Received: by 2002:a25:1104:0:0:0:0:0 with SMTP id 4csp318879ybr; Fri, 22 May 2020 07:25:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw1iAJ3PM8nZ4vSRPrOJ15rejsH/gpnXMo3w+br34ZK6ABzG9Lx2VXtK6/Rfuyn9TCjiK/1 X-Received: by 2002:a17:906:aad8:: with SMTP id kt24mr8859458ejb.54.1590157536935; Fri, 22 May 2020 07:25:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590157536; cv=none; d=google.com; s=arc-20160816; b=I5CQT+rm1KSYI0VC3XHu37hACnYvxch4CgoNpeN4QH4RIIePyAM6i4AZ4eP6irRkW3 BQwlJtTV5rMIn/bHD3dYKxjwoIMw2I/VjDd2WMiR2HFKlAE1UOvUyu+0UxN6a3AVwCdy fnPsjmpAjEft8qsVkCG1fPJib8R0uZPForP3jffcTnjpIHYXPNnCoqE2c5BSIxtjqUyW yQqF6UL/NTUiw5ENB4dKvPaZQ7hDjJMk7TXOnH+Z5zbPxs7meOrLbkv+K9fNaL2LKD1O iWtjom1Nb329ZcA/Ry6hJluDJK3FvtY6IvpEopY7qJNUuoUagujWfUCQN78dcZtyHnPS KoIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date; bh=B5YQdb4srUdGQMl53eZ6N9be6OU1r+Rjmp1FxDjPByc=; b=aKdzviSMD7H8GXmZSg3R++r9nP/0GpJcuwu5kz+pCe4mlTcyn0b5FlG+d691+vO0x6 DBth3YGZ+NyCABMpFkuXPg1PQUTeRz8bwaKIvMFzOVgXJMUXB/BgYmBj91h+t0SMtbNY knoHroOoZXK+5Z4LMaZKNhMeRP+5N3ODrO2xQED9dqmBV4CR9Fqft0ZNGi7f8WD75bjB 6tveCG6UvUPPtunZC/6LW6ft5PrN70P357zbsCrwfN7IGcMCU/Ho8h0+OlfgMgLW7UQY EVRzEtXJXasKkdlS9y+tqyUBy+4cXUIfxOxk4a3msRznZYfx/Nq1LsMA4si1n107KIOK 7Gog== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r20si5014964ejx.622.2020.05.22.07.25.12; Fri, 22 May 2020 07:25:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730010AbgEVOUt (ORCPT + 99 others); Fri, 22 May 2020 10:20:49 -0400 Received: from mx2.suse.de ([195.135.220.15]:59240 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729399AbgEVOUs (ORCPT ); Fri, 22 May 2020 10:20:48 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id EE843B15F; Fri, 22 May 2020 14:20:48 +0000 (UTC) Date: Fri, 22 May 2020 07:15:14 -0700 From: Davidlohr Bueso To: Michel Lespinasse Cc: Andrew Morton , linux-mm , LKML , Peter Zijlstra , Laurent Dufour , Vlastimil Babka , Matthew Wilcox , Liam Howlett , Jerome Glisse , David Rientjes , Hugh Dickins , Ying Han , Jason Gunthorpe , Daniel Jordan , John Hubbard Subject: Re: [PATCH v6 07/12] mmap locking API: add mmap_read_trylock_non_owner() Message-ID: <20200522141514.ctpmu4ksw4lj6udu@linux-p48b> Mail-Followup-To: Michel Lespinasse , Andrew Morton , linux-mm , LKML , Peter Zijlstra , Laurent Dufour , Vlastimil Babka , Matthew Wilcox , Liam Howlett , Jerome Glisse , David Rientjes , Hugh Dickins , Ying Han , Jason Gunthorpe , Daniel Jordan , John Hubbard References: <20200520052908.204642-1-walken@google.com> <20200520052908.204642-8-walken@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20200520052908.204642-8-walken@google.com> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 19 May 2020, Michel Lespinasse wrote: >Add a couple APIs used by kernel/bpf/stackmap.c only: >- mmap_read_trylock_non_owner() >- mmap_read_unlock_non_owner() (may be called from a work queue). > >It's