162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci#include <linux/mm.h> 362306a36Sopenharmony_ci#include <linux/slab.h> 462306a36Sopenharmony_ci#include <linux/string.h> 562306a36Sopenharmony_ci#include <linux/compiler.h> 662306a36Sopenharmony_ci#include <linux/export.h> 762306a36Sopenharmony_ci#include <linux/err.h> 862306a36Sopenharmony_ci#include <linux/sched.h> 962306a36Sopenharmony_ci#include <linux/sched/mm.h> 1062306a36Sopenharmony_ci#include <linux/sched/signal.h> 1162306a36Sopenharmony_ci#include <linux/sched/task_stack.h> 1262306a36Sopenharmony_ci#include <linux/security.h> 1362306a36Sopenharmony_ci#include <linux/swap.h> 1462306a36Sopenharmony_ci#include <linux/swapops.h> 1562306a36Sopenharmony_ci#include <linux/mman.h> 1662306a36Sopenharmony_ci#include <linux/hugetlb.h> 1762306a36Sopenharmony_ci#include <linux/vmalloc.h> 1862306a36Sopenharmony_ci#include <linux/userfaultfd_k.h> 1962306a36Sopenharmony_ci#include <linux/elf.h> 2062306a36Sopenharmony_ci#include <linux/elf-randomize.h> 2162306a36Sopenharmony_ci#include <linux/personality.h> 2262306a36Sopenharmony_ci#include <linux/random.h> 2362306a36Sopenharmony_ci#include <linux/processor.h> 2462306a36Sopenharmony_ci#include <linux/sizes.h> 2562306a36Sopenharmony_ci#include <linux/compat.h> 2662306a36Sopenharmony_ci 2762306a36Sopenharmony_ci#include <linux/uaccess.h> 2862306a36Sopenharmony_ci 2962306a36Sopenharmony_ci#include "internal.h" 3062306a36Sopenharmony_ci#include "swap.h" 3162306a36Sopenharmony_ci 3262306a36Sopenharmony_ci/** 3362306a36Sopenharmony_ci * kfree_const - conditionally free memory 3462306a36Sopenharmony_ci * @x: pointer to the memory 3562306a36Sopenharmony_ci * 3662306a36Sopenharmony_ci * Function calls kfree only if @x is not in .rodata section. 3762306a36Sopenharmony_ci */ 3862306a36Sopenharmony_civoid kfree_const(const void *x) 3962306a36Sopenharmony_ci{ 4062306a36Sopenharmony_ci if (!is_kernel_rodata((unsigned long)x)) 4162306a36Sopenharmony_ci kfree(x); 4262306a36Sopenharmony_ci} 4362306a36Sopenharmony_ciEXPORT_SYMBOL(kfree_const); 4462306a36Sopenharmony_ci 4562306a36Sopenharmony_ci/** 4662306a36Sopenharmony_ci * kstrdup - allocate space for and copy an existing string 4762306a36Sopenharmony_ci * @s: the string to duplicate 4862306a36Sopenharmony_ci * @gfp: the GFP mask used in the kmalloc() call when allocating memory 4962306a36Sopenharmony_ci * 5062306a36Sopenharmony_ci * Return: newly allocated copy of @s or %NULL in case of error 5162306a36Sopenharmony_ci */ 5262306a36Sopenharmony_cinoinline 5362306a36Sopenharmony_cichar *kstrdup(const char *s, gfp_t gfp) 5462306a36Sopenharmony_ci{ 5562306a36Sopenharmony_ci size_t len; 5662306a36Sopenharmony_ci char *buf; 5762306a36Sopenharmony_ci 5862306a36Sopenharmony_ci if (!s) 5962306a36Sopenharmony_ci return NULL; 6062306a36Sopenharmony_ci 6162306a36Sopenharmony_ci len = strlen(s) + 1; 6262306a36Sopenharmony_ci buf = kmalloc_track_caller(len, gfp); 6362306a36Sopenharmony_ci if (buf) 6462306a36Sopenharmony_ci memcpy(buf, s, len); 6562306a36Sopenharmony_ci return buf; 6662306a36Sopenharmony_ci} 6762306a36Sopenharmony_ciEXPORT_SYMBOL(kstrdup); 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci/** 7062306a36Sopenharmony_ci * kstrdup_const - conditionally duplicate an existing const string 7162306a36Sopenharmony_ci * @s: the string to duplicate 7262306a36Sopenharmony_ci * @gfp: the GFP mask used in the kmalloc() call when allocating memory 7362306a36Sopenharmony_ci * 7462306a36Sopenharmony_ci * Note: Strings allocated by kstrdup_const should be freed by kfree_const and 7562306a36Sopenharmony_ci * must not be passed to krealloc(). 7662306a36Sopenharmony_ci * 7762306a36Sopenharmony_ci * Return: source string if it is in .rodata section otherwise 7862306a36Sopenharmony_ci * fallback to kstrdup. 7962306a36Sopenharmony_ci */ 8062306a36Sopenharmony_ciconst char *kstrdup_const(const char *s, gfp_t gfp) 8162306a36Sopenharmony_ci{ 8262306a36Sopenharmony_ci if (is_kernel_rodata((unsigned long)s)) 8362306a36Sopenharmony_ci return s; 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_ci return kstrdup(s, gfp); 8662306a36Sopenharmony_ci} 8762306a36Sopenharmony_ciEXPORT_SYMBOL(kstrdup_const); 8862306a36Sopenharmony_ci 8962306a36Sopenharmony_ci/** 9062306a36Sopenharmony_ci * kstrndup - allocate space for and copy an existing string 9162306a36Sopenharmony_ci * @s: the string to duplicate 9262306a36Sopenharmony_ci * @max: read at most @max chars from @s 9362306a36Sopenharmony_ci * @gfp: the GFP mask used in the kmalloc() call when allocating memory 9462306a36Sopenharmony_ci * 9562306a36Sopenharmony_ci * Note: Use kmemdup_nul() instead if the size is known exactly. 9662306a36Sopenharmony_ci * 9762306a36Sopenharmony_ci * Return: newly allocated copy of @s or %NULL in case of error 9862306a36Sopenharmony_ci */ 9962306a36Sopenharmony_cichar *kstrndup(const char *s, size_t max, gfp_t gfp) 10062306a36Sopenharmony_ci{ 10162306a36Sopenharmony_ci size_t len; 10262306a36Sopenharmony_ci char *buf; 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci if (!s) 10562306a36Sopenharmony_ci return NULL; 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_ci len = strnlen(s, max); 10862306a36Sopenharmony_ci buf = kmalloc_track_caller(len+1, gfp); 10962306a36Sopenharmony_ci if (buf) { 11062306a36Sopenharmony_ci memcpy(buf, s, len); 11162306a36Sopenharmony_ci buf[len] = '\0'; 11262306a36Sopenharmony_ci } 11362306a36Sopenharmony_ci return buf; 11462306a36Sopenharmony_ci} 11562306a36Sopenharmony_ciEXPORT_SYMBOL(kstrndup); 11662306a36Sopenharmony_ci 11762306a36Sopenharmony_ci/** 11862306a36Sopenharmony_ci * kmemdup - duplicate region of memory 11962306a36Sopenharmony_ci * 12062306a36Sopenharmony_ci * @src: memory region to duplicate 12162306a36Sopenharmony_ci * @len: memory region length 12262306a36Sopenharmony_ci * @gfp: GFP mask to use 12362306a36Sopenharmony_ci * 12462306a36Sopenharmony_ci * Return: newly allocated copy of @src or %NULL in case of error, 12562306a36Sopenharmony_ci * result is physically contiguous. Use kfree() to free. 12662306a36Sopenharmony_ci */ 12762306a36Sopenharmony_civoid *kmemdup(const void *src, size_t len, gfp_t gfp) 12862306a36Sopenharmony_ci{ 12962306a36Sopenharmony_ci void *p; 13062306a36Sopenharmony_ci 13162306a36Sopenharmony_ci p = kmalloc_track_caller(len, gfp); 13262306a36Sopenharmony_ci if (p) 13362306a36Sopenharmony_ci memcpy(p, src, len); 13462306a36Sopenharmony_ci return p; 13562306a36Sopenharmony_ci} 13662306a36Sopenharmony_ciEXPORT_SYMBOL(kmemdup); 13762306a36Sopenharmony_ci 13862306a36Sopenharmony_ci/** 13962306a36Sopenharmony_ci * kvmemdup - duplicate region of memory 14062306a36Sopenharmony_ci * 14162306a36Sopenharmony_ci * @src: memory region to duplicate 14262306a36Sopenharmony_ci * @len: memory region length 14362306a36Sopenharmony_ci * @gfp: GFP mask to use 14462306a36Sopenharmony_ci * 14562306a36Sopenharmony_ci * Return: newly allocated copy of @src or %NULL in case of error, 14662306a36Sopenharmony_ci * result may be not physically contiguous. Use kvfree() to free. 14762306a36Sopenharmony_ci */ 14862306a36Sopenharmony_civoid *kvmemdup(const void *src, size_t len, gfp_t gfp) 14962306a36Sopenharmony_ci{ 15062306a36Sopenharmony_ci void *p; 15162306a36Sopenharmony_ci 15262306a36Sopenharmony_ci p = kvmalloc(len, gfp); 15362306a36Sopenharmony_ci if (p) 15462306a36Sopenharmony_ci memcpy(p, src, len); 15562306a36Sopenharmony_ci