blob: 07f42a7a60657adf069483c6981c642d67ba78f1 [file] [log] [blame]
David Brazdil0f672f62019-12-10 10:32:29 +00001// SPDX-License-Identifier: GPL-2.0-only
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00002/*
3 * linux/mm/mmu_notifier.c
4 *
5 * Copyright (C) 2008 Qumranet, Inc.
6 * Copyright (C) 2008 SGI
7 * Christoph Lameter <cl@linux.com>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +00008 */
9
10#include <linux/rculist.h>
11#include <linux/mmu_notifier.h>
12#include <linux/export.h>
13#include <linux/mm.h>
14#include <linux/err.h>
Olivier Deprez157378f2022-04-04 15:47:50 +020015#include <linux/interval_tree.h>
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000016#include <linux/srcu.h>
17#include <linux/rcupdate.h>
18#include <linux/sched.h>
19#include <linux/sched/mm.h>
20#include <linux/slab.h>
21
22/* global SRCU for all MMs */
23DEFINE_STATIC_SRCU(srcu);
24
David Brazdil0f672f62019-12-10 10:32:29 +000025#ifdef CONFIG_LOCKDEP
26struct lockdep_map __mmu_notifier_invalidate_range_start_map = {
27 .name = "mmu_notifier_invalidate_range_start"
28};
29#endif
Andrew Scullb4b6d4a2019-01-02 15:54:55 +000030
31/*
Olivier Deprez157378f2022-04-04 15:47:50 +020032 * The mmu_notifier_subscriptions structure is allocated and installed in
33 * mm->notifier_subscriptions inside the mm_take_all_locks() protected
34 * critical section and it's released only when mm_count reaches zero
35 * in mmdrop().
36 */
37struct mmu_notifier_subscriptions {
38 /* all mmu notifiers registered in this mm are queued in this list */
39 struct hlist_head list;
40 bool has_itree;
41 /* to serialize the list modifications and hlist_unhashed */
42 spinlock_t lock;
43 unsigned long invalidate_seq;
44 unsigned long active_invalidate_ranges;
45 struct rb_root_cached itree;
46 wait_queue_head_t wq;
47 struct hlist_head deferred_list;
48};
49
50/*
51 * This is a collision-retry read-side/write-side 'lock', a lot like a
52 * seqcount, however this allows multiple write-sides to hold it at
53 * once. Conceptually the write side is protecting the values of the PTEs in
54 * this mm, such that PTES cannot be read into SPTEs (shadow PTEs) while any
55 * writer exists.
56 *
57 * Note that the core mm creates nested invalidate_range_start()/end() regions
58 * within the same thread, and runs invalidate_range_start()/end() in parallel
59 * on multiple CPUs. This is designed to not reduce concurrency or block
60 * progress on the mm side.
61 *
62 * As a secondary function, holding the full write side also serves to prevent
63 * writers for the itree, this is an optimization to avoid extra locking
64 * during invalidate_range_start/end notifiers.
65 *
66 * The write side has two states, fully excluded:
67 * - mm->active_invalidate_ranges != 0
68 * - subscriptions->invalidate_seq & 1 == True (odd)
69 * - some range on the mm_struct is being invalidated
70 * - the itree is not allowed to change
71 *
72 * And partially excluded:
73 * - mm->active_invalidate_ranges != 0
74 * - subscriptions->invalidate_seq & 1 == False (even)
75 * - some range on the mm_struct is being invalidated
76 * - the itree is allowed to change
77 *
78 * Operations on notifier_subscriptions->invalidate_seq (under spinlock):
79 * seq |= 1 # Begin writing
80 * seq++ # Release the writing state
81 * seq & 1 # True if a writer exists
82 *
83 * The later state avoids some expensive work on inv_end in the common case of
84 * no mmu_interval_notifier monitoring the VA.
85 */
86static bool
87mn_itree_is_invalidating(struct mmu_notifier_subscriptions *subscriptions)
88{
89 lockdep_assert_held(&subscriptions->lock);
90 return subscriptions->invalidate_seq & 1;
91}
92
93static struct mmu_interval_notifier *
94mn_itree_inv_start_range(struct mmu_notifier_subscriptions *subscriptions,
95 const struct mmu_notifier_range *range,
96 unsigned long *seq)
97{
98 struct interval_tree_node *node;
99 struct mmu_interval_notifier *res = NULL;
100
101 spin_lock(&subscriptions->lock);
102 subscriptions->active_invalidate_ranges++;
103 node = interval_tree_iter_first(&subscriptions->itree, range->start,
104 range->end - 1);
105 if (node) {
106 subscriptions->invalidate_seq |= 1;
107 res = container_of(node, struct mmu_interval_notifier,
108 interval_tree);
109 }
110
111 *seq = subscriptions->invalidate_seq;
112 spin_unlock(&subscriptions->lock);
113 return res;
114}
115
116static struct mmu_interval_notifier *
117mn_itree_inv_next(struct mmu_interval_notifier *interval_sub,
118 const struct mmu_notifier_range *range)
119{
120 struct interval_tree_node *node;
121
122 node = interval_tree_iter_next(&interval_sub->interval_tree,
123 range->start, range->end - 1);
124 if (!node)
125 return NULL;
126 return container_of(node, struct mmu_interval_notifier, interval_tree);
127}
128
129static void mn_itree_inv_end(struct mmu_notifier_subscriptions *subscriptions)
130{
131 struct mmu_interval_notifier *interval_sub;
132 struct hlist_node *next;
133
134 spin_lock(&subscriptions->lock);
135 if (--subscriptions->active_invalidate_ranges ||
136 !mn_itree_is_invalidating(subscriptions)) {
137 spin_unlock(&subscriptions->lock);
138 return;
139 }
140
141 /* Make invalidate_seq even */
142 subscriptions->invalidate_seq++;
143
144 /*
145 * The inv_end incorporates a deferred mechanism like rtnl_unlock().
146 * Adds and removes are queued until the final inv_end happens then
147 * they are progressed. This arrangement for tree updates is used to
148 * avoid using a blocking lock during invalidate_range_start.
