162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only
262306a36Sopenharmony_ci#include <linux/mm.h>
362306a36Sopenharmony_ci#include <linux/slab.h>
462306a36Sopenharmony_ci#include <linux/string.h>
562306a36Sopenharmony_ci#include <linux/compiler.h>
662306a36Sopenharmony_ci#include <linux/export.h>
762306a36Sopenharmony_ci#include <linux/err.h>
862306a36Sopenharmony_ci#include <linux/sched.h>
962306a36Sopenharmony_ci#include <linux/sched/mm.h>
1062306a36Sopenharmony_ci#include <linux/sched/signal.h>
1162306a36Sopenharmony_ci#include <linux/sched/task_stack.h>
1262306a36Sopenharmony_ci#include <linux/security.h>
1362306a36Sopenharmony_ci#include <linux/swap.h>
1462306a36Sopenharmony_ci#include <linux/swapops.h>
1562306a36Sopenharmony_ci#include <linux/mman.h>
1662306a36Sopenharmony_ci#include <linux/hugetlb.h>
1762306a36Sopenharmony_ci#include <linux/vmalloc.h>
1862306a36Sopenharmony_ci#include <linux/userfaultfd_k.h>
1962306a36Sopenharmony_ci#include <linux/elf.h>
2062306a36Sopenharmony_ci#include <linux/elf-randomize.h>
2162306a36Sopenharmony_ci#include <linux/personality.h>
2262306a36Sopenharmony_ci#include <linux/random.h>
2362306a36Sopenharmony_ci#include <linux/processor.h>
2462306a36Sopenharmony_ci#include <linux/sizes.h>
2562306a36Sopenharmony_ci#include <linux/compat.h>
2662306a36Sopenharmony_ci
2762306a36Sopenharmony_ci#include <linux/uaccess.h>
2862306a36Sopenharmony_ci
2962306a36Sopenharmony_ci#include "internal.h"
3062306a36Sopenharmony_ci#include "swap.h"
3162306a36Sopenharmony_ci
3262306a36Sopenharmony_ci/**
3362306a36Sopenharmony_ci * kfree_const - conditionally free memory
3462306a36Sopenharmony_ci * @x: pointer to the memory
3562306a36Sopenharmony_ci *
3662306a36Sopenharmony_ci * Function calls kfree only if @x is not in .rodata section.
3762306a36Sopenharmony_ci */
3862306a36Sopenharmony_civoid kfree_const(const void *x)
3962306a36Sopenharmony_ci{
4062306a36Sopenharmony_ci	if (!is_kernel_rodata((unsigned long)x))
4162306a36Sopenharmony_ci		kfree(x);
4262306a36Sopenharmony_ci}
4362306a36Sopenharmony_ciEXPORT_SYMBOL(kfree_const);
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ci/**
4662306a36Sopenharmony_ci * kstrdup - allocate space for and copy an existing string
4762306a36Sopenharmony_ci * @s: the string to duplicate
4862306a36Sopenharmony_ci * @gfp: the GFP mask used in the kmalloc() call when allocating memory
4962306a36Sopenharmony_ci *
5062306a36Sopenharmony_ci * Return: newly allocated copy of @s or %NULL in case of error
5162306a36Sopenharmony_ci */
5262306a36Sopenharmony_cinoinline
5362306a36Sopenharmony_cichar *kstrdup(const char *s, gfp_t gfp)
5462306a36Sopenharmony_ci{
5562306a36Sopenharmony_ci	size_t len;
5662306a36Sopenharmony_ci	char *buf;
5762306a36Sopenharmony_ci
5862306a36Sopenharmony_ci	if (!s)
5962306a36Sopenharmony_ci		return NULL;
6062306a36Sopenharmony_ci
6162306a36Sopenharmony_ci	len = strlen(s) + 1;
6262306a36Sopenharmony_ci	buf = kmalloc_track_caller(len, gfp);
6362306a36Sopenharmony_ci	if (buf)
6462306a36Sopenharmony_ci		memcpy(buf, s, len);
6562306a36Sopenharmony_ci	return buf;
6662306a36Sopenharmony_ci}
6762306a36Sopenharmony_ciEXPORT_SYMBOL(kstrdup);
6862306a36Sopenharmony_ci
6962306a36Sopenharmony_ci/**
7062306a36Sopenharmony_ci * kstrdup_const - conditionally duplicate an existing const string
7162306a36Sopenharmony_ci * @s: the string to duplicate
7262306a36Sopenharmony_ci * @gfp: the GFP mask used in the kmalloc() call when allocating memory
7362306a36Sopenharmony_ci *
7462306a36Sopenharmony_ci * Note: Strings allocated by kstrdup_const should be freed by kfree_const and
7562306a36Sopenharmony_ci * must not be passed to krealloc().
7662306a36Sopenharmony_ci *
7762306a36Sopenharmony_ci * Return: source string if it is in .rodata section otherwise
7862306a36Sopenharmony_ci * fallback to kstrdup.
7962306a36Sopenharmony_ci */
8062306a36Sopenharmony_ciconst char *kstrdup_const(const char *s, gfp_t gfp)
8162306a36Sopenharmony_ci{
8262306a36Sopenharmony_ci	if (is_kernel_rodata((unsigned long)s))
8362306a36Sopenharmony_ci		return s;
8462306a36Sopenharmony_ci
8562306a36Sopenharmony_ci	return kstrdup(s, gfp);
8662306a36Sopenharmony_ci}
8762306a36Sopenharmony_ciEXPORT_SYMBOL(kstrdup_const);
8862306a36Sopenharmony_ci
8962306a36Sopenharmony_ci/**
9062306a36Sopenharmony_ci * kstrndup - allocate space for and copy an existing string
9162306a36Sopenharmony_ci * @s: the string to duplicate
9262306a36Sopenharmony_ci * @max: read at most @max chars from @s
9362306a36Sopenharmony_ci * @gfp: the GFP mask used in the kmalloc() call when allocating memory
9462306a36Sopenharmony_ci *
9562306a36Sopenharmony_ci * Note: Use kmemdup_nul() instead if the size is known exactly.
9662306a36Sopenharmony_ci *
9762306a36Sopenharmony_ci * Return: newly allocated copy of @s or %NULL in case of error
9862306a36Sopenharmony_ci */
9962306a36Sopenharmony_cichar *kstrndup(const char *s, size_t max, gfp_t gfp)
10062306a36Sopenharmony_ci{
10162306a36Sopenharmony_ci	size_t len;
10262306a36Sopenharmony_ci	char *buf;
10362306a36Sopenharmony_ci
10462306a36Sopenharmony_ci	if (!s)
10562306a36Sopenharmony_ci		return NULL;
10662306a36Sopenharmony_ci
10762306a36Sopenharmony_ci	len = strnlen(s, max);
10862306a36Sopenharmony_ci	buf = kmalloc_track_caller(len+1, gfp);
10962306a36Sopenharmony_ci	if (buf) {
11062306a36Sopenharmony_ci		memcpy(buf, s, len);
11162306a36Sopenharmony_ci		buf[len] = '\0';
11262306a36Sopenharmony_ci	}
11362306a36Sopenharmony_ci	return buf;
11462306a36Sopenharmony_ci}
11562306a36Sopenharmony_ciEXPORT_SYMBOL(kstrndup);
11662306a36Sopenharmony_ci
11762306a36Sopenharmony_ci/**
11862306a36Sopenharmony_ci * kmemdup - duplicate region of memory
11962306a36Sopenharmony_ci *
12062306a36Sopenharmony_ci * @src: memory region to duplicate
12162306a36Sopenharmony_ci * @len: memory region length
12262306a36Sopenharmony_ci * @gfp: GFP mask to use
12362306a36Sopenharmony_ci *
12462306a36Sopenharmony_ci * Return: newly allocated copy of @src or %NULL in case of error,
12562306a36Sopenharmony_ci * result is physically contiguous. Use kfree() to free.
12662306a36Sopenharmony_ci */
12762306a36Sopenharmony_civoid *kmemdup(const void *src, size_t len, gfp_t gfp)
12862306a36Sopenharmony_ci{
12962306a36Sopenharmony_ci	void *p;
13062306a36Sopenharmony_ci
13162306a36Sopenharmony_ci	p = kmalloc_track_caller(len, gfp);
13262306a36Sopenharmony_ci	if (p)
13362306a36Sopenharmony_ci		memcpy(p, src, len);
13462306a36Sopenharmony_ci	return p;
13562306a36Sopenharmony_ci}
13662306a36Sopenharmony_ciEXPORT_SYMBOL(kmemdup);
13762306a36Sopenharmony_ci
13862306a36Sopenharmony_ci/**
13962306a36Sopenharmony_ci * kvmemdup - duplicate region of memory
14062306a36Sopenharmony_ci *
14162306a36Sopenharmony_ci * @src: memory region to duplicate
14262306a36Sopenharmony_ci * @len: memory region length
14362306a36Sopenharmony_ci * @gfp: GFP mask to use
14462306a36Sopenharmony_ci *
14562306a36Sopenharmony_ci * Return: newly allocated copy of @src or %NULL in case of error,
14662306a36Sopenharmony_ci * result may be not physically contiguous. Use kvfree() to free.