return p; 15662306a36Sopenharmony_ci} 15762306a36Sopenharmony_ciEXPORT_SYMBOL(kvmemdup); 15862306a36Sopenharmony_ci 15962306a36Sopenharmony_ci/** 16062306a36Sopenharmony_ci * kmemdup_nul - Create a NUL-terminated string from unterminated data 16162306a36Sopenharmony_ci * @s: The data to stringify 16262306a36Sopenharmony_ci * @len: The size of the data 16362306a36Sopenharmony_ci * @gfp: the GFP mask used in the kmalloc() call when allocating memory 16462306a36Sopenharmony_ci * 16562306a36Sopenharmony_ci * Return: newly allocated copy of @s with NUL-termination or %NULL in 16662306a36Sopenharmony_ci * case of error 16762306a36Sopenharmony_ci */ 16862306a36Sopenharmony_cichar *kmemdup_nul(const char *s, size_t len, gfp_t gfp) 16962306a36Sopenharmony_ci{ 17062306a36Sopenharmony_ci char *buf; 17162306a36Sopenharmony_ci 17262306a36Sopenharmony_ci if (!s) 17362306a36Sopenharmony_ci return NULL; 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci buf = kmalloc_track_caller(len + 1, gfp); 17662306a36Sopenharmony_ci if (buf) { 17762306a36Sopenharmony_ci memcpy(buf, s, len); 17862306a36Sopenharmony_ci buf[len] = '\0'; 17962306a36Sopenharmony_ci } 18062306a36Sopenharmony_ci return buf; 18162306a36Sopenharmony_ci} 18262306a36Sopenharmony_ciEXPORT_SYMBOL(kmemdup_nul); 18362306a36Sopenharmony_ci 18462306a36Sopenharmony_ci/** 18562306a36Sopenharmony_ci * memdup_user - duplicate memory region from user space 18662306a36Sopenharmony_ci * 18762306a36Sopenharmony_ci * @src: source address in user space 18862306a36Sopenharmony_ci * @len: number of bytes to copy 18962306a36Sopenharmony_ci * 19062306a36Sopenharmony_ci * Return: an ERR_PTR() on failure. Result is physically 19162306a36Sopenharmony_ci * contiguous, to be freed by kfree(). 19262306a36Sopenharmony_ci */ 19362306a36Sopenharmony_civoid *memdup_user(const void __user *src, size_t len) 19462306a36Sopenharmony_ci{ 19562306a36Sopenharmony_ci void *p; 19662306a36Sopenharmony_ci 19762306a36Sopenharmony_ci p = kmalloc_track_caller(len, GFP_USER | __GFP_NOWARN); 19862306a36Sopenharmony_ci if (!p) 19962306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 20062306a36Sopenharmony_ci 20162306a36Sopenharmony_ci if (copy_from_user(p, src, len)) { 20262306a36Sopenharmony_ci kfree(p); 20362306a36Sopenharmony_ci return ERR_PTR(-EFAULT); 20462306a36Sopenharmony_ci } 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_ci return p; 20762306a36Sopenharmony_ci} 20862306a36Sopenharmony_ciEXPORT_SYMBOL(memdup_user); 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ci/** 21162306a36Sopenharmony_ci * vmemdup_user - duplicate memory region from user space 21262306a36Sopenharmony_ci * 21362306a36Sopenharmony_ci * @src: source address in user space 21462306a36Sopenharmony_ci * @len: number of bytes to copy 21562306a36Sopenharmony_ci * 21662306a36Sopenharmony_ci * Return: an ERR_PTR() on failure. Result may be not 21762306a36Sopenharmony_ci * physically contiguous. Use kvfree() to free. 21862306a36Sopenharmony_ci */ 21962306a36Sopenharmony_civoid *vmemdup_user(const void __user *src, size_t len) 22062306a36Sopenharmony_ci{ 22162306a36Sopenharmony_ci void *p; 22262306a36Sopenharmony_ci 22362306a36Sopenharmony_ci p = kvmalloc(len, GFP_USER); 22462306a36Sopenharmony_ci if (!p) 22562306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ci if (copy_from_user(p, src, len)) { 22862306a36Sopenharmony_ci kvfree(p); 22962306a36Sopenharmony_ci return ERR_PTR(-EFAULT); 23062306a36Sopenharmony_ci } 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_ci return p; 23362306a36Sopenharmony_ci} 23462306a36Sopenharmony_ciEXPORT_SYMBOL(vmemdup_user); 23562306a36Sopenharmony_ci 23662306a36Sopenharmony_ci/** 23762306a36Sopenharmony_ci * strndup_user - duplicate an existing string from user space 23862306a36Sopenharmony_ci * @s: The string to duplicate 23962306a36Sopenharmony_ci * @n: Maximum number of bytes to copy, including the trailing NUL. 24062306a36Sopenharmony_ci * 24162306a36Sopenharmony_ci * Return: newly allocated copy of @s or an ERR_PTR() in case of error 24262306a36Sopenharmony_ci */ 24362306a36Sopenharmony_cichar *strndup_user(const char __user *s, long n) 24462306a36Sopenharmony_ci{ 24562306a36Sopenharmony_ci char *p; 24662306a36Sopenharmony_ci long length; 24762306a36Sopenharmony_ci 24862306a36Sopenharmony_ci length = strnlen_user(s, n); 24962306a36Sopenharmony_ci 25062306a36Sopenharmony_ci if (!length) 25162306a36Sopenharmony_ci return ERR_PTR(-EFAULT); 25262306a36Sopenharmony_ci 25362306a36Sopenharmony_ci if (length > n) 25462306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 25562306a36Sopenharmony_ci 25662306a36Sopenharmony_ci p = memdup_user(s, length); 25762306a36Sopenharmony_ci 25862306a36Sopenharmony_ci if (IS_ERR(p)) 25962306a36Sopenharmony_ci return p; 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_ci p[length - 1] = '\0'; 26262306a36Sopenharmony_ci 26362306a36Sopenharmony_ci return p; 26462306a36Sopenharmony_ci} 26562306a36Sopenharmony_ciEXPORT_SYMBOL(strndup_user); 26662306a36Sopenharmony_ci 26762306a36Sopenharmony_ci/** 26862306a36Sopenharmony_ci * memdup_user_nul - duplicate memory region from user space and NUL-terminate 26962306a36Sopenharmony_ci * 27062306a36Sopenharmony_ci * @src: source address in user space 27162306a36Sopenharmony_ci * @len: number of bytes to copy 27262306a36Sopenharmony_ci * 27362306a36Sopenharmony_ci * Return: an ERR_PTR() on failure. 27462306a36Sopenharmony_ci */ 27562306a36Sopenharmony_civoid *memdup_user_nul(const void __user *src, size_t len) 27662306a36Sopenharmony_ci{ 27762306a36Sopenharmony_ci char *p; 27862306a36Sopenharmony_ci 27962306a36Sopenharmony_ci /* 28062306a36Sopenharmony_ci * Always use GFP_KERNEL, since copy_from_user() can sleep and 28162306a36Sopenharmony_ci * cause pagefault, which makes it pointless to use GFP_NOFS 28262306a36Sopenharmony_ci * or GFP_ATOMIC. 28362306a36Sopenharmony_ci */ 28462306a36Sopenharmony_ci p = kmalloc_track_caller(len + 1, GFP_KERNEL); 28562306a36Sopenharmony_ci if (!p) 28662306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 28762306a36Sopenharmony_ci 28862306a36Sopenharmony_ci if (copy_from_user(p, src, len)) { 28962306a36Sopenharmony_ci kfree(p); 29062306a36Sopenharmony_ci return ERR_PTR(-EFAULT); 29162306a36Sopenharmony_ci } 29262306a36Sopenharmony_ci p[len] = '\0'; 29362306a36Sopenharmony_ci 29462306a36Sopenharmony_ci return p; 29562306a36Sopenharmony_ci} 29662306a36Sopenharmony_ciEXPORT_SYMBOL(memdup_user_nul); 29762306a36Sopenharmony_ci 29862306a36Sopenharmony_ci/* Check if the vma is being used as a stack by this task */ 29962306a36Sopenharmony_ciint vma_is_stack_for_current(struct vm_area_struct *vma) 30062306a36Sopenharmony_ci{ 30162306a36Sopenharmony_ci struct task_struct * __maybe_unused t = current; 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci return (vma->vm_start <= KSTK_ESP(t) && vma->vm_end >= KSTK_ESP(t)); 30462306a36Sopenharmony_ci} 30562306a36Sopenharmony_ci 30662306a36Sopenharmony_ci/* 30762306a36Sopenharmony_ci * Change backing file, only valid to use during initial VMA setup. 