From patchwork Thu Feb 13 22:46:41 2025 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Suren Baghdasaryan X-Patchwork-Id: 13974132 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 65F0CC021A4 for ; Thu, 13 Feb 2025 22:47:13 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id BA7A5280008; Thu, 13 Feb 2025 17:47:11 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id B37BF280001; Thu, 13 Feb 2025 17:47:11 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9312A280008; Thu, 13 Feb 2025 17:47:11 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 6A774280001 for ; Thu, 13 Feb 2025 17:47:11 -0500 (EST) Received: from smtpin12.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id 197DA16180F for ; Thu, 13 Feb 2025 22:47:11 +0000 (UTC) X-FDA: 83116408662.12.2D64AB3 Received: from mail-pj1-f73.google.com (mail-pj1-f73.google.com [209.85.216.73]) by imf16.hostedemail.com (Postfix) with ESMTP id 439CD18000E for ; Thu, 13 Feb 2025 22:47:09 +0000 (UTC) Authentication-Results: imf16.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=sEKmKHDu; spf=pass (imf16.hostedemail.com: domain of 3bHauZwYKCFcHJG3C05DD5A3.1DBA7CJM-BB9Kz19.DG5@flex--surenb.bounces.google.com designates 209.85.216.73 as permitted sender) smtp.mailfrom=3bHauZwYKCFcHJG3C05DD5A3.1DBA7CJM-BB9Kz19.DG5@flex--surenb.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1739486829; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=jH+IjsWoi1CDqDTbyIn4LxmH0nN4gQ/NWbFp+/jF/ZM=; b=ruTwWdILsn5/vSiOYzqumbj+J2UvlCg12QC6vyV+rgWKozr19aTeSUP2BgmbcIeoJZyV/V UlPzKVuewcydYfFAboxvBgPFzyoCEt2o9GXClKGpM0+BBt7CQnzKVrY6FIo4TKTZJSUZH2 Hc3+7Kx5kTwI1JpFCR4Gasx15pLpoT0= ARC-Authentication-Results: i=1; imf16.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=sEKmKHDu; spf=pass (imf16.hostedemail.com: domain of 3bHauZwYKCFcHJG3C05DD5A3.1DBA7CJM-BB9Kz19.DG5@flex--surenb.bounces.google.com designates 209.85.216.73 as permitted sender) smtp.mailfrom=3bHauZwYKCFcHJG3C05DD5A3.1DBA7CJM-BB9Kz19.DG5@flex--surenb.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1739486829; a=rsa-sha256; cv=none; b=oeXLnRWlsx2kuwrCOlHA2DhrwqQzROyzCXffqVpbNgvt3hQJ+zeUy10f+uLiAIQ80IBU0c Rhq4BmU20eSzErX+hcuW/pyzqD2JSJL1DQ+FdaalX8VvJjgrYX7Rn9vDy6XhawdtbsngIj hYUaeqNpcMm8I+qS4krlFWRXjLypi1A= Received: by mail-pj1-f73.google.com with SMTP id 98e67ed59e1d1-2f81a0d0a18so2884224a91.3 for ; Thu, 13 Feb 2025 14:47:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1739486828; x=1740091628; darn=kvack.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=jH+IjsWoi1CDqDTbyIn4LxmH0nN4gQ/NWbFp+/jF/ZM=; b=sEKmKHDumm2B8zd4nfibDfGGH2xnajyiyLPAfz4S5jUAU/TTleADcdzU/nf7FNW3Vp DfzwEoUQOcVdst2Ca/Ej2dx5wBy4ehU9/x6zNJ6RiKR8Vby0sD4kj+pLihuO/JdKXjjY h+8k4ia+9cKfyQWOR12+d0pLyswj0iLwnSYZaUrkx56+bizFfS8PdhzRfgRzANj8dFuR YO2dJePs8OAMgja0PNy3WWF2GwS/+2v9Ycwg2VAZhn96exhW7e9pmSAWT5TCYdnFO3L6 kXGf/xI6HXSUEoAe1++wmhqV9veL9HZ8LnPKEQNl0cfjr10N6YXtCwr1fygodWFmy3pw eTWQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1739486828; x=1740091628; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=jH+IjsWoi1CDqDTbyIn4LxmH0nN4gQ/NWbFp+/jF/ZM=; b=fNEAetmzQUYha2PEuMWzDISqftdld9j0bpoqhHEOaTYL+JRbDy555l0h5wQBLdQLtI GdmIVxEn25sejI/w7eyXWWjb/DqCvJUfbLyzOQmL/oWEqO81LMezLvYVIK4BeUssdWey kRUgdvcGTB4ctMN23T6sVTwlIKX703bQtmBK73uD/PNJ3OJDfU6BdIyd+SZTfu3waPeS