mirror of
https://github.com/raspberrypi/linux.git
synced 2025-12-22 17:52:09 +00:00
Pull MM updates from Andrew Morton:
- The series "zram: optimal post-processing target selection" from
Sergey Senozhatsky improves zram's post-processing selection
algorithm. This leads to improved memory savings.
- Wei Yang has gone to town on the mapletree code, contributing several
series which clean up the implementation:
- "refine mas_mab_cp()"
- "Reduce the space to be cleared for maple_big_node"
- "maple_tree: simplify mas_push_node()"
- "Following cleanup after introduce mas_wr_store_type()"
- "refine storing null"
- The series "selftests/mm: hugetlb_fault_after_madv improvements" from
David Hildenbrand fixes this selftest for s390.
- The series "introduce pte_offset_map_{ro|rw}_nolock()" from Qi Zheng
implements some rationaizations and cleanups in the page mapping
code.
- The series "mm: optimize shadow entries removal" from Shakeel Butt
optimizes the file truncation code by speeding up the handling of
shadow entries.
- The series "Remove PageKsm()" from Matthew Wilcox completes the
migration of this flag over to being a folio-based flag.
- The series "Unify hugetlb into arch_get_unmapped_area functions" from
Oscar Salvador implements a bunch of consolidations and cleanups in
the hugetlb code.
- The series "Do not shatter hugezeropage on wp-fault" from Dev Jain
takes away the wp-fault time practice of turning a huge zero page
into small pages. Instead we replace the whole thing with a THP. More
consistent cleaner and potentiall saves a large number of pagefaults.
- The series "percpu: Add a test case and fix for clang" from Andy
Shevchenko enhances and fixes the kernel's built in percpu test code.
- The series "mm/mremap: Remove extra vma tree walk" from Liam Howlett
optimizes mremap() by avoiding doing things which we didn't need to
do.
- The series "Improve the tmpfs large folio read performance" from
Baolin Wang teaches tmpfs to copy data into userspace at the folio
size rather than as individual pages. A 20% speedup was observed.
- The series "mm/damon/vaddr: Fix issue in
damon_va_evenly_split_region()" fro Zheng Yejian fixes DAMON
splitting.
- The series "memcg-v1: fully deprecate charge moving" from Shakeel
Butt removes the long-deprecated memcgv2 charge moving feature.
- The series "fix error handling in mmap_region() and refactor" from
Lorenzo Stoakes cleanup up some of the mmap() error handling and
addresses some potential performance issues.
- The series "x86/module: use large ROX pages for text allocations"
from Mike Rapoport teaches x86 to use large pages for
read-only-execute module text.
- The series "page allocation tag compression" from Suren Baghdasaryan
is followon maintenance work for the new page allocation profiling
feature.
- The series "page->index removals in mm" from Matthew Wilcox remove
most references to page->index in mm/. A slow march towards shrinking
struct page.
- The series "damon/{self,kunit}tests: minor fixups for DAMON debugfs
interface tests" from Andrew Paniakin performs maintenance work for
DAMON's self testing code.
- The series "mm: zswap swap-out of large folios" from Kanchana Sridhar
improves zswap's batching of compression and decompression. It is a
step along the way towards using Intel IAA hardware acceleration for
this zswap operation.
- The series "kasan: migrate the last module test to kunit" from
Sabyrzhan Tasbolatov completes the migration of the KASAN built-in
tests over to the KUnit framework.
- The series "implement lightweight guard pages" from Lorenzo Stoakes
permits userapace to place fault-generating guard pages within a
single VMA, rather than requiring that multiple VMAs be created for
this. Improved efficiencies for userspace memory allocators are
expected.
- The series "memcg: tracepoint for flushing stats" from JP Kobryn uses
tracepoints to provide increased visibility into memcg stats flushing
activity.
- The series "zram: IDLE flag handling fixes" from Sergey Senozhatsky
fixes a zram buglet which potentially affected performance.
- The series "mm: add more kernel parameters to control mTHP" from
Maíra Canal enhances our ability to control/configuremultisize THP
from the kernel boot command line.
- The series "kasan: few improvements on kunit tests" from Sabyrzhan
Tasbolatov has a couple of fixups for the KASAN KUnit tests.
- The series "mm/list_lru: Split list_lru lock into per-cgroup scope"
from Kairui Song optimizes list_lru memory utilization when lockdep
is enabled.
