Received: by 10.192.165.148 with SMTP id m20csp1782078imm; Thu, 3 May 2018 05:26:55 -0700 (PDT) X-Google-Smtp-Source: AB8JxZpJkF3ImCRaKJ7+f5InlE66216oDV4xP9mCXlhh/CWqNA/ZqiHbL8WEkg+F12FSsX56Uw+z X-Received: by 10.98.166.92 with SMTP id t89mr22973660pfe.27.1525350415083; Thu, 03 May 2018 05:26:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525350415; cv=none; d=google.com; s=arc-20160816; b=hVdO3p9qjoHLYRQNgv9wCqQ/QESQUJygHfSh7+5Pyj7L8JsGHQ43ofAdBP3jFKE8ob U3+sv8HECCnQK0j0iL9isW+QHYsFTF3YtkJX0/Pc7moVtxmVzITHCfZwxz8x7RtL5Bx8 JErLhD7d/BWJRFrAK8UW5walo7J6HnC9btpg6O1eesUlOCUg9R/CCM/u0wiL8gG37NKZ ImdoutRR4ryA/lw5fRLEh7WvbpYk70swwjsP8Yb3iHb87yLaF/lg/c/0nYUp0oXz8Fzl TBXFINDX29Vf6l3KPYij476OZcI7BV64rk5On6ah/Pipbbw9PuL3UfY06dIgNvS6WLAS nWtw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:arc-authentication-results; bh=5io+1xI3/QKaLfE1yTYx7ckHTgCg1tInZp2WdStprwY=; b=D1QdqnbezZKRcSDwWj4ciBrgdFBmyHPz1F3sZi6Qhqid4e4L5XW2OvsVaGJBd+z9fC IuJse3eOBcA8MAU+XbupnrjHJtApl+p3/wvLRyNiV2GWQLKbE7h4zyarV39Ys1gsCvAL tHkYP+UkBowiL4C9x1PVkBClBU6ohbj3g3MNzVuPgfwJC15BB6056awpJp0N9qLZWceh TJ8tas/nZTBAc8QwcHM4DLzpwSQnWJhwgrmtK4FNNOpnDL1LcIdvIOcX4V1kJDIRY1Au jtuks1tMbRTvkWkaa0QStT4sGU3SD43a2O8teGvttnfMRjaLL5A8e7ACmAl5rLXvxdeW Qq3Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j28si14098797pfe.337.2018.05.03.05.26.41; Thu, 03 May 2018 05:26:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752282AbeECMZf (ORCPT + 99 others); Thu, 3 May 2018 08:25:35 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:44666 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751612AbeECMZc (ORCPT ); Thu, 3 May 2018 08:25:32 -0400 Received: from pps.filterd (m0098404.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w43COUko108935 for ; Thu, 3 May 2018 08:25:32 -0400 Received: from e06smtp15.uk.ibm.com (e06smtp15.uk.ibm.com [195.75.94.111]) by mx0a-001b2d01.pphosted.com with ESMTP id 2hr1w71gum-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 03 May 2018 08:25:32 -0400 Received: from localhost by e06smtp15.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 3 May 2018 13:25:28 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp15.uk.ibm.com (192.168.101.145) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Thu, 3 May 2018 13:25:20 +0100 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w43CPKtj60686590; Thu, 3 May 2018 12:25:20 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D7BEBA4053; Thu, 3 May 2018 13:17:07 +0100 (BST) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 9D9F3A4051; Thu, 3 May 2018 13:17:06 +0100 (BST) Received: from [9.101.4.33] (unknown [9.101.4.33]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 3 May 2018 13:17:06 +0100 (BST) Subject: Re: [PATCH v10 12/25] mm: cache some VMA fields in the vm_fault structure To: Minchan Kim Cc: akpm@linux-foundation.org, mhocko@kernel.org, peterz@infradead.org, kirill@shutemov.name, ak@linux.intel.com, dave@stgolabs.net, jack@suse.cz, Matthew Wilcox , benh@kernel.crashing.org, mpe@ellerman.id.au, paulus@samba.org, Thomas Gleixner , Ingo Molnar , hpa@zytor.com, Will Deacon , Sergey Senozhatsky , Andrea Arcangeli , Alexei Starovoitov , kemi.wang@intel.com, sergey.senozhatsky.work@gmail.com, Daniel Jordan , David Rientjes , Jerome Glisse , Ganesh Mahendran , linux-kernel@vger.kernel.org, linux-mm@kvack.org, haren@linux.vnet.ibm.com, khandual@linux.vnet.ibm.com, npiggin@gmail.com, bsingharora@gmail.com, paulmck@linux.vnet.ibm.com, Tim Chen , linuxppc-dev@lists.ozlabs.org, x86@kernel.org References: <1523975611-15978-1-git-send-email-ldufour@linux.vnet.ibm.com> <1523975611-15978-13-git-send-email-ldufour@linux.vnet.ibm.com> <20180423074221.GE114098@rodete-desktop-imager.corp.google.com> From: Laurent Dufour Date: Thu, 3 May 2018 14:25:18 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.7.0 MIME-Version: 1.0 In-Reply-To: <20180423074221.GE114098@rodete-desktop-imager.corp.google.