hCismtS2Az5GMFs7aU8rmWWej7BidDc8OMkEzV+f9BZLFySjky1IfCCvBJZcztCMX6T/ 1VforBZGIrZ5bdJBIPQayeibkhDcB4GlhLzR8umTpTAtKtXCmY/0vFP4ETyU404nYJc3 3Z7w== X-Forwarded-Encrypted: i=1; AJvYcCUBSUaWAbOkQGghzUfl3mcAN9PSZfT5Aj6dBKWsCnEEIOpQh44FmZQOA2IMtIfkWcCK5HIXeZ82WA==@kvack.org X-Gm-Message-State: AOJu0Yyi6tk1dZui3FR+iCySyFtdnLHF5Fr0jylrMDslvqs1ttR3W6/3 EqPnoh8B319anO4aLky9NfryC+yW8QwSATl8lg0gpNvvo0T0lFNOJkFDMBmGPH3gGuc3q0O5Jen xyA== X-Google-Smtp-Source: AGHT+IFAejlKUMRiGK6lse6cj9gDccmhauhvLNb8QCnLKB76TP7y/Vj9rouXSbsWYDlN1QYS+niVoTXiz0o= X-Received: from pjk14.prod.google.com ([2002:a17:90b:558e:b0:2ef:7352:9e97]) (user=surenb job=prod-delivery.src-stubby-dispatcher) by 2002:a17:90a:e7d0:b0:2ef:e0bb:1ef2 with SMTP id 98e67ed59e1d1-2fc0e98dc7dmr6643326a91.19.1739486828102; Thu, 13 Feb 2025 14:47:08 -0800 (PST) Date: Thu, 13 Feb 2025 14:46:41 -0800 In-Reply-To: <20250213224655.1680278-1-surenb@google.com> Mime-Version: 1.0 References: <20250213224655.1680278-1-surenb@google.com> X-Mailer: git-send-email 2.48.1.601.g30ceb7b040-goog Message-ID: <20250213224655.1680278-5-surenb@google.com> Subject: [PATCH v10 04/18] mm: introduce vma_iter_store_attached() to use with attached vmas From: Suren Baghdasaryan To: akpm@linux-foundation.org Cc: peterz@infradead.org, willy@infradead.org, liam.howlett@oracle.com, lorenzo.stoakes@oracle.com, david.laight.linux@gmail.com, mhocko@suse.com, vbabka@suse.cz, hannes@cmpxchg.org, mjguzik@gmail.com, oliver.sang@intel.com, mgorman@techsingularity.net, david@redhat.com, peterx@redhat.com, oleg@redhat.com, dave@stgolabs.net, paulmck@kernel.org, brauner@kernel.org, dhowells@redhat.com, hdanton@sina.com, hughd@google.com, lokeshgidra@google.com, minchan@google.com, jannh@google.com, shakeel.butt@linux.dev, souravpanda@google.com, pasha.tatashin@soleen.com, klarasmodin@gmail.com, richard.weiyang@gmail.com, corbet@lwn.net, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-team@android.com, surenb@google.com X-Rspam-User: X-Rspamd-Server: rspam09 X-Rspamd-Queue-Id: 439CD18000E X-Stat-Signature: 74wihc68tcycw5mq9btuc9bmuzcag9mr X-HE-Tag: 1739486829-617264 X-HE-Meta: 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 kRTPF+Qa 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: vma_iter_store() functions can be used both when adding a new vma and when updating an existing one. However for existing ones we do not need to mark them attached as they are already marked that way. With vma->detached being a separate flag, double-marking a vmas as attached or detached is not an issue because the flag will simply be overwritten with the same value. However once we fold this flag into the refcount later in this series, re-attaching or re-detaching a vma becomes an issue since these operations will be incrementing/decrementing a refcount. Introduce vma_iter_store_new() and vma_iter_store_overwrite() to replace vma_iter_store() and avoid re-attaching a vma during vma update. Add assertions in vma_mark_attached()/vma_mark_detached() to catch invalid usage. Update vma tests to check for vma detached state correctness. Signed-off-by: Suren Baghdasaryan --- Changes since v9 [1]: - Change VM_BUG_ON_VMA() to WARN_ON_ONCE() in vma_assert_{attached|detached}, per Lorenzo Stoakes - Rename vma_iter_store() into vma_iter_store_new(), per