149 */
150 hlist_for_each_entry_safe(interval_sub, next,
151 &subscriptions->deferred_list,
152 deferred_item) {
153 if (RB_EMPTY_NODE(&interval_sub->interval_tree.rb))
154 interval_tree_insert(&interval_sub->interval_tree,
155 &subscriptions->itree);
156 else
157 interval_tree_remove(&interval_sub->interval_tree,
158 &subscriptions->itree);
159 hlist_del(&interval_sub->deferred_item);
160 }
161 spin_unlock(&subscriptions->lock);
162
163 wake_up_all(&subscriptions->wq);
164}
165
166/**
167 * mmu_interval_read_begin - Begin a read side critical section against a VA
168 * range
169 * @interval_sub: The interval subscription
170 *
171 * mmu_iterval_read_begin()/mmu_iterval_read_retry() implement a
172 * collision-retry scheme similar to seqcount for the VA range under
173 * subscription. If the mm invokes invalidation during the critical section
174 * then mmu_interval_read_retry() will return true.
175 *
176 * This is useful to obtain shadow PTEs where teardown or setup of the SPTEs
177 * require a blocking context. The critical region formed by this can sleep,
178 * and the required 'user_lock' can also be a sleeping lock.
179 *
180 * The caller is required to provide a 'user_lock' to serialize both teardown
181 * and setup.
182 *
183 * The return value should be passed to mmu_interval_read_retry().
184 */
185unsigned long
186mmu_interval_read_begin(struct mmu_interval_notifier *interval_sub)
187{
188 struct mmu_notifier_subscriptions *subscriptions =
189 interval_sub->mm->notifier_subscriptions;
190 unsigned long seq;
191 bool is_invalidating;
192
193 /*
194 * If the subscription has a different seq value under the user_lock
195 * than we started with then it has collided.
196 *
197 * If the subscription currently has the same seq value as the
198 * subscriptions seq, then it is currently between
199 * invalidate_start/end and is colliding.
200 *
201 * The locking looks broadly like this:
202 * mn_tree_invalidate_start(): mmu_interval_read_begin():
203 * spin_lock
204 * seq = READ_ONCE(interval_sub->invalidate_seq);
205 * seq == subs->invalidate_seq
206 * spin_unlock
207 * spin_lock
208 * seq = ++subscriptions->invalidate_seq
209 * spin_unlock
210 * op->invalidate_range():
211 * user_lock
212 * mmu_interval_set_seq()
213 * interval_sub->invalidate_seq = seq
214 * user_unlock
215 *
216 * [Required: mmu_interval_read_retry() == true]
217 *
218 * mn_itree_inv_end():
219 * spin_lock
220 * seq = ++subscriptions->invalidate_seq
221 * spin_unlock
222 *
223 * user_lock
224 * mmu_interval_read_retry():
225 * interval_sub->invalidate_seq != seq
226 * user_unlock
227 *
228 * Barriers are not needed here as any races here are closed by an
229 * eventual mmu_interval_read_retry(), which provides a barrier via the
230 * user_lock.
231 */
232 spin_lock(&subscriptions->lock);
233 /* Pairs with the WRITE_ONCE in mmu_interval_set_seq() */
234 seq = READ_ONCE(interval_sub->invalidate_seq);
235 is_invalidating = seq == subscriptions->invalidate_seq;
236 spin_unlock(&subscriptions->lock);
237
238 /*
239 * interval_sub->invalidate_seq must always be set to an odd value via
240 * mmu_interval_set_seq() using the provided cur_seq from
241 * mn_itree_inv_start_range(). This ensures that if seq does wrap we
242 * will always clear the below sleep in some reasonable time as
243 * subscriptions->invalidate_seq is even in the idle state.
244 */
245 lock_map_acquire(&__mmu_notifier_invalidate_range_start_map);
246 lock_map_release(&__mmu_notifier_invalidate_range_start_map);
247 if (is_invalidating)
248 wait_event(subscriptions->wq,
249 READ_ONCE(subscriptions->invalidate_seq) != seq);
250
251 /*
252 * Notice that mmu_interval_read_retry() can already be true at this
253 * point, avoiding loops here allows the caller to provide a global
254 * time bound.
255 */
256
257 return seq;
258}
259EXPORT_SYMBOL_GPL(mmu_interval_read_begin);
260
261static void mn_itree_release(struct mmu_notifier_subscriptions *subscriptions,
262 struct mm_struct *mm)
263{
264 struct mmu_notifier_range range = {
265 .flags = MMU_NOTIFIER_RANGE_BLOCKABLE,
266 .event = MMU_NOTIFY_RELEASE,
267 .mm = mm,
268 .start = 0,
269 .end = ULONG_MAX,
270 };
271 struct mmu_interval_notifier *interval_sub;
272 unsigned long cur_seq;
273 bool ret;
274
275 for (interval_sub =
276 mn_itree_inv_start_range(subscriptions, &range, &cur_seq);
277 interval_sub;
278 interval_sub = mn_itree_inv_next(interval_sub, &range)) {
279 ret = interval_sub->ops->invalidate(interval_sub, &range,
280 cur_seq);
281 WARN_ON(!ret);
282 }
283
284 mn_itree_inv_end(subscriptions);
285}
286
287/*
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000288 * This function can't run concurrently against mmu_notifier_register
289 * because mm->mm_users > 0 during mmu_notifier_register and exit_mmap
290 * runs with mm_users == 0. Other tasks may still invoke mmu notifiers
291 * in parallel despite there being no task using this mm any more,
292 * through the vmas outside of the exit_mmap context, such as with
293 * vmtruncate. This serializes against mmu_notifier_unregister with
Olivier Deprez157378f2022-04-04 15:47:50 +0200294 * the notifier_subscriptions->lock in addition to SRCU and it serializes
295 * against the other mmu notifiers with SRCU. struct mmu_notifier_subscriptions
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000296 * can't go away from under us as exit_mmap holds an mm_count pin
297 * itself.
298 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200299static void mn_hlist_release(struct mmu_notifier_subscriptions *subscriptions,
300 struct mm_struct *mm)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000301{
Olivier Deprez157378f2022-04-04 15:47:50 +0200302 struct mmu_notifier *subscription;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000303 int id;
304
305 /*
306 * SRCU here will block mmu_notifier_unregister until
307 * ->release returns.
308 */
309 id = srcu_read_lock(&srcu);
Olivier Deprez157378f2022-04-04 15:47:50 +0200310 hlist_for_each_entry_rcu(subscription, &subscriptions->list, hlist,
311 srcu_read_lock_held(&srcu))
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000312 /*
313 * If ->release runs before mmu_notifier_unregister it must be
314 * handled, as it's the only way for the driver to flush all
315 * existing sptes and stop the driver from establishing any more
316 * sptes before all the pages in the mm are freed.
