Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2547318imm; Fri, 24 Aug 2018 00:50:55 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYonH6yyyt6LjR9EZ2nGXHeKNrzMIfUS1ew/wJCpXDnhs3o396X96PilLWPH4c5OVHFFBzW X-Received: by 2002:a17:902:9883:: with SMTP id s3-v6mr596261plp.194.1535097055909; Fri, 24 Aug 2018 00:50:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535097055; cv=none; d=google.com; s=arc-20160816; b=D+da/+vrQWnbXOoamAcfDkUjIB3ZH3lwdgZFTT3/o27i0FwEBruU8ap5wj8TmcMpQ7 gu3IwfoP1UlMJa1ePcsZfSlSX4B2OVoI23+I0vHaTaeoHn6XZnBG35ZEejNW56Jg0cd7 qHFqFxvFqTMmSPu9hOfWpbf/0JAFdRTRMjdQMTN8eIeSIQKmSNgHq38Py7HNVmNcI8j/ sB4quLWVA/4wlGqbxVNF9ISxkJveHkc7veRQ5tgxUqPCbfxNkwYi6MvrZaBRZvnnFc7r hlvaQV0jFzSEWP1TgxEnTvrno1nDSFSxu2WExDGmUWbJip8VqyMGJ6DL43QTcquFfshF yrSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=iaGpQS+/r6+Wf24XUCmySxrlRHPPLfkOKtT8lo2vWcI=; b=dbrpky5G9FJSLEMyDhs3i1GfMQH2TDeSB/S4TNacOe5wJAT2FJhEWnMVTD3Op3A1tG YTKOOT4KN8KOF7ukT0uzcM2K7La7XRDi6wnPlTvNVJdKQWEvtMB7TuBSgZ0hkbec5IkE zKALcyAqBI1PohWfVX+g8ThdJU4dfRulaiRYyQ/ViaWm60AYCbqbiB4JDXajyGsGHkD1 g5SfcliyLLpXSIfJAn8W8xCHB/P5o9hV07moq9+/N8Dr0FU90BQcFGgUo0wRuoGmocdG jMvsTqNRmLt+Jlbk53ni1oAIBOMPfhQXSB5fozZ7cV7AbsdqZop4TEKfij6XbdWak7TF V8MQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r24-v6si6469104pgo.605.2018.08.24.00.50.39; Fri, 24 Aug 2018 00:50:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727702AbeHXLWb (ORCPT + 99 others); Fri, 24 Aug 2018 07:22:31 -0400 Received: from mx2.suse.de ([195.135.220.15]:53360 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726899AbeHXLWb (ORCPT ); Fri, 24 Aug 2018 07:22:31 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 4C7C9AF6F; Fri, 24 Aug 2018 07:49:03 +0000 (UTC) Date: Fri, 24 Aug 2018 09:49:02 +0200 From: Michal Hocko To: Juergen Gross Cc: Boris Ostrovsky , Tetsuo Handa , Andrew Morton , linux-mm@kvack.org, xen-devel@lists.xenproject.org, LKML Subject: Re: [PATCH] xen/gntdev: fix up blockable calls to mn_invl_range_start Message-ID: <20180824074902.GY29735@dhcp22.suse.cz> References: <20180823120707.10998-1-mhocko@kernel.org> <07c7ead4-334d-9b25-f588-25e9b46bbea0@i-love.sakura.ne.jp> <20180823135151.GM29735@dhcp22.suse.cz> <9d2d11eb-7fe1-b836-056c-7886d6fc56e5@oracle.com> <20180823190933.GP29735@dhcp22.suse.cz> <2afe2559-78ad-2d5b-41aa-1988f941759b@suse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2afe2559-78ad-2d5b-41aa-1988f941759b@suse.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 24-08-18 07:03:28, Juergen Gross wrote: > On 23/08/18 21:09, Michal Hocko wrote: > > On Thu 23-08-18 10:06:53, Boris Ostrovsky wrote: > >> On 08/23/2018 09:51 AM, Michal Hocko wrote: > >>> On Thu 23-08-18 22:44:07, Tetsuo Handa wrote: > >>>> On 2018/08/23 21:07, Michal Hocko wrote: > >>>>> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c > >>>>> index 57390c7666e5..e7d8bb1bee2a 100644 > >>>>> --- a/drivers/xen/gntdev.c > >>>>> +++ b/drivers/xen/gntdev.c > >>>>> @@ -519,21 +519,20 @@ static int mn_invl_range_start(struct mmu_notifier *mn, > >>>>> struct gntdev_grant_map *map; > >>>>> int ret = 0; > >>>>> > >>>>> - /* TODO do we really need a mutex here? */ > >>>>> if (blockable) > >>>>> mutex_lock(&priv->lock); > >>>>> else if (!mutex_trylock(&priv->lock)) > >>>>> return -EAGAIN; > >>>>> > >>>>> list_for_each_entry(map, &priv->maps, next) { > >>>>> - if (in_range(map, start, end)) { > >>>>> + if (!blockable && in_range(map, start, end)) { > >>>> This