Skip to content

Commit ad465ca

Browse files
aagittorvalds
authored andcommitted
userfaultfd: UFFDIO_COPY and UFFDIO_ZEROPAGE
These two ioctl allows to either atomically copy or to map zeropages into the virtual address space. This is used by the thread that opened the userfaultfd to resolve the userfaults. Signed-off-by: Andrea Arcangeli <aarcange@redhat.com> Acked-by: Pavel Emelyanov <xemul@parallels.com> Cc: Sanidhya Kashyap <sanidhya.gatech@gmail.com> Cc: zhang.zhanghailiang@huawei.com Cc: "Kirill A. Shutemov" <kirill@shutemov.name> Cc: Andres Lagar-Cavilla <andreslc@google.com> Cc: Dave Hansen <dave.hansen@intel.com> Cc: Paolo Bonzini <pbonzini@redhat.com> Cc: Rik van Riel <riel@redhat.com> Cc: Mel Gorman <mgorman@suse.de> Cc: Andy Lutomirski <luto@amacapital.net> Cc: Hugh Dickins <hughd@google.com> Cc: Peter Feiner <pfeiner@google.com> Cc: "Dr. David Alan Gilbert" <dgilbert@redhat.com> Cc: Johannes Weiner <hannes@cmpxchg.org> Cc: "Huangpeng (Peter)" <peter.huangpeng@huawei.com> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
1 parent b6ebaed commit ad465ca

File tree

1 file changed

+96
-0
lines changed

1 file changed

+96
-0
lines changed

fs/userfaultfd.c

Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -983,6 +983,96 @@ static int userfaultfd_wake(struct userfaultfd_ctx *ctx,
983983
return ret;
984984
}
985985

986+
static int userfaultfd_copy(struct userfaultfd_ctx *ctx,
987+
unsigned long arg)
988+
{
989+
__s64 ret;
990+
struct uffdio_copy uffdio_copy;
991+
struct uffdio_copy __user *user_uffdio_copy;
992+
struct userfaultfd_wake_range range;
993+
994+
user_uffdio_copy = (struct uffdio_copy __user *) arg;
995+
996+
ret = -EFAULT;
997+
if (copy_from_user(&uffdio_copy, user_uffdio_copy,
998+
/* don't copy "copy" last field */
999+
sizeof(uffdio_copy)-sizeof(__s64)))
1000+
goto out;
1001+
1002+
ret = validate_range(ctx->mm, uffdio_copy.dst, uffdio_copy.len);
1003+
if (ret)
1004+
goto out;
1005+
/*
1006+
* double check for wraparound just in case. copy_from_user()
1007+
* will later check uffdio_copy.src + uffdio_copy.len to fit
1008+
* in the userland range.
1009+
*/
1010+
ret = -EINVAL;
1011+
if (uffdio_copy.src + uffdio_copy.len <= uffdio_copy.src)
1012+
goto out;
1013+
if (uffdio_copy.mode & ~UFFDIO_COPY_MODE_DONTWAKE)
1014+
goto out;
1015+
1016+
ret = mcopy_atomic(ctx->mm, uffdio_copy.dst, uffdio_copy.src,
1017+
uffdio_copy.len);
1018+
if (unlikely(put_user(ret, &user_uffdio_copy->copy)))
1019+
return -EFAULT;
1020+
if (ret < 0)
1021+
goto out;
1022+
BUG_ON(!ret);
1023+
/* len == 0 would wake all */
1024+
range.len = ret;
1025+
if (!(uffdio_copy.mode & UFFDIO_COPY_MODE_DONTWAKE)) {
1026+
range.start = uffdio_copy.dst;
1027+
wake_userfault(ctx, &range);
1028+
}
1029+
ret = range.len == uffdio_copy.len ? 0 : -EAGAIN;
1030+
out:
1031+
return ret;
1032+
}
1033+
1034+
static int userfaultfd_zeropage(struct userfaultfd_ctx *ctx,
1035+
unsigned long arg)
1036+
{
1037+
__s64 ret;
1038+
struct uffdio_zeropage uffdio_zeropage;
1039+
struct uffdio_zeropage __user *user_uffdio_zeropage;
1040+
struct userfaultfd_wake_range range;
1041+
1042+
user_uffdio_zeropage = (struct uffdio_zeropage __user *) arg;
1043+
1044+
ret = -EFAULT;
1045+
if (copy_from_user(&uffdio_zeropage, user_uffdio_zeropage,
1046+
/* don't copy "zeropage" last field */
1047+
sizeof(uffdio_zeropage)-sizeof(__s64)))
1048+
goto out;
1049+
1050+
ret = validate_range(ctx->mm, uffdio_zeropage.range.start,
1051+
uffdio_zeropage.range.len);
1052+
if (ret)
1053+
goto out;
1054+
ret = -EINVAL;
1055+
if (uffdio_zeropage.mode & ~UFFDIO_ZEROPAGE_MODE_DONTWAKE)
1056+
goto out;
1057+
1058+
ret = mfill_zeropage(ctx->mm, uffdio_zeropage.range.start,
1059+
uffdio_zeropage.range.len);
1060+
if (unlikely(put_user(ret, &user_uffdio_zeropage->zeropage)))
1061+
return -EFAULT;
1062+
if (ret < 0)
1063+
goto out;
1064+
/* len == 0 would wake all */
1065+
BUG_ON(!ret);
1066+
range.len = ret;
1067+
if (!(uffdio_zeropage.mode & UFFDIO_ZEROPAGE_MODE_DONTWAKE)) {
1068+
range.start = uffdio_zeropage.range.start;
1069+
wake_userfault(ctx, &range);
1070+
}
1071+
ret = range.len == uffdio_zeropage.range.len ? 0 : -EAGAIN;
1072+
out:
1073+
return ret;
1074+
}
1075+
9861076
/*
9871077
* userland asks for a certain API version and we return which bits
9881078
* and ioctl commands are implemented in this kernel for such API
@@ -1038,6 +1128,12 @@ static long userfaultfd_ioctl(struct file *file, unsigned cmd,
10381128
case UFFDIO_WAKE:
10391129
ret = userfaultfd_wake(ctx, arg);
10401130
break;
1131+
case UFFDIO_COPY:
1132+
ret = userfaultfd_copy(ctx, arg);
1133+
break;
1134+
case UFFDIO_ZEROPAGE:
1135+
ret = userfaultfd_zeropage(ctx, arg);
1136+
break;
10411137
}
10421138
return ret;
10431139
}

0 commit comments

Comments
 (0)