317 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200318 if (subscription->ops->release)
319 subscription->ops->release(subscription, mm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000320
Olivier Deprez157378f2022-04-04 15:47:50 +0200321 spin_lock(&subscriptions->lock);
322 while (unlikely(!hlist_empty(&subscriptions->list))) {
323 subscription = hlist_entry(subscriptions->list.first,
324 struct mmu_notifier, hlist);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000325 /*
326 * We arrived before mmu_notifier_unregister so
327 * mmu_notifier_unregister will do nothing other than to wait
328 * for ->release to finish and for mmu_notifier_unregister to
329 * return.
330 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200331 hlist_del_init_rcu(&subscription->hlist);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000332 }
Olivier Deprez157378f2022-04-04 15:47:50 +0200333 spin_unlock(&subscriptions->lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000334 srcu_read_unlock(&srcu, id);
335
336 /*
337 * synchronize_srcu here prevents mmu_notifier_release from returning to
338 * exit_mmap (which would proceed with freeing all pages in the mm)
339 * until the ->release method returns, if it was invoked by
340 * mmu_notifier_unregister.
341 *
Olivier Deprez157378f2022-04-04 15:47:50 +0200342 * The notifier_subscriptions can't go away from under us because
343 * one mm_count is held by exit_mmap.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000344 */
345 synchronize_srcu(&srcu);
346}
347
Olivier Deprez157378f2022-04-04 15:47:50 +0200348void __mmu_notifier_release(struct mm_struct *mm)
349{
350 struct mmu_notifier_subscriptions *subscriptions =
351 mm->notifier_subscriptions;
352
353 if (subscriptions->has_itree)
354 mn_itree_release(subscriptions, mm);
355
356 if (!hlist_empty(&subscriptions->list))
357 mn_hlist_release(subscriptions, mm);
358}
359
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000360/*
361 * If no young bitflag is supported by the hardware, ->clear_flush_young can
362 * unmap the address and return 1 or 0 depending if the mapping previously
363 * existed or not.
364 */
365int __mmu_notifier_clear_flush_young(struct mm_struct *mm,
366 unsigned long start,
367 unsigned long end)
368{
Olivier Deprez157378f2022-04-04 15:47:50 +0200369 struct mmu_notifier *subscription;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000370 int young = 0, id;
371
372 id = srcu_read_lock(&srcu);
Olivier Deprez157378f2022-04-04 15:47:50 +0200373 hlist_for_each_entry_rcu(subscription,
374 &mm->notifier_subscriptions->list, hlist,
375 srcu_read_lock_held(&srcu)) {
376 if (subscription->ops->clear_flush_young)
377 young |= subscription->ops->clear_flush_young(
378 subscription, mm, start, end);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000379 }
380 srcu_read_unlock(&srcu, id);
381
382 return young;
383}
384
385int __mmu_notifier_clear_young(struct mm_struct *mm,
386 unsigned long start,
387 unsigned long end)
388{
Olivier Deprez157378f2022-04-04 15:47:50 +0200389 struct mmu_notifier *subscription;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000390 int young = 0, id;
391
392 id = srcu_read_lock(&srcu);
Olivier Deprez157378f2022-04-04 15:47:50 +0200393 hlist_for_each_entry_rcu(subscription,
394 &mm->notifier_subscriptions->list, hlist,
395 srcu_read_lock_held(&srcu)) {
396 if (subscription->ops->clear_young)
397 young |= subscription->ops->clear_young(subscription,
398 mm, start, end);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000399 }
400 srcu_read_unlock(&srcu, id);
401
402 return young;
403}
404
405int __mmu_notifier_test_young(struct mm_struct *mm,
406 unsigned long address)
407{
Olivier Deprez157378f2022-04-04 15:47:50 +0200408 struct mmu_notifier *subscription;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000409 int young = 0, id;
410
411 id = srcu_read_lock(&srcu);
Olivier Deprez157378f2022-04-04 15:47:50 +0200412 hlist_for_each_entry_rcu(subscription,
413 &mm->notifier_subscriptions->list, hlist,
414 srcu_read_lock_held(&srcu)) {
415 if (subscription->ops->test_young) {
416 young = subscription->ops->test_young(subscription, mm,
417 address);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000418 if (young)
419 break;
420 }
421 }
422 srcu_read_unlock(&srcu, id);
423
424 return young;
425}
426
427void __mmu_notifier_change_pte(struct mm_struct *mm, unsigned long address,
428 pte_t pte)
429{
Olivier Deprez157378f2022-04-04 15:47:50 +0200430 struct mmu_notifier *subscription;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000431 int id;
432
433 id = srcu_read_lock(&srcu);
Olivier Deprez157378f2022-04-04 15:47:50 +0200434 hlist_for_each_entry_rcu(subscription,
435 &mm->notifier_subscriptions->list, hlist,
436 srcu_read_lock_held(&srcu)) {
437 if (subscription->ops->change_pte)
438 subscription->ops->change_pte(subscription, mm, address,
439 pte);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000440 }
441 srcu_read_unlock(&srcu, id);
442}
443
Olivier Deprez157378f2022-04-04 15:47:50 +0200444static int mn_itree_invalidate(struct mmu_notifier_subscriptions *subscriptions,
445 const struct mmu_notifier_range *range)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000446{
Olivier Deprez157378f2022-04-04 15:47:50 +0200447 struct mmu_interval_notifier *interval_sub;
448 unsigned long cur_seq;
449
450 for (interval_sub =
451 mn_itree_inv_start_range(subscriptions, range, &cur_seq);
452 interval_sub;
453 interval_sub = mn_itree_inv_next(interval_sub, range)) {
454 bool ret;
455
456 ret = interval_sub->ops->invalidate(interval_sub, range,
457 cur_seq);
458 if (!ret) {
459 if (WARN_ON(mmu_notifier_range_blockable(range)))
460 continue;
461 goto out_would_block;
462 }
463 }
464 return 0;
465
466out_would_block:
467 /*
468 * On -EAGAIN the non-blocking caller is not allowed to call
469 * invalidate_range_end()
470 */
471 mn_itree_inv_end(subscriptions);
472 return -EAGAIN;
473}
474
475static int mn_hlist_invalidate_range_start(
476 struct mmu_notifier_subscriptions *subscriptions,
477 struct mmu_notifier_range *range)
478{
479 struct mmu_notifier *subscription;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000480 int ret = 0;
481 int id;
482
483 id = srcu_read_lock(&srcu);
Olivier Deprez157378f2022-04-04 15:47:50 +0200484 hlist_for_each_entry_rcu(subscription, &subscriptions->list, hlist,
485 srcu_read_lock_held(&srcu)) {
486 const struct mmu_notifier_ops *ops = subscription->ops;
487
488 if (ops->invalidate_range_start) {
David Brazdil0f672f62019-12-10 10:32:29 +0000489 int _ret;
490
491 if (!mmu_notifier_range_blockable(range))
492 non_block_start();
Olivier Deprez157378f2022-04-04 15:47:50 +0200493 _ret = ops->invalidate_range_start(subscription, range);
David Brazdil0f672f62019-12-10 10:32:29 +0000494 if (!mmu_notifier_range_blockable(range))
495 non_block_end();
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000496 if (_ret) {
497 pr_info("%pS callback failed with %d in %sblockable context.\n",
Olivier Deprez157378f2022-04-04 15:47:50 +0200498 ops->invalidate_range_start, _ret,
499 !mmu_notifier_range_blockable(range) ?
