Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp146434ybz; Tue, 21 Apr 2020 17:19:06 -0700 (PDT) X-Google-Smtp-Source: APiQypLPlD/p1wH6uoejEDC4/qCljoNDlZr7CjoLl00fYp9og+ezYE7bBw5MPmXk+F2mJCluLja0 X-Received: by 2002:a17:906:e90:: with SMTP id p16mr10310525ejf.14.1587514746381; Tue, 21 Apr 2020 17:19:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587514746; cv=none; d=google.com; s=arc-20160816; b=pAv0oEdw528l3n3EzalCSJ3Rx2yQ46QdLFKWOmILD5VAN7+/Zz4ce3DBS7c96HbU8v 1Mkyfve3evm+ZFiGcOv7E6tSObwPFBg2fsHUau7lrND2mA5Mxlk1wezSoWuz8jnmEaCh ZZzQ2GfCq2yniZDNk3koGIY38wB3n85CZw0vpLO4M9VcDbaRutvgqI8lb93qsAb3Vhim ldWBGhdDPhA8MGAX6S5ugf0GNyRFLRr4WwJUPqiB23bfTCo80ntjmF+Qzju5Gbhqx/88 GmIvT7OknRJx3TIDMDNKslyJfhqnUvZVAy69E7HWyWjCZHnndUGq0r4SVclBLZVqsO+X gEdA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=trhg9Yk7vVwhm5tzbCAJRNxhtIH/dkjCFeCx4usvKdo=; b=UUDF6HXWMDLJaeQvTpXMOK/h59yJf9yHXL2cZRDp0iJQZpaZEVlDOTAWBgxpRgMKo9 6Lj/FEhVP77j8qBy/sfncEbdGgAciqkg1/iqjEUk1xLoZjQsk0gYUZ3E1waVRMfZA/F5 FOBGLveSWoj6qcVwbirbvXeAWEETuVe4Vi5OmT2nI+HglbNSCMhzWnxipVAc8pnbXesw VbeApe+ULj7mgOUZ92kVEvuCNpYIcL11qg0yN7ndOUQa5/PklxlcZhi+2DRaVdDNmwmh SFf3zovbuYZrM1OdSRiyNfZ7I2s/hNngGFHuG4kIx+on+amsL0bWBbKzArk6xXS0MWFI qRrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=BHEsdusq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i20si2389444edx.314.2020.04.21.17.18.43; Tue, 21 Apr 2020 17:19:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=BHEsdusq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726462AbgDVAOy (ORCPT + 99 others); Tue, 21 Apr 2020 20:14:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54614 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726434AbgDVAOn (ORCPT ); Tue, 21 Apr 2020 20:14:43 -0400 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0D048C061BD3 for ; Tue, 21 Apr 2020 17:14:42 -0700 (PDT) Received: by mail-pf1-x449.google.com with SMTP id o5so578435pfp.0 for ; Tue, 21 Apr 2020 17:14:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=trhg9Yk7vVwhm5tzbCAJRNxhtIH/dkjCFeCx4usvKdo=; b=BHEsdusqub6ITSFVJH1OMaviWdq8JZTGu52eYcgWIfShAzJitgHwHUZS3IvSOm1BNK JoTHHdeOuTWVSp3Aou4Wk3xTIFTTRqDcwpW5wgRDbQQS4DxJIytHgthOHaGUvHwNjkQe oWa4Qmnw57wWVZ2tndrp4TK2iFfiZ92Halo7sVxnJxPaolU+K9JmS8I4jrq4jhbbgvzB JS1k9LoBdeRYsIdS5zOLVvh5XXfUBfumGNrf/bEdBVphpikbeiEhVjLZcTM799RvpEMp U4XZNdb62rmL8l+SiqDEJ+cKSBOrXG5vnp8CblZGvTiay4osZPNIOplUBnMK+AHVlXKu JQpw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=trhg9Yk7vVwhm5tzbCAJRNxhtIH/dkjCFeCx4usvKdo=; b=cpNhaNOjpJzkqBQ/oHlPdamXv92/RVKXLT6li6tmr81jkv3xaT1CIwTbV4Q5wxcAVn TIkWbjLo+2Hkjh5m1JFlQUKv/o3ABcXWf7iKhoZildtsVfFr9A9/tNydUmBtJpjHwgaK CFSYvOQcxEfW0jXruKiaPaQQHORFF3gAK/dy1lH2kafP1n4ae8mQo5Mjp+k5qypmC3MK TJfIqW3VBd7YDZZJZO2K3apW411hBsmKcZjCvoR9G7i96LAI8i/YUgPlWFvmhaRlpEMK S8xG4mlznXdX/mDSD1K4n0OWAb4UK6aIA4tULh6DSh47ycK6mR1GpA/IlKbZqNabQYLa 2ZFw== X-Gm-Message-State: AGi0PuafInXo4ranIw0RJ3tAlA1PlDvXMdhC6caypa/JgxRgcavXQI7e q6a/nbpsamXGbWett0LWlc8oY0fn5dc= X-Received: by 2002:a17:90a:dc83:: with SMTP id j3mr6004567pjv.6.1587514481568; Tue, 21 Apr 2020 17:14:41 -0700 (PDT) Date: Tue, 21 Apr 2020 17:14:19 -0700 In-Reply-To: <20200422001422.232330-1-walken@google.com> Message-Id: <20200422001422.232330-8-walken@google.com> Mime-Version: 1.0 References: <20200422001422.232330-1-walken@google.com> X-Mailer: git-send-email 2.26.1.301.g55bc3eb7cb9-goog Subject: [PATCH v5 07/10] mmap locking API: add mmap_read_trylock_non_owner() From: Michel Lespinasse To: Andrew Morton , linux-mm Cc: LKML , Peter Zijlstra , Laurent Dufour , Vlastimil Babka , Matthew Wilcox , Liam Howlett , Jerome Glisse , Davidlohr Bueso , David Rientjes , Hugh Dickins , Ying Han , Jason Gunthorpe , Daniel Jordan , Michel Lespinasse Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add a couple APIs used by kernel/bpf/stackmap.c only: - mmap_read_trylock_non_owner() - mmap_read_unlock_non_owner() (may be called from a work queue). It's still not ideal that bpf/stackmap subverts the lock ownership in this way. Thanks to Peter Zijlstra for suggesting this API as the least-ugly way of addressing this in the short term. Signed-off-by: Michel Lespinasse Reviewed-by: Daniel Jordan --- include/linux/mmap_lock.h | 14 ++++++++++++++ kernel/bpf/stackmap.c | 17 +++++------------ 2 files changed, 19 insertions(+), 12 deletions(-) diff --git a/include/linux/mmap_lock.h b/include/linux/mmap_lock.h index a757cb30ae77..d1826ce42f00 100644 --- a/include/linux/mmap_lock.h +++ b/include/linux/mmap_lock.h @@ -56,4 +56,18 @@ static inline void mmap_read_unlock(struct mm_struct *mm) up_read(&mm->mmap_sem); } +static inline bool mmap_read_trylock_non_owner(struct mm_struct *mm) +{ + if (down_read_trylock(&mm->mmap_sem)) { + rwsem_release(&mm->mmap_sem.dep_map, _RET_IP_); + return true; + } + return false; +} + +static inline void mmap_read_unlock_non_owner(struct mm_struct *mm) +{ + up_read_non_owner(&mm->mmap_sem); +} + #endif /* _LINUX_MMAP_LOCK_H */ diff --git a/kernel/bpf/stackmap.c b/kernel/bpf/stackmap.c index 11d41f0c7005..998968659892 100644 --- a/kernel/bpf/stackmap.c +++ b/kernel/bpf/stackmap.c @@ -33,7 +33,7 @@ struct bpf_stack_map { /* irq_work to run up_read() for build_id lookup in nmi context */ struct stack_map_irq_work { struct irq_work irq_work; - struct rw_semaphore *sem; + struct mm_struct *mm; }; static void do_up_read(struct irq_work *entry) @@ -44,8 +44,7 @@ static void do_up_read(struct irq_work *entry) return; work = container_of(entry, struct stack_map_irq_work, irq_work); - up_read_non_owner(work->sem); - work->sem = NULL; + mmap_read_unlock_non_owner(work->mm); } static DEFINE_PER_CPU(struct stack_map_irq_work, up_read_work); @@ -317,7 +316,7 @@ static void stack_map_get_build_id_offset(struct bpf_stack_build_id *id_offs, * with build_id. */ if (!user || !current || !current->mm || irq_work_busy || - mmap_read_trylock(current->mm) == 0) { + !mmap_read_trylock_non_owner(current->mm)) { /* cannot access current->mm, fall back to ips */ for (i = 0; i < trace_nr; i++) { id_offs[i].status = BPF_STACK_BUILD_ID_IP; @@ -342,16 +341,10 @@ static void stack_map_get_build_id_offset(struct bpf_stack_build_id *id_offs, } if (!work) { - mmap_read_unlock(current->mm); + mmap_read_unlock_non_owner(current->mm); } else { - work->sem = ¤t->mm->mmap_sem; + work->mm = current->mm; irq_work_queue(&work->irq_work); - /* - * The irq_work will release the mmap_sem with - * up_read_non_owner(). The rwsem_release() is called - * here to release the lock from lockdep's perspective. - */ - rwsem_release(¤t->mm->mmap_sem.dep_map, _RET_IP_); } } -- 2.26.1.301.g55bc3eb7cb9-goog