14762306a36Sopenharmony_ci */
14862306a36Sopenharmony_civoid *kvmemdup(const void *src, size_t len, gfp_t gfp)
14962306a36Sopenharmony_ci{
15062306a36Sopenharmony_ci	void *p;
15162306a36Sopenharmony_ci
15262306a36Sopenharmony_ci	p = kvmalloc(len, gfp);
15362306a36Sopenharmony_ci	if (p)
15462306a36Sopenharmony_ci		memcpy(p, src, len);
15562306a36Sopenharmony_ci	return p;
15662306a36Sopenharmony_ci}
15762306a36Sopenharmony_ciEXPORT_SYMBOL(kvmemdup);
15862306a36Sopenharmony_ci
15962306a36Sopenharmony_ci/**
16062306a36Sopenharmony_ci * kmemdup_nul - Create a NUL-terminated string from unterminated data
16162306a36Sopenharmony_ci * @s: The data to stringify
16262306a36Sopenharmony_ci * @len: The size of the data
16362306a36Sopenharmony_ci * @gfp: the GFP mask used in the kmalloc() call when allocating memory
16462306a36Sopenharmony_ci *
16562306a36Sopenharmony_ci * Return: newly allocated copy of @s with NUL-termination or %NULL in
16662306a36Sopenharmony_ci * case of error
16762306a36Sopenharmony_ci */
16862306a36Sopenharmony_cichar *kmemdup_nul(const char *s, size_t len, gfp_t gfp)
16962306a36Sopenharmony_ci{
17062306a36Sopenharmony_ci	char *buf;
17162306a36Sopenharmony_ci
17262306a36Sopenharmony_ci	if (!s)
17362306a36Sopenharmony_ci		return NULL;
17462306a36Sopenharmony_ci
17562306a36Sopenharmony_ci	buf = kmalloc_track_caller(len + 1, gfp);
17662306a36Sopenharmony_ci	if (buf) {
17762306a36Sopenharmony_ci		memcpy(buf, s, len);
17862306a36Sopenharmony_ci		buf[len] = '\0';
17962306a36Sopenharmony_ci	}
18062306a36Sopenharmony_ci	return buf;
18162306a36Sopenharmony_ci}
18262306a36Sopenharmony_ciEXPORT_SYMBOL(kmemdup_nul);
18362306a36Sopenharmony_ci
18462306a36Sopenharmony_ci/**
18562306a36Sopenharmony_ci * memdup_user - duplicate memory region from user space
18662306a36Sopenharmony_ci *
18762306a36Sopenharmony_ci * @src: source address in user space
18862306a36Sopenharmony_ci * @len: number of bytes to copy
18962306a36Sopenharmony_ci *
19062306a36Sopenharmony_ci * Return: an ERR_PTR() on failure.  Result is physically
19162306a36Sopenharmony_ci * contiguous, to be freed by kfree().
19262306a36Sopenharmony_ci */
19362306a36Sopenharmony_civoid *memdup_user(const void __user *src, size_t len)
19462306a36Sopenharmony_ci{
19562306a36Sopenharmony_ci	void *p;
19662306a36Sopenharmony_ci
19762306a36Sopenharmony_ci	p = kmalloc_track_caller(len, GFP_USER | __GFP_NOWARN);
19862306a36Sopenharmony_ci	if (!p)
19962306a36Sopenharmony_ci		return ERR_PTR(-ENOMEM);
20062306a36Sopenharmony_ci
20162306a36Sopenharmony_ci	if (copy_from_user(p, src, len)) {
20262306a36Sopenharmony_ci		kfree(p);
20362306a36Sopenharmony_ci		return ERR_PTR(-EFAULT);
20462306a36Sopenharmony_ci	}
20562306a36Sopenharmony_ci
20662306a36Sopenharmony_ci	return p;
20762306a36Sopenharmony_ci}
20862306a36Sopenharmony_ciEXPORT_SYMBOL(memdup_user);
20962306a36Sopenharmony_ci
21062306a36Sopenharmony_ci/**
21162306a36Sopenharmony_ci * vmemdup_user - duplicate memory region from user space
21262306a36Sopenharmony_ci *
21362306a36Sopenharmony_ci * @src: source address in user space
21462306a36Sopenharmony_ci * @len: number of bytes to copy
21562306a36Sopenharmony_ci *
21662306a36Sopenharmony_ci * Return: an ERR_PTR() on failure.  Result may be not
21762306a36Sopenharmony_ci * physically contiguous.  Use kvfree() to free.
21862306a36Sopenharmony_ci */
21962306a36Sopenharmony_civoid *vmemdup_user(const void __user *src, size_t len)
22062306a36Sopenharmony_ci{
22162306a36Sopenharmony_ci	void *p;
22262306a36Sopenharmony_ci
22362306a36Sopenharmony_ci	p = kvmalloc(len, GFP_USER);
22462306a36Sopenharmony_ci	if (!p)
22562306a36Sopenharmony_ci		return ERR_PTR(-ENOMEM);
22662306a36Sopenharmony_ci
22762306a36Sopenharmony_ci	if (copy_from_user(p, src, len)) {
22862306a36Sopenharmony_ci		kvfree(p);
22962306a36Sopenharmony_ci		return ERR_PTR(-EFAULT);
23062306a36Sopenharmony_ci	}
23162306a36Sopenharmony_ci
23262306a36Sopenharmony_ci	return p;
23362306a36Sopenharmony_ci}
23462306a36Sopenharmony_ciEXPORT_SYMBOL(vmemdup_user);
23562306a36Sopenharmony_ci
23662306a36Sopenharmony_ci/**
23762306a36Sopenharmony_ci * strndup_user - duplicate an existing string from user space
23862306a36Sopenharmony_ci * @s: The string to duplicate
23962306a36Sopenharmony_ci * @n: Maximum number of bytes to copy, including the trailing NUL.
24062306a36Sopenharmony_ci *
24162306a36Sopenharmony_ci * Return: newly allocated copy of @s or an ERR_PTR() in case of error
24262306a36Sopenharmony_ci */
24362306a36Sopenharmony_cichar *strndup_user(const char __user *s, long n)
24462306a36Sopenharmony_ci{
24562306a36Sopenharmony_ci	char *p;
24662306a36Sopenharmony_ci	long length;
24762306a36Sopenharmony_ci
24862306a36Sopenharmony_ci	length = strnlen_user(s, n);
24962306a36Sopenharmony_ci
25062306a36Sopenharmony_ci	if (!length)
25162306a36Sopenharmony_ci		return ERR_PTR(-EFAULT);
25262306a36Sopenharmony_ci
25362306a36Sopenharmony_ci	if (length > n)
25462306a36Sopenharmony_ci		return ERR_PTR(-EINVAL);
25562306a36Sopenharmony_ci
25662306a36Sopenharmony_ci	p = memdup_user(s, length);
25762306a36Sopenharmony_ci
25862306a36Sopenharmony_ci	if (IS_ERR(p))
25962306a36Sopenharmony_ci		return p;
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_ci	p[length - 1] = '\0';
26262306a36Sopenharmony_ci
26362306a36Sopenharmony_ci	return p;
26462306a36Sopenharmony_ci}
26562306a36Sopenharmony_ciEXPORT_SYMBOL(strndup_user);
26662306a36Sopenharmony_ci
26762306a36Sopenharmony_ci/**
26862306a36Sopenharmony_ci * memdup_user_nul - duplicate memory region from user space and NUL-terminate
26962306a36Sopenharmony_ci *
27062306a36Sopenharmony_ci * @src: source address in user space
27162306a36Sopenharmony_ci * @len: number of bytes to copy
27262306a36Sopenharmony_ci *
27362306a36Sopenharmony_ci * Return: an ERR_PTR() on failure.
27462306a36Sopenharmony_ci */
27562306a36Sopenharmony_civoid *memdup_user_nul(const void __user *src, size_t len)
27662306a36Sopenharmony_ci{
27762306a36Sopenharmony_ci	char *p;
27862306a36Sopenharmony_ci
27962306a36Sopenharmony_ci	/*
28062306a36Sopenharmony_ci	 * Always use GFP_KERNEL, since copy_from_user() can sleep and
28162306a36Sopenharmony_ci	 * cause pagefault, which makes it pointless to use GFP_NOFS
28262306a36Sopenharmony_ci	 * or GFP_ATOMIC.
28362306a36Sopenharmony_ci	 */
28462306a36Sopenharmony_ci	p = kmalloc_track_caller(len + 1, GFP_KERNEL);
28562306a36Sopenharmony_ci	if (!p)
28662306a36Sopenharmony_ci		return ERR_PTR(-ENOMEM);
28762306a36Sopenharmony_ci
28862306a36Sopenharmony_ci	if (copy_from_user(p, src, len)) {
28962306a36Sopenharmony_ci		kfree(p);
29062306a36Sopenharmony_ci		return ERR_PTR(-EFAULT);
29162306a36Sopenharmony_ci	}
29262306a36Sopenharmony_ci	p[len] = '\0';
29362306a36Sopenharmony_ci
29462306a36Sopenharmony_ci	return p;
29562306a36Sopenharmony_ci}
29662306a36Sopenharmony_ciEXPORT_SYMBOL(memdup_user_nul);
29762306a36Sopenharmony_ci
29862306a36Sopenharmony_ci/* Check if the vma is being used as a stack by this task */
29962306a36Sopenharmony_ciint vma_is_stack_for_current(struct vm_area_struct *vma)
30062306a36Sopenharmony_ci{
30162306a36Sopenharmony_ci	struct task_struct * __maybe_unused t = current;
30262306a36Sopenharmony_ci
30362306a36Sopenharmony_ci	return (vma->vm_start <= KSTK_ESP(t) && vma->vm_end >= KSTK_ESP(t));
30462306a36Sopenharmony_ci}
30562306a36Sopenharmony_ci
30662306a36Sopenharmony_ci/*
30762306a36Sopenharmony_ci * Change backing file, only valid to use during initial VMA setup.