500 "non-" :
501 "");
David Brazdil0f672f62019-12-10 10:32:29 +0000502 WARN_ON(mmu_notifier_range_blockable(range) ||
503 _ret != -EAGAIN);
Olivier Deprez157378f2022-04-04 15:47:50 +0200504 /*
505 * We call all the notifiers on any EAGAIN,
506 * there is no way for a notifier to know if
507 * its start method failed, thus a start that
508 * does EAGAIN can't also do end.
509 */
510 WARN_ON(ops->invalidate_range_end);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000511 ret = _ret;
512 }
513 }
514 }
Olivier Deprez157378f2022-04-04 15:47:50 +0200515
516 if (ret) {
517 /*
518 * Must be non-blocking to get here. If there are multiple
519 * notifiers and one or more failed start, any that succeeded
520 * start are expecting their end to be called. Do so now.
521 */
522 hlist_for_each_entry_rcu(subscription, &subscriptions->list,
523 hlist, srcu_read_lock_held(&srcu)) {
524 if (!subscription->ops->invalidate_range_end)
525 continue;
526
527 subscription->ops->invalidate_range_end(subscription,
528 range);
529 }
530 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000531 srcu_read_unlock(&srcu, id);
532
533 return ret;
534}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000535
Olivier Deprez157378f2022-04-04 15:47:50 +0200536int __mmu_notifier_invalidate_range_start(struct mmu_notifier_range *range)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000537{
Olivier Deprez157378f2022-04-04 15:47:50 +0200538 struct mmu_notifier_subscriptions *subscriptions =
539 range->mm->notifier_subscriptions;
540 int ret;
541
542 if (subscriptions->has_itree) {
543 ret = mn_itree_invalidate(subscriptions, range);
544 if (ret)
545 return ret;
546 }
547 if (!hlist_empty(&subscriptions->list))
548 return mn_hlist_invalidate_range_start(subscriptions, range);
549 return 0;
550}
551
552static void
553mn_hlist_invalidate_end(struct mmu_notifier_subscriptions *subscriptions,
554 struct mmu_notifier_range *range, bool only_end)
555{
556 struct mmu_notifier *subscription;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000557 int id;
558
559 id = srcu_read_lock(&srcu);
Olivier Deprez157378f2022-04-04 15:47:50 +0200560 hlist_for_each_entry_rcu(subscription, &subscriptions->list, hlist,
561 srcu_read_lock_held(&srcu)) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000562 /*
563 * Call invalidate_range here too to avoid the need for the
564 * subsystem of having to register an invalidate_range_end
565 * call-back when there is invalidate_range already. Usually a
566 * subsystem registers either invalidate_range_start()/end() or
567 * invalidate_range(), so this will be no additional overhead
568 * (besides the pointer check).
569 *
570 * We skip call to invalidate_range() if we know it is safe ie
571 * call site use mmu_notifier_invalidate_range_only_end() which
572 * is safe to do when we know that a call to invalidate_range()
573 * already happen under page table lock.
574 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200575 if (!only_end && subscription->ops->invalidate_range)
576 subscription->ops->invalidate_range(subscription,
577 range->mm,
578 range->start,
579 range->end);
580 if (subscription->ops->invalidate_range_end) {
David Brazdil0f672f62019-12-10 10:32:29 +0000581 if (!mmu_notifier_range_blockable(range))
582 non_block_start();
Olivier Deprez157378f2022-04-04 15:47:50 +0200583 subscription->ops->invalidate_range_end(subscription,
584 range);
David Brazdil0f672f62019-12-10 10:32:29 +0000585 if (!mmu_notifier_range_blockable(range))
586 non_block_end();
587 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000588 }
589 srcu_read_unlock(&srcu, id);
Olivier Deprez157378f2022-04-04 15:47:50 +0200590}
591
592void __mmu_notifier_invalidate_range_end(struct mmu_notifier_range *range,
593 bool only_end)
594{
595 struct mmu_notifier_subscriptions *subscriptions =
596 range->mm->notifier_subscriptions;
597
598 lock_map_acquire(&__mmu_notifier_invalidate_range_start_map);
599 if (subscriptions->has_itree)
600 mn_itree_inv_end(subscriptions);
601
602 if (!hlist_empty(&subscriptions->list))
603 mn_hlist_invalidate_end(subscriptions, range, only_end);
David Brazdil0f672f62019-12-10 10:32:29 +0000604 lock_map_release(&__mmu_notifier_invalidate_range_start_map);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000605}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000606
607void __mmu_notifier_invalidate_range(struct mm_struct *mm,
608 unsigned long start, unsigned long end)
609{
Olivier Deprez157378f2022-04-04 15:47:50 +0200610 struct mmu_notifier *subscription;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000611 int id;
612
613 id = srcu_read_lock(&srcu);
Olivier Deprez157378f2022-04-04 15:47:50 +0200614 hlist_for_each_entry_rcu(subscription,
615 &mm->notifier_subscriptions->list, hlist,
616 srcu_read_lock_held(&srcu)) {
617 if (subscription->ops->invalidate_range)
618 subscription->ops->invalidate_range(subscription, mm,
619 start, end);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000620 }
621 srcu_read_unlock(&srcu, id);
622}
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000623
624/*
Olivier Deprez157378f2022-04-04 15:47:50 +0200625 * Same as mmu_notifier_register but here the caller must hold the mmap_lock in
626 * write mode. A NULL mn signals the notifier is being registered for itree
627 * mode.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000628 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200629int __mmu_notifier_register(struct mmu_notifier *subscription,
630 struct mm_struct *mm)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000631{
Olivier Deprez157378f2022-04-04 15:47:50 +0200632 struct mmu_notifier_subscriptions *subscriptions = NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000633 int ret;
634
Olivier Deprez157378f2022-04-04 15:47:50 +0200635 mmap_assert_write_locked(mm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000636 BUG_ON(atomic_read(&mm->mm_users) <= 0);
637
David Brazdil0f672f62019-12-10 10:32:29 +0000638 if (IS_ENABLED(CONFIG_LOCKDEP)) {
639 fs_reclaim_acquire(GFP_KERNEL);
640 lock_map_acquire(&__mmu_notifier_invalidate_range_start_map);
641 lock_map_release(&__mmu_notifier_invalidate_range_start_map);
642 fs_reclaim_release(GFP_KERNEL);
643 }
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000644
Olivier Deprez157378f2022-04-04 15:47:50 +0200645 if (!mm->notifier_subscriptions) {
David Brazdil0f672f62019-12-10 10:32:29 +0000646 /*
647 * kmalloc cannot be called under mm_take_all_locks(), but we
Olivier Deprez157378f2022-04-04 15:47:50 +0200648 * know that mm->notifier_subscriptions can't change while we
649 * hold the write side of the mmap_lock.