* tag 'mm-stable-2024-11-18-19-27' of git://git.kernel.org/pub/scm/linux/kernel/git/akpm/mm: (215 commits)
cma: enforce non-zero pageblock_order during cma_init_reserved_mem()
mm/kfence: add a new kunit test test_use_after_free_read_nofault()
zram: fix NULL pointer in comp_algorithm_show()
memcg/hugetlb: add hugeTLB counters to memcg
vmstat: call fold_vm_zone_numa_events() before show per zone NUMA event
mm: mmap_lock: check trace_mmap_lock_$type_enabled() instead of regcount
zram: ZRAM_DEF_COMP should depend on ZRAM
MAINTAINERS/MEMORY MANAGEMENT: add document files for mm
Docs/mm/damon: recommend academic papers to read and/or cite
mm: define general function pXd_init()
kmemleak: iommu/iova: fix transient kmemleak false positive
mm/list_lru: simplify the list_lru walk callback function
mm/list_lru: split the lock to per-cgroup scope
mm/list_lru: simplify reparenting and initial allocation
mm/list_lru: code clean up for reparenting
mm/list_lru: don't export list_lru_add
mm/list_lru: don't pass unnecessary key parameters
kasan: add kunit tests for kmalloc_track_caller, kmalloc_node_track_caller
kasan: change kasan_atomics kunit test as KUNIT_CASE_SLOW
kasan: use EXPORT_SYMBOL_IF_KUNIT to export symbols
...
408 lines
10 KiB
C
408 lines
10 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* Copyright 2007 Andi Kleen, SUSE Labs.
|
|
*
|
|
* This contains most of the x86 vDSO kernel-side code.
|
|
*/
|
|
#include <linux/mm.h>
|
|
#include <linux/err.h>
|
|
#include <linux/sched.h>
|
|
#include <linux/sched/task_stack.h>
|
|
#include <linux/slab.h>
|
|
#include <linux/init.h>
|
|
#include <linux/random.h>
|
|
#include <linux/elf.h>
|
|
#include <linux/cpu.h>
|
|
#include <linux/ptrace.h>
|
|
#include <linux/time_namespace.h>
|
|
|
|
#include <asm/pvclock.h>
|
|
#include <asm/vgtod.h>
|
|
#include <asm/proto.h>
|
|
#include <asm/vdso.h>
|
|
#include <asm/tlb.h>
|
|
#include <asm/page.h>
|
|
#include <asm/desc.h>
|
|
#include <asm/cpufeature.h>
|
|
#include <asm/vdso/vsyscall.h>
|
|
#include <clocksource/hyperv_timer.h>
|
|
|
|
struct vdso_data *arch_get_vdso_data(void *vvar_page)
|
|
{
|
|
return (struct vdso_data *)vvar_page;
|
|
}
|
|
|
|
static union vdso_data_store vdso_data_store __page_aligned_data;
|
|
struct vdso_data *vdso_data = vdso_data_store.data;
|
|
|
|
unsigned int vclocks_used __read_mostly;
|
|
|
|
#if defined(CONFIG_X86_64)
|
|
unsigned int __read_mostly vdso64_enabled = 1;
|
|
#endif
|
|
|
|
int __init init_vdso_image(const struct vdso_image *image)
|
|
{
|
|
BUILD_BUG_ON(VDSO_CLOCKMODE_MAX >= 32);
|
|
BUG_ON(image->size % PAGE_SIZE != 0);
|
|
|
|
apply_alternatives((struct alt_instr *)(image->data + image->alt),
|
|
(struct alt_instr *)(image->data + image->alt +
|
|
image->alt_len),
|
|
NULL);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static const struct vm_special_mapping vvar_mapping;
|
|
struct linux_binprm;
|
|
|
|
static vm_fault_t vdso_fault(const struct vm_special_mapping *sm,
|
|
struct vm_area_struct *vma, struct vm_fault *vmf)
|
|
{
|
|
const struct vdso_image *image = vma->vm_mm->context.vdso_image;
|
|
|
|
if (!image || (vmf->pgoff << PAGE_SHIFT) >= image->size)
|
|
return VM_FAULT_SIGBUS;
|
|
|
|
vmf->page = virt_to_page(image->data + (vmf->pgoff << PAGE_SHIFT));
|
|
get_page(vmf->page);
|
|
return 0;
|
|
}
|
|
|
|
static void vdso_fix_landing(const struct vdso_image *image,
|
|
struct vm_area_struct *new_vma)
|
|
{
|
|
#if defined CONFIG_X86_32 || defined CONFIG_IA32_EMULATION
|
|
if (in_ia32_syscall() && image == &vdso_image_32) {
|
|
struct pt_regs *regs = current_pt_regs();
|
|
unsigned long vdso_land = image->sym_int80_landing_pad;
|
|
unsigned long old_land_addr = vdso_land +
|
|
(unsigned long)current->mm->context.vdso;
|
|
|
|
/* Fixing userspace landing - look at do_fast_syscall_32 */
|
|
if (regs->ip == old_land_addr)
|
|
regs->ip = new_vma->vm_start + vdso_land;
|
|
}
|
|
#endif
|
|
}
|
|
|
|
static int vdso_mremap(const struct vm_special_mapping *sm,
|
|
struct vm_area_struct *new_vma)
|
|
{
|
|
const struct vdso_image *image = current->mm->context.vdso_image;
|
|
|
|
vdso_fix_landing(image, new_vma);
|
|
current->mm->context.vdso = (void __user *)new_vma->vm_start;
|
|
|
|
return 0;
|
|
}
|
|
|
|
#ifdef CONFIG_TIME_NS
|
|
/*
|
|
* The vvar page layout depends on whether a task belongs to the root or
|
|
* non-root time namespace. Whenever a task changes its namespace, the VVAR
|
|
* page tables are cleared and then they will re-faulted with a
|
|
* corresponding layout.