30862306a36Sopenharmony_ci */ 30962306a36Sopenharmony_civoid vma_set_file(struct vm_area_struct *vma, struct file *file) 31062306a36Sopenharmony_ci{ 31162306a36Sopenharmony_ci /* Changing an anonymous vma with this is illegal */ 31262306a36Sopenharmony_ci get_file(file); 31362306a36Sopenharmony_ci swap(vma->vm_file, file); 31462306a36Sopenharmony_ci fput(file); 31562306a36Sopenharmony_ci} 31662306a36Sopenharmony_ciEXPORT_SYMBOL(vma_set_file); 31762306a36Sopenharmony_ci 31862306a36Sopenharmony_ci#ifndef STACK_RND_MASK 31962306a36Sopenharmony_ci#define STACK_RND_MASK (0x7ff >> (PAGE_SHIFT - 12)) /* 8MB of VA */ 32062306a36Sopenharmony_ci#endif 32162306a36Sopenharmony_ci 32262306a36Sopenharmony_ciunsigned long randomize_stack_top(unsigned long stack_top) 32362306a36Sopenharmony_ci{ 32462306a36Sopenharmony_ci unsigned long random_variable = 0; 32562306a36Sopenharmony_ci 32662306a36Sopenharmony_ci if (current->flags & PF_RANDOMIZE) { 32762306a36Sopenharmony_ci random_variable = get_random_long(); 32862306a36Sopenharmony_ci random_variable &= STACK_RND_MASK; 32962306a36Sopenharmony_ci random_variable <<= PAGE_SHIFT; 33062306a36Sopenharmony_ci } 33162306a36Sopenharmony_ci#ifdef CONFIG_STACK_GROWSUP 33262306a36Sopenharmony_ci return PAGE_ALIGN(stack_top) + random_variable; 33362306a36Sopenharmony_ci#else 33462306a36Sopenharmony_ci return PAGE_ALIGN(stack_top) - random_variable; 33562306a36Sopenharmony_ci#endif 33662306a36Sopenharmony_ci} 33762306a36Sopenharmony_ci 33862306a36Sopenharmony_ci/** 33962306a36Sopenharmony_ci * randomize_page - Generate a random, page aligned address 34062306a36Sopenharmony_ci * @start: The smallest acceptable address the caller will take. 34162306a36Sopenharmony_ci * @range: The size of the area, starting at @start, within which the 34262306a36Sopenharmony_ci * random address must fall. 34362306a36Sopenharmony_ci * 34462306a36Sopenharmony_ci * If @start + @range would overflow, @range is capped. 34562306a36Sopenharmony_ci * 34662306a36Sopenharmony_ci * NOTE: Historical use of randomize_range, which this replaces, presumed that 34762306a36Sopenharmony_ci * @start was already page aligned. We now align it regardless. 34862306a36Sopenharmony_ci * 34962306a36Sopenharmony_ci * Return: A page aligned address within [start, start + range). On error, 35062306a36Sopenharmony_ci * @start is returned. 35162306a36Sopenharmony_ci */ 35262306a36Sopenharmony_ciunsigned long randomize_page(unsigned long start, unsigned long range) 35362306a36Sopenharmony_ci{ 35462306a36Sopenharmony_ci if (!PAGE_ALIGNED(start)) { 35562306a36Sopenharmony_ci range -= PAGE_ALIGN(start) - start; 35662306a36Sopenharmony_ci start = PAGE_ALIGN(start); 35762306a36Sopenharmony_ci } 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_ci if (start > ULONG_MAX - range) 36062306a36Sopenharmony_ci range = ULONG_MAX - start; 36162306a36Sopenharmony_ci 36262306a36Sopenharmony_ci range >>= PAGE_SHIFT; 36362306a36Sopenharmony_ci 36462306a36Sopenharmony_ci if (range == 0) 36562306a36Sopenharmony_ci return start; 36662306a36Sopenharmony_ci 36762306a36Sopenharmony_ci return start + (get_random_long() % range << PAGE_SHIFT); 36862306a36Sopenharmony_ci} 36962306a36Sopenharmony_ci 37062306a36Sopenharmony_ci#ifdef CONFIG_ARCH_WANT_DEFAULT_TOPDOWN_MMAP_LAYOUT 37162306a36Sopenharmony_ciunsigned long __weak arch_randomize_brk(struct mm_struct *mm) 37262306a36Sopenharmony_ci{ 37362306a36Sopenharmony_ci /* Is the current task 32bit ? */ 37462306a36Sopenharmony_ci if (!IS_ENABLED(CONFIG_64BIT) || is_compat_task()) 37562306a36Sopenharmony_ci return randomize_page(mm->brk, SZ_32M); 37662306a36Sopenharmony_ci 37762306a36Sopenharmony_ci return randomize_page(mm->brk, SZ_1G); 37862306a36Sopenharmony_ci} 37962306a36Sopenharmony_ci 38062306a36Sopenharmony_ciunsigned long arch_mmap_rnd(void) 38162306a36Sopenharmony_ci{ 38262306a36Sopenharmony_ci unsigned long rnd; 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ci#ifdef CONFIG_HAVE_ARCH_MMAP_RND_COMPAT_BITS 38562306a36Sopenharmony_ci if (is_compat_task()) 38662306a36Sopenharmony_ci rnd = get_random_long() & ((1UL << mmap_rnd_compat_bits) - 1); 38762306a36Sopenharmony_ci else 38862306a36Sopenharmony_ci#endif /* CONFIG_HAVE_ARCH_MMAP_RND_COMPAT_BITS */ 38962306a36Sopenharmony_ci rnd = get_random_long() & ((1UL << mmap_rnd_bits) - 1); 39062306a36Sopenharmony_ci 39162306a36Sopenharmony_ci return rnd << PAGE_SHIFT; 39262306a36Sopenharmony_ci} 39362306a36Sopenharmony_ci 39462306a36Sopenharmony_cistatic int mmap_is_legacy(struct rlimit *rlim_stack) 39562306a36Sopenharmony_ci{ 39662306a36Sopenharmony_ci if (current->personality & ADDR_COMPAT_LAYOUT) 39762306a36Sopenharmony_ci return 1; 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ci /* On parisc the stack always grows up - so a unlimited stack should 40062306a36Sopenharmony_ci * not be an indicator to use the legacy memory layout. */ 40162306a36Sopenharmony_ci if (rlim_stack->rlim_cur == RLIM_INFINITY && 40262306a36Sopenharmony_ci !IS_ENABLED(CONFIG_STACK_GROWSUP)) 40362306a36Sopenharmony_ci return 1; 40462306a36Sopenharmony_ci 40562306a36Sopenharmony_ci return sysctl_legacy_va_layout; 40662306a36Sopenharmony_ci} 40762306a36Sopenharmony_ci 40862306a36Sopenharmony_ci/* 40962306a36Sopenharmony_ci * Leave enough space between the mmap area and the stack to honour ulimit in 41062306a36Sopenharmony_ci * the face of randomisation. 41162306a36Sopenharmony_ci */ 41262306a36Sopenharmony_ci#define MIN_GAP (SZ_128M) 41362306a36Sopenharmony_ci#define MAX_GAP (STACK_TOP / 6 * 5) 41462306a36Sopenharmony_ci 41562306a36Sopenharmony_cistatic unsigned long mmap_base(unsigned long rnd, struct rlimit *rlim_stack) 41662306a36Sopenharmony_ci{ 41762306a36Sopenharmony_ci#ifdef CONFIG_STACK_GROWSUP 41862306a36Sopenharmony_ci /* 41962306a36Sopenharmony_ci * For an upwards growing stack the calculation is much simpler. 42062306a36Sopenharmony_ci * Memory for the maximum stack size is reserved at the top of the 42162306a36Sopenharmony_ci * task. mmap_base starts directly below the stack and grows 42262306a36Sopenharmony_ci * downwards. 42362306a36Sopenharmony_ci */ 42462306a36Sopenharmony_ci return PAGE_ALIGN_DOWN(mmap_upper_limit(rlim_stack) - rnd); 42562306a36Sopenharmony_ci#else 42662306a36Sopenharmony_ci unsigned long gap = rlim_stack->rlim_cur; 42762306a36Sopenharmony_ci unsigned long pad = stack_guard_gap; 42862306a36Sopenharmony_ci 42962306a36Sopenharmony_ci /* Account for stack randomization if necessary */ 43062306a36Sopenharmony_ci if (current->flags & PF_RANDOMIZE) 43162306a36Sopenharmony_ci pad += (STACK_RND_MASK << PAGE_SHIFT); 43262306a36Sopenharmony_ci 43362306a36Sopenharmony_ci /* Values close to RLIM_INFINITY can overflow. */ 43462306a36Sopenharmony_ci if (gap + pad > gap) 43562306a36Sopenharmony_ci gap += pad; 43662306a36Sopenharmony_ci 43762306a36Sopenharmony_ci if (gap < MIN_GAP) 43862306a36Sopenharmony_ci gap = MIN_GAP; 43962306a36Sopenharmony_ci else if (gap > MAX_GAP) 44062306a36Sopenharmony_ci gap = MAX_GAP; 44162306a36Sopenharmony_ci 44262306a36Sopenharmony_ci return PAGE_ALIGN(STACK_TOP - gap - rnd); 44362306a36Sopenharmony_ci#endif 44462306a36Sopenharmony_ci} 44562306a36Sopenharmony_ci 44662306a36Sopenharmony_civoid arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack) 44762306a36Sopenharmony_ci{ 44862306a36Sopenharmony_ci unsigned long random_factor = 0UL; 44962306a36Sopenharmony_ci 45062306a36Sopenharmony_ci if (current->flags & PF_RANDOMIZE) 45162306a36Sopenharmony_ci random_factor = arch_mmap_rnd(); 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_ci if (mmap_is_legacy(rlim_stack)) { 45462306a36Sopenharmony_ci mm->mmap_base = TASK_UNMAPPED_BASE + random_factor; 45562306a36Sopenharmony_ci mm->get_unmapped_area = arch_get_unmapped_area; 45662306a36Sopenharmony_ci } else { 45762306a36Sopenharmony_ci mm->mmap_base = mmap_base(random_factor, rlim_stack); 45862306a36Sopenharmony_ci mm->get_unmapped_area = arch_get_unmapped_area_topdown; 45962306a36Sopenharmony_ci } 46062306a36Sopenharmony_ci} 46162306a36Sopenharmony_ci#elif defined(CONFIG_MMU) && !defined(HAVE_ARCH_PICK_MMAP_LAYOUT) 46262306a36Sopenharmony_civoid arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack) 46362306a36Sopenharmony_ci{ 46462306a36Sopenharmony_ci mm->mmap_base = TASK_UNMAPPED_BASE; 46562306a36Sopenharmony_ci mm->get_unmapped_area = arch_get_unmapped_area; 46662306a36Sopenharmony_ci} 46762306a36Sopenharmony_ci#endif 46862306a36Sopenharmony_ci 46962306a36Sopenharmony_ci/** 47062306a36Sopenharmony_ci * __account_locked_vm - account locked pages to an mm's locked_vm 47162306a36Sopenharmony_ci * @mm: mm to account against 47262306a36Sopenharmony_ci * @pages: number of pages to account 47362306a36Sopenharmony_ci * @inc: %true if @pages should be considered positive, %false if not 47462306a36Sopenharmony_ci * @task: task used to check RLIMIT_MEMLOCK 47562306a36Sopenharmony_ci * @bypass_rlim: %true if checking RLIMIT_MEMLOCK should be skipped 47662306a36Sopenharmony_ci * 47762306a36Sopenharmony_ci * Assumes @task and @mm are valid (i.e. at least one reference on each), and 47862306a36Sopenharmony_ci * that mmap_lock is held as writer. 47962306a36Sopenharmony_ci * 48062306a36Sopenharmony_ci * Return: 48162306a36Sopenharmony_ci * * 0 on success 48262306a36Sopenharmony_ci * * -ENOMEM if RLIMIT_MEMLOCK would be exceeded. 48362306a36Sopenharmony_ci */ 48462306a36Sopenharmony_ciint __account_locked_vm(struct mm_struct *mm, unsigned long pages, bool inc, 48562306a36Sopenharmony_ci struct task_struct *task, bool bypass_rlim) 48662306a36Sopenharmony_ci{ 48762306a36Sopenharmony_ci unsigned long locked_vm, limit; 48862306a36Sopenharmony_ci int ret = 0; 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ci mmap_assert_write_locked(mm); 49162306a36Sopenharmony_ci 49262306a36Sopenharmony_ci locked_vm = mm->locked_vm; 49362306a36Sopenharmony_ci if (inc) { 49462306a36Sopenharmony_ci if (!bypass_rlim) { 49562306a36Sopenharmony_ci limit = task_rlimit(task, RLIMIT_MEMLOCK) >> PAGE_SHIFT; 49662306a36Sopenharmony_ci if (locked_vm + pages > limit) 49762306a36Sopenharmony_ci ret = -ENOMEM; 49862306a36Sopenharmony_ci } 49962306a36Sopenharmony_ci if (!ret) 50062306a36Sopenharmony_ci mm->locked_vm = locked_vm + pages; 50162306a36Sopenharmony_ci } else { 50262306a36Sopenharmony_ci WARN_ON_ONCE(pages > locked_vm); 50362306a36Sopenharmony_ci mm->locked_vm = locked_vm - pages; 50462306a36Sopenharmony_ci } 50562306a36Sopenharmony_ci 50662306a36Sopenharmony_ci pr_debug("%s: [%d] caller %ps %c%lu %lu/%lu%s\n", __func__, task->pid, 50762306a36Sopenharmony_ci (void *)_RET_IP_, (inc) ? '+' : '-', pages << PAGE_SHIFT, 50862306a36Sopenharmony_ci locked_vm << PAGE_SHIFT, task_rlimit(task, RLIMIT_MEMLOCK), 50962306a36Sopenharmony_ci ret ? " - exceeded" : ""); 51062306a36Sopenharmony_ci 51162306a36Sopenharmony_ci return ret; 51262306a36Sopenharmony_ci} 51362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(__account_locked_vm); 51462306a36Sopenharmony_ci 51562306a36Sopenharmony_ci/** 51662306a36Sopenharmony_ci * account_locked_vm - account locked pages to an mm's locked_vm 51762306a36Sopenharmony_ci * @mm: mm to account against, may be NULL 51862306a36Sopenharmony_ci * @pages: number of pages to account 51962306a36Sopenharmony_ci * @inc: %true if @pages should be considered positive, %false if not 52062306a36Sopenharmony_ci * 52162306a36Sopenharmony_ci * Assumes a non-NULL @mm is valid (i.e. at least one reference on it). 52262306a36Sopenharmony_ci * 52362306a36Sopenharmony_ci * Return: 52462306a36Sopenharmony_ci * * 0 on success, or if mm is NULL 52562306a36Sopenharmony_ci * * -ENOMEM if RLIMIT_MEMLOCK would be exceeded. 52662306a36Sopenharmony_ci */ 52762306a36Sopenharmony_ciint account_locked_vm(struct mm_struct *mm, unsigned long pages, bool inc) 52862306a36Sopenharmony_ci{ 52962306a36Sopenharmony_ci int ret; 53062306a36Sopenharmony_ci 53162306a36Sopenharmony_ci if (pages == 0 || !mm) 53262306a36Sopenharmony_ci return 0; 53362306a36Sopenharmony_ci 53462306a36Sopenharmony_ci mmap_write_lock(mm); 53562306a36Sopenharmony_ci ret = __account_locked_vm(mm, pages, inc, current, 53662306a36Sopenharmony_ci capable(CAP_IPC_LOCK)); 53762306a36Sopenharmony_ci mmap_write_unlock(mm); 53862306a36Sopenharmony_ci 53962306a36Sopenharmony_ci return ret; 54062306a36Sopenharmony_ci} 54162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(account_locked_vm); 54262306a36Sopenharmony_ci 54362306a36Sopenharmony_ciunsigned long vm_mmap_pgoff(struct file *file, unsigned long addr, 54462306a36Sopenharmony_ci unsigned long len, unsigned long prot, 54562306a36Sopenharmony_ci unsigned long flag, unsigned long pgoff) 54662306a36Sopenharmony_ci{ 54762306a36Sopenharmony_ci unsigned long ret; 54862306a36Sopenharmony_ci struct mm_struct *mm = current->mm; 54962306a36Sopenharmony_ci unsigned long populate; 55062306a36Sopenharmony_ci LIST_HEAD(uf); 55162306a36Sopenharmony_ci 55262306a36Sopenharmony_ci ret = security_mmap_file(file, prot, flag); 55362306a36Sopenharmony_ci if (!ret) { 55462306a36Sopenharmony_ci if (mmap_write_lock_killable(mm)) 55562306a36Sopenharmony_ci return -EINTR; 55662306a36Sopenharmony_ci ret = do_mmap(file, addr, len, prot, flag, 0, pgoff, &populate, 55762306a36Sopenharmony_ci &uf); 55862306a36Sopenharmony_ci mmap_write_unlock(mm); 55962306a36Sopenharmony_ci userfaultfd_unmap_complete(mm, &uf); 56062306a36Sopenharmony_ci if (populate) 56162306a36Sopenharmony_ci mm_populate(ret, populate); 56262306a36Sopenharmony_ci } 56362306a36Sopenharmony_ci return ret; 56462306a36Sopenharmony_ci} 56562306a36Sopenharmony_ci 56662306a36Sopenharmony_ciunsigned long vm_mmap(struct file *file, unsigned long addr, 56762306a36Sopenharmony_ci unsigned long len, unsigned long prot, 56862306a36Sopenharmony_ci unsigned long flag, unsigned long offset) 56962306a36Sopenharmony_ci{ 57062306a36Sopenharmony_ci if (unlikely(offset + PAGE_ALIGN(len) < offset)) 57162306a36Sopenharmony_ci return -EINVAL; 57262306a36Sopenharmony_ci if (unlikely(offset_in_page(offset))) 57362306a36Sopenharmony_ci return -EINVAL; 57462306a36Sopenharmony_ci 57562306a36Sopenharmony_ci return vm_mmap_pgoff(file, addr, len, prot, flag, offset >> PAGE_SHIFT); 57662306a36Sopenharmony_ci} 57762306a36Sopenharmony_ciEXPORT_SYMBOL(vm_mmap); 57862306a36Sopenharmony_ci 57962306a36Sopenharmony_ci/** 58062306a36Sopenharmony_ci * kvmalloc_node - attempt to allocate physically contiguous memory, but upon 58162306a36Sopenharmony_ci * failure, fall back to non-contiguous (vmalloc) allocation. 58262306a36Sopenharmony_ci * @size: size of the request. 58362306a36Sopenharmony_ci * @flags: gfp mask for the allocation - must be compatible (superset) with GFP_KERNEL. 58462306a36Sopenharmony_ci * @node: numa node to allocate from 58562306a36Sopenharmony_ci * 58662306a36Sopenharmony_ci * Uses kmalloc to get the memory but if the allocation fails then falls back 58762306a36Sopenharmony_ci * to the vmalloc allocator. Use kvfree for freeing the memory. 58862306a36Sopenharmony_ci * 58962306a36Sopenharmony_ci * GFP_NOWAIT and GFP_ATOMIC are not supported, neither is the __GFP_NORETRY modifier. 