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18050312-0020-0000-0000-000004188BA5 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18050312-0021-0000-0000-000042ADAD5E Message-Id: X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-05-03_06:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=2 phishscore=0 bulkscore=0 spamscore=0 clxscore=1011 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1805030113 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 23/04/2018 09:42, Minchan Kim wrote: > On Tue, Apr 17, 2018 at 04:33:18PM +0200, Laurent Dufour wrote: >> When handling speculative page fault, the vma->vm_flags and >> vma->vm_page_prot fields are read once the page table lock is released. So >> there is no more guarantee that these fields would not change in our back. >> They will be saved in the vm_fault structure before the VMA is checked for >> changes. > > Sorry. I cannot understand. > If it is changed under us, what happens? If it's critical, why cannot we > check with seqcounter? > Clearly, I'm not understanding the logic here. However, it's a global > change without CONFIG_SPF so I want to be more careful. > It would be better to describe why we need to sanpshot those values > into vm_fault rather than preventing the race. The idea is to go forward processing the page fault using the VMA's fields values saved in the vm_fault structure. Then once the pte are locked, the vma->sequence_counter is checked again and if something has changed in our back the speculative page fault processing is aborted. Thanks, Laurent. > > Thanks. > >> >> This patch also set the fields in hugetlb_no_page() and >> __collapse_huge_page_swapin even if it is not need for the callee. >> >> Signed-off-by: Laurent Dufour >> --- >> include/linux/mm.h | 10 ++++++++-- >> mm/huge_memory.c | 6 +++--- >> mm/hugetlb.c | 2 ++ >> mm/khugepaged.c | 2 ++ >> mm/memory.c | 50 ++++++++++++++++++++++++++------------------------ >> mm/migrate.c | 2 +- >> 6 files changed, 42 insertions(+), 30 deletions(-) >> >> diff --git a/include/linux/mm.h b/include/linux/mm.h >> index f6edd15563bc..c65205c8c558 100644 >> --- a/include/linux/mm.h >> +++ b/include/linux/mm.h >> @@ -367,6 +367,12 @@ struct vm_fault { >> * page table to avoid allocation from >> * atomic context. >> */ >> + /* >> + * These entries are required when handling speculative page fault. >> + * This way the page handling is done using consistent field values. >> + */ >> + unsigned long vma_flags; >> + pgprot_t vma_page_prot; >> }; >> >> /* page entry size for vm->huge_fault() */ >> @@ -687,9 +693,9 @@ void free_compound_page(struct page *page); >> * pte_mkwrite. But get_user_pages can cause write faults for mappings >> * that do not have writing enabled, when used by access_process_vm. >> */ >> -static inline pte_t maybe_mkwrite(pte_t pte, struct vm_area_struct *vma) >> +static inline pte_t maybe_mkwrite(pte_t pte, unsigned long vma_flags) >> { >> - if (likely(vma->vm_flags & VM_WRITE)) >> + if (likely(vma_flags & VM_WRITE)) >> pte = pte_mkwrite(pte); >> return pte; >> } >> diff --git a/mm/huge_memory.c b/mm/huge_memory.c >> index a3a1815f8e11..da2afda67e68 100644 >> --- a/mm/huge_memory.c >> +++ b/mm/huge_memory.c >> @@ -1194,8 +1194,8 @@ static int do_huge_pmd_wp_page_fallback(struct vm_fault *vmf, pmd_t orig_pmd, >> >> for (i = 0; i < HPAGE_PMD_NR; i++, haddr += PAGE_SIZE) { >> pte_t entry; >> - entry = mk_pte(pages[i], vma->vm_page_prot); >> - entry = maybe_mkwrite(pte_mkdirty(entry), vma); >> + entry = mk_pte(pages[i], vmf->vma_page_prot); >> + entry = maybe_mkwrite(pte_mkdirty(entry), vmf->vma_flags); >> memcg = (void *)page_private(pages[i]); >> set_page_private(pages[i], 0); >> page_add_new_anon_rmap(pages[i], vmf->vma, haddr, false); >> @@ -2168,7 +2168,7 @@ static void __split_huge_pmd_locked(struct vm_area_struct *vma, pmd_t *pmd, >> entry = pte_swp_mksoft_dirty(entry); >> } else { >> entry = mk_pte(page + i, READ_ONCE(vma->vm_page_prot)); >> - entry = maybe_mkwrite(entry, vma); >> + entry = maybe_mkwrite(entry, vma->vm_flags); >> if (!write) >> entry = pte_wrprotect(entry); >> if (!young) >> diff --git a/mm/hugetlb.c b/mm/hugetlb.c >> index 218679138255..774864153407 100644 >> --- a/mm/hugetlb.c >> +++ b/mm/hugetlb.c >> @@ -3718,6 +3718,8 @@ static int hugetlb_no_page(struct mm_struct *mm, struct vm_area_struct *vma, >> .vma = vma, >> .address = address, >> .flags = flags, >> + .vma_flags = vma->vm_flags, >> + .vma_page_prot = vma->vm_page_prot, >> /* >> * Hard to debug if it ends up being >> * used by a callee that assumes >> diff --git a/mm/khugepaged.c b/mm/khugepaged.c >> index 0b28af4b950d..2b02a9f9589e 100644 >> --- a/mm/khugepaged.c >> +++ b/mm/khugepaged.c >> @@ -887,6 +887,8 @@ static bool __collapse_huge_page_swapin(struct mm_struct *mm, >> .flags = FAULT_FLAG_ALLOW_RETRY, >> .pmd = pmd, >> .pgoff = linear_page_index(vma, address), >> + .vma_flags = vma->vm_flags, >> + .vma_page_prot = vma->vm_page_prot, >> }; >> >> /* we only decide to swapin, if there is enough young ptes */ >> diff --git a/mm/memory.c b/mm/memory.c >> index f76f5027d251..2fb9920e06a5 100644 >> --- a/mm/memory.c >> +++ b/mm/memory.c >> @@ -1826,7 +1826,7 @@ static int insert_pfn(struct vm_area_struct *vma, unsigned long addr, >> out_mkwrite: >> if (mkwrite) { >> entry = pte_mkyoung(entry); >> - entry = maybe_mkwrite(pte_mkdirty(entry), vma); >> + entry = maybe_mkwrite(pte_mkdirty(entry), vma->vm_flags); >> } >> >> set_pte_at(mm, addr, pte, entry); >> @@ -2472,7 +2472,7 @@ static inline void wp_page_reuse(struct vm_fault *vmf) >> >> flush_cache_page(vma, vmf->address, pte_pfn(vmf->orig_pte)); >> entry = pte_mkyoung(vmf->orig_pte); >> - entry = maybe_mkwrite(pte_mkdirty(entry), vma); >> + entry = maybe_mkwrite(pte_mkdirty(entry), vmf->vma_flags); >> if (ptep_set_access_flags(vma, vmf->address, vmf->pte, entry, 1)) >> update_mmu_cache(vma, vmf->address, vmf->pte); >> pte_unmap_unlock(vmf->pte, vmf->ptl); >> @@ -2548,8 +2548,8 @@ static int wp_page_copy(struct vm_fault *vmf) >> inc_mm_counter_fast(mm, MM_ANONPAGES); >> } >> flush_cache_page(vma, vmf->address, pte_pfn(vmf->orig_pte)); >> - entry = mk_pte(new_page, vma->vm_page_prot); >> - entry = maybe_mkwrite(pte_mkdirty(entry), vma); >> + entry = mk_pte(new_page, vmf->vma_page_prot); >> + entry = maybe_mkwrite(pte_mkdirty(entry), vmf->vma_flags); >> /* >> * Clear the pte entry and flush it first, before updating the >> * pte with the new entry. This