|
|
* See also the comment near timens_setup_vdso_data() for details.
|
|
*/
|
|
int vdso_join_timens(struct task_struct *task, struct time_namespace *ns)
|
|
{
|
|
struct mm_struct *mm = task->mm;
|
|
struct vm_area_struct *vma;
|
|
VMA_ITERATOR(vmi, mm, 0);
|
|
|
|
mmap_read_lock(mm);
|
|
for_each_vma(vmi, vma) {
|
|
if (vma_is_special_mapping(vma, &vvar_mapping))
|
|
zap_vma_pages(vma);
|
|
}
|
|
mmap_read_unlock(mm);
|
|
|
|
return 0;
|
|
}
|
|
#endif
|
|
|
|
static vm_fault_t vvar_fault(const struct vm_special_mapping *sm,
|
|
struct vm_area_struct *vma, struct vm_fault *vmf)
|
|
{
|
|
const struct vdso_image *image = vma->vm_mm->context.vdso_image;
|
|
unsigned long pfn;
|
|
long sym_offset;
|
|
|
|
if (!image)
|
|
return VM_FAULT_SIGBUS;
|
|
|
|
sym_offset = (long)(vmf->pgoff << PAGE_SHIFT) +
|
|
image->sym_vvar_start;
|
|
|
|
/*
|
|
* Sanity check: a symbol offset of zero means that the page
|
|
* does not exist for this vdso image, not that the page is at
|
|
* offset zero relative to the text mapping. This should be
|
|
* impossible here, because sym_offset should only be zero for
|
|
* the page past the end of the vvar mapping.
|
|
*/
|
|
if (sym_offset == 0)
|
|
return VM_FAULT_SIGBUS;
|
|
|
|
if (sym_offset == image->sym_vvar_page) {
|
|
struct page *timens_page = find_timens_vvar_page(vma);
|
|
|
|
pfn = __pa_symbol(vdso_data) >> PAGE_SHIFT;
|
|
|
|
/*
|
|
* If a task belongs to a time namespace then a namespace
|
|
* specific VVAR is mapped with the sym_vvar_page offset and
|
|
* the real VVAR page is mapped with the sym_timens_page
|
|
* offset.
|
|
* See also the comment near timens_setup_vdso_data().
|
|
*/
|
|
if (timens_page) {
|
|
unsigned long addr;
|
|
vm_fault_t err;
|
|
|
|
/*
|
|
* Optimization: inside time namespace pre-fault
|
|
* VVAR page too. As on timens page there are only
|
|
* offsets for clocks on VVAR, it'll be faulted
|
|
* shortly by VDSO code.