59062306a36Sopenharmony_ci * __GFP_RETRY_MAYFAIL is supported, and it should be used only if kmalloc is 59162306a36Sopenharmony_ci * preferable to the vmalloc fallback, due to visible performance drawbacks. 59262306a36Sopenharmony_ci * 59362306a36Sopenharmony_ci * Return: pointer to the allocated memory of %NULL in case of failure 59462306a36Sopenharmony_ci */ 59562306a36Sopenharmony_civoid *kvmalloc_node(size_t size, gfp_t flags, int node) 59662306a36Sopenharmony_ci{ 59762306a36Sopenharmony_ci gfp_t kmalloc_flags = flags; 59862306a36Sopenharmony_ci void *ret; 59962306a36Sopenharmony_ci 60062306a36Sopenharmony_ci /* 60162306a36Sopenharmony_ci * We want to attempt a large physically contiguous block first because 60262306a36Sopenharmony_ci * it is less likely to fragment multiple larger blocks and therefore 60362306a36Sopenharmony_ci * contribute to a long term fragmentation less than vmalloc fallback. 60462306a36Sopenharmony_ci * However make sure that larger requests are not too disruptive - no 60562306a36Sopenharmony_ci * OOM killer and no allocation failure warnings as we have a fallback. 60662306a36Sopenharmony_ci */ 60762306a36Sopenharmony_ci if (size > PAGE_SIZE) { 60862306a36Sopenharmony_ci kmalloc_flags |= __GFP_NOWARN; 60962306a36Sopenharmony_ci 61062306a36Sopenharmony_ci if (!(kmalloc_flags & __GFP_RETRY_MAYFAIL)) 61162306a36Sopenharmony_ci kmalloc_flags |= __GFP_NORETRY; 61262306a36Sopenharmony_ci 61362306a36Sopenharmony_ci /* nofail semantic is implemented by the vmalloc fallback */ 61462306a36Sopenharmony_ci kmalloc_flags &= ~__GFP_NOFAIL; 61562306a36Sopenharmony_ci } 61662306a36Sopenharmony_ci 61762306a36Sopenharmony_ci ret = kmalloc_node(size, kmalloc_flags, node); 61862306a36Sopenharmony_ci 61962306a36Sopenharmony_ci /* 62062306a36Sopenharmony_ci * It doesn't really make sense to fallback to vmalloc for sub page 62162306a36Sopenharmony_ci * requests 62262306a36Sopenharmony_ci */ 62362306a36Sopenharmony_ci if (ret || size <= PAGE_SIZE) 62462306a36Sopenharmony_ci return ret; 62562306a36Sopenharmony_ci 62662306a36Sopenharmony_ci /* non-sleeping allocations are not supported by vmalloc */ 62762306a36Sopenharmony_ci if (!gfpflags_allow_blocking(flags)) 62862306a36Sopenharmony_ci return NULL; 62962306a36Sopenharmony_ci 63062306a36Sopenharmony_ci /* Don't even allow crazy sizes */ 63162306a36Sopenharmony_ci if (unlikely(size > INT_MAX)) { 63262306a36Sopenharmony_ci WARN_ON_ONCE(!(flags & __GFP_NOWARN)); 63362306a36Sopenharmony_ci return NULL; 63462306a36Sopenharmony_ci } 63562306a36Sopenharmony_ci 63662306a36Sopenharmony_ci /* 63762306a36Sopenharmony_ci * kvmalloc() can always use VM_ALLOW_HUGE_VMAP, 63862306a36Sopenharmony_ci * since the callers already cannot assume anything 63962306a36Sopenharmony_ci * about the resulting pointer, and cannot play 64062306a36Sopenharmony_ci * protection games. 64162306a36Sopenharmony_ci */ 64262306a36Sopenharmony_ci return __vmalloc_node_range(size, 1, VMALLOC_START, VMALLOC_END, 64362306a36Sopenharmony_ci flags, PAGE_KERNEL, VM_ALLOW_HUGE_VMAP, 64462306a36Sopenharmony_ci node, __builtin_return_address(0)); 64562306a36Sopenharmony_ci} 64662306a36Sopenharmony_ciEXPORT_SYMBOL(kvmalloc_node); 64762306a36Sopenharmony_ci 64862306a36Sopenharmony_ci/** 64962306a36Sopenharmony_ci * kvfree() - Free memory. 65062306a36Sopenharmony_ci * @addr: Pointer to allocated memory. 65162306a36Sopenharmony_ci * 65262306a36Sopenharmony_ci * kvfree frees memory allocated by any of vmalloc(), kmalloc() or kvmalloc(). 65362306a36Sopenharmony_ci * It is slightly more efficient to use kfree() or vfree() if you are certain 65462306a36Sopenharmony_ci * that you know which one to use. 65562306a36Sopenharmony_ci * 65662306a36Sopenharmony_ci * Context: Either preemptible task context or not-NMI interrupt. 65762306a36Sopenharmony_ci */ 65862306a36Sopenharmony_civoid kvfree(const void *addr) 65962306a36Sopenharmony_ci{ 66062306a36Sopenharmony_ci if (is_vmalloc_addr(addr)) 66162306a36Sopenharmony_ci vfree(addr); 66262306a36Sopenharmony_ci else 66362306a36Sopenharmony_ci kfree(addr); 66462306a36Sopenharmony_ci} 66562306a36Sopenharmony_ciEXPORT_SYMBOL(kvfree); 66662306a36Sopenharmony_ci 66762306a36Sopenharmony_ci/** 66862306a36Sopenharmony_ci * kvfree_sensitive - Free a data object containing sensitive information. 66962306a36Sopenharmony_ci * @addr: address of the data object to be freed. 67062306a36Sopenharmony_ci * @len: length of the data object. 67162306a36Sopenharmony_ci * 67262306a36Sopenharmony_ci * Use the special memzero_explicit() function to clear the content of a 67362306a36Sopenharmony_ci * kvmalloc'ed object containing sensitive data to make sure that the 67462306a36Sopenharmony_ci * compiler won't optimize out the data clearing. 67562306a36Sopenharmony_ci */ 67662306a36Sopenharmony_civoid kvfree_sensitive(const void *addr, size_t len) 67762306a36Sopenharmony_ci{ 67862306a36Sopenharmony_ci if (likely(!ZERO_OR_NULL_PTR(addr))) { 67962306a36Sopenharmony_ci memzero_explicit((void *)addr, len); 68062306a36Sopenharmony_ci kvfree(addr); 68162306a36Sopenharmony_ci } 68262306a36Sopenharmony_ci} 68362306a36Sopenharmony_ciEXPORT_SYMBOL(kvfree_sensitive); 68462306a36Sopenharmony_ci 68562306a36Sopenharmony_civoid *kvrealloc(const void *p, size_t oldsize, size_t newsize, gfp_t flags) 68662306a36Sopenharmony_ci{ 68762306a36Sopenharmony_ci void *newp; 68862306a36Sopenharmony_ci 68962306a36Sopenharmony_ci if (oldsize >= newsize) 69062306a36Sopenharmony_ci return (void *)p; 69162306a36Sopenharmony_ci newp = kvmalloc(newsize, flags); 69262306a36Sopenharmony_ci if (!newp) 69362306a36Sopenharmony_ci return NULL; 69462306a36Sopenharmony_ci memcpy(newp, p, oldsize); 69562306a36Sopenharmony_ci kvfree(p); 69662306a36Sopenharmony_ci return newp; 69762306a36Sopenharmony_ci} 69862306a36Sopenharmony_ciEXPORT_SYMBOL(kvrealloc); 69962306a36Sopenharmony_ci 70062306a36Sopenharmony_ci/** 70162306a36Sopenharmony_ci * __vmalloc_array - allocate memory for a virtually contiguous array. 70262306a36Sopenharmony_ci * @n: number of elements. 70362306a36Sopenharmony_ci * @size: element size. 70462306a36Sopenharmony_ci * @flags: the type of memory to allocate (see kmalloc). 70562306a36Sopenharmony_ci */ 70662306a36Sopenharmony_civoid *__vmalloc_array(size_t n, size_t size, gfp_t flags) 70762306a36Sopenharmony_ci{ 70862306a36Sopenharmony_ci size_t bytes; 70962306a36Sopenharmony_ci 71062306a36Sopenharmony_ci if (unlikely(check_mul_overflow(n, size, &bytes))) 71162306a36Sopenharmony_ci return NULL; 71262306a36Sopenharmony_ci return __vmalloc(bytes, flags); 71362306a36Sopenharmony_ci} 71462306a36Sopenharmony_ciEXPORT_SYMBOL(__vmalloc_array); 71562306a36Sopenharmony_ci 71662306a36Sopenharmony_ci/** 71762306a36Sopenharmony_ci * vmalloc_array - allocate memory for a virtually contiguous array. 71862306a36Sopenharmony_ci * @n: number of elements. 71962306a36Sopenharmony_ci * @size: element size. 72062306a36Sopenharmony_ci */ 72162306a36Sopenharmony_civoid *vmalloc_array(size_t n, size_t size) 72262306a36Sopenharmony_ci{ 72362306a36Sopenharmony_ci return __vmalloc_array(n, size, GFP_KERNEL); 72462306a36Sopenharmony_ci} 72562306a36Sopenharmony_ciEXPORT_SYMBOL(vmalloc_array); 72662306a36Sopenharmony_ci 72762306a36Sopenharmony_ci/** 72862306a36Sopenharmony_ci * __vcalloc - allocate and zero memory for a virtually contiguous array. 72962306a36Sopenharmony_ci * @n: number of elements. 73062306a36Sopenharmony_ci * @size: element size. 73162306a36Sopenharmony_ci * @flags: the type of memory to allocate (see kmalloc). 