David Brazdil0f672f62019-12-10 10:32:29 +0000650 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200651 subscriptions = kzalloc(
652 sizeof(struct mmu_notifier_subscriptions), GFP_KERNEL);
653 if (!subscriptions)
David Brazdil0f672f62019-12-10 10:32:29 +0000654 return -ENOMEM;
655
Olivier Deprez157378f2022-04-04 15:47:50 +0200656 INIT_HLIST_HEAD(&subscriptions->list);
657 spin_lock_init(&subscriptions->lock);
658 subscriptions->invalidate_seq = 2;
659 subscriptions->itree = RB_ROOT_CACHED;
660 init_waitqueue_head(&subscriptions->wq);
661 INIT_HLIST_HEAD(&subscriptions->deferred_list);
David Brazdil0f672f62019-12-10 10:32:29 +0000662 }
663
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000664 ret = mm_take_all_locks(mm);
665 if (unlikely(ret))
666 goto out_clean;
667
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000668 /*
669 * Serialize the update against mmu_notifier_unregister. A
670 * side note: mmu_notifier_release can't run concurrently with
671 * us because we hold the mm_users pin (either implicitly as
672 * current->mm or explicitly with get_task_mm() or similar).
673 * We can't race against any other mmu notifier method either
674 * thanks to mm_take_all_locks().
Olivier Deprez157378f2022-04-04 15:47:50 +0200675 *
676 * release semantics on the initialization of the
677 * mmu_notifier_subscriptions's contents are provided for unlocked
678 * readers. acquire can only be used while holding the mmgrab or
679 * mmget, and is safe because once created the
680 * mmu_notifier_subscriptions is not freed until the mm is destroyed.
681 * As above, users holding the mmap_lock or one of the
682 * mm_take_all_locks() do not need to use acquire semantics.
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000683 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200684 if (subscriptions)
685 smp_store_release(&mm->notifier_subscriptions, subscriptions);
David Brazdil0f672f62019-12-10 10:32:29 +0000686
Olivier Deprez157378f2022-04-04 15:47:50 +0200687 if (subscription) {
688 /* Pairs with the mmdrop in mmu_notifier_unregister_* */
689 mmgrab(mm);
690 subscription->mm = mm;
691 subscription->users = 1;
692
693 spin_lock(&mm->notifier_subscriptions->lock);
694 hlist_add_head_rcu(&subscription->hlist,
695 &mm->notifier_subscriptions->list);
696 spin_unlock(&mm->notifier_subscriptions->lock);
697 } else
698 mm->notifier_subscriptions->has_itree = true;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000699
700 mm_drop_all_locks(mm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000701 BUG_ON(atomic_read(&mm->mm_users) <= 0);
David Brazdil0f672f62019-12-10 10:32:29 +0000702 return 0;
703
704out_clean:
Olivier Deprez157378f2022-04-04 15:47:50 +0200705 kfree(subscriptions);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000706 return ret;
707}
David Brazdil0f672f62019-12-10 10:32:29 +0000708EXPORT_SYMBOL_GPL(__mmu_notifier_register);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000709
David Brazdil0f672f62019-12-10 10:32:29 +0000710/**
711 * mmu_notifier_register - Register a notifier on a mm
Olivier Deprez157378f2022-04-04 15:47:50 +0200712 * @subscription: The notifier to attach
David Brazdil0f672f62019-12-10 10:32:29 +0000713 * @mm: The mm to attach the notifier to
714 *
Olivier Deprez157378f2022-04-04 15:47:50 +0200715 * Must not hold mmap_lock nor any other VM related lock when calling
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000716 * this registration function. Must also ensure mm_users can't go down
717 * to zero while this runs to avoid races with mmu_notifier_release,
718 * so mm has to be current->mm or the mm should be pinned safely such
719 * as with get_task_mm(). If the mm is not current->mm, the mm_users
720 * pin should be released by calling mmput after mmu_notifier_register
David Brazdil0f672f62019-12-10 10:32:29 +0000721 * returns.
722 *
723 * mmu_notifier_unregister() or mmu_notifier_put() must be always called to
724 * unregister the notifier.
725 *
Olivier Deprez157378f2022-04-04 15:47:50 +0200726 * While the caller has a mmu_notifier get the subscription->mm pointer will remain
David Brazdil0f672f62019-12-10 10:32:29 +0000727 * valid, and can be converted to an active mm pointer via mmget_not_zero().
