Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp1140998imm; Fri, 5 Oct 2018 19:52:20 -0700 (PDT) X-Google-Smtp-Source: ACcGV60KCQO4rEoZe+wXX20zRmpTxfyIYCbbkSTC8DcurSR/IcjxsFHiFsNVodXSAnpQofOcXryh X-Received: by 2002:a63:61d0:: with SMTP id v199-v6mr12649173pgb.242.1538794340390; Fri, 05 Oct 2018 19:52:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538794340; cv=none; d=google.com; s=arc-20160816; b=LW808i0yi1FAP1wkSWysyGRQKx8Hlzwwmd5zibW3QPOuF3RnFEyzzofeEOrqyYQ9DI sunfYpwMRtg8p2ltHM3jcMVJdNepS3L2IE2v29IhEshnWAO5h300WLGVua1vIJHZu7TI mlbvMD5IvJ4NoPZrrbz94a0B0wGIdK+HDSSrXSDyy8qYBK+hvF/hxfmORMOna2PcfZ8f LWn+YBOPE15CIQ2ZoExFVJN47p2UWeR6wxV97pBfYVQZ/yJx90u2aVIAGXzfv24CiXyt /Oxctfjh6zBwOzac62d1I3cbE5YJYR4Mm0MRM1Wd3iLQKG28i/kuPChoyNt6TwJeHjxs TkVg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=01DDUSyuajCXizBTsypEqSwY2/MJLvR3TICruWaqIVc=; b=RxTJcRchCJXrBhsn5KxlXd8OKOqeVCLvNsPFKz265mA4YaXofj1mzesbDkOJKX1sFc gC2VGeRVBJMArUMU3itrmUpdmXKHDplGeakE4UVp2oKoLbME/pEYLyLewYq2ZuQTDBNE cLjJVuyNUobq3zV4SMYniOIcuDLNAvyMidvqyKD7No7TNbCNh054+1GEsVVeJRTQBOaZ YZkknz6MYB2Dml5Hf/hA+1BFIO8LfF96YI4gkpQZwr9I5MdmU495lxsrzD3lj9WPiVaT TH9atd3L08tsTCY3bOdyZBIz6A6Vymc1zLZn4opSq9W2pSnf9YctxZO0YFqpEazrdv10 beQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=gZT62M2H; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l91-v6si11409411plb.315.2018.10.05.19.52.04; Fri, 05 Oct 2018 19:52:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=gZT62M2H; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729438AbeJFJv2 (ORCPT + 99 others); Sat, 6 Oct 2018 05:51:28 -0400 Received: from mail-pl1-f194.google.com ([209.85.214.194]:39913 "EHLO mail-pl1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726812AbeJFJv1 (ORCPT ); Sat, 6 Oct 2018 05:51:27 -0400 Received: by mail-pl1-f194.google.com with SMTP id w14-v6so7626849plp.6; Fri, 05 Oct 2018 19:49:55 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=01DDUSyuajCXizBTsypEqSwY2/MJLvR3TICruWaqIVc=; b=gZT62M2H6Q36uwqP8UJt98SnxUmEe0yrjAmJ2xll4EC9dRr78DoAkNM4Bsvi+vH0ug yGvv//ICP4M0GjxzxoA9O/8lCppksEoFyonWiBtBpHDx4apadIU56gbXr6qwB9+SgNM5 oeAK+/uFC2WaE9hVjy8f5GLT+X3NwJBMIJA2KTrzh2Z/C2m7PQH3OJlrD+VPM8lZsq0e SPC5HneuopMYVZxZzzJ2DfZXllsm3L6UGySg0xVB/BLB6EcewLjyFfBDT2hZhMsHZuiM Ig2I60+7M9LHpPByDDeqPTx9cDPFzkJM4mAnJZfgruICN+xh2KZsYmZlqj9j5e9M66Q6 mwcw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=01DDUSyuajCXizBTsypEqSwY2/MJLvR3TICruWaqIVc=; b=T/SYxfy9Q0Y/yosPdgBaR3zKaYRfP0dmP6Y2zLhPchqSHDQJXQSBPlnSwsYWFPN8K/ qQJ/ZTURyEHH7UndLUaHEPs7vtcPxmaqkwjDoqRilw2Lt3YkaeAUYLv8qSsA5tQs0CIk KUI7+YiuBz815h6ofw3AFrzckiWFZoSxSoDXk4bf6ruNMxAEhGLMMACRVD8Jzr7pSMuX 0BlMgzZIiqddamWZPJGQNm4ThZfQe3izkLcpj7xefqUMnt/R+QtYR/Ukd4qXa1YomrLF 2AtL+ZzeORz/uP2eugOU32WB6ufhey0OmGTJdiLWWm6o9nplcARPkfunxUNbPPwYrv0Z /+JQ== X-Gm-Message-State: ABuFfoh0Kc2tC+3Jg7YKPIOLFdCM3hljNVOmusOQvfENrDoWZA2iside TuWNe34DXZH0kdq4G/qdk1o= X-Received: by 2002:a17:902:6b06:: with SMTP id o6-v6mr13810554plk.6.1538794195317; Fri, 05 Oct 2018 19:49:55 -0700 (PDT) Received: from blueforge.nvidia.com (searspoint.nvidia.com. [216.228.112.21]) by smtp.gmail.com with ESMTPSA id n63-v6sm3962785pfn.9.2018.10.05.19.49.53 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 05 Oct 2018 19:49:54 -0700 (PDT) From: john.hubbard@gmail.com X-Google-Original-From: jhubbard@nvidia.com To: Matthew Wilcox , Michal Hocko , Christopher Lameter , Jason Gunthorpe , Dan Williams , Jan Kara Cc: linux-mm@kvack.org, LKML , linux-rdma , linux-fsdevel@vger.kernel.org, John Hubbard , Al Viro , Jerome Glisse , Christoph Hellwig , Ralph Campbell Subject: [PATCH v3 2/3] mm: introduce put_user_page*(), placeholder versions Date: Fri, 5 Oct 2018 19:49:48 -0700 Message-Id: <20181006024949.20691-3-jhubbard@nvidia.com> X-Mailer: git-send-email 2.19.0 In-Reply-To: <20181006024949.20691-1-jhubbard@nvidia.com> References: <20181006024949.20691-1-jhubbard@nvidia.com> MIME-Version: 1.0 X-NVConfidentiality: public Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: John Hubbard Introduces put_user_page(), which simply calls put_page(). This provides a way to update all get_user_pages*() callers, so that they call put_user_page(), instead of put_page(). Also introduces put_user_pages(), and a few dirty/locked variations, as a replacement for release_pages(), and also as a replacement for open-coded loops that release multiple pages. These may be used for subsequent performance improvements, via batching of pages to be released. This prepares for eventually fixing the problem described in [1], and is following a plan listed in [2], [3], [4]. [1] https://lwn.net/Articles/753027/ : "The Trouble with get_user_pages()" [2] https://lkml.kernel.org/r/20180709080554.21931-1-jhubbard@nvidia.com Proposed steps for fixing get_user_pages() + DMA problems. [3]https://lkml.kernel.org/r/20180710082100.mkdwngdv5kkrcz6n@quack2.suse.cz Bounce buffers (otherwise [2] is not really viable). [4] https://lkml.kernel.org/r/20181003162115.GG24030@quack2.suse.cz Follow-up discussions. CC: Matthew Wilcox CC: Michal Hocko CC: Christopher Lameter CC: Jason Gunthorpe CC: Dan Williams CC: Jan Kara CC: Al Viro CC: Jerome Glisse CC: Christoph Hellwig CC: Ralph Campbell Signed-off-by: John Hubbard --- include/linux/mm.h | 48 ++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 46 insertions(+), 2 deletions(-) diff --git a/include/linux/mm.h b/include/linux/mm.h index 0416a7204be3..305b206e6851 100644 --- a/include/linux/mm.h +++ b/include/linux/mm.h @@ -137,6 +137,8 @@ extern int overcommit_ratio_handler(struct ctl_table *, int, void __user *, size_t *, loff_t *); extern int overcommit_kbytes_handler(struct ctl_table *, int, void __user *, size_t *, loff_t *); +int set_page_dirty(struct page *page); +int set_page_dirty_lock(struct page *page); #define nth_page(page,n) pfn_to_page(page_to_pfn((page)) + (n)) @@ -943,6 +945,50 @@ static inline void put_page(struct page *page) __put_page(page); } +/* Pages that were pinned via get_user_pages*() should be released via + * either put_user_page(), or one of the put_user_pages*() routines + * below. + */ +static inline void put_user_page(struct page *page) +{ + put_page(page); +} + +static inline void put_user_pages_dirty(struct page **pages, + unsigned long npages) +{ + unsigned long index; + + for (index = 0; index < npages; index++) { + if (!PageDirty(pages[index])) + set_page_dirty(pages[index]); + + put_user_page(pages[index]); + } +} + +static inline void put_user_pages_dirty_lock(struct page **pages, + unsigned long npages) +{ + unsigned long index; + + for (index = 0; index < npages; index++) { + if (!PageDirty(pages[index])) + set_page_dirty_lock(pages[index]); + + put_user_page(pages[index]); + } +} + +static inline void put_user_pages(struct page **pages, + unsigned long npages) +{ + unsigned long index; + + for (index = 0; index < npages; index++) + put_user_page(pages[index]); +} + #if defined(CONFIG_SPARSEMEM) && !defined(CONFIG_SPARSEMEM_VMEMMAP) #define SECTION_IN_PAGE_FLAGS #endif @@ -1534,8 +1580,6 @@ int redirty_page_for_writepage(struct writeback_control *wbc, void account_page_dirtied(struct page *page, struct address_space *mapping); void account_page_cleaned(struct page *page, struct address_space *mapping, struct bdi_writeback *wb); -int set_page_dirty(struct page *page); -int set_page_dirty_lock(struct page *page); void __cancel_dirty_page(struct page *page); static inline void cancel_dirty_page(struct page *page) { -- 2.19.0