Received: by 2002:ab2:6a05:0:b0:1f8:1780:a4ed with SMTP id w5csp2789888lqo; Tue, 14 May 2024 09:09:53 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUtry5aW49UfHWTSxVIpNKijOqSHLROa0d6Gyv9cDmyb7YBIisCG9C68gaLOXvCIPuI47VFVhg25gXfFxm8b5cjZciQa/7CKZBDffrXkg== X-Google-Smtp-Source: AGHT+IEFewcCfEnFiHONe55uB1LLgfyyxZgM34sM6CTsPFN94krKEL/vESlAMn1Ph6rq766TKHQ0 X-Received: by 2002:a05:620a:70ec:b0:78d:6182:fa35 with SMTP id af79cd13be357-792c75f3f51mr1326417485a.53.1715702993285; Tue, 14 May 2024 09:09:53 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715702993; cv=pass; d=google.com; s=arc-20160816; b=rSeEeaJhaV6eNEtj8Pg8rWRpcW0PoT08sBCmWDB6kBvMlo8FkTZAznXU4WQLXz7uEA CHHQVgByhxuQeV3WLvB77VasFQdfespTzShRm6q79CTv9pdaZ7YVivI1Dd30rRk/vN3f pWL8i40DjO97BRnUUiWM2gF8Awzo05eRyiV87IV5YJgsd5MrVE0q6oaBzBvQXsV2ZAcB sSMhCFo7SB/hcMjncBH6Cklph+9PL5/P4E+K4hMWw9Ywb+xNKEckIMB3yMyQl7l6chN2 elEmawbA7CMVMuEHus9fZR49+aWeAWWscDOmsbDqLvG1oCXlr9Vebiy79ddKUKTPFScP Lqcg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:cc:to:from:subject:message-id :mime-version:list-unsubscribe:list-subscribe:list-id:precedence :date:dkim-signature; bh=ZEVbKWgtoe1tC5EBanPRfye6zC5Rn/5W6YQoLopFORw=; fh=HYSmvqWGR80VhnyB7Ctvoqago5Pb25HK55cWIZKaero=; b=CVm03wR9h+z02IVrwbXpPeGcES0us1J/zCCVP56EJSiMNKo61NO7CH0fNYCE+I3i+6 kT4YtjQtgeQ2DRbC25TuHxOvuJUjnyxlgtlZnqC/WFjYe/1wz/8rtiWMhybnnYqL4L6O TR6OzQRp8/F3KztNE34x15gjYxD62Sdg8qK8wDPABuwWh2GNnFxJf32dEo9D89hw5Vlu LVxndoPBnqKGic2RzGmdzfpixdEK0nfBl9jsJAXz7fu7I7QfMfGuSAGIzXKXxhMm+DBH Q3o4j9G1Ewu2BdToW3MAqpcM4V3eMVyD3GuZSPqiFYGjRJRCtwp5ONYfUJL43opNfRPz /e0g==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=CPkp3ox+; arc=pass (i=1 spf=pass spfdomain=flex--cmllamas.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-178917-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-178917-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id af79cd13be357-792e0d46a31si446350885a.205.2024.05.14.09.09.53 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 14 May 2024 09:09:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-178917-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b=CPkp3ox+; arc=pass (i=1 spf=pass spfdomain=flex--cmllamas.bounces.google.com dkim=pass dkdomain=google.com dmarc=pass fromdomain=google.com); spf=pass (google.com: domain of linux-kernel+bounces-178917-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-178917-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id BF7831C209CF for ; Tue, 14 May 2024 16:09:52 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 5C65417F393; Tue, 14 May 2024 16:09:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="CPkp3ox+" Received: from mail-yb1-f202.google.com (mail-yb1-f202.google.com [209.85.219.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 1B529144D1D for ; Tue, 14 May 2024 16:09:35 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.219.202 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715702977; cv=none; b=orlIrX7iI6IPZuxO5KjfM7sag92Cr3CV4T2mcJnFjLX34HqXs354vh88Y1qHqlx//gMYP97j8cRT0Xl4C2lsk9WiQWNSCy/9PCInfOPbM+VQw5Jpl6vffIzSws+3MrXaTynmioRJbEyQ3Rl8cCy3lDUsgLRJl9tgEdEyDFO7FMQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715702977; c=relaxed/simple; bh=UXFugdl0g5ZKxh/QIJtz74QIXCChgtFJ0b86SihhXCQ=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=GjEo6wuXdZBAYxXXZcNjX/1X6+PrGbbjn/O+o1A7ZuRYWWRkjOTx1+lx0rWx0KExWDGVdH2GyzzTgSeOOHln73ZckMnsgUgGKN5eCuz6rZ1BL6aIiCouXHILFQJjeCENubfeeUz2ADQKXfVP0I9Wm75IgwteNgluOvYML9Bh4rI= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--cmllamas.