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000728 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200729int mmu_notifier_register(struct mmu_notifier *subscription,
730 struct mm_struct *mm)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000731{
David Brazdil0f672f62019-12-10 10:32:29 +0000732 int ret;
733
Olivier Deprez157378f2022-04-04 15:47:50 +0200734 mmap_write_lock(mm);
735 ret = __mmu_notifier_register(subscription, mm);
736 mmap_write_unlock(mm);
David Brazdil0f672f62019-12-10 10:32:29 +0000737 return ret;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000738}
739EXPORT_SYMBOL_GPL(mmu_notifier_register);
740
David Brazdil0f672f62019-12-10 10:32:29 +0000741static struct mmu_notifier *
742find_get_mmu_notifier(struct mm_struct *mm, const struct mmu_notifier_ops *ops)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000743{
Olivier Deprez157378f2022-04-04 15:47:50 +0200744 struct mmu_notifier *subscription;
David Brazdil0f672f62019-12-10 10:32:29 +0000745
Olivier Deprez157378f2022-04-04 15:47:50 +0200746 spin_lock(&mm->notifier_subscriptions->lock);
747 hlist_for_each_entry_rcu(subscription,
748 &mm->notifier_subscriptions->list, hlist,
749 lockdep_is_held(&mm->notifier_subscriptions->lock)) {
750 if (subscription->ops != ops)
David Brazdil0f672f62019-12-10 10:32:29 +0000751 continue;
752
Olivier Deprez157378f2022-04-04 15:47:50 +0200753 if (likely(subscription->users != UINT_MAX))
754 subscription->users++;
David Brazdil0f672f62019-12-10 10:32:29 +0000755 else
Olivier Deprez157378f2022-04-04 15:47:50 +0200756 subscription = ERR_PTR(-EOVERFLOW);
757 spin_unlock(&mm->notifier_subscriptions->lock);
758 return subscription;
David Brazdil0f672f62019-12-10 10:32:29 +0000759 }
Olivier Deprez157378f2022-04-04 15:47:50 +0200760 spin_unlock(&mm->notifier_subscriptions->lock);
David Brazdil0f672f62019-12-10 10:32:29 +0000761 return NULL;
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000762}
David Brazdil0f672f62019-12-10 10:32:29 +0000763
764/**
765 * mmu_notifier_get_locked - Return the single struct mmu_notifier for
766 * the mm & ops
767 * @ops: The operations struct being subscribe with
768 * @mm : The mm to attach notifiers too
769 *
770 * This function either allocates a new mmu_notifier via
771 * ops->alloc_notifier(), or returns an already existing notifier on the
772 * list. The value of the ops pointer is used to determine when two notifiers
773 * are the same.
774 *
775 * Each call to mmu_notifier_get() must be paired with a call to
Olivier Deprez157378f2022-04-04 15:47:50 +0200776 * mmu_notifier_put(). The caller must hold the write side of mm->mmap_lock.
David Brazdil0f672f62019-12-10 10:32:29 +0000777 *
778 * While the caller has a mmu_notifier get the mm pointer will remain valid,
779 * and can be converted to an active mm pointer via mmget_not_zero().
780 */
781struct mmu_notifier *mmu_notifier_get_locked(const struct mmu_notifier_ops *ops,
782 struct mm_struct *mm)
783{
Olivier Deprez157378f2022-04-04 15:47:50 +0200784 struct mmu_notifier *subscription;
David Brazdil0f672f62019-12-10 10:32:29 +0000785 int ret;
786
Olivier Deprez157378f2022-04-04 15:47:50 +0200787 mmap_assert_write_locked(mm);
David Brazdil0f672f62019-12-10 10:32:29 +0000788
Olivier Deprez157378f2022-04-04 15:47:50 +0200789 if (mm->notifier_subscriptions) {
790 subscription = find_get_mmu_notifier(mm, ops);
791 if (subscription)
792 return subscription;
David Brazdil0f672f62019-12-10 10:32:29 +0000793 }
794
Olivier Deprez157378f2022-04-04 15:47:50 +0200795 subscription = ops->alloc_notifier(mm);
796 if (IS_ERR(subscription))
797 return subscription;
798 subscription->ops = ops;
799 ret = __mmu_notifier_register(subscription, mm);
David Brazdil0f672f62019-12-10 10:32:29 +0000800 if (ret)
801 goto out_free;
Olivier Deprez157378f2022-04-04 15:47:50 +0200802 return subscription;
David Brazdil0f672f62019-12-10 10:32:29 +0000803out_free:
Olivier Deprez157378f2022-04-04 15:47:50 +0200804 subscription->ops->free_notifier(subscription);
David Brazdil0f672f62019-12-10 10:32:29 +0000805 return ERR_PTR(ret);
806}
807EXPORT_SYMBOL_GPL(mmu_notifier_get_locked);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000808
809/* this is called after the last mmu_notifier_unregister() returned */
Olivier Deprez157378f2022-04-04 15:47:50 +0200810void __mmu_notifier_subscriptions_destroy(struct mm_struct *mm)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000811{
Olivier Deprez157378f2022-04-04 15:47:50 +0200812 BUG_ON(!hlist_empty(&mm->notifier_subscriptions->list));
813 kfree(mm->notifier_subscriptions);
814 mm->notifier_subscriptions = LIST_POISON1; /* debug */
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000815}
816
817/*
818 * This releases the mm_count pin automatically and frees the mm
819 * structure if it was the last user of it. It serializes against
820 * running mmu notifiers with SRCU and against mmu_notifier_unregister
821 * with the unregister lock + SRCU. All sptes must be dropped before
822 * calling mmu_notifier_unregister. ->release or any other notifier
823 * method may be invoked concurrently with mmu_notifier_unregister,
824 * and only after mmu_notifier_unregister returned we're guaranteed
825 * that ->release or any other method can't run anymore.
826 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200827void mmu_notifier_unregister(struct mmu_notifier *subscription,
828 struct mm_struct *mm)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000829{
830 BUG_ON(atomic_read(&mm->mm_count) <= 0);
831
Olivier Deprez157378f2022-04-04 15:47:50 +0200832 if (!hlist_unhashed(&subscription->hlist)) {
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000833 /*
834 * SRCU here will force exit_mmap to wait for ->release to
835 * finish before freeing the pages.
836 */
837 int id;
838
839 id = srcu_read_lock(&srcu);
840 /*
841 * exit_mmap will block in mmu_notifier_release to guarantee
842 * that ->release is called before freeing the pages.
843 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200844 if (subscription->ops->release)
845 subscription->ops->release(subscription, mm);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000846 srcu_read_unlock(&srcu, id);
847
Olivier Deprez157378f2022-04-04 15:47:50 +0200848 spin_lock(&mm->notifier_subscriptions->lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000849 /*
850 * Can not use list_del_rcu() since __mmu_notifier_release
851 * can delete it before we hold the lock.
