Received: by 10.213.65.68 with SMTP id h4csp174482imn; Thu, 15 Mar 2018 13:12:47 -0700 (PDT) X-Google-Smtp-Source: AG47ELvcz9/ifFapHqAr1b0gVmwBPKyhw72dZLdvCOnCyGGP6lPCZzT2twpHLMEzn+hAHIQ1q8tQ X-Received: by 2002:a17:902:2f81:: with SMTP id t1-v6mr9479991plb.290.1521144767341; Thu, 15 Mar 2018 13:12:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521144767; cv=none; d=google.com; s=arc-20160816; b=RFJZzT2TM+EKfCR8Yoizgd1olcQp5Zzcy0NGOK/uD15SXwtKY6Ge33IogvPxSlj0N9 0y1044/2DpMAgSsXqz4CzCP8GptkIPMRrnQVdtIYVbLUs1lpr7GZ7BBGu4RlnuIdrs5h 9FZisIHrf6lv8nunPATr7hv8ZL9WPphDjvnaCSDeHB3Nabp5ZYA1226paCcTYVcoqJr3 4eeANCFemuRTc6oajulDPVe/TZIxPILRWwJACR6pBjlsla9e3SnsZnHbV5FFPfpr65/+ Ij9+MHdjfgkAnxu3Ju9RKn2vYropjtu4aKa8k21rsa42f2g9g07ZdAtUNv/BlWQwJoPS T6SA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=1FyWYlkB0r2AI5qjszSxcd+5/NSEbyuZma2x5qF+c6A=; b=DyjVqJt5cahu8bCLMJJ7mA5A8K2IcCDw+Wue6o0S045xEdhAxvHMbqUEGcML+olg4A GUmZoBRmswsy8AQlP2UUFBvvq8Gwe6W4wGUt2uz3pV4NJtzSMFYhCj71ywgTChhD6lM4 bkxmj99LQOiLEV3y3ErMSX1mhe5O5PLmHc7eFD4ZhEn3otz49dAgr9dVA/0s8e4oBo1j SyVD7YbM5sNVFoUI59ZBcOR1ZSh68TgHdwZjUdEvMAHoCFNATrghkPOwPLkcv4KikpFG AZC5GTq1jTfETtALkSo9MaSG17dn2n8/2ipbZ5ahJJJr9l+jKVIJfW8KWxvspoPr2W67 p2yA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=dqZY6nn4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y18si4265139pfl.154.2018.03.15.13.12.27; Thu, 15 Mar 2018 13:12:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=dqZY6nn4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752150AbeCOUL3 (ORCPT + 99 others); Thu, 15 Mar 2018 16:11:29 -0400 Received: from mail-io0-f193.google.com ([209.85.223.193]:43245 "EHLO mail-io0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751612AbeCOUL2 (ORCPT ); Thu, 15 Mar 2018 16:11:28 -0400 Received: by mail-io0-f193.google.com with SMTP id l12so10010609ioc.10 for ; Thu, 15 Mar 2018 13:11:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=1FyWYlkB0r2AI5qjszSxcd+5/NSEbyuZma2x5qF+c6A=; b=dqZY6nn4pm8V3Y2pvKbzDjCrgqBPXmpSetUc106D76iyL0qnkNecWplouJXHFvDwyl tkH2vuzvK4+l1ewrIR1bPRwtUUJ1K6MulhzxCXpRbTYd10E8OeDjt2+oqc6wAaIxRL9h a7Q+nQrxHJ1EOtBpVb1nUjdb89fa0X1kFhtGrEUgcfx3j+4CFL8WprmECUamgW5c4AHV BGRUP77xv3epUj53+nrODK7WkBLDqaYV0nYgvIIsI4qPamh4UVflG7y6waXfp74EZV5O 2kvUEgp/hFzi/FCZ5gEK/s4zBRNYIJc6DY6ZnR0/1w0ldxUitOmumhgWtA91yKvdMQaa /qHQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=1FyWYlkB0r2AI5qjszSxcd+5/NSEbyuZma2x5qF+c6A=; b=mfb6pkIlgbvHQf4d5++fgNCo1FF0pzF92itVJjsFvUsa+OaNQkjrPeGrofna7ERxIq