Received: by 10.223.176.5 with SMTP id f5csp996335wra; Tue, 6 Feb 2018 10:44:44 -0800 (PST) X-Google-Smtp-Source: AH8x227uRXFj/VITERTYkBYgeMHWl5rBMD1i1A71FxJRUoa+OffYgycrHZCWlXp5m+r4c6h9nqrB X-Received: by 10.99.190.76 with SMTP id g12mr2746631pgo.235.1517942684617; Tue, 06 Feb 2018 10:44:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517942684; cv=none; d=google.com; s=arc-20160816; b=Qye6wqCU4Fu3LLB9w3Ht97uTtri0kfGz3/7Ol61AY1IutvmHN849/5bAA9SzVmTRE3 uyE7VeJuIfpVdvcsMa+XDMilSoqj+sMpGNLKPV0ozH0FyN7F1sSVMzeoQXOwPb9vpl3k KgOTcM/hl9cYnZOeZs7l3LhWezjefdeqf2zPuumumvd2AOWqQRim82OtGaxdyutwq3xq XwwHrbIAPfOC236JpzYi5JACzumTdZ/1Yl52laRYnM6WC0C8RAvxfArioS+zVi0Kvubp m4ixV0vY39sOPUF1DzuxtRD/Sd86bO6Xss4j9g1++Pr3+4BinL0BBAT0TJV8I23syqzj kJ7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:arc-authentication-results; bh=O5RzRzSMVB7AEvmupLyqL+FqNwLcGEOL4EmQvtapqLw=; b=bhVshYXUMxIbK2glEGDVCKIUv6zKlMIWXgSYMRZL12xY9EtdIiRIY7EXCsqWzioBzx lu6zEFTLRxdc470kojRI4UEM+c0vGlKYtdbNP6gdTLbO/gSAyy7K3PcQqe2DVOjKe954 NyxnLcAgYKxHwIH8IZD7vbVPfw++FJSLGotBIpbT2VPSrn3qu2nrUEknK0UCKHpOyjun eCQbHmQviPiDjRcCbYZRkq/kHSQpmYig3THFalncdgMrad7L7jx3el+4m1mXT2Nb+f+a OiGI69OQum6FYzi8o6ypQgeEmvpe/xYkPPyFzKltynWFT8jXV7xvgvwtjUWlJicvJVFn mbNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g7si360291pfj.60.2018.02.06.10.44.30; Tue, 06 Feb 2018 10:44:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753125AbeBFSmQ (ORCPT + 99 others); Tue, 6 Feb 2018 13:42:16 -0500 Received: from mx2.suse.de ([195.135.220.15]:48643 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752852AbeBFSmK (ORCPT ); Tue, 6 Feb 2018 13:42:10 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id BFF41AD4B; Tue, 6 Feb 2018 18:42:08 +0000 (UTC) Date: Tue, 6 Feb 2018 10:32:54 -0800 From: Davidlohr Bueso To: Laurent Dufour Cc: Davidlohr Bueso , akpm@linux-foundation.org, mingo@kernel.org, peterz@infradead.org, jack@suse.cz, mhocko@kernel.org, kirill.shutemov@linux.intel.com, mawilcox@microsoft.com, mgorman@techsingularity.net, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 06/64] mm: teach pagefault paths about range locking Message-ID: <20180206183254.zsm276etjarud3lj@linux-n805> Mail-Followup-To: Laurent Dufour , Davidlohr Bueso , akpm@linux-foundation.org, mingo@kernel.org, peterz@infradead.org, jack@suse.cz, mhocko@kernel.org, kirill.shutemov@linux.intel.com, mawilcox@microsoft.com, mgorman@techsingularity.net, linux-mm@kvack.org, linux-kernel@vger.kernel.org References: <20180205012754.23615-1-dbueso@wotan.suse.de> <20180205012754.23615-7-dbueso@wotan.suse.de> <7217f6dc-bce0-e73f-7d63-a328180d6ca7@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <7217f6dc-bce0-e73f-7d63-a328180d6ca7@linux.vnet.ibm.com> User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 05 Feb 2018, Laurent Dufour wrote: >> --- a/drivers/misc/sgi-gru/grufault.c >> +++ b/drivers/misc/sgi-gru/grufault.c >> @@ -189,7 +189,8 @@ static void get_clear_fault_map(struct gru_state *gru, >> */ >> static int non_atomic_pte_lookup(struct vm_area_struct *vma, >> unsigned long vaddr, int write, >> - unsigned long *paddr, int *pageshift) >> + unsigned long *paddr, int *pageshift, >> + struct range_lock *mmrange) >> { >> struct page *page; >> >> @@ -198,7 +199,8 @@ static int non_atomic_pte_lookup(struct vm_area_struct *vma, >> #else >> *pageshift = PAGE_SHIFT; >> #endif >> - if (get_user_pages(vaddr, 1, write ? FOLL_WRITE : 0, &page, NULL) <= 0) >> + if (get_user_pages(vaddr, 1, write ? FOLL_WRITE : 0, >> + &page, NULL, mmrange) <= 0) > >There is no need to pass down the range here since underlying called >__get_user_pages_locked() is told to not unlock the mmap_sem. >In general get_user_pages() doesn't need a range parameter. Yeah, you're right. At least it was a productive exercise for auditing. Thanks, Davidlohr