|
|
*/
|
|
addr = vmf->address + (image->sym_timens_page - sym_offset);
|
|
err = vmf_insert_pfn(vma, addr, pfn);
|
|
if (unlikely(err & VM_FAULT_ERROR))
|
|
return err;
|
|
|
|
pfn = page_to_pfn(timens_page);
|
|
}
|
|
|
|
return vmf_insert_pfn(vma, vmf->address, pfn);
|
|
|
|
} else if (sym_offset == image->sym_timens_page) {
|
|
struct page *timens_page = find_timens_vvar_page(vma);
|
|
|
|
if (!timens_page)
|
|
return VM_FAULT_SIGBUS;
|
|
|
|
pfn = __pa_symbol(vdso_data) >> PAGE_SHIFT;
|
|
return vmf_insert_pfn(vma, vmf->address, pfn);
|
|
}
|
|
|
|
return VM_FAULT_SIGBUS;
|
|
}
|
|
|
|
static vm_fault_t vvar_vclock_fault(const struct vm_special_mapping *sm,
|
|
struct vm_area_struct *vma, struct vm_fault *vmf)
|
|
{
|
|
switch (vmf->pgoff) {
|
|
#ifdef CONFIG_PARAVIRT_CLOCK
|
|
case VDSO_PAGE_PVCLOCK_OFFSET:
|
|
{
|
|
struct pvclock_vsyscall_time_info *pvti =
|
|
pvclock_get_pvti_cpu0_va();
|
|
|
|
if (pvti && vclock_was_used(VDSO_CLOCKMODE_PVCLOCK))
|
|
return vmf_insert_pfn_prot(vma, vmf->address,
|
|
__pa(pvti) >> PAGE_SHIFT,
|
|
pgprot_decrypted(vma->vm_page_prot));
|
|
break;
|
|
}
|
|
#endif /* CONFIG_PARAVIRT_CLOCK */
|
|
#ifdef CONFIG_HYPERV_TIMER
|
|
case VDSO_PAGE_HVCLOCK_OFFSET:
|
|
{
|
|
unsigned long pfn = hv_get_tsc_pfn();
|
|
|
|
if (pfn && vclock_was_used(VDSO_CLOCKMODE_HVCLOCK))
|
|
return vmf_insert_pfn(vma, vmf->address, pfn);
|
|
break;
|
|
}
|
|
#endif /* CONFIG_HYPERV_TIMER */
|
|
}
|
|
|
|
return VM_FAULT_SIGBUS;
|
|
}
|
|
|
|
static const struct vm_special_mapping vdso_mapping = {
|
|
.name = "[vdso]",
|
|
.fault = vdso_fault,
|
|
.mremap = vdso_mremap,
|
|
};
|
|
static const struct vm_special_mapping vvar_mapping = {
|
|
.name = "[vvar]",
|
|
.fault = vvar_fault,
|
|
};
|
|
static const struct vm_special_mapping vvar_vclock_mapping = {
|
|
.name = "[vvar_vclock]",
|
|
.fault = vvar_vclock_fault,
|
|
};
|
|
|
|
/*
|
|
* Add vdso and vvar mappings to current process.
|
|
* @image - blob to map
|
|
* @addr - request a specific address (zero to map at free addr)
|
|
*/
|
|
static int map_vdso(const struct vdso_image *image, unsigned long addr)
|
|
{
|
|
struct mm_struct *mm = current->mm;
|
|
struct vm_area_struct *vma;
|
|
unsigned long text_start;
|
|
int ret = 0;
|
|
|
|
if (mmap_write_lock_killable(mm))
|
|
return -EINTR;
|
|
|
|
addr = get_unmapped_area(NULL, addr,
|
|
image->size - image->sym_vvar_start, 0, 0);
|
|
if (IS_ERR_VALUE(addr)) {
|
|
ret = addr;
|
|
goto up_fail;
|
|
}
|
|
|
|
text_start = addr - image->sym_vvar_start;
|
|
|
|
/*
|
|
* MAYWRITE to allow gdb to COW and set breakpoints
|
|
*/
|
|
vma = _install_special_mapping(mm,
|
|
text_start,
|
|
image->size,
|
|
VM_READ|VM_EXEC|
|
|
VM_MAYREAD|VM_MAYWRITE|VM_MAYEXEC,
|
|
&vdso_mapping);
|
|
|
|
if (IS_ERR(vma)) {
|
|
ret = PTR_ERR(vma);
|
|
goto up_fail;
|
|
}
|
|
|
|
vma = _install_special_mapping(mm,
|
|
addr,
|
|
(__VVAR_PAGES - VDSO_NR_VCLOCK_PAGES) * PAGE_SIZE,
|
|
VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP|
|
|
VM_PFNMAP,
|
|
&vvar_mapping);
|
|
|
|
if (IS_ERR(vma)) {
|
|
ret = PTR_ERR(vma);
|
|
do_munmap(mm, text_start, image->size, NULL);
|
|
goto up_fail;
|
|
}
|
|
|
|
vma = _install_special_mapping(mm,
|
|
addr + (__VVAR_PAGES - VDSO_NR_VCLOCK_PAGES) * PAGE_SIZE,
|
|
VDSO_NR_VCLOCK_PAGES * PAGE_SIZE,
|
|
VM_READ|VM_MAYREAD|VM_IO|VM_DONTDUMP|
|
|
VM_PFNMAP,
|
|
&vvar_vclock_mapping);
|
|
|
|
if (IS_ERR(vma)) {
|
|
ret = PTR_ERR(vma);
|
|
do_munmap(mm, text_start, image->size, NULL);
|
|
do_munmap(mm, addr, image->size, NULL);
|
|
goto up_fail;
|
|
}
|
|
|
|
current->mm->context.vdso = (void __user *)text_start;
|
|
current->mm->context.vdso_image = image;
|
|
|
|
up_fail:
|
|
mmap_write_unlock(mm);
|
|
return ret;
|
|
}
|
|
|
|
int map_vdso_once(const struct vdso_image *image, unsigned long addr)
|
|
{
|
|
struct mm_struct *mm = current->mm;
|
|
struct vm_area_struct *vma;
|
|
VMA_ITERATOR(vmi, mm, 0);
|
|
|
|
mmap_write_lock(mm);
|
|
/*
|
|
* Check if we have already mapped vdso blob - fail to prevent
|
|
* abusing from userspace install_special_mapping, which may
|
|
* not do accounting and rlimit right.