852 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200853 hlist_del_init_rcu(&subscription->hlist);
854 spin_unlock(&mm->notifier_subscriptions->lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000855 }
856
857 /*
858 * Wait for any running method to finish, of course including
859 * ->release if it was run by mmu_notifier_release instead of us.
860 */
861 synchronize_srcu(&srcu);
862
863 BUG_ON(atomic_read(&mm->mm_count) <= 0);
864
865 mmdrop(mm);
866}
867EXPORT_SYMBOL_GPL(mmu_notifier_unregister);
868
David Brazdil0f672f62019-12-10 10:32:29 +0000869static void mmu_notifier_free_rcu(struct rcu_head *rcu)
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000870{
Olivier Deprez157378f2022-04-04 15:47:50 +0200871 struct mmu_notifier *subscription =
872 container_of(rcu, struct mmu_notifier, rcu);
873 struct mm_struct *mm = subscription->mm;
David Brazdil0f672f62019-12-10 10:32:29 +0000874
Olivier Deprez157378f2022-04-04 15:47:50 +0200875 subscription->ops->free_notifier(subscription);
David Brazdil0f672f62019-12-10 10:32:29 +0000876 /* Pairs with the get in __mmu_notifier_register() */
877 mmdrop(mm);
878}
879
880/**
881 * mmu_notifier_put - Release the reference on the notifier
Olivier Deprez157378f2022-04-04 15:47:50 +0200882 * @subscription: The notifier to act on
David Brazdil0f672f62019-12-10 10:32:29 +0000883 *
884 * This function must be paired with each mmu_notifier_get(), it releases the
885 * reference obtained by the get. If this is the last reference then process
886 * to free the notifier will be run asynchronously.
887 *
888 * Unlike mmu_notifier_unregister() the get/put flow only calls ops->release
889 * when the mm_struct is destroyed. Instead free_notifier is always called to
890 * release any resources held by the user.
891 *
892 * As ops->release is not guaranteed to be called, the user must ensure that
893 * all sptes are dropped, and no new sptes can be established before
894 * mmu_notifier_put() is called.
895 *
896 * This function can be called from the ops->release callback, however the
897 * caller must still ensure it is called pairwise with mmu_notifier_get().
898 *
899 * Modules calling this function must call mmu_notifier_synchronize() in
900 * their __exit functions to ensure the async work is completed.
901 */
Olivier Deprez157378f2022-04-04 15:47:50 +0200902void mmu_notifier_put(struct mmu_notifier *subscription)
David Brazdil0f672f62019-12-10 10:32:29 +0000903{
Olivier Deprez157378f2022-04-04 15:47:50 +0200904 struct mm_struct *mm = subscription->mm;
David Brazdil0f672f62019-12-10 10:32:29 +0000905
Olivier Deprez157378f2022-04-04 15:47:50 +0200906 spin_lock(&mm->notifier_subscriptions->lock);
907 if (WARN_ON(!subscription->users) || --subscription->users)
David Brazdil0f672f62019-12-10 10:32:29 +0000908 goto out_unlock;
Olivier Deprez157378f2022-04-04 15:47:50 +0200909 hlist_del_init_rcu(&subscription->hlist);
910 spin_unlock(&mm->notifier_subscriptions->lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000911
Olivier Deprez157378f2022-04-04 15:47:50 +0200912 call_srcu(&srcu, &subscription->rcu, mmu_notifier_free_rcu);
David Brazdil0f672f62019-12-10 10:32:29 +0000913 return;
914
915out_unlock:
Olivier Deprez157378f2022-04-04 15:47:50 +0200916 spin_unlock(&mm->notifier_subscriptions->lock);
Andrew Scullb4b6d4a2019-01-02 15:54:55 +0000917}
David Brazdil0f672f62019-12-10 10:32:29 +0000918EXPORT_SYMBOL_GPL(mmu_notifier_put);
919
Olivier Deprez157378f2022-04-04 15:47:50 +0200920static int __mmu_interval_notifier_insert(
921 struct mmu_interval_notifier *interval_sub, struct mm_struct *mm,
922 struct mmu_notifier_subscriptions *subscriptions, unsigned long start,
923 unsigned long length, const struct mmu_interval_notifier_ops *ops)
924{
925 interval_sub->mm = mm;
926 interval_sub->ops = ops;
927 RB_CLEAR_NODE(&interval_sub->interval_tree.rb);
928 interval_sub->interval_tree.start = start;
929 /*
930 * Note that the representation of the intervals in the interval tree
931 * considers the ending point as contained in the interval.
932 */
933 if (length == 0 ||
934 check_add_overflow(start, length - 1,
935 &interval_sub->interval_tree.last))
936 return -EOVERFLOW;
937
938 /* Must call with a mmget() held */
939 if (WARN_ON(atomic_read(&mm->mm_users) <= 0))
940 return -EINVAL;
941
942 /* pairs with mmdrop in mmu_interval_notifier_remove() */
943 mmgrab(mm);
944
945 /*
946 * If some invalidate_range_start/end region is going on in parallel
947 * we don't know what VA ranges are affected, so we must assume this
948 * new range is included.
949 *
950 * If the itree is invalidating then we are not allowed to change
951 * it. Retrying until invalidation is done is tricky due to the
952 * possibility for live lock, instead defer the add to
953 * mn_itree_inv_end() so this algorithm is deterministic.
954 *
955 * In all cases the value for the interval_sub->invalidate_seq should be
956 * odd, see mmu_interval_read_begin()
957 */
958 spin_lock(&subscriptions->lock);
959 if (subscriptions->active_invalidate_ranges) {
960 if (mn_itree_is_invalidating(subscriptions))
961 hlist_add_head(&interval_sub->deferred_item,
962 &subscriptions->deferred_list);
963 else {
964 subscriptions->invalidate_seq |= 1;
965 interval_tree_insert(&interval_sub->interval_tree,
966 &subscriptions->itree);
967 }
968 interval_sub->invalidate_seq = subscriptions->invalidate_seq;
969 } else {
970 WARN_ON(mn_itree_is_invalidating(subscriptions));
971 /*
972 * The starting seq for a subscription not under invalidation
973 * should be odd, not equal to the current invalidate_seq and
974 * invalidate_seq should not 'wrap' to the new seq any time
975 * soon.