Lorenzo Stoakes - Expand changelog, per Lorenzo Stoakes - Update vma tests to check for vma detached state correctness, per Lorenzo Stoakes [1] https://lore.kernel.org/all/20250111042604.3230628-5-surenb@google.com/ include/linux/mm.h | 14 +++++++++++ mm/nommu.c | 4 +-- mm/vma.c | 12 ++++----- mm/vma.h | 11 +++++++-- tools/testing/vma/vma.c | 42 +++++++++++++++++++++++++------- tools/testing/vma/vma_internal.h | 10 ++++++++ 6 files changed, 74 insertions(+), 19 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index cd5ee61e98f2..1b8e72888124 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -821,8 +821,19 @@ static inline void vma_assert_locked(struct vm_area_struct *vma) vma_assert_write_locked(vma); } +static inline void vma_assert_attached(struct vm_area_struct *vma) +{ + WARN_ON_ONCE(vma->detached); +} + +static inline void vma_assert_detached(struct vm_area_struct *vma) +{ + WARN_ON_ONCE(!vma->detached); +} + static inline void vma_mark_attached(struct vm_area_struct *vma) { + vma_assert_detached(vma); vma->detached = false; } @@ -830,6 +841,7 @@ static inline void vma_mark_detached(struct vm_area_struct *vma) { /* When detaching vma should be write-locked */ vma_assert_write_locked(vma); + vma_assert_attached(vma); vma->detached = true; } @@ -866,6 +878,8 @@ static inline void vma_end_read(struct vm_area_struct *vma) {} static inline void vma_start_write(struct vm_area_struct *vma) {} static inline void vma_assert_write_locked(struct vm_area_struct *vma) { mmap_assert_write_locked(vma->vm_mm); } +static inline void vma_assert_attached(struct vm_area_struct *vma) {} +static inline void vma_assert_detached(struct vm_area_struct *vma) {} static inline void vma_mark_attached(struct vm_area_struct *vma) {} static inline void vma_mark_detached(struct vm_area_struct *vma) {} diff --git a/mm/nommu.c b/mm/nommu.c index baa79abdaf03..8b31d8396297 100644 --- a/mm/nommu.c +++ b/mm/nommu.c @@ -1191,7 +1191,7 @@ unsigned long do_mmap(struct file *file, setup_vma_to_mm(vma, current->mm); current->mm->map_count++; /* add the VMA to the tree */ - vma_iter_store(&vmi, vma); + vma_iter_store_new(&vmi, vma); /* we flush the region from the icache only when the first executable * mapping of it is made */ @@ -1356,7 +1356,7 @@ static int split_vma(struct vma_iterator *vmi, struct vm_area_struct *vma, setup_vma_to_mm(vma, mm); setup_vma_to_mm(new, mm); - vma_iter_store(vmi, new); + vma_iter_store_new(vmi, new); mm->map_count++; return 0; diff --git a/mm/vma.c b/mm/vma.c index 498507d8a262..f72b73f57451 100644 --- a/mm/vma.c +++ b/mm/vma.c @@ -320,7 +320,7 @@ static void vma_complete(struct vma_prepare *vp, struct vma_iterator *vmi, * us to insert it before dropping the locks * (it may either follow vma or precede it). */ - vma_iter_store(vmi, vp->insert); + vma_iter_store_new(vmi, vp->insert); mm->map_count++; } @@ -700,7 +700,7 @@ static int commit_merge(struct vma_merge_struct *vmg) vmg->__adjust_middle_start ? vmg->middle : NULL); vma_set_range(vma, vmg->start, vmg->end, vmg->pgoff); vmg_adjust_set_range(vmg); - vma_iter_store(vmg->vmi, vmg->target); + vma_iter_store_overwrite(vmg->vmi, vmg->target); vma_complete(&vp, vmg->vmi, vma->vm_mm); @@ -1707,7 +1707,7 @@ int vma_link(struct mm_struct *mm, struct vm_area_struct *vma) return -ENOMEM; vma_start_write(vma); - vma_iter_store(&vmi, vma); + vma_iter_store_new(&vmi, vma); vma_link_file(vma); mm->map_count++; validate_mm(mm); @@ -2386,7 +2386,7 @@ static int __mmap_new_vma(struct mmap_state *map, struct vm_area_struct **vmap) /* Lock the VMA since it is modified after insertion into VMA tree */ vma_start_write(vma); - vma_iter_store(vmi, vma); + vma_iter_store_new(vmi, vma); map->mm->map_count++; vma_link_file(vma); @@ -2862,7 +2862,7 @@ int expand_upwards(struct vm_area_struct *vma, unsigned long address) anon_vma_interval_tree_pre_update_vma(vma); vma->vm_end = address; /* Overwrite old entry in mtree. */ - vma_iter_store(&vmi, vma); + vma_iter_store_overwrite(&vmi, vma); anon_vma_interval_tree_post_update_vma(vma); perf_event_mmap(vma); @@ -2942,7 +2942,7 @@ int expand_downwards(struct vm_area_struct *vma, unsigned long address) vma->vm_start = address; vma->vm_pgoff -= grow; /* Overwrite old entry in mtree. */ - vma_iter_store(&vmi, vma); + vma_iter_store_overwrite(&vmi, vma); anon_vma_interval_tree_post_update_vma(vma); perf_event_mmap(vma); diff --git a/mm/vma.h b/mm/vma.h index bffb56afce5f..55be77ff042f 100644 --- a/mm/vma.h +++ b/mm/vma.h @@ -413,9 +413,10 @@ static inline struct vm_area_struct *vma_iter_load(struct vma_iterator *vmi) } /* Store a VMA with preallocated memory */ -static inline void vma_iter_store(struct vma_iterator *vmi, - struct vm_area_struct *vma) +static inline void vma_iter_store_overwrite(struct vma_iterator *vmi, + struct vm_area_struct *vma) { + vma_assert_attached(vma); #if defined(CONFIG_DEBUG_VM_MAPLE_TREE) if (MAS_WARN_ON(&vmi->mas, vmi->mas.status != ma_start && @@ -438,7 +439,13 @@ static inline void vma_iter_store(struct vma_iterator *vmi, __mas_set_range(&vmi->mas, vma->vm_start, vma->vm_end - 1); mas_store_prealloc(&vmi->mas, vma); +} + +static inline void vma_iter_store_new(struct vma_iterator *vmi, + struct vm_area_struct *vma) +{ vma_mark_attached(vma); + vma_iter_store_overwrite(vmi, vma); } static inline unsigned long vma_iter_addr(struct vma_iterator *vmi) diff --git a/tools/testing/vma/vma.c b/tools/testing/vma/vma.c index c7ffa71841ca..11f761769b5b 100644 --- a/tools/testing/vma/vma.c +++ b/tools/testing/vma/vma.c @@ -74,10 +74,22 @@ static struct vm_area_struct *alloc_vma(struct mm_struct *mm, ret->vm_end = end; ret->vm_pgoff = pgoff; ret->__vm_flags = flags; + vma_assert_detached(ret); return ret; } +/* Helper function to allocate a VMA and link it to the tree. */ +static int attach_vma(struct mm_struct *mm, struct vm_area_struct *vma) +{ + int res; + + res = vma_link(mm, vma); + if (!res) + vma_assert_attached(vma); + return res; +} + /* Helper function to allocate a VMA and link it to the tree. */ static struct vm_area_struct *alloc_and_link_vma(struct mm_struct *mm, unsigned long start, @@ -90,7 +102,7 @@ static struct vm_area_struct *alloc_and_link_vma(struct mm_struct *mm, if (vma == NULL) return NULL; - if (vma_link(mm, vma)) { + if (attach_vma(mm, vma)) { vm_area_free(vma); return NULL; } @@ -108,6 +120,7 @@ static struct vm_area_struct *alloc_and_link_vma(struct mm_struct *mm, /* Helper function which provides a wrapper around a merge new VMA operation. */ static struct vm_area_struct *merge_new(struct vma_merge_struct *vmg) { + struct vm_area_struct *vma; /* * For convenience, get prev and next VMAs. Which the new VMA operation * requires. @@ -116,7 +129,11 @@ static struct vm_area_struct *merge_new(struct vma_merge_struct *vmg) vmg->prev = vma_prev(vmg->vmi); vma_iter_next_range(vmg->vmi); - return vma_merge_new_range(vmg); + vma = vma_merge_new_range(vmg); + if (vma) + vma_assert_attached(vma); + + return vma; } /* @@ -125,7 +142,12 @@ static struct vm_area_struct *merge_new(struct vma_merge_struct *vmg) */ static struct vm_area_struct *merge_existing(struct vma_merge_struct *vmg) { - return vma_merge_existing_range(vmg); + struct vm_area_struct *vma; + + vma = vma_merge_existing_range(vmg); + if (vma) + vma_assert_attached(vma); + return vma; } /* @@ -260,8 +282,8 @@ static bool test_simple_merge(void) .pgoff = 1, }; - ASSERT_FALSE(vma_link(&mm, vma_left)); - ASSERT_FALSE(vma_link(&mm, vma_right)); + ASSERT_FALSE(attach_vma(&mm, vma_left)); + ASSERT_FALSE(attach_vma(&mm, vma_right)); vma = merge_new(&vmg); ASSERT_NE(vma, NULL); @@ -285,7 +307,7 @@ static bool test_simple_modify(void) struct vm_area_struct *init_vma = alloc_vma(&mm, 0, 0x3000, 0, flags); VMA_ITERATOR(vmi, &mm, 0x1000); - ASSERT_FALSE(vma_link(&mm, init_vma)); + ASSERT_FALSE(attach_vma(&mm, init_vma)); /* * The flags will not be changed, the vma_modify_flags() function @@ -351,7 +373,7 @@ static bool test_simple_expand(void) .pgoff = 0, }; - ASSERT_FALSE(vma_link(&mm, vma)); + ASSERT_FALSE(attach_vma(&mm, vma)); ASSERT_FALSE(expand_existing(&vmg)); @@ -372,7 +394,7 @@ static bool test_simple_shrink(void) struct vm_area_struct *vma = alloc_vma(&mm, 0, 0x3000, 0, flags); VMA_ITERATOR(vmi, &mm, 0); - ASSERT_FALSE(vma_link(&mm, vma)); + ASSERT_FALSE(attach_vma(&mm, vma)); ASSERT_FALSE(vma_shrink(&vmi, vma, 0, 0x1000, 0)); @@ -1522,11 +1544,11 @@ static bool test_copy_vma(void) vma = alloc_and_link_vma(&mm, 0x3000, 0x5000, 3, flags); vma_new = copy_vma(&vma, 0, 0x2000, 0, &need_locks); - ASSERT_NE(vma_new, vma); ASSERT_EQ(vma_new->vm_start, 0); ASSERT_EQ(vma_new->vm_end, 0x2000); ASSERT_EQ(vma_new->vm_pgoff, 0); + vma_assert_attached(vma_new); cleanup_mm(&mm, &vmi); @@ -1535,6 +1557,7 @@ static bool test_copy_vma(void) vma = alloc_and_link_vma(&mm, 0, 0x2000, 0, flags); vma_next = alloc_and_link_vma(&mm, 0x6000, 0x8000, 6, flags); vma_new = copy_vma(&vma, 0x4000, 0x2000, 4, &need_locks); + vma_assert_attached(vma_new); ASSERT_EQ(vma_new, vma_next); @@ -1576,6 +1599,7 @@ static bool test_expand_only_mode(void) ASSERT_EQ(vma->vm_pgoff, 3); ASSERT_TRUE(vma_write_started(vma)); ASSERT_EQ(vma_iter_addr(&vmi), 0x3000); + vma_assert_attached(vma); cleanup_mm(&mm, &vmi); return true; diff --git a/tools/testing/vma/vma_internal.h b/tools/testing/vma/vma_internal.h index f93f7f74f97b..34277842156c 100644 --- a/tools/testing/vma/vma_internal.h +++ b/tools/testing/vma/vma_internal.h @@ -470,6 +470,16 @@ static inline void vma_lock_init(struct vm_area_struct *vma) vma->vm_lock_seq = UINT_MAX; } +static inline void vma_assert_attached(struct vm_area_struct *vma) +{ + WARN_ON_ONCE(vma->detached); +} + +static inline void vma_assert_detached(struct vm_area_struct *vma) +{ + WARN_ON_ONCE(!vma->detached); +} + static inline void vma_assert_write_locked(struct vm_area_struct *); static inline void vma_mark_attached(struct vm_area_struct *vma) {