73262306a36Sopenharmony_ci */ 73362306a36Sopenharmony_civoid *__vcalloc(size_t n, size_t size, gfp_t flags) 73462306a36Sopenharmony_ci{ 73562306a36Sopenharmony_ci return __vmalloc_array(n, size, flags | __GFP_ZERO); 73662306a36Sopenharmony_ci} 73762306a36Sopenharmony_ciEXPORT_SYMBOL(__vcalloc); 73862306a36Sopenharmony_ci 73962306a36Sopenharmony_ci/** 74062306a36Sopenharmony_ci * vcalloc - allocate and zero memory for a virtually contiguous array. 74162306a36Sopenharmony_ci * @n: number of elements. 74262306a36Sopenharmony_ci * @size: element size. 74362306a36Sopenharmony_ci */ 74462306a36Sopenharmony_civoid *vcalloc(size_t n, size_t size) 74562306a36Sopenharmony_ci{ 74662306a36Sopenharmony_ci return __vmalloc_array(n, size, GFP_KERNEL | __GFP_ZERO); 74762306a36Sopenharmony_ci} 74862306a36Sopenharmony_ciEXPORT_SYMBOL(vcalloc); 74962306a36Sopenharmony_ci 75062306a36Sopenharmony_cistruct anon_vma *folio_anon_vma(struct folio *folio) 75162306a36Sopenharmony_ci{ 75262306a36Sopenharmony_ci unsigned long mapping = (unsigned long)folio->mapping; 75362306a36Sopenharmony_ci 75462306a36Sopenharmony_ci if ((mapping & PAGE_MAPPING_FLAGS) != PAGE_MAPPING_ANON) 75562306a36Sopenharmony_ci return NULL; 75662306a36Sopenharmony_ci return (void *)(mapping - PAGE_MAPPING_ANON); 75762306a36Sopenharmony_ci} 75862306a36Sopenharmony_ci 75962306a36Sopenharmony_ci/** 76062306a36Sopenharmony_ci * folio_mapping - Find the mapping where this folio is stored. 76162306a36Sopenharmony_ci * @folio: The folio. 76262306a36Sopenharmony_ci * 76362306a36Sopenharmony_ci * For folios which are in the page cache, return the mapping that this 76462306a36Sopenharmony_ci * page belongs to. Folios in the swap cache return the swap mapping 76562306a36Sopenharmony_ci * this page is stored in (which is different from the mapping for the 76662306a36Sopenharmony_ci * swap file or swap device where the data is stored). 76762306a36Sopenharmony_ci * 76862306a36Sopenharmony_ci * You can call this for folios which aren't in the swap cache or page 76962306a36Sopenharmony_ci * cache and it will return NULL. 77062306a36Sopenharmony_ci */ 77162306a36Sopenharmony_cistruct address_space *folio_mapping(struct folio *folio) 77262306a36Sopenharmony_ci{ 77362306a36Sopenharmony_ci struct address_space *mapping; 77462306a36Sopenharmony_ci 77562306a36Sopenharmony_ci /* This happens if someone calls flush_dcache_page on slab page */ 77662306a36Sopenharmony_ci if (unlikely(folio_test_slab(folio))) 77762306a36Sopenharmony_ci return NULL; 77862306a36Sopenharmony_ci 77962306a36Sopenharmony_ci if (unlikely(folio_test_swapcache(folio))) 78062306a36Sopenharmony_ci return swap_address_space(folio->swap); 78162306a36Sopenharmony_ci 78262306a36Sopenharmony_ci mapping = folio->mapping; 78362306a36Sopenharmony_ci if ((unsigned long)mapping & PAGE_MAPPING_FLAGS) 78462306a36Sopenharmony_ci return NULL; 78562306a36Sopenharmony_ci 78662306a36Sopenharmony_ci return mapping; 78762306a36Sopenharmony_ci} 78862306a36Sopenharmony_ciEXPORT_SYMBOL(folio_mapping); 78962306a36Sopenharmony_ci 79062306a36Sopenharmony_ci/** 79162306a36Sopenharmony_ci * folio_copy - Copy the contents of one folio to another. 79262306a36Sopenharmony_ci * @dst: Folio to copy to. 79362306a36Sopenharmony_ci * @src: Folio to copy from. 79462306a36Sopenharmony_ci * 79562306a36Sopenharmony_ci * The bytes in the folio represented by @src are copied to @dst. 79662306a36Sopenharmony_ci * Assumes the caller has validated that @dst is at least as large as @src. 79762306a36Sopenharmony_ci * Can be called in atomic context for order-0 folios, but if the folio is 79862306a36Sopenharmony_ci * larger, it may sleep. 79962306a36Sopenharmony_ci */ 80062306a36Sopenharmony_civoid folio_copy(struct folio *dst, struct folio *src) 80162306a36Sopenharmony_ci{ 80262306a36Sopenharmony_ci long i = 0; 80362306a36Sopenharmony_ci long nr = folio_nr_pages(src); 80462306a36Sopenharmony_ci 80562306a36Sopenharmony_ci for (;;) { 80662306a36Sopenharmony_ci copy_highpage(folio_page(dst, i), folio_page(src, i)); 80762306a36Sopenharmony_ci if (++i == nr) 80862306a36Sopenharmony_ci break; 80962306a36Sopenharmony_ci cond_resched(); 81062306a36Sopenharmony_ci } 81162306a36Sopenharmony_ci} 81262306a36Sopenharmony_ci 81362306a36Sopenharmony_ciint sysctl_overcommit_memory __read_mostly = OVERCOMMIT_GUESS; 81462306a36Sopenharmony_ciint sysctl_overcommit_ratio __read_mostly = 50; 81562306a36Sopenharmony_ciunsigned long sysctl_overcommit_kbytes __read_mostly; 81662306a36Sopenharmony_ciint sysctl_max_map_count __read_mostly = DEFAULT_MAX_MAP_COUNT; 81762306a36Sopenharmony_ciunsigned long sysctl_user_reserve_kbytes __read_mostly = 1UL << 17; /* 128MB */ 81862306a36Sopenharmony_ciunsigned long sysctl_admin_reserve_kbytes __read_mostly = 1UL << 13; /* 8MB */ 81962306a36Sopenharmony_ci 82062306a36Sopenharmony_ciint overcommit_ratio_handler(struct ctl_table *table, int write, void *buffer, 82162306a36Sopenharmony_ci size_t *lenp, loff_t *ppos) 82262306a36Sopenharmony_ci{ 82362306a36Sopenharmony_ci int ret; 82462306a36Sopenharmony_ci 82562306a36Sopenharmony_ci ret = proc_dointvec(table, write, buffer, lenp, ppos); 82662306a36Sopenharmony_ci if (ret == 0 && write) 82762306a36Sopenharmony_ci sysctl_overcommit_kbytes = 0; 82862306a36Sopenharmony_ci return ret; 82962306a36Sopenharmony_ci} 83062306a36Sopenharmony_ci 83162306a36Sopenharmony_cistatic void sync_overcommit_as(struct work_struct *dummy) 83262306a36Sopenharmony_ci{ 83362306a36Sopenharmony_ci percpu_counter_sync(&vm_committed_as); 83462306a36Sopenharmony_ci} 83562306a36Sopenharmony_ci 83662306a36Sopenharmony_ciint overcommit_policy_handler(struct ctl_table *table, int write, void *buffer, 83762306a36Sopenharmony_ci size_t *lenp, loff_t *ppos) 83862306a36Sopenharmony_ci{ 83962306a36Sopenharmony_ci struct ctl_table t; 84062306a36Sopenharmony_ci int new_policy = -1; 84162306a36Sopenharmony_ci int ret; 84262306a36Sopenharmony_ci 84362306a36Sopenharmony_ci /* 84462306a36Sopenharmony_ci * The deviation of sync_overcommit_as could be big with loose policy 84562306a36Sopenharmony_ci * like OVERCOMMIT_ALWAYS/OVERCOMMIT_GUESS. When changing policy to 84662306a36Sopenharmony_ci * strict OVERCOMMIT_NEVER, we need to reduce the deviation to comply 84762306a36Sopenharmony_ci * with the strict "NEVER", and to avoid possible race condition (even 84862306a36Sopenharmony_ci * though user usually won't too frequently do the switching to policy 84962306a36Sopenharmony_ci * OVERCOMMIT_NEVER), the switch is done in the following order: 85062306a36Sopenharmony_ci * 1. changing the batch 85162306a36Sopenharmony_ci * 2. sync percpu count on each CPU 85262306a36Sopenharmony_ci * 3. switch the policy 85362306a36Sopenharmony_ci */ 85462306a36Sopenharmony_ci if (write) { 85562306a36Sopenharmony_ci t = *table; 85662306a36Sopenharmony_ci t.data = &new_policy; 85762306a36Sopenharmony_ci ret = proc_dointvec_minmax(&t, write, buffer, lenp, ppos); 85862306a36Sopenharmony_ci if (ret || new_policy == -1) 85962306a36Sopenharmony_ci return ret; 86062306a36Sopenharmony_ci 86162306a36Sopenharmony_ci mm_compute_batch(new_policy); 86262306a36Sopenharmony_ci if (new_policy == OVERCOMMIT_NEVER) 86362306a36Sopenharmony_ci schedule_on_each_cpu(sync_overcommit_as); 86462306a36Sopenharmony_ci sysctl_overcommit_memory = new_policy; 86562306a36Sopenharmony_ci } else { 