976 */
977 interval_sub->invalidate_seq =
978 subscriptions->invalidate_seq - 1;
979 interval_tree_insert(&interval_sub->interval_tree,
980 &subscriptions->itree);
981 }
982 spin_unlock(&subscriptions->lock);
983 return 0;
984}
985
986/**
987 * mmu_interval_notifier_insert - Insert an interval notifier
988 * @interval_sub: Interval subscription to register
989 * @start: Starting virtual address to monitor
990 * @length: Length of the range to monitor
991 * @mm: mm_struct to attach to
992 * @ops: Interval notifier operations to be called on matching events
993 *
994 * This function subscribes the interval notifier for notifications from the
995 * mm. Upon return the ops related to mmu_interval_notifier will be called
996 * whenever an event that intersects with the given range occurs.
997 *
998 * Upon return the range_notifier may not be present in the interval tree yet.
999 * The caller must use the normal interval notifier read flow via
1000 * mmu_interval_read_begin() to establish SPTEs for this range.
1001 */
1002int mmu_interval_notifier_insert(struct mmu_interval_notifier *interval_sub,
1003 struct mm_struct *mm, unsigned long start,
1004 unsigned long length,
1005 const struct mmu_interval_notifier_ops *ops)
1006{
1007 struct mmu_notifier_subscriptions *subscriptions;
1008 int ret;
1009
1010 might_lock(&mm->mmap_lock);
1011
1012 subscriptions = smp_load_acquire(&mm->notifier_subscriptions);
1013 if (!subscriptions || !subscriptions->has_itree) {
1014 ret = mmu_notifier_register(NULL, mm);
1015 if (ret)
1016 return ret;
1017 subscriptions = mm->notifier_subscriptions;
1018 }
1019 return __mmu_interval_notifier_insert(interval_sub, mm, subscriptions,
1020 start, length, ops);
1021}
1022EXPORT_SYMBOL_GPL(mmu_interval_notifier_insert);
1023
1024int mmu_interval_notifier_insert_locked(
1025 struct mmu_interval_notifier *interval_sub, struct mm_struct *mm,
1026 unsigned long start, unsigned long length,
1027 const struct mmu_interval_notifier_ops *ops)
1028{
1029 struct mmu_notifier_subscriptions *subscriptions =
1030 mm->notifier_subscriptions;
1031 int ret;
1032
1033 mmap_assert_write_locked(mm);
1034
1035 if (!subscriptions || !subscriptions->has_itree) {
1036 ret = __mmu_notifier_register(NULL, mm);
1037 if (ret)
1038 return ret;
1039 subscriptions = mm->notifier_subscriptions;
1040 }
1041 return __mmu_interval_notifier_insert(interval_sub, mm, subscriptions,
1042 start, length, ops);
1043}
1044EXPORT_SYMBOL_GPL(mmu_interval_notifier_insert_locked);
1045
1046/**
1047 * mmu_interval_notifier_remove - Remove a interval notifier
1048 * @interval_sub: Interval subscription to unregister
1049 *
1050 * This function must be paired with mmu_interval_notifier_insert(). It cannot
1051 * be called from any ops callback.
1052 *
1053 * Once this returns ops callbacks are no longer running on other CPUs and
1054 * will not be called in future.
1055 */
1056void mmu_interval_notifier_remove(struct mmu_interval_notifier *interval_sub)
1057{
1058 struct mm_struct *mm = interval_sub->mm;
1059 struct mmu_notifier_subscriptions *subscriptions =
1060 mm->notifier_subscriptions;
1061 unsigned long seq = 0;
1062
1063 might_sleep();
1064
1065 spin_lock(&subscriptions->lock);
1066 if (mn_itree_is_invalidating(subscriptions)) {
1067 /*
1068 * remove is being called after insert put this on the
1069 * deferred list, but before the deferred list was processed.
1070 */
1071 if (RB_EMPTY_NODE(&interval_sub->interval_tree.rb)) {
1072 hlist_del(&interval_sub->deferred_item);
1073 } else {
1074 hlist_add_head(&interval_sub->deferred_item,
1075 &subscriptions->deferred_list);
1076 seq = subscriptions->invalidate_seq;
1077 }
1078 } else {
1079 WARN_ON(RB_EMPTY_NODE(&interval_sub->interval_tree.rb));
1080 interval_tree_remove(&interval_sub->interval_tree,
1081 &subscriptions->itree);
1082 }
1083 spin_unlock(&subscriptions->lock);
1084
1085 /*
1086 * The possible sleep on progress in the invalidation requires the
1087 * caller not hold any locks held by invalidation callbacks.
1088 */
1089 lock_map_acquire(&__mmu_notifier_invalidate_range_start_map);
1090 lock_map_release(&__mmu_notifier_invalidate_range_start_map);
1091 if (seq)
1092 wait_event(subscriptions->wq,
1093 READ_ONCE(subscriptions->invalidate_seq) != seq);
1094
1095 /* pairs with mmgrab in mmu_interval_notifier_insert() */
1096 mmdrop(mm);
1097}
1098EXPORT_SYMBOL_GPL(mmu_interval_notifier_remove);
1099
David Brazdil0f672f62019-12-10 10:32:29 +00001100/**
1101 * mmu_notifier_synchronize - Ensure all mmu_notifiers are freed
1102 *
1103 * This function ensures that all outstanding async SRU work from
1104 * mmu_notifier_put() is completed. After it returns any mmu_notifier_ops
1105 * associated with an unused mmu_notifier will no longer be called.
1106 *
1107 * Before using the caller must ensure that all of its mmu_notifiers have been
1108 * fully released via mmu_notifier_put().
1109 *
1110 * Modules using the mmu_notifier_put() API should call this in their __exit
1111 * function to avoid module unloading races.
1112 */
1113void mmu_notifier_synchronize(void)
1114{
1115 synchronize_srcu(&srcu);
1116}
1117EXPORT_SYMBOL_GPL(mmu_notifier_synchronize);
1118
1119bool
1120mmu_notifier_range_update_to_read_only(const struct mmu_notifier_range *range)
1121{
1122 if (!range->vma || range->event != MMU_NOTIFY_PROTECTION_VMA)
1123 return false;
1124 /* Return true if the vma still have the read flag set. */
1125 return range->vma->vm_flags & VM_READ;
1126}
1127EXPORT_SYMBOL_GPL(mmu_notifier_range_update_to_read_only);