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=CPkp3ox+; arc=none smtp.client-ip=209.85.219.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--cmllamas.bounces.google.com Received: by mail-yb1-f202.google.com with SMTP id 3f1490d57ef6-de6054876efso11207007276.2 for ; Tue, 14 May 2024 09:09:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1715702975; x=1716307775; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:from:subject:message-id :mime-version:date:from:to:cc:subject:date:message-id:reply-to; bh=ZEVbKWgtoe1tC5EBanPRfye6zC5Rn/5W6YQoLopFORw=; b=CPkp3ox+BvDFRs3aG+412f6ggQo64cU94iVYGPkYr6ctOQgmzrHLjNFywipcRvyMZY Z82QUfjDBylOksAvzfJrCdgQwOvqlhinJcG0xVWhIm2DtpAwBbjMhYLvRyB7oNS82Yzs ZD/U4bMAZzo4/SyTTR09jTfNDp/L4cfNJ462hg/exjZmVVFQ2uRtSta301hqSDGV7Rwn zu9tG1LZF966V1i3qg2AcU+MbieGf8DTaWWo6+TAoljYxheH7kQfo6iugTOikMq8m5uu 60ntkQ05Zo6kbrkLA+hFtCfnmaGTIL5HgJLoUNowZa2YaQw379RuRPpupAV+6j/LQowD 3OFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1715702975; x=1716307775; h=content-transfer-encoding:cc:to:from:subject:message-id :mime-version:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=ZEVbKWgtoe1tC5EBanPRfye6zC5Rn/5W6YQoLopFORw=; b=ZoqBXFkwMTDnENGcCv7sARRBnfu9rsUldWROkX9C5/o8E04uWCV8rPaPcDboQZvFHK N26IYNwAtJqvhruNltuiQEzuDGP2VpQhlvQfSoHTG3f+m04Uuoe04eb5bmiB2brhNB9z kUkCX7f/FbxEQDpuFnmGwgD1HJ9gLmCNmlagYd3ROcA5vHxIBE/EyHhwhdWnPQ0vR1Iz MtXsd9rc6DswVZqfjElUmOHK+DPVZWd5CKZDq5iTBAEIaF7CoLqg+Y6gFpPzLsdbE3Zh oPfY1fwtQZP3oCkvUDXXpa853ubjFSNyutsH1Bw0cHBW8wYkr55s73x7cLYs56Vd0ERm aPNA== X-Gm-Message-State: AOJu0YwaDy7NrpVoQwsWpZBTDFAMEhcqYAgONrZ+BXoRPwh7fA/IUmd4 k00YqR8915GrfJB1gO7HcgJPDZJpWJvMicakj8tSer5FTRfEATIidA6bBMP68rELkdmV6pYbMMf pTUTOYFKKVA== X-Received: from xllamas.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5070]) (user=cmllamas job=sendgmr) by 2002:a05:6902:2b87:b0:dcc:6065:2b3d with SMTP id 3f1490d57ef6-dee4f3720bdmr3304655276.8.1715702974848; Tue, 14 May 2024 09:09:34 -0700 (PDT) Date: Tue, 14 May 2024 16:09:06 +0000 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 X-Mailer: git-send-email 2.45.0.rc1.225.g2a3ae87e7f-goog Message-ID: <20240514160926.1309778-1-cmllamas@google.com> Subject: [PATCH v2] binder: use bitmap for faster descriptor lookup From: Carlos Llamas To: Greg Kroah-Hartman , "=?UTF-8?q?Arve=20Hj=C3=B8nnev=C3=A5g?=" , Todd Kjos , Martijn Coenen , Joel Fernandes , Christian Brauner , Carlos Llamas , Suren Baghdasaryan Cc: linux-kernel@vger.kernel.org, kernel-team@android.com, Tim Murray , Alice Ryhl , John Stultz , Steven Moreland , Nick Chen Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable When creating new binder references, the driver assigns a descriptor id that is shared with userspace. Regrettably, the driver needs to keep the descriptors small enough to accommodate userspace potentially using them as Vector indexes. Currently, the driver performs a linear search on the rb-tree of references to find the smallest available descriptor id. This approach, however, scales poorly as the number of references grows. This patch introduces the usage of bitmaps to boost the performance of descriptor assignments. This optimization results in notable performance gains, particularly in processes with a large number of references. The following benchmark with 100,000 references showcases the difference in latency between the dbitmap implementation and the legacy approach: [ 587.145098] get_ref_desc_olocked: 15us (dbitmap on) [ 602.788623] get_ref_desc_olocked: 47343us (dbitmap off) Note the bitmap size is dynamically adjusted in line with the number of references, ensuring efficient memory usage. In cases where growing the bitmap is not possible, the driver falls back to the slow legacy method. A previous attempt to solve this issue was proposed in [1]. However, such method involved adding new ioctls which isn't great, plus older userspace code would not have benefited from the optimizations either. Link: https://lore.kernel.org/all/20240417191418.1341988-1-cmllamas@google.