86662306a36Sopenharmony_ci ret = proc_dointvec_minmax(table, write, buffer, lenp, ppos); 86762306a36Sopenharmony_ci } 86862306a36Sopenharmony_ci 86962306a36Sopenharmony_ci return ret; 87062306a36Sopenharmony_ci} 87162306a36Sopenharmony_ci 87262306a36Sopenharmony_ciint overcommit_kbytes_handler(struct ctl_table *table, int write, void *buffer, 87362306a36Sopenharmony_ci size_t *lenp, loff_t *ppos) 87462306a36Sopenharmony_ci{ 87562306a36Sopenharmony_ci int ret; 87662306a36Sopenharmony_ci 87762306a36Sopenharmony_ci ret = proc_doulongvec_minmax(table, write, buffer, lenp, ppos); 87862306a36Sopenharmony_ci if (ret == 0 && write) 87962306a36Sopenharmony_ci sysctl_overcommit_ratio = 0; 88062306a36Sopenharmony_ci return ret; 88162306a36Sopenharmony_ci} 88262306a36Sopenharmony_ci 88362306a36Sopenharmony_ci/* 88462306a36Sopenharmony_ci * Committed memory limit enforced when OVERCOMMIT_NEVER policy is used 88562306a36Sopenharmony_ci */ 88662306a36Sopenharmony_ciunsigned long vm_commit_limit(void) 88762306a36Sopenharmony_ci{ 88862306a36Sopenharmony_ci unsigned long allowed; 88962306a36Sopenharmony_ci 89062306a36Sopenharmony_ci if (sysctl_overcommit_kbytes) 89162306a36Sopenharmony_ci allowed = sysctl_overcommit_kbytes >> (PAGE_SHIFT - 10); 89262306a36Sopenharmony_ci else 89362306a36Sopenharmony_ci allowed = ((totalram_pages() - hugetlb_total_pages()) 89462306a36Sopenharmony_ci * sysctl_overcommit_ratio / 100); 89562306a36Sopenharmony_ci allowed += total_swap_pages; 89662306a36Sopenharmony_ci 89762306a36Sopenharmony_ci return allowed; 89862306a36Sopenharmony_ci} 89962306a36Sopenharmony_ci 90062306a36Sopenharmony_ci/* 90162306a36Sopenharmony_ci * Make sure vm_committed_as in one cacheline and not cacheline shared with 90262306a36Sopenharmony_ci * other variables. It can be updated by several CPUs frequently. 90362306a36Sopenharmony_ci */ 90462306a36Sopenharmony_cistruct percpu_counter vm_committed_as ____cacheline_aligned_in_smp; 90562306a36Sopenharmony_ci 90662306a36Sopenharmony_ci/* 90762306a36Sopenharmony_ci * The global memory commitment made in the system can be a metric 90862306a36Sopenharmony_ci * that can be used to drive ballooning decisions when Linux is hosted 90962306a36Sopenharmony_ci * as a guest. On Hyper-V, the host implements a policy engine for dynamically 91062306a36Sopenharmony_ci * balancing memory across competing virtual machines that are hosted. 91162306a36Sopenharmony_ci * Several metrics drive this policy engine including the guest reported 91262306a36Sopenharmony_ci * memory commitment. 91362306a36Sopenharmony_ci * 91462306a36Sopenharmony_ci * The time cost of this is very low for small platforms, and for big 91562306a36Sopenharmony_ci * platform like a 2S/36C/72T Skylake server, in worst case where 91662306a36Sopenharmony_ci * vm_committed_as's spinlock is under severe contention, the time cost 91762306a36Sopenharmony_ci * could be about 30~40 microseconds. 91862306a36Sopenharmony_ci */ 91962306a36Sopenharmony_ciunsigned long vm_memory_committed(void) 92062306a36Sopenharmony_ci{ 92162306a36Sopenharmony_ci return percpu_counter_sum_positive(&vm_committed_as); 92262306a36Sopenharmony_ci} 92362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(vm_memory_committed); 92462306a36Sopenharmony_ci 92562306a36Sopenharmony_ci/* 92662306a36Sopenharmony_ci * Check that a process has enough memory to allocate a new virtual 92762306a36Sopenharmony_ci * mapping. 0 means there is enough memory for the allocation to 92862306a36Sopenharmony_ci * succeed and -ENOMEM implies there is not. 92962306a36Sopenharmony_ci * 93062306a36Sopenharmony_ci * We currently support three overcommit policies, which are set via the 93162306a36Sopenharmony_ci * vm.overcommit_memory sysctl. See Documentation/mm/overcommit-accounting.rst 93262306a36Sopenharmony_ci * 93362306a36Sopenharmony_ci * Strict overcommit modes added 2002 Feb 26 by Alan Cox. 93462306a36Sopenharmony_ci * Additional code 2002 Jul 20 by Robert Love. 93562306a36Sopenharmony_ci * 93662306a36Sopenharmony_ci * cap_sys_admin is 1 if the process has admin privileges, 0 otherwise. 93762306a36Sopenharmony_ci * 93862306a36Sopenharmony_ci * Note this is a helper function intended to be used by LSMs which 93962306a36Sopenharmony_ci * wish to use this logic. 94062306a36Sopenharmony_ci */ 94162306a36Sopenharmony_ciint __vm_enough_memory(struct mm_struct *mm, long pages, int cap_sys_admin) 94262306a36Sopenharmony_ci{ 94362306a36Sopenharmony_ci long allowed; 94462306a36Sopenharmony_ci 94562306a36Sopenharmony_ci vm_acct_memory(pages); 94662306a36Sopenharmony_ci 94762306a36Sopenharmony_ci /* 94862306a36Sopenharmony_ci * Sometimes we want to use more memory than we have 94962306a36Sopenharmony_ci */ 95062306a36Sopenharmony_ci if (sysctl_overcommit_memory == OVERCOMMIT_ALWAYS) 95162306a36Sopenharmony_ci return 0; 95262306a36Sopenharmony_ci 95362306a36Sopenharmony_ci if (sysctl_overcommit_memory == OVERCOMMIT_GUESS) { 95462306a36Sopenharmony_ci if (pages > totalram_pages() + total_swap_pages) 95562306a36Sopenharmony_ci goto error; 95662306a36Sopenharmony_ci return 0; 95762306a36Sopenharmony_ci } 95862306a36Sopenharmony_ci 95962306a36Sopenharmony_ci allowed = vm_commit_limit(); 96062306a36Sopenharmony_ci /* 96162306a36Sopenharmony_ci * Reserve some for root 96262306a36Sopenharmony_ci */ 96362306a36Sopenharmony_ci if (!cap_sys_admin) 96462306a36Sopenharmony_ci allowed -= sysctl_admin_reserve_kbytes >> (PAGE_SHIFT - 10); 96562306a36Sopenharmony_ci 96662306a36Sopenharmony_ci /* 96762306a36Sopenharmony_ci * Don't let a single process grow so big a user can't recover 96862306a36Sopenharmony_ci */ 96962306a36Sopenharmony_ci if (mm) { 97062306a36Sopenharmony_ci long reserve = sysctl_user_reserve_kbytes >> (PAGE_SHIFT - 10); 97162306a36Sopenharmony_ci 97262306a36Sopenharmony_ci allowed -= min_t(long, mm->total_vm / 32, reserve); 97362306a36Sopenharmony_ci } 97462306a36Sopenharmony_ci 97562306a36Sopenharmony_ci if (percpu_counter_read_positive(&vm_committed_as) < allowed) 97662306a36Sopenharmony_ci return 0; 97762306a36Sopenharmony_cierror: 97862306a36Sopenharmony_ci pr_warn_ratelimited("%s: pid: %d, comm: %s, not enough memory for the allocation\n", 97962306a36Sopenharmony_ci __func__, current->pid, current->comm); 98062306a36Sopenharmony_ci vm_unacct_memory(pages); 98162306a36Sopenharmony_ci 98262306a36Sopenharmony_ci return -ENOMEM; 98362306a36Sopenharmony_ci} 98462306a36Sopenharmony_ci 98562306a36Sopenharmony_ci/** 98662306a36Sopenharmony_ci * get_cmdline() - copy the cmdline value to a buffer. 98762306a36Sopenharmony_ci * @task: the task whose cmdline value to copy. 98862306a36Sopenharmony_ci * @buffer: the buffer to copy to. 98962306a36Sopenharmony_ci * @buflen: the length of the buffer. Larger cmdline values are truncated 99062306a36Sopenharmony_ci * to this length. 