30862306a36Sopenharmony_ci */
30962306a36Sopenharmony_civoid vma_set_file(struct vm_area_struct *vma, struct file *file)
31062306a36Sopenharmony_ci{
31162306a36Sopenharmony_ci	/* Changing an anonymous vma with this is illegal */
31262306a36Sopenharmony_ci	get_file(file);
31362306a36Sopenharmony_ci	swap(vma->vm_file, file);
31462306a36Sopenharmony_ci	fput(file);
31562306a36Sopenharmony_ci}
31662306a36Sopenharmony_ciEXPORT_SYMBOL(vma_set_file);
31762306a36Sopenharmony_ci
31862306a36Sopenharmony_ci#ifndef STACK_RND_MASK
31962306a36Sopenharmony_ci#define STACK_RND_MASK (0x7ff >> (PAGE_SHIFT - 12))     /* 8MB of VA */
32062306a36Sopenharmony_ci#endif
32162306a36Sopenharmony_ci
32262306a36Sopenharmony_ciunsigned long randomize_stack_top(unsigned long stack_top)
32362306a36Sopenharmony_ci{
32462306a36Sopenharmony_ci	unsigned long random_variable = 0;
32562306a36Sopenharmony_ci
32662306a36Sopenharmony_ci	if (current->flags & PF_RANDOMIZE) {
32762306a36Sopenharmony_ci		random_variable = get_random_long();
32862306a36Sopenharmony_ci		random_variable &= STACK_RND_MASK;
32962306a36Sopenharmony_ci		random_variable <<= PAGE_SHIFT;
33062306a36Sopenharmony_ci	}
33162306a36Sopenharmony_ci#ifdef CONFIG_STACK_GROWSUP
33262306a36Sopenharmony_ci	return PAGE_ALIGN(stack_top) + random_variable;
33362306a36Sopenharmony_ci#else
33462306a36Sopenharmony_ci	return PAGE_ALIGN(stack_top) - random_variable;
33562306a36Sopenharmony_ci#endif
33662306a36Sopenharmony_ci}
33762306a36Sopenharmony_ci
33862306a36Sopenharmony_ci/**
33962306a36Sopenharmony_ci * randomize_page - Generate a random, page aligned address
34062306a36Sopenharmony_ci * @start:	The smallest acceptable address the caller will take.
34162306a36Sopenharmony_ci * @range:	The size of the area, starting at @start, within which the
34262306a36Sopenharmony_ci *		random address must fall.
34362306a36Sopenharmony_ci *
34462306a36Sopenharmony_ci * If @start + @range would overflow, @range is capped.
34562306a36Sopenharmony_ci *
34662306a36Sopenharmony_ci * NOTE: Historical use of randomize_range, which this replaces, presumed that
34762306a36Sopenharmony_ci * @start was already page aligned.  We now align it regardless.
34862306a36Sopenharmony_ci *
34962306a36Sopenharmony_ci * Return: A page aligned address within [start, start + range).  On error,
35062306a36Sopenharmony_ci * @start is returned.
35162306a36Sopenharmony_ci */
35262306a36Sopenharmony_ciunsigned long randomize_page(unsigned long start, unsigned long range)
35362306a36Sopenharmony_ci{
35462306a36Sopenharmony_ci	if (!PAGE_ALIGNED(start)) {
35562306a36Sopenharmony_ci		range -= PAGE_ALIGN(start) - start;
35662306a36Sopenharmony_ci		start = PAGE_ALIGN(start);
35762306a36Sopenharmony_ci	}
35862306a36Sopenharmony_ci
35962306a36Sopenharmony_ci	if (start > ULONG_MAX - range)
36062306a36Sopenharmony_ci		range = ULONG_MAX - start;
36162306a36Sopenharmony_ci
36262306a36Sopenharmony_ci	range >>= PAGE_SHIFT;
36362306a36Sopenharmony_ci
36462306a36Sopenharmony_ci	if (range == 0)
36562306a36Sopenharmony_ci		return start;
36662306a36Sopenharmony_ci
36762306a36Sopenharmony_ci	return start + (get_random_long() % range << PAGE_SHIFT);
36862306a36Sopenharmony_ci}
36962306a36Sopenharmony_ci
37062306a36Sopenharmony_ci#ifdef CONFIG_ARCH_WANT_DEFAULT_TOPDOWN_MMAP_LAYOUT
37162306a36Sopenharmony_ciunsigned long __weak arch_randomize_brk(struct mm_struct *mm)
37262306a36Sopenharmony_ci{
37362306a36Sopenharmony_ci	/* Is the current task 32bit ? */
37462306a36Sopenharmony_ci	if (!IS_ENABLED(CONFIG_64BIT) || is_compat_task())
37562306a36Sopenharmony_ci		return randomize_page(mm->brk, SZ_32M);
37662306a36Sopenharmony_ci
37762306a36Sopenharmony_ci	return randomize_page(mm->brk, SZ_1G);
37862306a36Sopenharmony_ci}
37962306a36Sopenharmony_ci
38062306a36Sopenharmony_ciunsigned long arch_mmap_rnd(void)
38162306a36Sopenharmony_ci{
38262306a36Sopenharmony_ci	unsigned long rnd;
38362306a36Sopenharmony_ci
38462306a36Sopenharmony_ci#ifdef CONFIG_HAVE_ARCH_MMAP_RND_COMPAT_BITS
38562306a36Sopenharmony_ci	if (is_compat_task())
38662306a36Sopenharmony_ci		rnd = get_random_long() & ((1UL << mmap_rnd_compat_bits) - 1);
38762306a36Sopenharmony_ci	else
38862306a36Sopenharmony_ci#endif /* CONFIG_HAVE_ARCH_MMAP_RND_COMPAT_BITS */
38962306a36Sopenharmony_ci		rnd = get_random_long() & ((1UL << mmap_rnd_bits) - 1);
39062306a36Sopenharmony_ci
39162306a36Sopenharmony_ci	return rnd << PAGE_SHIFT;
39262306a36Sopenharmony_ci}
39362306a36Sopenharmony_ci
39462306a36Sopenharmony_cistatic int mmap_is_legacy(struct rlimit *rlim_stack)
39562306a36Sopenharmony_ci{
39662306a36Sopenharmony_ci	if (current->personality & ADDR_COMPAT_LAYOUT)
39762306a36Sopenharmony_ci		return 1;
39862306a36Sopenharmony_ci
39962306a36Sopenharmony_ci	/* On parisc the stack always grows up - so a unlimited stack should
40062306a36Sopenharmony_ci	 * not be an indicator to use the legacy memory layout. */
40162306a36Sopenharmony_ci	if (rlim_stack->rlim_cur == RLIM_INFINITY &&
40262306a36Sopenharmony_ci		!IS_ENABLED(CONFIG_STACK_GROWSUP))
40362306a36Sopenharmony_ci		return 1;
40462306a36Sopenharmony_ci
40562306a36Sopenharmony_ci	return sysctl_legacy_va_layout;
40662306a36Sopenharmony_ci}
40762306a36Sopenharmony_ci
40862306a36Sopenharmony_ci/*
40962306a36Sopenharmony_ci * Leave enough space between the mmap area and the stack to honour ulimit in
41062306a36Sopenharmony_ci * the face of randomisation.
41162306a36Sopenharmony_ci */
41262306a36Sopenharmony_ci#define MIN_GAP		(SZ_128M)
41362306a36Sopenharmony_ci#define MAX_GAP		(STACK_TOP / 6 * 5)
41462306a36Sopenharmony_ci
41562306a36Sopenharmony_cistatic unsigned long mmap_base(unsigned long rnd, struct rlimit *rlim_stack)
41662306a36Sopenharmony_ci{
41762306a36Sopenharmony_ci#ifdef CONFIG_STACK_GROWSUP
41862306a36Sopenharmony_ci	/*
41962306a36Sopenharmony_ci	 * For an upwards growing stack the calculation is much simpler.
42062306a36Sopenharmony_ci	 * Memory for the maximum stack size is reserved at the top of the
42162306a36Sopenharmony_ci	 * task. mmap_base starts directly below the stack and grows
42262306a36Sopenharmony_ci	 * downwards.