will avoid a race condition >> @@ -2614,7 +2614,7 @@ static int wp_page_copy(struct vm_fault *vmf) >> * Don't let another task, with possibly unlocked vma, >> * keep the mlocked page. >> */ >> - if (page_copied && (vma->vm_flags & VM_LOCKED)) { >> + if (page_copied && (vmf->vma_flags & VM_LOCKED)) { >> lock_page(old_page); /* LRU manipulation */ >> if (PageMlocked(old_page)) >> munlock_vma_page(old_page); >> @@ -2650,7 +2650,7 @@ static int wp_page_copy(struct vm_fault *vmf) >> */ >> int finish_mkwrite_fault(struct vm_fault *vmf) >> { >> - WARN_ON_ONCE(!(vmf->vma->vm_flags & VM_SHARED)); >> + WARN_ON_ONCE(!(vmf->vma_flags & VM_SHARED)); >> if (!pte_map_lock(vmf)) >> return VM_FAULT_RETRY; >> /* >> @@ -2752,7 +2752,7 @@ static int do_wp_page(struct vm_fault *vmf) >> * We should not cow pages in a shared writeable mapping. >> * Just mark the pages writable and/or call ops->pfn_mkwrite. >> */ >> - if ((vma->vm_flags & (VM_WRITE|VM_SHARED)) == >> + if ((vmf->vma_flags & (VM_WRITE|VM_SHARED)) == >> (VM_WRITE|VM_SHARED)) >> return wp_pfn_shared(vmf); >> >> @@ -2799,7 +2799,7 @@ static int do_wp_page(struct vm_fault *vmf) >> return VM_FAULT_WRITE; >> } >> unlock_page(vmf->page); >> - } else if (unlikely((vma->vm_flags & (VM_WRITE|VM_SHARED)) == >> + } else if (unlikely((vmf->vma_flags & (VM_WRITE|VM_SHARED)) == >> (VM_WRITE|VM_SHARED))) { >> return wp_page_shared(vmf); >> } >> @@ -3078,9 +3078,9 @@ int do_swap_page(struct vm_fault *vmf) >> >> inc_mm_counter_fast(vma->vm_mm, MM_ANONPAGES); >> dec_mm_counter_fast(vma->vm_mm, MM_SWAPENTS); >> - pte = mk_pte(page, vma->vm_page_prot); >> + pte = mk_pte(page, vmf->vma_page_prot); >> if ((vmf->flags & FAULT_FLAG_WRITE) && reuse_swap_page(page, NULL)) { >> - pte = maybe_mkwrite(pte_mkdirty(pte), vma); >> + pte = maybe_mkwrite(pte_mkdirty(pte), vmf->vma_flags); >> vmf->flags &= ~FAULT_FLAG_WRITE; >> ret |= VM_FAULT_WRITE; >> exclusive = RMAP_EXCLUSIVE; >> @@ -3105,7 +3105,7 @@ int do_swap_page(struct vm_fault *vmf) >> >> swap_free(entry); >> if (mem_cgroup_swap_full(page) || >> - (vma->vm_flags & VM_LOCKED) || PageMlocked(page)) >> + (vmf->vma_flags & VM_LOCKED) || PageMlocked(page)) >> try_to_free_swap(page); >> unlock_page(page); >> if (page != swapcache && swapcache) { >> @@ -3163,7 +3163,7 @@ static int do_anonymous_page(struct vm_fault *vmf) >> pte_t entry; >> >> /* File mapping without ->vm_ops ? */ >> - if (vma->vm_flags & VM_SHARED) >> + if (vmf->vma_flags & VM_SHARED) >> return VM_FAULT_SIGBUS; >> >> /* >> @@ -3187,7 +3187,7 @@ static int do_anonymous_page(struct vm_fault *vmf) >> if (!(vmf->flags & FAULT_FLAG_WRITE) && >> !mm_forbids_zeropage(vma->vm_mm)) { >> entry = pte_mkspecial(pfn_pte(my_zero_pfn(vmf->address), >> - vma->vm_page_prot)); >> + vmf->vma_page_prot)); >> if (!pte_map_lock(vmf)) >> return VM_FAULT_RETRY; >> if (!pte_none(*vmf->pte)) >> @@ -3220,8 +3220,8 @@ static int do_anonymous_page(struct vm_fault *vmf) >> */ >> __SetPageUptodate(page); >> >> - entry = mk_pte(page, vma->vm_page_prot); >> - if (vma->vm_flags & VM_WRITE) >> + entry = mk_pte(page, vmf->vma_page_prot); >> + if (vmf->vma_flags & VM_WRITE) >> entry = pte_mkwrite(pte_mkdirty(entry)); >> >> if (!pte_map_lock(vmf)) { >> @@ -3418,7 +3418,7 @@ static int do_set_pmd(struct vm_fault *vmf, struct page *page) >> for (i = 0; i < HPAGE_PMD_NR; i++) >> flush_icache_page(vma, page + i); >> >> - entry = mk_huge_pmd(page, vma->vm_page_prot); >> + entry = mk_huge_pmd(page, vmf->vma_page_prot); >> if (write) >> entry = maybe_pmd_mkwrite(pmd_mkdirty(entry), vma); >> >> @@ -3492,11 +3492,11 @@ int alloc_set_pte(struct vm_fault *vmf, struct mem_cgroup *memcg, >> return VM_FAULT_NOPAGE; >> >> flush_icache_page(vma, page); >> - entry = mk_pte(page, vma->vm_page_prot); >> + entry = mk_pte(page, vmf->vma_page_prot); >> if (write) >> - entry = maybe_mkwrite(pte_mkdirty(entry), vma); >> + entry = maybe_mkwrite(pte_mkdirty(entry), vmf->vma_flags); >> /* copy-on-write page */ >> - if (write && !