99162306a36Sopenharmony_ci * 99262306a36Sopenharmony_ci * Return: the size of the cmdline field copied. Note that the copy does 99362306a36Sopenharmony_ci * not guarantee an ending NULL byte. 99462306a36Sopenharmony_ci */ 99562306a36Sopenharmony_ciint get_cmdline(struct task_struct *task, char *buffer, int buflen) 99662306a36Sopenharmony_ci{ 99762306a36Sopenharmony_ci int res = 0; 99862306a36Sopenharmony_ci unsigned int len; 99962306a36Sopenharmony_ci struct mm_struct *mm = get_task_mm(task); 100062306a36Sopenharmony_ci unsigned long arg_start, arg_end, env_start, env_end; 100162306a36Sopenharmony_ci if (!mm) 100262306a36Sopenharmony_ci goto out; 100362306a36Sopenharmony_ci if (!mm->arg_end) 100462306a36Sopenharmony_ci goto out_mm; /* Shh! No looking before we're done */ 100562306a36Sopenharmony_ci 100662306a36Sopenharmony_ci spin_lock(&mm->arg_lock); 100762306a36Sopenharmony_ci arg_start = mm->arg_start; 100862306a36Sopenharmony_ci arg_end = mm->arg_end; 100962306a36Sopenharmony_ci env_start = mm->env_start; 101062306a36Sopenharmony_ci env_end = mm->env_end; 101162306a36Sopenharmony_ci spin_unlock(&mm->arg_lock); 101262306a36Sopenharmony_ci 101362306a36Sopenharmony_ci len = arg_end - arg_start; 101462306a36Sopenharmony_ci 101562306a36Sopenharmony_ci if (len > buflen) 101662306a36Sopenharmony_ci len = buflen; 101762306a36Sopenharmony_ci 101862306a36Sopenharmony_ci res = access_process_vm(task, arg_start, buffer, len, FOLL_FORCE); 101962306a36Sopenharmony_ci 102062306a36Sopenharmony_ci /* 102162306a36Sopenharmony_ci * If the nul at the end of args has been overwritten, then 102262306a36Sopenharmony_ci * assume application is using setproctitle(3). 102362306a36Sopenharmony_ci */ 102462306a36Sopenharmony_ci if (res > 0 && buffer[res-1] != '\0' && len < buflen) { 102562306a36Sopenharmony_ci len = strnlen(buffer, res); 102662306a36Sopenharmony_ci if (len < res) { 102762306a36Sopenharmony_ci res = len; 102862306a36Sopenharmony_ci } else { 102962306a36Sopenharmony_ci len = env_end - env_start; 103062306a36Sopenharmony_ci if (len > buflen - res) 103162306a36Sopenharmony_ci len = buflen - res; 103262306a36Sopenharmony_ci res += access_process_vm(task, env_start, 103362306a36Sopenharmony_ci buffer+res, len, 103462306a36Sopenharmony_ci FOLL_FORCE); 103562306a36Sopenharmony_ci res = strnlen(buffer, res); 103662306a36Sopenharmony_ci } 103762306a36Sopenharmony_ci } 103862306a36Sopenharmony_ciout_mm: 103962306a36Sopenharmony_ci mmput(mm); 104062306a36Sopenharmony_ciout: 104162306a36Sopenharmony_ci return res; 104262306a36Sopenharmony_ci} 104362306a36Sopenharmony_ci 104462306a36Sopenharmony_ciint __weak memcmp_pages(struct page *page1, struct page *page2) 104562306a36Sopenharmony_ci{ 104662306a36Sopenharmony_ci char *addr1, *addr2; 104762306a36Sopenharmony_ci int ret; 104862306a36Sopenharmony_ci 104962306a36Sopenharmony_ci addr1 = kmap_atomic(page1); 105062306a36Sopenharmony_ci addr2 = kmap_atomic(page2); 105162306a36Sopenharmony_ci ret = memcmp(addr1, addr2, PAGE_SIZE); 105262306a36Sopenharmony_ci kunmap_atomic(addr2); 105362306a36Sopenharmony_ci kunmap_atomic(addr1); 105462306a36Sopenharmony_ci return ret; 105562306a36Sopenharmony_ci} 105662306a36Sopenharmony_ci 105762306a36Sopenharmony_ci#ifdef CONFIG_PRINTK 105862306a36Sopenharmony_ci/** 105962306a36Sopenharmony_ci * mem_dump_obj - Print available provenance information 106062306a36Sopenharmony_ci * @object: object for which to find provenance information. 106162306a36Sopenharmony_ci * 106262306a36Sopenharmony_ci * This function uses pr_cont(), so that the caller is expected to have 106362306a36Sopenharmony_ci * printed out whatever preamble is appropriate. The provenance information 106462306a36Sopenharmony_ci * depends on the type of object and on how much debugging is enabled. 106562306a36Sopenharmony_ci * For example, for a slab-cache object, the slab name is printed, and, 106662306a36Sopenharmony_ci * if available, the return address and stack trace from the allocation 106762306a36Sopenharmony_ci * and last free path of that object. 106862306a36Sopenharmony_ci */ 106962306a36Sopenharmony_civoid mem_dump_obj(void *object) 107062306a36Sopenharmony_ci{ 107162306a36Sopenharmony_ci const char *type; 107262306a36Sopenharmony_ci 107362306a36Sopenharmony_ci if (kmem_valid_obj(object)) { 107462306a36Sopenharmony_ci kmem_dump_obj(object); 107562306a36Sopenharmony_ci return; 107662306a36Sopenharmony_ci } 107762306a36Sopenharmony_ci 107862306a36Sopenharmony_ci if (vmalloc_dump_obj(object)) 107962306a36Sopenharmony_ci return; 108062306a36Sopenharmony_ci 108162306a36Sopenharmony_ci if (is_vmalloc_addr(object)) 108262306a36Sopenharmony_ci type = "vmalloc memory"; 108362306a36Sopenharmony_ci else if (virt_addr_valid(object)) 108462306a36Sopenharmony_ci type = "non-slab/vmalloc memory"; 108562306a36Sopenharmony_ci else if (object == NULL) 108662306a36Sopenharmony_ci type = "NULL pointer"; 108762306a36Sopenharmony_ci else if (object == ZERO_SIZE_PTR) 108862306a36Sopenharmony_ci type = "zero-size pointer"; 108962306a36Sopenharmony_ci else 109062306a36Sopenharmony_ci type = "non-paged memory"; 109162306a36Sopenharmony_ci 109262306a36Sopenharmony_ci pr_cont(" %s\n", type); 109362306a36Sopenharmony_ci} 109462306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(mem_dump_obj); 109562306a36Sopenharmony_ci#endif 109662306a36Sopenharmony_ci 109762306a36Sopenharmony_ci/* 109862306a36Sopenharmony_ci * A driver might set a page logically offline -- PageOffline() -- and 109962306a36Sopenharmony_ci * turn the page inaccessible in the hypervisor; after that, access to page 110062306a36Sopenharmony_ci * content can be fatal. 110162306a36Sopenharmony_ci * 110262306a36Sopenharmony_ci * Some special PFN walkers -- i.e., /proc/kcore -- read content of random 110362306a36Sopenharmony_ci * pages after checking PageOffline(); however, these PFN walkers can race 110462306a36Sopenharmony_ci * with drivers that set PageOffline(). 110562306a36Sopenharmony_ci * 110662306a36Sopenharmony_ci * page_offline_freeze()/page_offline_thaw() allows for a subsystem to 110762306a36Sopenharmony_ci * synchronize with such drivers, achieving that a page cannot be set 110862306a36Sopenharmony_ci * PageOffline() while frozen. 110962306a36Sopenharmony_ci * 111062306a36Sopenharmony_ci * page_offline_begin()/page_offline_end() is used by drivers that care about 111162306a36Sopenharmony_ci * such races when setting a page PageOffline(). 111262306a36Sopenharmony_ci */ 111362306a36Sopenharmony_cistatic DECLARE_RWSEM(page_offline_rwsem); 111462306a36Sopenharmony_ci 111562306a36Sopenharmony_civoid page_offline_freeze(void) 111662306a36Sopenharmony_ci{ 111762306a36Sopenharmony_ci down_read(&page_offline_rwsem); 111862306a36Sopenharmony_ci} 111962306a36Sopenharmony_ci 112062306a36Sopenharmony_civoid page_offline_thaw(void) 112162306a36Sopenharmony_ci{ 112262306a36Sopenharmony_ci up_read(&page_offline_rwsem); 112362306a36Sopenharmony_ci} 112462306a36Sopenharmony_ci 112562306a36Sopenharmony_civoid page_offline_begin(void) 112662306a36Sopenharmony_ci{ 112762306a36Sopenharmony_ci down_write(&page_offline_rwsem); 112862306a36Sopenharmony_ci} 112962306a36Sopenharmony_ciEXPORT_SYMBOL(page_offline_begin); 113062306a36Sopenharmony_ci 113162306a36Sopenharmony_civoid page_offline_end(void) 113262306a36Sopenharmony_ci{ 113362306a36Sopenharmony_ci up_write(&page_offline_rwsem); 113462306a36Sopenharmony_ci} 113562306a36Sopenharmony_ciEXPORT_SYMBOL(page_offline_end); 113662306a36Sopenharmony_ci 113762306a36Sopenharmony_ci#ifndef flush_dcache_folio 113862306a36Sopenharmony_civoid flush_dcache_folio(struct folio *folio) 113962306a36Sopenharmony_ci{ 114062306a36Sopenharmony_ci long i, nr = folio_nr_pages(folio); 114162306a36Sopenharmony_ci 114262306a36Sopenharmony_ci for (i = 0; i < nr; i++) 114362306a36Sopenharmony_ci flush_dcache_page(folio_page(folio, i)); 114462306a36Sopenharmony_ci} 114562306a36Sopenharmony_ciEXPORT_SYMBOL(flush_dcache_folio); 114662306a36Sopenharmony_ci#endif 1147