From patchwork Fri Mar 27 02:10:54 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Michel Lespinasse X-Patchwork-Id: 11461557 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 845AB15AB for ; Fri, 27 Mar 2020 02:11:22 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 51CCB2074D for ; Fri, 27 Mar 2020 02:11:22 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="vff5HijL" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 51CCB2074D Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 5F0196B0070; Thu, 26 Mar 2020 22:11:18 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id 57C876B0071; Thu, 26 Mar 2020 22:11:18 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 331E06B0072; Thu, 26 Mar 2020 22:11:18 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0018.hostedemail.com [216.40.44.18]) by kanga.kvack.org (Postfix) with ESMTP id 12E016B0070 for ; Thu, 26 Mar 2020 22:11:18 -0400 (EDT) Received: from smtpin22.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id E80E08248068 for ; Fri, 27 Mar 2020 02:11:17 +0000 (UTC) X-FDA: 76639514994.22.tent12_b4c0c4fe9120 X-Spam-Summary: 2,0,0,3f082fa519cbbe65,d41d8cd98f00b204,3xgb9xgykchuptedxgzhhzex.vhfebgnq-ffdotvd.hkz@flex--walken.bounces.google.com,,RULES_HIT:41:152:355:379:541:800:960:973:988:989:1260:1277:1313:1314:1345:1359:1431:1437:1516:1518:1535:1542:1593:1594:1711:1730:1747:1777:1792:1801:2198:2199:2393:2559:2562:3138:3139:3140:3141:3142:3152:3353:3865:3868:3870:3871:3874:4250:4321:4605:5007:6261:6653:6742:7903:8660:9969:10004:10400:11026:11473:11657:11658:11914:12043:12296:12297:12438:12555:12895:12986:13141:13148:13153:13228:13230:14096:14097:14181:14394:14659:14721:21080:21220:21433:21444:21451:21627:21990:30054,0,RBL:209.85.210.202:@flex--walken.bounces.google.com:.lbl8.mailshell.net-62.18.0.100 66.100.201.100,CacheIP:none,Bayesian:0.5,0.5,0.5,Netcheck:none,DomainCache:0,MSF:not bulk,SPF:fp,MSBL:0,DNSBL:neutral,Custom_rules:0:0:0,LFtime:24,LUA_SUMMARY:none X-HE-Tag: tent12_b4c0c4fe9120 X-Filterd-Recvd-Size: 5979 Received: from mail-pf1-f202.google.com (mail-pf1-f202.google.com [209.85.210.202]) by imf04.hostedemail.com (Postfix) with ESMTP for ; Fri, 27 Mar 2020 02:11:17 +0000 (UTC) Received: by mail-pf1-f202.google.com with SMTP id 78so6969107pfy.22 for ; Thu, 26 Mar 2020 19:11:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=oxDWeBm7sOHjpiApO9NbnvZLKdMBOgGtnj1GVCKM9PM=; b=vff5HijLm3rVFWQg1Q6tILibVb0/t3dACKm0UD0fwBJMKC9ohGcRlug/Kuglwu1XyW 7ahlsaaY+O/P+CM86RifHiol654wkqYYPFnbzAP1Epq+gRAvZ8G6houEHhq9Dd4FOGA8 LFas61baJo5B8lNp/Ro7RhBxKogZEauq+zhA+7v9tTtNPw9GWfaO2z2+5nNh1/GYfhgQ JLUzwzAqNmpmCdF5H1M3vldBSYZkhtjyMvWBzestCGLa956M1XKtKaSRByaM5ib8N0Bg kAJlN3LxNobDGIKEQANlS/2PS9VRCrhMzqttI0gyG3zqH5bD2HO1F03dC4GtKGIYb3f4 pfcg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=oxDWeBm7sOHjpiApO9NbnvZLKdMBOgGtnj1GVCKM9PM=; b=IcoexvgEuYz4sPXgn7QIty7Vm2RvMDu4/RM++Du7urwmFfaYC7pA2UMdd/qu/KYUwN 1ES9h/jPyX1RZAn1FIOzUEfj0v3td7Lab0RUiU080b2x0J77hTqAbeMA9G77OM0bBus8 AtvXOCz9rVEY7J/4k/Cuyu6cH2k3p3sEzcxwxTWB/f2ew8R0tZLqagQWAra2sz+4lS8p 4Dsd6gDeiA1u2iW0UqusEHCcSBsIL1G/QXyMyX8Ba64h7kKIbTucmyOEY15lpNxdPC06 rb1Df0l1ZP2bYB043vyeKXz3gv403wRhxtn1fdYwX7bRVU3ZO6n+vuPi28G6SCFsmp/e 6vXA== X-Gm-Message-State: ANhLgQ2a155f+aLis3OAl71AOliXm3dePRK9n0F8GO4rNApWKPduHaUk 5e2VUIswX3tiaZn9xd45KMKRmKXUSHw= X-Google-Smtp-Source: ADFU+vuh3Psmnwb5B2KXKfiPZ7gW9ScpNWqCS0cyKYTi8+z/ypo7VtLCrBAXmFLp6QjG5Evl+DPNu+S2aKw= X-Received: by 2002:a17:90a:d78b:: with SMTP id z11mr2409659pju.34.1585275076325; Thu, 26 Mar 2020 19:11:16 -0700 (PDT) Date: Thu, 26 Mar 2020 19:10:54 -0700 In-Reply-To: <20200327021058.221911-1-walken@google.com> Message-Id: <20200327021058.221911-7-walken@google.com> Mime-Version: 1.0 References: <20200327021058.221911-1-walken@google.com> X-Mailer: git-send-email 2.26.0.rc2.310.g2932bb562d-goog Subject: [PATCH v2 06/10] mmap locking API: convert nested write lock sites From: Michel Lespinasse To: Andrew Morton , linux-mm Cc: LKML , Peter Zijlstra , Laurent Dufour , Vlastimil Babka , Matthew Wilcox , Liam Howlett , Jerome Glisse , Davidlohr Bueso , David Rientjes , Hugh Dickins , Ying Han , Jason Gunthorpe , Markus Elfring , Michel Lespinasse X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Add API for nested write locks and convert the few call sites doing that. Signed-off-by: Michel Lespinasse --- arch/um/include/asm/mmu_context.h | 5 +++-- include/linux/mmap_lock.h | 11 +++++++++++ kernel/fork.c | 4 ++-- 3 files changed, 16 insertions(+), 4 deletions(-) diff --git a/arch/um/include/asm/mmu_context.h b/arch/um/include/asm/mmu_context.h index 62262c5c7785..cc15173f7518 100644 --- a/arch/um/include/asm/mmu_context.h +++ b/arch/um/include/asm/mmu_context.h @@ -8,6 +8,7 @@ #include #include +#include #include @@ -47,9 +48,9 @@ static inline void activate_mm(struct mm_struct *old, struct mm_struct *new) * when the new ->mm is used for the first time. */ __switch_mm(&new->context.id); - down_write_nested(&new->mmap_sem, 1); + mmap_write_lock_nested(new, 1); uml_setup_stubs(new); - mmap_write_unlock(new); + mmap_write_unlock_nested(new); } static inline void switch_mm(struct mm_struct *prev, struct mm_struct *next, diff --git a/include/linux/mmap_lock.h b/include/linux/mmap_lock.h index cffd25afe92b..40a972a26857 100644 --- a/include/linux/mmap_lock.h +++ b/include/linux/mmap_lock.h @@ -11,6 +11,11 @@ static inline void mmap_write_lock(struct mm_struct *mm) down_write(&mm->mmap_sem); } +static inline void mmap_write_lock_nested(struct mm_struct *mm, int subclass) +{ + down_write_nested(&mm->mmap_sem, subclass); +} + static inline int mmap_write_lock_killable(struct mm_struct *mm) { return down_write_killable(&mm->mmap_sem); @@ -26,6 +31,12 @@ static inline void mmap_write_unlock(struct mm_struct *mm) up_write(&mm->mmap_sem); } +/* Pairs with mmap_write_lock_nested() */ +static inline void mmap_write_unlock_nested(struct mm_struct *mm) +{ + up_write(&mm->mmap_sem); +} + static inline void mmap_downgrade_write_lock(struct mm_struct *mm) { downgrade_write(&mm->mmap_sem); diff --git a/kernel/fork.c b/kernel/fork.c index c321910d46e8..3460308b2213 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -497,7 +497,7 @@ static __latent_entropy int dup_mmap(struct mm_struct *mm, /* * Not linked in yet - no deadlock potential: */ - down_write_nested(&mm->mmap_sem, SINGLE_DEPTH_NESTING); + mmap_write_lock_nested(mm, SINGLE_DEPTH_NESTING); /* No ordering required: file already has been exposed. */ RCU_INIT_POINTER(mm->exe_file, get_mm_exe_file(oldmm)); @@ -612,7 +612,7 @@ static __latent_entropy int dup_mmap(struct mm_struct *mm, /* a new mm has just been created */ retval = arch_dup_mmap(oldmm, mm); out: - mmap_write_unlock(mm); + mmap_write_unlock_nested(mm); flush_tlb_mm(oldmm); mmap_write_unlock(oldmm); dup_userfaultfd_complete(&uf);