(vma->vm_flags & VM_SHARED)) { >> + if (write && !(vmf->vma_flags & VM_SHARED)) { >> inc_mm_counter_fast(vma->vm_mm, MM_ANONPAGES); >> page_add_new_anon_rmap(page, vma, vmf->address, false); >> mem_cgroup_commit_charge(page, memcg, false, false); >> @@ -3535,7 +3535,7 @@ int finish_fault(struct vm_fault *vmf) >> >> /* Did we COW the page? */ >> if ((vmf->flags & FAULT_FLAG_WRITE) && >> - !(vmf->vma->vm_flags & VM_SHARED)) >> + !(vmf->vma_flags & VM_SHARED)) >> page = vmf->cow_page; >> else >> page = vmf->page; >> @@ -3789,7 +3789,7 @@ static int do_fault(struct vm_fault *vmf) >> ret = VM_FAULT_SIGBUS; >> else if (!(vmf->flags & FAULT_FLAG_WRITE)) >> ret = do_read_fault(vmf); >> - else if (!(vma->vm_flags & VM_SHARED)) >> + else if (!(vmf->vma_flags & VM_SHARED)) >> ret = do_cow_fault(vmf); >> else >> ret = do_shared_fault(vmf); >> @@ -3846,7 +3846,7 @@ static int do_numa_page(struct vm_fault *vmf) >> * accessible ptes, some can allow access by kernel mode. >> */ >> pte = ptep_modify_prot_start(vma->vm_mm, vmf->address, vmf->pte); >> - pte = pte_modify(pte, vma->vm_page_prot); >> + pte = pte_modify(pte, vmf->vma_page_prot); >> pte = pte_mkyoung(pte); >> if (was_writable) >> pte = pte_mkwrite(pte); >> @@ -3880,7 +3880,7 @@ static int do_numa_page(struct vm_fault *vmf) >> * Flag if the page is shared between multiple address spaces. This >> * is later used when determining whether to group tasks together >> */ >> - if (page_mapcount(page) > 1 && (vma->vm_flags & VM_SHARED)) >> + if (page_mapcount(page) > 1 && (vmf->vma_flags & VM_SHARED)) >> flags |= TNF_SHARED; >> >> last_cpupid = page_cpupid_last(page); >> @@ -3925,7 +3925,7 @@ static inline int wp_huge_pmd(struct vm_fault *vmf, pmd_t orig_pmd) >> return vmf->vma->vm_ops->huge_fault(vmf, PE_SIZE_PMD); >> >> /* COW handled on pte level: split pmd */ >> - VM_BUG_ON_VMA(vmf->vma->vm_flags & VM_SHARED, vmf->vma); >> + VM_BUG_ON_VMA(vmf->vma_flags & VM_SHARED, vmf->vma); >> __split_huge_pmd(vmf->vma, vmf->pmd, vmf->address, false, NULL); >> >> return VM_FAULT_FALLBACK; >> @@ -4072,6 +4072,8 @@ static int __handle_mm_fault(struct vm_area_struct *vma, unsigned long address, >> .flags = flags, >> .pgoff = linear_page_index(vma, address), >> .gfp_mask = __get_fault_gfp_mask(vma), >> + .vma_flags = vma->vm_flags, >> + .vma_page_prot = vma->vm_page_prot, >> }; >> unsigned int dirty = flags & FAULT_FLAG_WRITE; >> struct mm_struct *mm = vma->vm_mm; >> diff --git a/mm/migrate.c b/mm/migrate.c >> index bb6367d70a3e..44d7007cfc1c 100644 >> --- a/mm/migrate.c >> +++ b/mm/migrate.c >> @@ -240,7 +240,7 @@ static bool remove_migration_pte(struct page *page, struct vm_area_struct *vma, >> */ >> entry = pte_to_swp_entry(*pvmw.pte); >> if (is_write_migration_entry(entry)) >> - pte = maybe_mkwrite(pte, vma); >> + pte = maybe_mkwrite(pte, vma->vm_flags); >> >> if (unlikely(is_zone_device_page(new))) { >> if (is_device_private_page(new)) { >> -- >> 2.7.4 >> >