= com/ [1] Cc: Tim Murray Cc: Arve Hj=C3=B8nnev=C3=A5g Cc: Alice Ryhl Cc: Martijn Coenen Cc: Todd Kjos Cc: John Stultz Cc: Steven Moreland Suggested-by: Nick Chen Signed-off-by: Carlos Llamas --- Notes: v1: first solution using a new "flags" ioctl: https://lore.kernel.org/all/20240417191418.1341988-1-cmllamas@googl= e.com/ =20 v2: switch to a different implementation using bitmaps. drivers/android/binder.c | 113 +++++++++++++++++++++--- drivers/android/binder_internal.h | 5 +- drivers/android/dbitmap.h | 139 ++++++++++++++++++++++++++++++ 3 files changed, 243 insertions(+), 14 deletions(-) create mode 100644 drivers/android/dbitmap.h diff --git a/drivers/android/binder.c b/drivers/android/binder.c index dd6923d37931..6a310f8373fc 100644 --- a/drivers/android/binder.c +++ b/drivers/android/binder.c @@ -1045,6 +1045,67 @@ static struct binder_ref *binder_get_ref_olocked(str= uct binder_proc *proc, return NULL; } =20 +/* find first non-zero available descriptor the "slow way" */ +static u32 slow_desc_lookup_olocked(struct binder_proc *proc) +{ + struct binder_ref *ref; + struct rb_node *n; + u32 desc; + + desc =3D 1; + for (n =3D rb_first(&proc->refs_by_desc); n; n =3D rb_next(n)) { + ref =3D rb_entry(n, struct binder_ref, rb_node_desc); + if (ref->data.desc > desc) + break; + desc =3D ref->data.desc + 1; + } + + return desc; +} + +/* + * Find an available reference descriptor. Note that the proc->outer_lock + * might be released in the process. In such case, -EAGAIN is returned and + * the provided descriptor is invalid. + */ +static int get_ref_desc_olocked(struct binder_proc *proc, + struct binder_node *node, + u32 *desc) +{ + struct dbitmap *dmap =3D &proc->dmap; + unsigned long *new, bit; + unsigned int nbits; + + /* 0 is reserved for the context manager */ + if (node =3D=3D proc->context->binder_context_mgr_node) { + *desc =3D 0; + return 0; + } + + if (unlikely(!dbitmap_enabled(dmap))) { + *desc =3D slow_desc_lookup_olocked(proc); + return 0; + } + + if (dbitmap_get_first_zero_bit(dmap, &bit) =3D=3D 0) { + *desc =3D bit; + return 0; + } + + /* + * The descriptors bitmap is full and needs to be expanded. + * The proc->outer_lock is briefly released to allocate the + * new bitmap safely. + */ + nbits =3D dbitmap_expand_nbits(dmap); + binder_proc_unlock(proc); + new =3D bitmap_zalloc(nbits, GFP_KERNEL | __GFP_ZERO); + binder_proc_lock(proc); + dbitmap_expand(dmap, new, nbits); + + return -EAGAIN; +} + /** * binder_get_ref_for_node_olocked() - get the ref associated with given n= ode * @proc: binder_proc that owns the ref @@ -1068,12 +1129,14 @@ static struct binder_ref *binder_get_ref_for_node_o= locked( struct binder_node *node, struct binder_ref *new_ref) { - struct binder_context *context =3D proc->context; - struct rb_node **p =3D &proc->refs_by_node.rb_node; - struct rb_node *parent =3D NULL; struct binder_ref *ref; - struct rb_node *n; + struct rb_node *parent; + struct rb_node **p; + u32 desc; =20 +retry: + p =3D &proc->refs_by_node.rb_node; + parent =3D NULL; while (*p) { parent =3D *p; ref =3D rb_entry(parent, struct binder_ref, rb_node_node); @@ -1088,6 +1151,10 @@ static struct binder_ref *binder_get_ref_for_node_ol= ocked( if (!new_ref) return NULL; =20 + /* might release the proc->outer_lock */ + if (get_ref_desc_olocked(proc, node, &desc) =3D=3D -EAGAIN) + goto retry; + binder_stats_created(BINDER_STAT_REF); new_ref->data.debug_id =3D atomic_inc_return(&binder_last_id); new_ref->proc =3D proc; @@ -1095,14 +1162,7 @@ static struct binder_ref *binder_get_ref_for_node_ol= ocked( rb_link_node(&new_ref->rb_node_node, parent, p); rb_insert_color(&new_ref->rb_node_node, &proc->refs_by_node); =20 - new_ref->data.desc =3D (node =3D=3D context->binder_context_mgr_node) ? 0= : 1; - for (n =3D rb_first(&proc->refs_by_desc); n !=3D NULL; n =3D rb_next(n)) = { - ref =3D rb_entry(n, struct binder_ref, rb_node_desc); - if (ref->data.desc > new_ref->data.desc) - break; - new_ref->data.desc =3D ref->data.desc + 1; - } - + new_ref->data.desc =3D desc; p =3D &proc->refs_by_desc.rb_node; while (*p) { parent =3D *p; @@ -1131,6 +1191,7 @@ static struct binder_ref *binder_get_ref_for_node_olo= cked( =20 static void binder_cleanup_ref_olocked(struct binder_ref *ref) { + struct dbitmap *dmap =3D &ref->proc->dmap; bool delete_node =3D false; =20 binder_debug(BINDER_DEBUG_INTERNAL_REFS, @@ -1138,6 +1199,8 @@ static void binder_cleanup_ref_olocked(struct binder_= ref *ref) ref->proc->pid, ref->data.debug_id, ref->data.desc, ref->node->debug_id); =20 + if (dbitmap_enabled(dmap)) + dbitmap_clear_bit(dmap, ref->data.desc); rb_erase(&ref->rb_node_desc, &ref->proc->refs_by_desc); rb_erase(&ref->rb_node_node, &ref->proc->refs_by_node); =20 @@ -1298,6 +1361,25 @@ static void binder_free_ref(struct binder_ref *ref) kfree(ref); } =20 +/* shrink descriptor bitmap if needed */ +static void try_shrink_dmap(struct binder_proc *proc) +{ + unsigned long *new; + int nbits; + + binder_proc_lock(proc); + nbits =3D dbitmap_shrink_nbits(&proc->dmap); + binder_proc_unlock(proc); + + if (!nbits) + return; + + new =3D bitmap_zalloc(nbits, GFP_KERNEL | __GFP_ZERO); + binder_proc_lock(proc); + dbitmap_shrink(&proc->dmap, new, nbits); + binder_proc_unlock(proc); +} + /** * binder_update_ref_for_handle() - inc/dec the ref for given handle * @proc: proc containing the ref @@ -1334,8 +1416,10 @@ static int binder_update_ref_for_handle(struct binde= r_proc *proc, *rdata =3D ref->data; binder_proc_unlock(proc); =20 - if (delete_ref) + if (delete_ref) { binder_free_ref(ref); + try_shrink_dmap(proc); + } return ret; =20 err_no_ref: @@ -4931,6 +5015,7 @@ static void binder_free_proc(struct binder_proc *proc= ) put_task_struct(proc->tsk); put_cred(proc->cred); binder_stats_deleted(BINDER_STAT_PROC); + dbitmap_free(&proc->dmap); kfree(proc); } =20 @@ -5634,6 +5719,8 @@ static int binder_open(struct inode *nodp, struct fil= e *filp) proc =3D kzalloc(sizeof(*proc), GFP_KERNEL); if (proc =3D=3D NULL) return -ENOMEM; + + dbitmap_init(&proc->dmap); spin_lock_init(&proc->inner_lock); spin_lock_init(&proc->outer_lock); get_task_struct(current->group_leader); diff --git a/drivers/android/binder_internal.h b/drivers/android/binder_int= ernal.h index 7270d4d22207..256bb75d9d8c 100644 --- a/drivers/android/binder_internal.h +++ b/drivers/android/binder_internal.h @@ -14,6 +14,7 @@ #include #include #include "binder_alloc.h" +#include "dbitmap.h" =20 struct binder_context { struct binder_node *binder_context_mgr_node; @@ -368,6 +369,8 @@ struct binder_ref { * @freeze_wait: waitqueue of processes waiting for all outstandi= ng * transactions to be processed * (protected by @inner_lock) + * @dmap bitmap to manage available reference descriptors + * (protected