42362306a36Sopenharmony_ci	 */
42462306a36Sopenharmony_ci	return PAGE_ALIGN_DOWN(mmap_upper_limit(rlim_stack) - rnd);
42562306a36Sopenharmony_ci#else
42662306a36Sopenharmony_ci	unsigned long gap = rlim_stack->rlim_cur;
42762306a36Sopenharmony_ci	unsigned long pad = stack_guard_gap;
42862306a36Sopenharmony_ci
42962306a36Sopenharmony_ci	/* Account for stack randomization if necessary */
43062306a36Sopenharmony_ci	if (current->flags & PF_RANDOMIZE)
43162306a36Sopenharmony_ci		pad += (STACK_RND_MASK << PAGE_SHIFT);
43262306a36Sopenharmony_ci
43362306a36Sopenharmony_ci	/* Values close to RLIM_INFINITY can overflow. */
43462306a36Sopenharmony_ci	if (gap + pad > gap)
43562306a36Sopenharmony_ci		gap += pad;
43662306a36Sopenharmony_ci
43762306a36Sopenharmony_ci	if (gap < MIN_GAP)
43862306a36Sopenharmony_ci		gap = MIN_GAP;
43962306a36Sopenharmony_ci	else if (gap > MAX_GAP)
44062306a36Sopenharmony_ci		gap = MAX_GAP;
44162306a36Sopenharmony_ci
44262306a36Sopenharmony_ci	return PAGE_ALIGN(STACK_TOP - gap - rnd);
44362306a36Sopenharmony_ci#endif
44462306a36Sopenharmony_ci}
44562306a36Sopenharmony_ci
44662306a36Sopenharmony_civoid arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack)
44762306a36Sopenharmony_ci{
44862306a36Sopenharmony_ci	unsigned long random_factor = 0UL;
44962306a36Sopenharmony_ci
45062306a36Sopenharmony_ci	if (current->flags & PF_RANDOMIZE)
45162306a36Sopenharmony_ci		random_factor = arch_mmap_rnd();
45262306a36Sopenharmony_ci
45362306a36Sopenharmony_ci	if (mmap_is_legacy(rlim_stack)) {
45462306a36Sopenharmony_ci		mm->mmap_base = TASK_UNMAPPED_BASE + random_factor;
45562306a36Sopenharmony_ci		mm->get_unmapped_area = arch_get_unmapped_area;
45662306a36Sopenharmony_ci	} else {
45762306a36Sopenharmony_ci		mm->mmap_base = mmap_base(random_factor, rlim_stack);
45862306a36Sopenharmony_ci		mm->get_unmapped_area = arch_get_unmapped_area_topdown;
45962306a36Sopenharmony_ci	}
46062306a36Sopenharmony_ci}
46162306a36Sopenharmony_ci#elif defined(CONFIG_MMU) && !defined(HAVE_ARCH_PICK_MMAP_LAYOUT)
46262306a36Sopenharmony_civoid arch_pick_mmap_layout(struct mm_struct *mm, struct rlimit *rlim_stack)
46362306a36Sopenharmony_ci{
46462306a36Sopenharmony_ci	mm->mmap_base = TASK_UNMAPPED_BASE;
46562306a36Sopenharmony_ci	mm->get_unmapped_area = arch_get_unmapped_area;
46662306a36Sopenharmony_ci}
46762306a36Sopenharmony_ci#endif
46862306a36Sopenharmony_ci
46962306a36Sopenharmony_ci/**
47062306a36Sopenharmony_ci * __account_locked_vm - account locked pages to an mm's locked_vm
47162306a36Sopenharmony_ci * @mm:          mm to account against
47262306a36Sopenharmony_ci * @pages:       number of pages to account
47362306a36Sopenharmony_ci * @inc:         %true if @pages should be considered positive, %false if not
47462306a36Sopenharmony_ci * @task:        task used to check RLIMIT_MEMLOCK
47562306a36Sopenharmony_ci * @bypass_rlim: %true if checking RLIMIT_MEMLOCK should be skipped
47662306a36Sopenharmony_ci *
47762306a36Sopenharmony_ci * Assumes @task and @mm are valid (i.e. at least one reference on each), and
47862306a36Sopenharmony_ci * that mmap_lock is held as writer.
47962306a36Sopenharmony_ci *
48062306a36Sopenharmony_ci * Return:
48162306a36Sopenharmony_ci * * 0       on success
48262306a36Sopenharmony_ci * * -ENOMEM if RLIMIT_MEMLOCK would be exceeded.
48362306a36Sopenharmony_ci */
48462306a36Sopenharmony_ciint __account_locked_vm(struct mm_struct *mm, unsigned long pages, bool inc,
48562306a36Sopenharmony_ci			struct task_struct *task, bool bypass_rlim)
48662306a36Sopenharmony_ci{
48762306a36Sopenharmony_ci	unsigned long locked_vm, limit;
48862306a36Sopenharmony_ci	int ret = 0;
48962306a36Sopenharmony_ci
49062306a36Sopenharmony_ci	mmap_assert_write_locked(mm);
49162306a36Sopenharmony_ci
49262306a36Sopenharmony_ci	locked_vm = mm->locked_vm;
49362306a36Sopenharmony_ci	if (inc) {
49462306a36Sopenharmony_ci		if (!bypass_rlim) {
49562306a36Sopenharmony_ci			limit = task_rlimit(task, RLIMIT_MEMLOCK) >> PAGE_SHIFT;
49662306a36Sopenharmony_ci			if (locked_vm + pages > limit)
49762306a36Sopenharmony_ci				ret = -ENOMEM;
49862306a36Sopenharmony_ci		}
49962306a36Sopenharmony_ci		if (!ret)
50062306a36Sopenharmony_ci			mm->locked_vm = locked_vm + pages;
50162306a36Sopenharmony_ci	} else {
50262306a36Sopenharmony_ci		WARN_ON_ONCE(pages > locked_vm);
50362306a36Sopenharmony_ci		mm->locked_vm = locked_vm - pages;
50462306a36Sopenharmony_ci	}
50562306a36Sopenharmony_ci
50662306a36Sopenharmony_ci	pr_debug("%s: [%d] caller %ps %c%lu %lu/%lu%s\n", __func__, task->pid,
50762306a36Sopenharmony_ci		 (void *)_RET_IP_, (inc) ? '+' : '-', pages << PAGE_SHIFT,
50862306a36Sopenharmony_ci		 locked_vm << PAGE_SHIFT, task_rlimit(task, RLIMIT_MEMLOCK),
50962306a36Sopenharmony_ci		 ret ? " - exceeded" : "");
51062306a36Sopenharmony_ci
51162306a36Sopenharmony_ci	return ret;
51262306a36Sopenharmony_ci}
51362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(__account_locked_vm);
51462306a36Sopenharmony_ci
51562306a36Sopenharmony_ci/**
51662306a36Sopenharmony_ci * account_locked_vm - account locked pages to an mm's locked_vm
51762306a36Sopenharmony_ci * @mm:          mm to account against, may be NULL
51862306a36Sopenharmony_ci * @pages:       number of pages to account
51962306a36Sopenharmony_ci * @inc:         %true if @pages should be considered positive, %false if not
52062306a36Sopenharmony_ci *
52162306a36Sopenharmony_ci * Assumes a non-NULL @mm is valid (i.e. at least one reference on it).
52262306a36Sopenharmony_ci *
52362306a36Sopenharmony_ci * Return:
52462306a36Sopenharmony_ci * * 0       on success, or if mm is NULL
52562306a36Sopenharmony_ci * * -ENOMEM if RLIMIT_MEMLOCK would be exceeded.
52662306a36Sopenharmony_ci */
52762306a36Sopenharmony_ciint account_locked_vm(struct mm_struct *mm, unsigned long pages, bool inc)
52862306a36Sopenharmony_ci{
52962306a36Sopenharmony_ci	int ret;
53062306a36Sopenharmony_ci
53162306a36Sopenharmony_ci	if (pages == 0 || !mm)
53262306a36Sopenharmony_ci		return 0;
53362306a36Sopenharmony_ci
53462306a36Sopenharmony_ci	mmap_write_lock(mm);
53562306a36Sopenharmony_ci	ret = __account_locked_vm(mm, pages, inc, current,
53662306a36Sopenharmony_ci				  capable(CAP_IPC_LOCK));
53762306a36Sopenharmony_ci	mmap_write_unlock(mm);
53862306a36Sopenharmony_ci
53962306a36Sopenharmony_ci	return ret;
54062306a36Sopenharmony_ci}
54162306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(account_locked_vm);
54262306a36Sopenharmony_ci
54362306a36Sopenharmony_ciunsigned long vm_mmap_pgoff(struct file *file, unsigned long addr,
54462306a36Sopenharmony_ci	unsigned long len, unsigned long prot,
54562306a36Sopenharmony_ci	unsigned long flag, unsigned long pgoff)
54662306a36Sopenharmony_ci{
54762306a36Sopenharmony_ci	unsigned long ret;
54862306a36Sopenharmony_ci	struct mm_struct *mm = current->mm;
54962306a36Sopenharmony_ci	unsigned long populate;
55062306a36Sopenharmony_ci	LIST_HEAD(uf);
55162306a36Sopenharmony_ci
55262306a36Sopenharmony_ci	ret = security_mmap_file(file, prot, flag);
55362306a36Sopenharmony_ci	if (!ret) {
55462306a36Sopenharmony_ci		if (mmap_write_lock_killable(mm))
55562306a36Sopenharmony_ci			return -EINTR;
55662306a36Sopenharmony_ci		ret = do_mmap(file, addr, len, prot, flag, 0, pgoff, &populate,
55762306a36Sopenharmony_ci			      &uf);
55862306a36Sopenharmony_ci		mmap_write_unlock(mm);
55962306a36Sopenharmony_ci		userfaultfd_unmap_complete(mm, &uf);
56062306a36Sopenharmony_ci		if (populate)
56162306a36Sopenharmony_ci			mm_populate(ret, populate);
56262306a36Sopenharmony_ci	}
56362306a36Sopenharmony_ci	return ret;
56462306a36Sopenharmony_ci}
56562306a36Sopenharmony_ci
56662306a36Sopenharmony_ciunsigned long vm_mmap(struct file *file, unsigned long addr,
56762306a36Sopenharmony_ci	unsigned long len, unsigned long prot,
56862306a36Sopenharmony_ci	unsigned long flag, unsigned long offset)
56962306a36Sopenharmony_ci{
57062306a36Sopenharmony_ci	if (unlikely(offset + PAGE_ALIGN(len) < offset))
57162306a36Sopenharmony_ci		return -EINVAL;
57262306a36Sopenharmony_ci	if (unlikely(offset_in_page(offset)))
57362306a36Sopenharmony_ci		return -EINVAL;
57462306a36Sopenharmony_ci
57562306a36Sopenharmony_ci	return vm_mmap_pgoff(file, addr, len, prot, flag, offset >> PAGE_SHIFT);
57662306a36Sopenharmony_ci}
57762306a36Sopenharmony_ciEXPORT_SYMBOL(vm_mmap);
57862306a36Sopenharmony_ci
57962306a36Sopenharmony_ci/**
58062306a36Sopenharmony_ci * kvmalloc_node - attempt to allocate physically contiguous memory, but upon
58162306a36Sopenharmony_ci * failure, fall back to non-contiguous (vmalloc) allocation.
58262306a36Sopenharmony_ci * @size: size of the request.