still looks strange. Prior to 93065ac753e4, in_range() test was > >>>> inside unmap_if_in_range(). But this patch removes in_range() test > >>>> if blockable == true. That is, unmap_if_in_range() will unconditionally > >>>> unmap if blockable == true, which seems to be an unexpected change. > >>> You are right. I completely forgot I've removed in_range there. Does > >>> this look any better? > >>> > >>> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c > >>> index e7d8bb1bee2a..30f81004ea63 100644 > >>> --- a/drivers/xen/gntdev.c > >>> +++ b/drivers/xen/gntdev.c > >>> @@ -525,14 +525,20 @@ static int mn_invl_range_start(struct mmu_notifier *mn, > >>> return -EAGAIN; > >>> > >>> list_for_each_entry(map, &priv->maps, next) { > >>> - if (!blockable && in_range(map, start, end)) { > >>> + if (in_range(map, start, end)) { > >>> + if (blockable) > >>> + continue; > >>> + > >>> ret = -EAGAIN; > >>> goto out_unlock; > >>> } > >>> unmap_if_in_range(map, start, end); > >> > >> > >> (I obviously missed that too with my R-b). > >> > >> This will never get anything done either. How about > > > > Yeah. I was half way out and posted a complete garbage. Sorry about > > that! > > > > Michal repeat after me > > Never post patches when in hurry! Never post patches when in hurry! > > Never post patches when in hurry! Never post patches when in hurry! > > Never post patches when in hurry! Never post patches when in hurry! > > Never post patches when in hurry! Never post patches when in hurry! > > Never post patches when in hurry! Never post patches when in hurry! > > > > What I really meant was this > > > > diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c > > index e7d8bb1bee2a..6fcc5a44f29d 100644 > > --- a/drivers/xen/gntdev.c > > +++ b/drivers/xen/gntdev.c > > @@ -525,17 +525,25 @@ static int mn_invl_range_start(struct mmu_notifier *mn, > > return -EAGAIN; > > > > list_for_each_entry(map, &priv->maps, next) { > > - if (!blockable && in_range(map, start, end)) { > > + if (!in_range(map, start, end)) > > + continue; > > + > > + if (!blockable) { > > ret = -EAGAIN; > > goto out_unlock; > > } > > + > > unmap_if_in_range(map, start, end); > > } > > list_for_each_entry(map, &priv->freeable_maps, next) { > > - if (!blockable && in_range(map, start, end)) { > > + if (!in_range(map, start, end)) > > + continue; > > + > > + if (!blockable) { > > ret = -EAGAIN; > > goto out_unlock; > > } > > + > > unmap_if_in_range(map, start, end); > > } > > > > > > I liked the general structure before 93065ac753e4 better. > > Why don't you return to that, add blockable parameter to > unmap_if_in_range() and let unmap_if_in_range() return a value (0 or > -EAGAIN)? This will avoid repeating the very same code. I can do that if that is your preference of course. I have even considered that but then I have got to this... > @@ -508,6 +504,8 @@ static void unmap_if_in_range(struct > gntdev_grant_map *map, > (mstart - map->vma->vm_start) >> PAGE_SHIFT, > (mend - mstart) >> PAGE_SHIFT); > WARN_ON(err); > + > + return 0; > } and I really didn't know what to do about that. On one hand the error has been ignored already, on the other hand it is just too ugly to ignore it when we do provide a return value. Moreover I can see how somebody would like to clean that up later and I am not sure what are we going to do about it in callers. But by all means, I will go the way you maintainers prefer. -- Michal Hocko SUSE Labs