iEkgQZWHb84pDVweOEhWjmzYWfK8jxP3tMRD3s3pe4NEXE55fLo7vjy7/6dSqCMn407M gn1k5IMnDTML/+29UKIT1B6p7Dm/NUdTWEw9ONfgaXb/GfoSVwNKkN77+5TS3qk1bi8Y kRyg4ibbikP+dccaR0w2wqe8tarik0arrh5rb8umtbkQzwBBEzeeoeixwHN5tJF5bXrI kG/6eF79wvFZ0WWi+gCvzpr5fLyd5H6cJZfY6ebubsp1O+wFRC3+YgeqAftJjVoSmQ/e iiYA== X-Gm-Message-State: AElRT7Em0a/S4TyYn8yBZk3Apjlnt/+QJCSuVNTcmjPrf5ywzqNiiTWA XGg4Li2V/2UoEhxboxBz7ukG2adZjEoqVURY7y7epQ== X-Received: by 10.107.62.86 with SMTP id l83mr4168870ioa.22.1521144687748; Thu, 15 Mar 2018 13:11:27 -0700 (PDT) MIME-Version: 1.0 Received: by 10.79.140.213 with HTTP; Thu, 15 Mar 2018 13:11:27 -0700 (PDT) In-Reply-To: <20180315190529.20943-15-linux@dominikbrodowski.net> References: <20180315190529.20943-1-linux@dominikbrodowski.net> <20180315190529.20943-15-linux@dominikbrodowski.net> From: Arnd Bergmann Date: Thu, 15 Mar 2018 21:11:27 +0100 X-Google-Sender-Auth: lPubOkMaES21C1Ufa2rJYuPMW5o Message-ID: Subject: Re: [PATCH v2 14/36] fs: add ksys_mount() helper; remove in-kernel calls to sys_mount() To: Dominik Brodowski Cc: Linux Kernel Mailing List , Linus Torvalds , Al Viro , Andy Lutomirski , Ingo Molnar , Andrew Morton Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 15, 2018 at 8:05 PM, Dominik Brodowski wrote: > Using this helper allows us to avoid the in-kernel calls to the sys_mount() > syscall. > > Cc: Alexander Viro > Signed-off-by: Dominik Brodowski > diff --git a/drivers/base/devtmpfs.c b/drivers/base/devtmpfs.c > index 50025d7959cb..4afb04686c8e 100644 > --- a/drivers/base/devtmpfs.c > +++ b/drivers/base/devtmpfs.c > @@ -356,7 +356,8 @@ int devtmpfs_mount(const char *mntdir) > if (!thread) > return 0; > > - err = sys_mount("devtmpfs", (char *)mntdir, "devtmpfs", MS_SILENT, NULL); > + err = ksys_mount("devtmpfs", (char *)mntdir, "devtmpfs", MS_SILENT, > + NULL); > if (err) > printk(KERN_INFO "devtmpfs: error mounting %i\n", err); > else > @@ -382,7 +383,7 @@ static int devtmpfsd(void *p) > *err = sys_unshare(CLONE_NEWNS); > if (*err) > goto out; > - *err = sys_mount("devtmpfs", "/", "devtmpfs", MS_SILENT, options); > + *err = ksys_mount("devtmpfs", "/", "devtmpfs", MS_SILENT, options); > if (*err) > goto out; > sys_chdir("/.."); /* will traverse into overmounted root */ Shouldn't the callers of sys_mount just call do_mount() instead? As I understand it, sys_mount is already a wrapper around do_mount() that copies its arguments from user space, but we don't need that when called from inside the kernel. Arnd