58362306a36Sopenharmony_ci * @flags: gfp mask for the allocation - must be compatible (superset) with GFP_KERNEL.
58462306a36Sopenharmony_ci * @node: numa node to allocate from
58562306a36Sopenharmony_ci *
58662306a36Sopenharmony_ci * Uses kmalloc to get the memory but if the allocation fails then falls back
58762306a36Sopenharmony_ci * to the vmalloc allocator. Use kvfree for freeing the memory.
58862306a36Sopenharmony_ci *
58962306a36Sopenharmony_ci * GFP_NOWAIT and GFP_ATOMIC are not supported, neither is the __GFP_NORETRY modifier.
59062306a36Sopenharmony_ci * __GFP_RETRY_MAYFAIL is supported, and it should be used only if kmalloc is
59162306a36Sopenharmony_ci * preferable to the vmalloc fallback, due to visible performance drawbacks.
59262306a36Sopenharmony_ci *
59362306a36Sopenharmony_ci * Return: pointer to the allocated memory of %NULL in case of failure
59462306a36Sopenharmony_ci */
59562306a36Sopenharmony_civoid *kvmalloc_node(size_t size, gfp_t flags, int node)
59662306a36Sopenharmony_ci{
59762306a36Sopenharmony_ci	gfp_t kmalloc_flags = flags;
59862306a36Sopenharmony_ci	void *ret;
59962306a36Sopenharmony_ci
60062306a36Sopenharmony_ci	/*
60162306a36Sopenharmony_ci	 * We want to attempt a large physically contiguous block first because
60262306a36Sopenharmony_ci	 * it is less likely to fragment multiple larger blocks and therefore
60362306a36Sopenharmony_ci	 * contribute to a long term fragmentation less than vmalloc fallback.
60462306a36Sopenharmony_ci	 * However make sure that larger requests are not too disruptive - no
60562306a36Sopenharmony_ci	 * OOM killer and no allocation failure warnings as we have a fallback.
60662306a36Sopenharmony_ci	 */
60762306a36Sopenharmony_ci	if (size > PAGE_SIZE) {
60862306a36Sopenharmony_ci		kmalloc_flags |= __GFP_NOWARN;
60962306a36Sopenharmony_ci
61062306a36Sopenharmony_ci		if (!(kmalloc_flags & __GFP_RETRY_MAYFAIL))
61162306a36Sopenharmony_ci			kmalloc_flags |= __GFP_NORETRY;
61262306a36Sopenharmony_ci
61362306a36Sopenharmony_ci		/* nofail semantic is implemented by the vmalloc fallback */
61462306a36Sopenharmony_ci		kmalloc_flags &= ~__GFP_NOFAIL;
61562306a36Sopenharmony_ci	}
61662306a36Sopenharmony_ci
61762306a36Sopenharmony_ci	ret = kmalloc_node(size, kmalloc_flags, node);
61862306a36Sopenharmony_ci
61962306a36Sopenharmony_ci	/*
62062306a36Sopenharmony_ci	 * It doesn't really make sense to fallback to vmalloc for sub page
62162306a36Sopenharmony_ci	 * requests
62262306a36Sopenharmony_ci	 */
62362306a36Sopenharmony_ci	if (ret || size <= PAGE_SIZE)
62462306a36Sopenharmony_ci		return ret;
62562306a36Sopenharmony_ci
62662306a36Sopenharmony_ci	/* non-sleeping allocations are not supported by vmalloc */
62762306a36Sopenharmony_ci	if (!gfpflags_allow_blocking(flags))
62862306a36Sopenharmony_ci		return NULL;
62962306a36Sopenharmony_ci
63062306a36Sopenharmony_ci	/* Don't even allow crazy sizes */
63162306a36Sopenharmony_ci	if (unlikely(size > INT_MAX)) {
63262306a36Sopenharmony_ci		WARN_ON_ONCE(!(flags & __GFP_NOWARN));
63362306a36Sopenharmony_ci		return NULL;
63462306a36Sopenharmony_ci	}
63562306a36Sopenharmony_ci
63662306a36Sopenharmony_ci	/*
63762306a36Sopenharmony_ci	 * kvmalloc() can always use VM_ALLOW_HUGE_VMAP,
63862306a36Sopenharmony_ci	 * since the callers already cannot assume anything
63962306a36Sopenharmony_ci	 * about the resulting pointer, and cannot play
64062306a36Sopenharmony_ci	 * protection games.
64162306a36Sopenharmony_ci	 */
64262306a36Sopenharmony_ci	return __vmalloc_node_range(size, 1, VMALLOC_START, VMALLOC_END,
64362306a36Sopenharmony_ci			flags, PAGE_KERNEL, VM_ALLOW_HUGE_VMAP,
64462306a36Sopenharmony_ci			node, __builtin_return_address(0));
64562306a36Sopenharmony_ci}
64662306a36Sopenharmony_ciEXPORT_SYMBOL(kvmalloc_node);
64762306a36Sopenharmony_ci
64862306a36Sopenharmony_ci/**
64962306a36Sopenharmony_ci * kvfree() - Free memory.
65062306a36Sopenharmony_ci * @addr: Pointer to allocated memory.
65162306a36Sopenharmony_ci *
65262306a36Sopenharmony_ci * kvfree frees memory allocated by any of vmalloc(), kmalloc() or kvmalloc().
65362306a36Sopenharmony_ci * It is slightly more efficient to use kfree() or vfree() if you are certain
65462306a36Sopenharmony_ci * that you know which one to use.
65562306a36Sopenharmony_ci *
65662306a36Sopenharmony_ci * Context: Either preemptible task context or not-NMI interrupt.
65762306a36Sopenharmony_ci */
65862306a36Sopenharmony_civoid kvfree(const void *addr)
65962306a36Sopenharmony_ci{
66062306a36Sopenharmony_ci	if (is_vmalloc_addr(addr))
66162306a36Sopenharmony_ci		vfree(addr);
66262306a36Sopenharmony_ci	else
66362306a36Sopenharmony_ci		kfree(addr);
66462306a36Sopenharmony_ci}
66562306a36Sopenharmony_ciEXPORT_SYMBOL(kvfree);
66662306a36Sopenharmony_ci
66762306a36Sopenharmony_ci/**
66862306a36Sopenharmony_ci * kvfree_sensitive - Free a data object containing sensitive information.
66962306a36Sopenharmony_ci * @addr: address of the data object to be freed.
67062306a36Sopenharmony_ci * @len: length of the data object.
67162306a36Sopenharmony_ci *
67262306a36Sopenharmony_ci * Use the special memzero_explicit() function to clear the content of a
67362306a36Sopenharmony_ci * kvmalloc'ed object containing sensitive data to make sure that the
67462306a36Sopenharmony_ci * compiler won't optimize out the data clearing.
67562306a36Sopenharmony_ci */
67662306a36Sopenharmony_civoid kvfree_sensitive(const void *addr, size_t len)
67762306a36Sopenharmony_ci{
67862306a36Sopenharmony_ci	if (likely(!ZERO_OR_NULL_PTR(addr))) {
67962306a36Sopenharmony_ci		memzero_explicit((void *)addr, len);
68062306a36Sopenharmony_ci		kvfree(addr);
68162306a36Sopenharmony_ci	}
68262306a36Sopenharmony_ci}
68362306a36Sopenharmony_ciEXPORT_SYMBOL(kvfree_sensitive);
68462306a36Sopenharmony_ci
68562306a36Sopenharmony_civoid *kvrealloc(const void *p, size_t oldsize, size_t newsize, gfp_t flags)
68662306a36Sopenharmony_ci{
68762306a36Sopenharmony_ci	void *newp;
68862306a36Sopenharmony_ci
68962306a36Sopenharmony_ci	if (oldsize >= newsize)
69062306a36Sopenharmony_ci		return (void *)p;
69162306a36Sopenharmony_ci	newp = kvmalloc(newsize, flags);
69262306a36Sopenharmony_ci	if (!newp)
69362306a36Sopenharmony_ci		return NULL;
69462306a36Sopenharmony_ci	memcpy(newp, p, oldsize);
69562306a36Sopenharmony_ci	kvfree(p);
69662306a36Sopenharmony_ci	return newp;
69762306a36Sopenharmony_ci}
69862306a36Sopenharmony_ciEXPORT_SYMBOL(kvrealloc);
69962306a36Sopenharmony_ci
70062306a36Sopenharmony_ci/**
70162306a36Sopenharmony_ci * __vmalloc_array - allocate memory for a virtually contiguous array.
70262306a36Sopenharmony_ci * @n: number of elements.
70362306a36Sopenharmony_ci * @size: element size.
70462306a36Sopenharmony_ci * @flags: the type of memory to allocate (see kmalloc).
70562306a36Sopenharmony_ci */
70662306a36Sopenharmony_civoid *__vmalloc_array(size_t n, size_t size, gfp_t flags)
70762306a36Sopenharmony_ci{
70862306a36Sopenharmony_ci	size_t bytes;
70962306a36Sopenharmony_ci
71062306a36Sopenharmony_ci	if (unlikely(check_mul_overflow(n, size, &bytes)))
71162306a36Sopenharmony_ci		return NULL;
71262306a36Sopenharmony_ci	return __vmalloc(bytes, flags);
71362306a36Sopenharmony_ci}
71462306a36Sopenharmony_ciEXPORT_SYMBOL(__vmalloc_array);
71562306a36Sopenharmony_ci
71662306a36Sopenharmony_ci/**
71762306a36Sopenharmony_ci * vmalloc_array - allocate memory for a virtually contiguous array.
71862306a36Sopenharmony_ci * @n: number of elements.
71962306a36Sopenharmony_ci * @size: element size.