still not ideal that bpf/stackmap subverts the lock ownership >in this way. Thanks to Peter Zijlstra for suggesting this API as the >least-ugly way of addressing this in the short term. > >Signed-off-by: Michel Lespinasse >Reviewed-by: Daniel Jordan >Reviewed-by: Vlastimil Babka Sigh, bpf, but ok. Reviewed-by: Davidlohr Bueso >--- > include/linux/mmap_lock.h | 14 ++++++++++++++ > kernel/bpf/stackmap.c | 17 +++++------------ > 2 files changed, 19 insertions(+), 12 deletions(-) > >diff --git a/include/linux/mmap_lock.h b/include/linux/mmap_lock.h >index a757cb30ae77..d1826ce42f00 100644 >--- a/include/linux/mmap_lock.h >+++ b/include/linux/mmap_lock.h >@@ -56,4 +56,18 @@ static inline void mmap_read_unlock(struct mm_struct *mm) > up_read(&mm->mmap_sem); > } > >+static inline bool mmap_read_trylock_non_owner(struct mm_struct *mm) >+{ >+ if (down_read_trylock(&mm->mmap_sem)) { >+ rwsem_release(&mm->mmap_sem.dep_map, _RET_IP_); >+ return true; >+ } >+ return false; >+} >+ >+static inline void mmap_read_unlock_non_owner(struct mm_struct *mm) >+{ >+ up_read_non_owner(&mm->mmap_sem); >+} >+ > #endif /* _LINUX_MMAP_LOCK_H */ >diff --git a/kernel/bpf/stackmap.c b/kernel/bpf/stackmap.c >index 11d41f0c7005..998968659892 100644 >--- a/kernel/bpf/stackmap.c >+++ b/kernel/bpf/stackmap.c >@@ -33,7 +33,7 @@ struct bpf_stack_map { > /* irq_work to run up_read() for build_id lookup in nmi context */ > struct stack_map_irq_work { > struct irq_work irq_work; >- struct rw_semaphore *sem; >+ struct mm_struct *mm; > }; > > static void do_up_read(struct irq_work *entry) >@@ -44,8 +44,7 @@ static void do_up_read(struct irq_work *entry) > return; > > work = container_of(entry, struct stack_map_irq_work, irq_work); >- up_read_non_owner(work->sem); >- work->sem = NULL; >+ mmap_read_unlock_non_owner(work->mm); > } > > static DEFINE_PER_CPU(struct stack_map_irq_work, up_read_work); >@@ -317,7 +316,7 @@ static void stack_map_get_build_id_offset(struct bpf_stack_build_id *id_offs, > * with build_id. > */ > if (!user || !current || !current->mm || irq_work_busy || >- mmap_read_trylock(current->mm) == 0) { >+ !mmap_read_trylock_non_owner(current->mm)) { > /* cannot access current->mm, fall back to ips */ > for (i = 0; i < trace_nr; i++) { > id_offs[i].status = BPF_STACK_BUILD_ID_IP; >@@ -342,16 +341,10 @@ static void stack_map_get_build_id_offset(struct bpf_stack_build_id *id_offs, > } > > if (!work) { >- mmap_read_unlock(current->mm); >+ mmap_read_unlock_non_owner(current->mm); > } else { >- work->sem = ¤t->mm->mmap_sem; >+ work->mm = current->mm; > irq_work_queue(&work->irq_work); >- /* >- * The irq_work will release the mmap_sem with >- * up_read_non_owner(). The rwsem_release() is called >- * here to release the lock from lockdep's perspective. >- */ >- rwsem_release(¤t->mm->mmap_sem.dep_map, _RET_IP_); > } > } > >-- >2.26.2.761.g0e0b3e54be-goog >