by @outer_lock) * @todo: list of work for this process * (protected by @inner_lock) * @stats: per-process binder statistics @@ -417,7 +420,7 @@ struct binder_proc { bool sync_recv; bool async_recv; wait_queue_head_t freeze_wait; - + struct dbitmap dmap; struct list_head todo; struct binder_stats stats; struct list_head delivered_death; diff --git a/drivers/android/dbitmap.h b/drivers/android/dbitmap.h new file mode 100644 index 000000000000..1c6a274e4c0a --- /dev/null +++ b/drivers/android/dbitmap.h @@ -0,0 +1,139 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +#ifndef _LINUX_DBITMAP_H +#define _LINUX_DBITMAP_H +#include + +#define NBITS_MIN BITS_PER_TYPE(unsigned long) + +struct dbitmap { + unsigned int nbits; + unsigned long *map; +}; + +static inline int dbitmap_enabled(struct dbitmap *dmap) +{ + return dmap->map !=3D NULL; +} + +static inline void dbitmap_free(struct dbitmap *dmap) +{ + dmap->nbits =3D 0; + kfree(dmap->map); + dmap->map =3D NULL; +} + +static inline unsigned int dbitmap_shrink_nbits(struct dbitmap *dmap) +{ + unsigned int bit; + + if (dmap->nbits <=3D NBITS_MIN) + return 0; + + bit =3D find_last_bit(dmap->map, dmap->nbits); + if (unlikely(bit =3D=3D dmap->nbits)) + return NBITS_MIN; + + if (unlikely(bit <=3D (dmap->nbits >> 2))) + return dmap->nbits >> 1; + + return 0; +} + +static inline void +dbitmap_replace(struct dbitmap *dmap, unsigned long *new, unsigned int nbi= ts) +{ + bitmap_copy(new, dmap->map, min(dmap->nbits, nbits)); + kfree(dmap->map); + dmap->map =3D new; + dmap->nbits =3D nbits; +} + +static inline void +dbitmap_shrink(struct dbitmap *dmap, unsigned long *new, unsigned int nbit= s) +{ + if (unlikely(!new)) + return; + + /* + * Make sure we can still shrink to the requested nbits as + * this call might have raced with another shrink or more + * bits have been assigned. In such case, release the @new + * bitmap and move on. + */ + if (unlikely(!dbitmap_enabled(dmap) || + dbitmap_shrink_nbits(dmap) !=3D nbits)) { + kfree(new); + return; + } + + dbitmap_replace(dmap, new, nbits); +} + +static inline unsigned int +dbitmap_expand_nbits(struct dbitmap *dmap) +{ + return dmap->nbits << 1; +} + +static inline void +dbitmap_expand(struct dbitmap *dmap, unsigned long *new, unsigned int nbit= s) +{ + /* + * Determine if the expand is still valid as it might have + * raced with another expand or free. In such case, release + * the @new bitmap and move on. + */ + if (unlikely(!dbitmap_enabled(dmap) || nbits <=3D dmap->nbits)) { + kfree(new); + return; + } + + /* + * ENOMEM is checked here as we can now discard a potential + * race with another successful expand. In such case, disable + * the dbitmap and fallback to slow_desc_lookup_olocked(). + */ + if (unlikely(!new)) { + dbitmap_free(dmap); + return; + } + + dbitmap_replace(dmap, new, nbits); +} + +static inline int +dbitmap_get_first_zero_bit(struct dbitmap *dmap, unsigned long *bit) +{ + unsigned long n; + + n =3D find_first_zero_bit(dmap->map, dmap->nbits); + if (unlikely(n =3D=3D dmap->nbits)) + return -ENOSPC; + + *bit =3D n; + set_bit(n, dmap->map); + + return 0; +} + +static inline void +dbitmap_clear_bit(struct dbitmap *dmap, unsigned long bit) +{ + clear_bit(bit, dmap->map); +} + +static inline int dbitmap_init(struct dbitmap *dmap) +{ + dmap->map =3D bitmap_zalloc(NBITS_MIN, GFP_KERNEL); + if (!dmap->map) { + dmap->nbits =3D 0; + return -ENOMEM; + } + + dmap->nbits =3D NBITS_MIN; + /* 0 is reserved for the context manager */ + set_bit(0, dmap->map); + + return 0; +} +#endif --=20 2.45.0.rc1.225.g2a3ae87e7f-goog