72062306a36Sopenharmony_ci */
72162306a36Sopenharmony_civoid *vmalloc_array(size_t n, size_t size)
72262306a36Sopenharmony_ci{
72362306a36Sopenharmony_ci	return __vmalloc_array(n, size, GFP_KERNEL);
72462306a36Sopenharmony_ci}
72562306a36Sopenharmony_ciEXPORT_SYMBOL(vmalloc_array);
72662306a36Sopenharmony_ci
72762306a36Sopenharmony_ci/**
72862306a36Sopenharmony_ci * __vcalloc - allocate and zero memory for a virtually contiguous array.
72962306a36Sopenharmony_ci * @n: number of elements.
73062306a36Sopenharmony_ci * @size: element size.
73162306a36Sopenharmony_ci * @flags: the type of memory to allocate (see kmalloc).
73262306a36Sopenharmony_ci */
73362306a36Sopenharmony_civoid *__vcalloc(size_t n, size_t size, gfp_t flags)
73462306a36Sopenharmony_ci{
73562306a36Sopenharmony_ci	return __vmalloc_array(n, size, flags | __GFP_ZERO);
73662306a36Sopenharmony_ci}
73762306a36Sopenharmony_ciEXPORT_SYMBOL(__vcalloc);
73862306a36Sopenharmony_ci
73962306a36Sopenharmony_ci/**
74062306a36Sopenharmony_ci * vcalloc - allocate and zero memory for a virtually contiguous array.
74162306a36Sopenharmony_ci * @n: number of elements.
74262306a36Sopenharmony_ci * @size: element size.
74362306a36Sopenharmony_ci */
74462306a36Sopenharmony_civoid *vcalloc(size_t n, size_t size)
74562306a36Sopenharmony_ci{
74662306a36Sopenharmony_ci	return __vmalloc_array(n, size, GFP_KERNEL | __GFP_ZERO);
74762306a36Sopenharmony_ci}
74862306a36Sopenharmony_ciEXPORT_SYMBOL(vcalloc);
74962306a36Sopenharmony_ci
75062306a36Sopenharmony_cistruct anon_vma *folio_anon_vma(struct folio *folio)
75162306a36Sopenharmony_ci{
75262306a36Sopenharmony_ci	unsigned long mapping = (unsigned long)folio->mapping;
75362306a36Sopenharmony_ci
75462306a36Sopenharmony_ci	if ((mapping & PAGE_MAPPING_FLAGS) != PAGE_MAPPING_ANON)
75562306a36Sopenharmony_ci		return NULL;
75662306a36Sopenharmony_ci	return (void *)(mapping - PAGE_MAPPING_ANON);
75762306a36Sopenharmony_ci}
75862306a36Sopenharmony_ci
75962306a36Sopenharmony_ci/**
76062306a36Sopenharmony_ci * folio_mapping - Find the mapping where this folio is stored.
76162306a36Sopenharmony_ci * @folio: The folio.
76262306a36Sopenharmony_ci *
76362306a36Sopenharmony_ci * For folios which are in the page cache, return the mapping that this
76462306a36Sopenharmony_ci * page belongs to.  Folios in the swap cache return the swap mapping
76562306a36Sopenharmony_ci * this page is stored in (which is different from the mapping for the
76662306a36Sopenharmony_ci * swap file or swap device where the data is stored).
76762306a36Sopenharmony_ci *
76862306a36Sopenharmony_ci * You can call this for folios which aren't in the swap cache or page
76962306a36Sopenharmony_ci * cache and it will return NULL.
77062306a36Sopenharmony_ci */
77162306a36Sopenharmony_cistruct address_space *folio_mapping(struct folio *folio)
77262306a36Sopenharmony_ci{
77362306a36Sopenharmony_ci	struct address_space *mapping;
77462306a36Sopenharmony_ci
77562306a36Sopenharmony_ci	/* This happens if someone calls flush_dcache_page on slab page */
77662306a36Sopenharmony_ci	if (unlikely(folio_test_slab(folio)))
77762306a36Sopenharmony_ci		return NULL;
77862306a36Sopenharmony_ci
77962306a36Sopenharmony_ci	if (unlikely(folio_test_swapcache(folio)))
78062306a36Sopenharmony_ci		return swap_address_space(folio->swap);
78162306a36Sopenharmony_ci
78262306a36Sopenharmony_ci	mapping = folio->mapping;
78362306a36Sopenharmony_ci	if ((unsigned long)mapping & PAGE_MAPPING_FLAGS)
78462306a36Sopenharmony_ci		return NULL;
78562306a36Sopenharmony_ci
78662306a36Sopenharmony_ci	return mapping;
78762306a36Sopenharmony_ci}
78862306a36Sopenharmony_ciEXPORT_SYMBOL(folio_mapping);
78962306a36Sopenharmony_ci
79062306a36Sopenharmony_ci/**
79162306a36Sopenharmony_ci * folio_copy - Copy the contents of one folio to another.
79262306a36Sopenharmony_ci * @dst: Folio to copy to.
79362306a36Sopenharmony_ci * @src: Folio to copy from.
79462306a36Sopenharmony_ci *
79562306a36Sopenharmony_ci * The bytes in the folio represented by @src are copied to @dst.
79662306a36Sopenharmony_ci * Assumes the caller has validated that @dst is at least as large as @src.
79762306a36Sopenharmony_ci * Can be called in atomic context for order-0 folios, but if the folio is
79862306a36Sopenharmony_ci * larger, it may sleep.
79962306a36Sopenharmony_ci */
80062306a36Sopenharmony_civoid folio_copy(struct folio *dst, struct folio *src)
80162306a36Sopenharmony_ci{
80262306a36Sopenharmony_ci	long i = 0;
80362306a36Sopenharmony_ci	long nr = folio_nr_pages(src);
80462306a36Sopenharmony_ci
80562306a36Sopenharmony_ci	for (;;) {
80662306a36Sopenharmony_ci		copy_highpage(folio_page(dst, i), folio_page(src, i));
80762306a36Sopenharmony_ci		if (++i == nr)
80862306a36Sopenharmony_ci			break;
80962306a36Sopenharmony_ci		cond_resched();
81062306a36Sopenharmony_ci	}
81162306a36Sopenharmony_ci}
81262306a36Sopenharmony_ci
81362306a36Sopenharmony_ciint sysctl_overcommit_memory __read_mostly = OVERCOMMIT_GUESS;
81462306a36Sopenharmony_ciint sysctl_overcommit_ratio __read_mostly = 50;
81562306a36Sopenharmony_ciunsigned long sysctl_overcommit_kbytes __read_mostly;
81662306a36Sopenharmony_ciint sysctl_max_map_count __read_mostly = DEFAULT_MAX_MAP_COUNT;
81762306a36Sopenharmony_ciunsigned long sysctl_user_reserve_kbytes __read_mostly = 1UL << 17; /* 128MB */
81862306a36Sopenharmony_ciunsigned long sysctl_admin_reserve_kbytes __read_mostly = 1UL << 13; /* 8MB */
81962306a36Sopenharmony_ci
82062306a36Sopenharmony_ciint overcommit_ratio_handler(struct ctl_table *table, int write, void *buffer,
82162306a36Sopenharmony_ci		size_t *lenp, loff_t *ppos)
82262306a36Sopenharmony_ci{
82362306a36Sopenharmony_ci	int ret;
82462306a36Sopenharmony_ci
82562306a36Sopenharmony_ci	ret = proc_dointvec(table, write, buffer, lenp, ppos);
82662306a36Sopenharmony_ci	if (ret == 0 && write)
82762306a36Sopenharmony_ci		sysctl_overcommit_kbytes = 0;
82862306a36Sopenharmony_ci	return ret;
82962306a36Sopenharmony_ci}
83062306a36Sopenharmony_ci
83162306a36Sopenharmony_cistatic void sync_overcommit_as(struct work_struct *dummy)
83262306a36Sopenharmony_ci{
83362306a36Sopenharmony_ci	percpu_counter_sync(&vm_committed_as);
83462306a36Sopenharmony_ci}
83562306a36Sopenharmony_ci
83662306a36Sopenharmony_ciint overcommit_policy_handler(struct ctl_table *table, int write, void *buffer,
83762306a36Sopenharmony_ci		size_t *lenp, loff_t *ppos)
83862306a36Sopenharmony_ci{
83962306a36Sopenharmony_ci	struct ctl_table t;
84062306a36Sopenharmony_ci	int new_policy = -1;
84162306a36Sopenharmony_ci	int ret;
84262306a36Sopenharmony_ci
84362306a36Sopenharmony_ci	/*
84462306a36Sopenharmony_ci	 * The deviation of sync_overcommit_as could be big with loose policy
84562306a36Sopenharmony_ci	 * like OVERCOMMIT_ALWAYS/OVERCOMMIT_GUESS. When changing policy to
84662306a36Sopenharmony_ci	 * strict OVERCOMMIT_NEVER, we need to reduce the deviation to comply
84762306a36Sopenharmony_ci	 * with the strict "NEVER", and to avoid possible race condition (even
84862306a36Sopenharmony_ci	 * though user usually won't too frequently do the switching to policy
84962306a36Sopenharmony_ci	 * OVERCOMMIT_NEVER), the switch is done in the following order:
85062306a36Sopenharmony_ci	 *	1. changing the batch
85162306a36Sopenharmony_ci	 *	2. sync percpu count on each CPU
85262306a36Sopenharmony_ci	 *	3. switch the policy
85362306a36Sopenharmony_ci	 */
85462306a36Sopenharmony_ci	if (write) {
85562306a36Sopenharmony_ci		t = *table;
85662306a36Sopenharmony_ci		t.data = &new_policy;
