(huge_page_order(hstate_vma(vma)));
2733ea14
JG
497 required_fault =
498 hmm_pte_need_fault(hmm_vma_walk, pfn_req_flags, cpu_flags);
a3eb13c1 499 if (required_fault) {
45050692 500 spin_unlock(ptl);
a3eb13c1 501 return hmm_vma_fault(addr, end, required_fault, walk);
63d5066f
JG
502 }
503
05c23af4 504 pfn = pte_pfn(entry) + ((start & ~hmask) >> PAGE_SHIFT);
7f08263d 505 for (; addr < end; addr += PAGE_SIZE, i++, pfn++)
2733ea14
JG
506 range->hmm_pfns[i] = pfn | cpu_flags;
507
63d5066f 508 spin_unlock(ptl);
45050692 509 return 0;
63d5066f 510}
251bbe59
CH
511#else
512#define hmm_vma_walk_hugetlb_entry NULL
513#endif /* CONFIG_HUGETLB_PAGE */
63d5066f 514
d28c2c9a
RC
515static int hmm_vma_walk_test(unsigned long start, unsigned long end,
516 struct mm_walk *walk)
33cd47dc 517{
d28c2c9a
RC
518 struct hmm_vma_walk *hmm_vma_walk = walk->private;
519 struct hmm_range *range = hmm_vma_walk->range;
520 struct vm_area_struct *vma = walk->vma;
521
6d398b0f 522 if (!(vma->vm_flags & (VM_IO | VM_PFNMAP)) &&
a3eb13c1
JG
523 vma->vm_flags & VM_READ)
524 return 0;
525
d28c2c9a 526 /*
a3eb13c1
JG
527 * vma ranges that don't have struct page backing them or map I/O
528 * devices directly cannot be handled by hmm_range_fault().
c2579c9c 529 *
d28c2c9a 530 * If the vma does not allow read access, then assume that it does not
c2579c9c
JG
531 * allow write access either. HMM does not support architectures that
532 * allow write without read.
a3eb13c1
JG
533 *
534 * If a fault is requested for an unsupported range then it is a hard
535 * failure.
d28c2c9a 536 */
a3eb13c1 537 if (hmm_range_need_fault(hmm_vma_walk,
2733ea14 538 range->hmm_pfns +
a3eb13c1
JG
539 ((start - range->start) >> PAGE_SHIFT),
540 (end - start) >> PAGE_SHIFT, 0))
541 return -EFAULT;
d28c2c9a 542
a3eb13c1 543 hmm_pfns_fill(start, end, range, HMM_PFN_ERROR);
d28c2c9a 544
a3eb13c1
JG
545 /* Skip this vma and continue processing the next vma. */
546 return 1;
33cd47dc
JG
547}
548
7b86ac33
CH
549static const struct mm_walk_ops hmm_walk_ops = {
550 .pud_entry = hmm_vma_walk_pud,
551 .pmd_entry = hmm_vma_walk_pmd,
552 .pte_hole = hmm_vma_walk_hole,
553 .hugetlb_entry = hmm_vma_walk_hugetlb_entry,
d28c2c9a 554 .test_walk = hmm_vma_walk_test,
7b86ac33
CH
555};
556
9a4903e4
CH
557/**
558 * hmm_range_fault - try to fault some address in a virtual address range
f970b977 559 * @range: argument structure
9a4903e4 560 *
be957c88 561 * Returns 0 on success or one of the following error codes:
73231612 562 *
9a4903e4
CH
563 * -EINVAL: Invalid arguments or mm or virtual address is in an invalid vma
564 * (e.g., device file vma).
565 * -ENOMEM: Out of memory.
566 * -EPERM: Invalid permission (e.g., asking for write and range is read
567 * only).
9a4903e4
CH
568 * -EBUSY: The range has been invalidated and the caller needs to wait for
569 * the invalidation to finish.
f970b977
JG
570 * -EFAULT: A page was requested to be valid and could not be made valid
571 * ie it has no backing VMA or it is illegal to access
74eee180 572 *
f970b977
JG
573 * This is similar to get_user_pages(), except that it can read the page tables
574 * without mutating them (ie causing faults).
74eee180 575 */
be957c88 576int hmm_range_fault(struct hmm_range *range)
74eee180 577{
d28c2c9a
RC
578 struct hmm_vma_walk hmm_vma_walk = {
579 .range = range,
580 .last = range->start,
d28c2c9a 581 };
a22dd506 582 struct mm_struct *mm = range->notifier->mm;
74eee180
JG
583 int ret;
584
42fc5414 585 mmap_assert_locked(mm);
704f3f2c 586
a3e0d41c
JG
587 do {
588 /* If range is no longer valid force retry. */
a22dd506
JG
589 if (mmu_interval_check_retry(range->notifier,
590 range->notifier_seq))
2bcbeaef 591 return -EBUSY;
d28c2c9a
RC
592 ret = walk_page_range(mm, hmm_vma_walk.last, range->end,
593 &hmm_walk_ops, &hmm_vma_walk);
be957c88
JG
594 /*
595 * When -EBUSY is returned the loop restarts with
596 * hmm_vma_walk.last set to an address that has not been stored
597 * in pfns. All entries < last in the pfn array are set to their
598 * output, and all >= are still at their input values.
599 */
d28c2c9a 600 } while (ret == -EBUSY);
be957c88 601 return ret;
74eee180 602}
73231612 603EXPORT_SYMBOL(hmm_range_fault);