Received: by 10.223.176.5 with SMTP id f5csp1990579wra; Sun, 4 Feb 2018 17:35:57 -0800 (PST) X-Google-Smtp-Source: AH8x225XFIq1UepfOl5+ddiLshw7wAf0JsKds9hQ1grdDgTkb3DSD4asXeAaMi2C1eKFg/8Kc67+ X-Received: by 2002:a17:902:1a4:: with SMTP id b33-v6mr5335266plb.58.1517794557331; Sun, 04 Feb 2018 17:35:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517794557; cv=none; d=google.com; s=arc-20160816; b=orKd2OLlAs1LgeAWJkIslIXim+2RnLkLGfRnrB6YZ8Ur6ufY0Hc3Omc6dWgCb/y1tn p03sJXfd9i+26QxviV4x8e8M8SNbCgcx8nlrZRZADzDmfIDuMSaWdYMhjIzE1KTwonxL uuBX0VBNFgu9nutr5v73UgANKI0ni52zy0fzxXAZYTv6jjQZQ9QoOoVn8bTQFImOIy4O WcYde3hvL8s2K/mTy0PIILWiRGcy2V43kgy/ffd2gw91vzz4QHSISQWpWa5ble4ff4r9 bS8yokFk7IPjHHQplqJaURIEN5wcNoOiTaB7BjkXY4vOMDgZg0ujoRyEM779HMlsjDcq CkEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=8lHpPfq2KfTPgmtsBsOtliHkrr5YvjMEzzZp/YvmJzg=; b=Ao+8ZCOwm09lZxhuuG/pm8oVbqsjvDArnYyPoKNBp7iKggmjjh7eDoV3NSw5EFqhIB POrlxw267IdYNMuMSMktbpUU/GXdAPZ7WEv8fRB/gUOmAx7H9BOrNKHLnh1CKG8JYOLu eVsaYPAdzbGrH/bDZxeOUM6mDtW7kR+YNSXkKs6kD3l9YBc8JRmjJngSh93HDiwQ10wY vmDSUYKDY4dx2o0MFwt7NOp0agjbVl5BjKaaucnR6QWGl3cqPSL+UGuckKgKRi8K/Cos OVP0Q68OcXpCztovaNF9nc5DYAPH/6L1LsKmw1osgC0E6vHUBiVJKYqQkKF3kXasO+ur edDw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c80si6043199pfb.182.2018.02.04.17.35.43; Sun, 04 Feb 2018 17:35:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752857AbeBEBdg (ORCPT + 99 others); Sun, 4 Feb 2018 20:33:36 -0500 Received: from mx2.suse.de ([195.135.220.15]:44160 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752786AbeBEB3V (ORCPT ); Sun, 4 Feb 2018 20:29:21 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 94844AE1B; Mon, 5 Feb 2018 01:28:01 +0000 (UTC) From: Davidlohr Bueso To: akpm@linux-foundation.org, mingo@kernel.org Cc: peterz@infradead.org, ldufour@linux.vnet.ibm.com, jack@suse.cz, mhocko@kernel.org, kirill.shutemov@linux.intel.com, mawilcox@microsoft.com, mgorman@techsingularity.net, dave@stgolabs.net, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Davidlohr Bueso Subject: [PATCH 48/64] arch/tile: use mm locking wrappers Date: Mon, 5 Feb 2018 02:27:38 +0100 Message-Id: <20180205012754.23615-49-dbueso@wotan.suse.de> X-Mailer: git-send-email 2.12.3 In-Reply-To: <20180205012754.23615-1-dbueso@wotan.suse.de> References: <20180205012754.23615-1-dbueso@wotan.suse.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Davidlohr Bueso * THIS IS A HACK * Breaks arch/um/. See comment in fix_range_common(). Signed-off-by: Davidlohr Bueso --- arch/um/include/asm/mmu_context.h | 5 +++-- arch/um/kernel/tlb.c | 12 +++++++++++- arch/um/kernel/trap.c | 6 +++--- 3 files changed, 17 insertions(+), 6 deletions(-) diff --git a/arch/um/include/asm/mmu_context.h b/arch/um/include/asm/mmu_context.h index 98cc3e36385a..7dc202c611db 100644 --- a/arch/um/include/asm/mmu_context.h +++ b/arch/um/include/asm/mmu_context.h @@ -49,14 +49,15 @@ extern void force_flush_all(void); static inline void activate_mm(struct mm_struct *old, struct mm_struct *new) { + DEFINE_RANGE_LOCK_FULL(mmrange); /* * This is called by fs/exec.c and sys_unshare() * when the new ->mm is used for the first time. */ __switch_mm(&new->context.id); - down_write(&new->mmap_sem); + mm_write_lock(new, &mmrange); uml_setup_stubs(new); - up_write(&new->mmap_sem); + mm_write_unlock(new, &mmrange); } static inline void switch_mm(struct mm_struct *prev, struct mm_struct *next, diff --git a/arch/um/kernel/tlb.c b/arch/um/kernel/tlb.c index 37508b190106..eeeeb048b6f4 100644 --- a/arch/um/kernel/tlb.c +++ b/arch/um/kernel/tlb.c @@ -297,10 +297,20 @@ void fix_range_common(struct mm_struct *mm, unsigned long start_addr, /* This is not an else because ret is modified above */ if (ret) { + /* + * FIXME: this is _wrong_ and will break arch/um. + * + * The right thing to do is modify the flush_tlb_range() + * api, but that in turn would require file_operations + * knowing about mmrange... Compiles cleanly, but sucks + * otherwise. + */ + DEFINE_RANGE_LOCK_FULL(mmrange); + printk(KERN_ERR "fix_range_common: failed, killing current " "process: %d\n", task_tgid_vnr(current)); /* We are under mmap_sem, release it such that current can terminate */ - up_write(¤t->mm->mmap_sem); + mm_write_unlock(current->mm, &mmrange); force_sig(SIGKILL, current); do_signal(¤t->thread.regs); } diff --git a/arch/um/kernel/trap.c b/arch/um/kernel/trap.c index e632a14e896e..14dcb83d00a9 100644 --- a/arch/um/kernel/trap.c +++ b/arch/um/kernel/trap.c @@ -47,7 +47,7 @@ int handle_page_fault(unsigned long address, unsigned long ip, if (is_user) flags |= FAULT_FLAG_USER; retry: - down_read(&mm->mmap_sem); + mm_read_lock(mm, &mmrange); vma = find_vma(mm, address); if (!vma) goto out; @@ -123,7 +123,7 @@ int handle_page_fault(unsigned long address, unsigned long ip, #endif flush_tlb_page(vma, address); out: - up_read(&mm->mmap_sem); + mm_read_unlock(mm, &mmrange); out_nosemaphore: return err; @@ -132,7 +132,7 @@ int handle_page_fault(unsigned long address, unsigned long ip, * We ran out of memory, call the OOM killer, and return the userspace * (which will retry the fault, or kill us if we got oom-killed). */ - up_read(&mm->mmap_sem); + mm_read_unlock(mm, &mmrange); if (!is_user) goto out_nosemaphore; pagefault_out_of_memory(); -- 2.13.6