85762306a36Sopenharmony_ci		ret = proc_dointvec_minmax(&t, write, buffer, lenp, ppos);
85862306a36Sopenharmony_ci		if (ret || new_policy == -1)
85962306a36Sopenharmony_ci			return ret;
86062306a36Sopenharmony_ci
86162306a36Sopenharmony_ci		mm_compute_batch(new_policy);
86262306a36Sopenharmony_ci		if (new_policy == OVERCOMMIT_NEVER)
86362306a36Sopenharmony_ci			schedule_on_each_cpu(sync_overcommit_as);
86462306a36Sopenharmony_ci		sysctl_overcommit_memory = new_policy;
86562306a36Sopenharmony_ci	} else {
86662306a36Sopenharmony_ci		ret = proc_dointvec_minmax(table, write, buffer, lenp, ppos);
86762306a36Sopenharmony_ci	}
86862306a36Sopenharmony_ci
86962306a36Sopenharmony_ci	return ret;
87062306a36Sopenharmony_ci}
87162306a36Sopenharmony_ci
87262306a36Sopenharmony_ciint overcommit_kbytes_handler(struct ctl_table *table, int write, void *buffer,
87362306a36Sopenharmony_ci		size_t *lenp, loff_t *ppos)
87462306a36Sopenharmony_ci{
87562306a36Sopenharmony_ci	int ret;
87662306a36Sopenharmony_ci
87762306a36Sopenharmony_ci	ret = proc_doulongvec_minmax(table, write, buffer, lenp, ppos);
87862306a36Sopenharmony_ci	if (ret == 0 && write)
87962306a36Sopenharmony_ci		sysctl_overcommit_ratio = 0;
88062306a36Sopenharmony_ci	return ret;
88162306a36Sopenharmony_ci}
88262306a36Sopenharmony_ci
88362306a36Sopenharmony_ci/*
88462306a36Sopenharmony_ci * Committed memory limit enforced when OVERCOMMIT_NEVER policy is used
88562306a36Sopenharmony_ci */
88662306a36Sopenharmony_ciunsigned long vm_commit_limit(void)
88762306a36Sopenharmony_ci{
88862306a36Sopenharmony_ci	unsigned long allowed;
88962306a36Sopenharmony_ci
89062306a36Sopenharmony_ci	if (sysctl_overcommit_kbytes)
89162306a36Sopenharmony_ci		allowed = sysctl_overcommit_kbytes >> (PAGE_SHIFT - 10);
89262306a36Sopenharmony_ci	else
89362306a36Sopenharmony_ci		allowed = ((totalram_pages() - hugetlb_total_pages())
89462306a36Sopenharmony_ci			   * sysctl_overcommit_ratio / 100);
89562306a36Sopenharmony_ci	allowed += total_swap_pages;
89662306a36Sopenharmony_ci
89762306a36Sopenharmony_ci	return allowed;
89862306a36Sopenharmony_ci}
89962306a36Sopenharmony_ci
90062306a36Sopenharmony_ci/*
90162306a36Sopenharmony_ci * Make sure vm_committed_as in one cacheline and not cacheline shared with
90262306a36Sopenharmony_ci * other variables. It can be updated by several CPUs frequently.
90362306a36Sopenharmony_ci */
90462306a36Sopenharmony_cistruct percpu_counter vm_committed_as ____cacheline_aligned_in_smp;
90562306a36Sopenharmony_ci
90662306a36Sopenharmony_ci/*
90762306a36Sopenharmony_ci * The global memory commitment made in the system can be a metric
90862306a36Sopenharmony_ci * that can be used to drive ballooning decisions when Linux is hosted
90962306a36Sopenharmony_ci * as a guest. On Hyper-V, the host implements a policy engine for dynamically
91062306a36Sopenharmony_ci * balancing memory across competing virtual machines that are hosted.
91162306a36Sopenharmony_ci * Several metrics drive this policy engine including the guest reported
91262306a36Sopenharmony_ci * memory commitment.
91362306a36Sopenharmony_ci *
91462306a36Sopenharmony_ci * The time cost of this is very low for small platforms, and for big
91562306a36Sopenharmony_ci * platform like a 2S/36C/72T Skylake server, in worst case where
91662306a36Sopenharmony_ci * vm_committed_as's spinlock is under severe contention, the time cost
91762306a36Sopenharmony_ci * could be about 30~40 microseconds.
91862306a36Sopenharmony_ci */
91962306a36Sopenharmony_ciunsigned long vm_memory_committed(void)
92062306a36Sopenharmony_ci{
92162306a36Sopenharmony_ci	return percpu_counter_sum_positive(&vm_committed_as);
92262306a36Sopenharmony_ci}
92362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(vm_memory_committed);
92462306a36Sopenharmony_ci
92562306a36Sopenharmony_ci/*
92662306a36Sopenharmony_ci * Check that a process has enough memory to allocate a new virtual
92762306a36Sopenharmony_ci * mapping. 0 means there is enough memory for the allocation to
92862306a36Sopenharmony_ci * succeed and -ENOMEM implies there is not.
92962306a36Sopenharmony_ci *
93062306a36Sopenharmony_ci * We currently support three overcommit policies, which are set via the
93162306a36Sopenharmony_ci * vm.overcommit_memory sysctl.  See Documentation/mm/overcommit-accounting.rst
93262306a36Sopenharmony_ci *
93362306a36Sopenharmony_ci * Strict overcommit modes added 2002 Feb 26 by Alan Cox.
93462306a36Sopenharmony_ci * Additional code 2002 Jul 20 by Robert Love.
93562306a36Sopenharmony_ci *
93662306a36Sopenharmony_ci * cap_sys_admin is 1 if the process has admin privileges, 0 otherwise.
93762306a36Sopenharmony_ci *
93862306a36Sopenharmony_ci * Note this is a helper function intended to be used by LSMs which
93962306a36Sopenharmony_ci * wish to use this logic.
94062306a36Sopenharmony_ci */
94162306a36Sopenharmony_ciint __vm_enough_memory(struct mm_struct *mm, long pages, int cap_sys_admin)
94262306a36Sopenharmony_ci{
94362306a36Sopenharmony_ci	long allowed;
94462306a36Sopenharmony_ci
94562306a36Sopenharmony_ci	vm_acct_memory(pages);
94662306a36Sopenharmony_ci
94762306a36Sopenharmony_ci	/*
94862306a36Sopenharmony_ci	 * Sometimes we want to use more memory than we have
94962306a36Sopenharmony_ci	 */
95062306a36Sopenharmony_ci	if (sysctl_overcommit_memory == OVERCOMMIT_ALWAYS)
95162306a36Sopenharmony_ci		return 0;
95262306a36Sopenharmony_ci
95362306a36Sopenharmony_ci	if (sysctl_overcommit_memory == OVERCOMMIT_GUESS) {
95462306a36Sopenharmony_ci		if (pages > totalram_pages() + total_swap_pages)
95562306a36Sopenharmony_ci			goto error;
95662306a36Sopenharmony_ci		return 0;
95762306a36Sopenharmony_ci	}
95862306a36Sopenharmony_ci
95962306a36Sopenharmony_ci	allowed = vm_commit_limit();
96062306a36Sopenharmony_ci	/*
96162306a36Sopenharmony_ci	 * Reserve some for root
96262306a36Sopenharmony_ci	 */
96362306a36Sopenharmony_ci	if (!cap_sys_admin)
96462306a36Sopenharmony_ci		allowed -= sysctl_admin_reserve_kbytes >> (PAGE_SHIFT - 10);
96562306a36Sopenharmony_ci
96662306a36Sopenharmony_ci	/*
96762306a36Sopenharmony_ci	 * Don't let a single process grow so big a user can't recover
96862306a36Sopenharmony_ci	 */
96962306a36Sopenharmony_ci	if (mm) {
97062306a36Sopenharmony_ci		long reserve = sysctl_user_reserve_kbytes >> (PAGE_SHIFT - 10);
97162306a36Sopenharmony_ci
97262306a36Sopenharmony_ci		allowed -= min_t(long, mm->total_vm / 32, reserve);
97362306a36Sopenharmony_ci	}
97462306a36Sopenharmony_ci
97562306a36Sopenharmony_ci	if (percpu_counter_read_positive(&vm_committed_as) < allowed)
97662306a36Sopenharmony_ci		return 0;
97762306a36Sopenharmony_cierror:
97862306a36Sopenharmony_ci	pr_warn_ratelimited("%s: pid: %d, comm: %s, not enough memory for the allocation\n",
97962306a36Sopenharmony_ci			    __func__, current->pid, current->comm);
98062306a36Sopenharmony_ci	vm_unacct_memory(pages);
98162306a36Sopenharmony_ci
98262306a36Sopenharmony_ci	return -ENOMEM;
98362306a36Sopenharmony_ci}
98462306a36Sopenharmony_ci
98562306a36Sopenharmony_ci/**
98662306a36Sopenharmony_ci * get_cmdline() - copy the cmdline value to a buffer.
98762306a36Sopenharmony_ci * @task:     the task whose cmdline value to copy.
98862306a36Sopenharmony_ci * @buffer:   the buffer to copy to.
98962306a36Sopenharmony_ci * @buflen:   the length of the buffer. Larger cmdline values are truncated
99062306a36Sopenharmony_ci *            to this length.
99162306a36Sopenharmony_ci *
99262306a36Sopenharmony_ci * Return: the size of the cmdline field copied. Note that the copy does
99362306a36Sopenharmony_ci * not guarantee an ending NULL byte.