|
|
* We could search vma near context.vdso, but it's a slowpath,
|
|
* so let's explicitly check all VMAs to be completely sure.
|
|
*/
|
|
for_each_vma(vmi, vma) {
|
|
if (vma_is_special_mapping(vma, &vdso_mapping) ||
|
|
vma_is_special_mapping(vma, &vvar_mapping) ||
|
|
vma_is_special_mapping(vma, &vvar_vclock_mapping)) {
|
|
mmap_write_unlock(mm);
|
|
return -EEXIST;
|
|
}
|
|
}
|
|
mmap_write_unlock(mm);
|
|
|
|
return map_vdso(image, addr);
|
|
}
|
|
|
|
#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
|
|
static int load_vdso32(void)
|
|
{
|
|
if (vdso32_enabled != 1) /* Other values all mean "disabled" */
|
|
return 0;
|
|
|
|
return map_vdso(&vdso_image_32, 0);
|
|
}
|
|
#endif
|
|
|
|
#ifdef CONFIG_X86_64
|
|
int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
|
|
{
|
|
if (!vdso64_enabled)
|
|
return 0;
|
|
|
|
return map_vdso(&vdso_image_64, 0);
|
|
}
|
|
|
|
#ifdef CONFIG_COMPAT
|
|
int compat_arch_setup_additional_pages(struct linux_binprm *bprm,
|
|
int uses_interp, bool x32)
|
|
{
|
|
#ifdef CONFIG_X86_X32_ABI
|
|
if (x32) {
|
|
if (!vdso64_enabled)
|
|
return 0;
|
|
return map_vdso(&vdso_image_x32, 0);
|
|
}
|
|
#endif
|
|
#ifdef CONFIG_IA32_EMULATION
|
|
return load_vdso32();
|
|
#else
|
|
return 0;
|
|
#endif
|
|
}
|
|
#endif
|
|
#else
|
|
int arch_setup_additional_pages(struct linux_binprm *bprm, int uses_interp)
|
|
{
|
|
return load_vdso32();
|
|
}
|
|
#endif
|
|
|
|
bool arch_syscall_is_vdso_sigreturn(struct pt_regs *regs)
|
|
{
|
|
#if defined(CONFIG_X86_32) || defined(CONFIG_IA32_EMULATION)
|
|
const struct vdso_image *image = current->mm->context.vdso_image;
|
|
unsigned long vdso = (unsigned long) current->mm->context.vdso;
|
|
|
|
if (in_ia32_syscall() && image == &vdso_image_32) {
|
|
if (regs->ip == vdso + image->sym_vdso32_sigreturn_landing_pad ||
|
|
regs->ip == vdso + image->sym_vdso32_rt_sigreturn_landing_pad)
|
|
return true;
|
|
}
|
|
#endif
|
|
return false;
|
|
}
|
|
|
|
#ifdef CONFIG_X86_64
|
|
static __init int vdso_setup(char *s)
|
|
{
|
|
vdso64_enabled = simple_strtoul(s, NULL, 0);
|
|
return 1;
|
|
}
|
|
__setup("vdso=", vdso_setup);
|
|
#endif /* CONFIG_X86_64 */
|