99462306a36Sopenharmony_ci */
99562306a36Sopenharmony_ciint get_cmdline(struct task_struct *task, char *buffer, int buflen)
99662306a36Sopenharmony_ci{
99762306a36Sopenharmony_ci	int res = 0;
99862306a36Sopenharmony_ci	unsigned int len;
99962306a36Sopenharmony_ci	struct mm_struct *mm = get_task_mm(task);
100062306a36Sopenharmony_ci	unsigned long arg_start, arg_end, env_start, env_end;
100162306a36Sopenharmony_ci	if (!mm)
100262306a36Sopenharmony_ci		goto out;
100362306a36Sopenharmony_ci	if (!mm->arg_end)
100462306a36Sopenharmony_ci		goto out_mm;	/* Shh! No looking before we're done */
100562306a36Sopenharmony_ci
100662306a36Sopenharmony_ci	spin_lock(&mm->arg_lock);
100762306a36Sopenharmony_ci	arg_start = mm->arg_start;
100862306a36Sopenharmony_ci	arg_end = mm->arg_end;
100962306a36Sopenharmony_ci	env_start = mm->env_start;
101062306a36Sopenharmony_ci	env_end = mm->env_end;
101162306a36Sopenharmony_ci	spin_unlock(&mm->arg_lock);
101262306a36Sopenharmony_ci
101362306a36Sopenharmony_ci	len = arg_end - arg_start;
101462306a36Sopenharmony_ci
101562306a36Sopenharmony_ci	if (len > buflen)
101662306a36Sopenharmony_ci		len = buflen;
101762306a36Sopenharmony_ci
101862306a36Sopenharmony_ci	res = access_process_vm(task, arg_start, buffer, len, FOLL_FORCE);
101962306a36Sopenharmony_ci
102062306a36Sopenharmony_ci	/*
102162306a36Sopenharmony_ci	 * If the nul at the end of args has been overwritten, then
102262306a36Sopenharmony_ci	 * assume application is using setproctitle(3).
102362306a36Sopenharmony_ci	 */
102462306a36Sopenharmony_ci	if (res > 0 && buffer[res-1] != '\0' && len < buflen) {
102562306a36Sopenharmony_ci		len = strnlen(buffer, res);
102662306a36Sopenharmony_ci		if (len < res) {
102762306a36Sopenharmony_ci			res = len;
102862306a36Sopenharmony_ci		} else {
102962306a36Sopenharmony_ci			len = env_end - env_start;
103062306a36Sopenharmony_ci			if (len > buflen - res)
103162306a36Sopenharmony_ci				len = buflen - res;
103262306a36Sopenharmony_ci			res += access_process_vm(task, env_start,
103362306a36Sopenharmony_ci						 buffer+res, len,
103462306a36Sopenharmony_ci						 FOLL_FORCE);
103562306a36Sopenharmony_ci			res = strnlen(buffer, res);
103662306a36Sopenharmony_ci		}
103762306a36Sopenharmony_ci	}
103862306a36Sopenharmony_ciout_mm:
103962306a36Sopenharmony_ci	mmput(mm);
104062306a36Sopenharmony_ciout:
104162306a36Sopenharmony_ci	return res;
104262306a36Sopenharmony_ci}
104362306a36Sopenharmony_ci
104462306a36Sopenharmony_ciint __weak memcmp_pages(struct page *page1, struct page *page2)
104562306a36Sopenharmony_ci{
104662306a36Sopenharmony_ci	char *addr1, *addr2;
104762306a36Sopenharmony_ci	int ret;
104862306a36Sopenharmony_ci
104962306a36Sopenharmony_ci	addr1 = kmap_atomic(page1);
105062306a36Sopenharmony_ci	addr2 = kmap_atomic(page2);
105162306a36Sopenharmony_ci	ret = memcmp(addr1, addr2, PAGE_SIZE);
105262306a36Sopenharmony_ci	kunmap_atomic(addr2);
105362306a36Sopenharmony_ci	kunmap_atomic(addr1);
105462306a36Sopenharmony_ci	return ret;
105562306a36Sopenharmony_ci}
105662306a36Sopenharmony_ci
105762306a36Sopenharmony_ci#ifdef CONFIG_PRINTK
105862306a36Sopenharmony_ci/**
105962306a36Sopenharmony_ci * mem_dump_obj - Print available provenance information
106062306a36Sopenharmony_ci * @object: object for which to find provenance information.
106162306a36Sopenharmony_ci *
106262306a36Sopenharmony_ci * This function uses pr_cont(), so that the caller is expected to have
106362306a36Sopenharmony_ci * printed out whatever preamble is appropriate.  The provenance information
106462306a36Sopenharmony_ci * depends on the type of object and on how much debugging is enabled.
106562306a36Sopenharmony_ci * For example, for a slab-cache object, the slab name is printed, and,
106662306a36Sopenharmony_ci * if available, the return address and stack trace from the allocation
106762306a36Sopenharmony_ci * and last free path of that object.
106862306a36Sopenharmony_ci */
106962306a36Sopenharmony_civoid mem_dump_obj(void *object)
107062306a36Sopenharmony_ci{
107162306a36Sopenharmony_ci	const char *type;
107262306a36Sopenharmony_ci
107362306a36Sopenharmony_ci	if (kmem_valid_obj(object)) {
107462306a36Sopenharmony_ci		kmem_dump_obj(object);
107562306a36Sopenharmony_ci		return;
107662306a36Sopenharmony_ci	}
107762306a36Sopenharmony_ci
107862306a36Sopenharmony_ci	if (vmalloc_dump_obj(object))
107962306a36Sopenharmony_ci		return;
108062306a36Sopenharmony_ci
108162306a36Sopenharmony_ci	if (is_vmalloc_addr(object))
108262306a36Sopenharmony_ci		type = "vmalloc memory";
108362306a36Sopenharmony_ci	else if (virt_addr_valid(object))
108462306a36Sopenharmony_ci		type = "non-slab/vmalloc memory";
108562306a36Sopenharmony_ci	else if (object == NULL)
108662306a36Sopenharmony_ci		type = "NULL pointer";
108762306a36Sopenharmony_ci	else if (object == ZERO_SIZE_PTR)
108862306a36Sopenharmony_ci		type = "zero-size pointer";
108962306a36Sopenharmony_ci	else
109062306a36Sopenharmony_ci		type = "non-paged memory";
109162306a36Sopenharmony_ci
109262306a36Sopenharmony_ci	pr_cont(" %s\n", type);
109362306a36Sopenharmony_ci}
109462306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(mem_dump_obj);
109562306a36Sopenharmony_ci#endif
109662306a36Sopenharmony_ci
109762306a36Sopenharmony_ci/*
109862306a36Sopenharmony_ci * A driver might set a page logically offline -- PageOffline() -- and
109962306a36Sopenharmony_ci * turn the page inaccessible in the hypervisor; after that, access to page
110062306a36Sopenharmony_ci * content can be fatal.
110162306a36Sopenharmony_ci *
110262306a36Sopenharmony_ci * Some special PFN walkers -- i.e., /proc/kcore -- read content of random
110362306a36Sopenharmony_ci * pages after checking PageOffline(); however, these PFN walkers can race
110462306a36Sopenharmony_ci * with drivers that set PageOffline().
110562306a36Sopenharmony_ci *
110662306a36Sopenharmony_ci * page_offline_freeze()/page_offline_thaw() allows for a subsystem to
110762306a36Sopenharmony_ci * synchronize with such drivers, achieving that a page cannot be set
110862306a36Sopenharmony_ci * PageOffline() while frozen.
110962306a36Sopenharmony_ci *
111062306a36Sopenharmony_ci * page_offline_begin()/page_offline_end() is used by drivers that care about
111162306a36Sopenharmony_ci * such races when setting a page PageOffline().
111262306a36Sopenharmony_ci */
111362306a36Sopenharmony_cistatic DECLARE_RWSEM(page_offline_rwsem);
111462306a36Sopenharmony_ci
111562306a36Sopenharmony_civoid page_offline_freeze(void)
111662306a36Sopenharmony_ci{
111762306a36Sopenharmony_ci	down_read(&page_offline_rwsem);
111862306a36Sopenharmony_ci}
111962306a36Sopenharmony_ci
112062306a36Sopenharmony_civoid page_offline_thaw(void)
112162306a36Sopenharmony_ci{
112262306a36Sopenharmony_ci	up_read(&page_offline_rwsem);
112362306a36Sopenharmony_ci}
112462306a36Sopenharmony_ci
112562306a36Sopenharmony_civoid page_offline_begin(void)
112662306a36Sopenharmony_ci{
112762306a36Sopenharmony_ci	down_write(&page_offline_rwsem);
112862306a36Sopenharmony_ci}
112962306a36Sopenharmony_ciEXPORT_SYMBOL(page_offline_begin);
113062306a36Sopenharmony_ci
113162306a36Sopenharmony_civoid page_offline_end(void)
113262306a36Sopenharmony_ci{
113362306a36Sopenharmony_ci	up_write(&page_offline_rwsem);
113462306a36Sopenharmony_ci}
113562306a36Sopenharmony_ciEXPORT_SYMBOL(page_offline_end);
113662306a36Sopenharmony_ci
113762306a36Sopenharmony_ci#ifndef flush_dcache_folio
113862306a36Sopenharmony_civoid flush_dcache_folio(struct folio *folio)
113962306a36Sopenharmony_ci{
114062306a36Sopenharmony_ci	long i, nr = folio_nr_pages(folio);
114162306a36Sopenharmony_ci
114262306a36Sopenharmony_ci	for (i = 0; i < nr; i++)
114362306a36Sopenharmony_ci		flush_dcache_page(folio_page(folio, i));
114462306a36Sopenharmony_ci}
114562306a36Sopenharmony_ciEXPORT_SYMBOL(flush_dcache_folio);
114662306a36Sopenharmony_ci#endif
1147