Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp275692ybk; Tue, 19 May 2020 22:31:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxmDxKSN6YfFoD9NbgcWbrB454cklR27Wue4HAVzk5twNnL3RSQeCcTO1q3bdcPf0lAoDah X-Received: by 2002:a17:906:dbef:: with SMTP id yd15mr2301879ejb.5.1589952710385; Tue, 19 May 2020 22:31:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589952710; cv=none; d=google.com; s=arc-20160816; b=xFM++68Atn23+9vAMfHR6OrVJgbrJsj8zvJnCUUi6PF3SM+Z9EEvyngF6EFQpCQEQB +eVuWO5BkzEYp3sJqCKMUoYcemCAZDcWupuwa3eHtic5pbiT1KKVeP4Bl3CZ6l1xwLnv Ds4b3GAFTxwu5WNTxv8RLYkDyxnIftC12yx9UL6vvyEhyVUwCMgDBwxARIAqQCudStCf KepqV8eZ9ali2L9Bqa2/hwWA6V9t/M8Exd/4etkQYiNDphAOlQrbyQb834WnZ1GRm6dK rYsQFvZDqlN07bfR14OP2SUGxtK6x69b62D6YyufDkbE3hegxBy+tvum6Px7Xd59mhId OyFw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=l1uoa86T5i4IFuilenMyhOPWP4qckBe++S0EocRcQls=; b=IDh40hc+PqdhWZdH8tgluFDmPHQdhBQ+DCGxnrc+UhtDk7tdBZtZGWEQspitYpjQh5 ypyzwLWkeKbWXxHMOej14F7DZGdmqeZefKh4S+xPLKjivV8+1r+AsVabIIweIqtYycPx vI6LKsrcYUqanLZ3V3a9aGnmp+KkLX1bymz2OCjWq9dlDd9tk/pwD3ikp7DyKOcZjV6c h9wOqnVt/46Nhk4OLAQSGEyvljhFs5/yoOFBrOSflzemLHFJs7JgCYxiABvrs7m41yjc zrECVd5zaXSHX5bAYOozOarYwQfNeoTbSRqGiFj3U76Rj4kN8xFiqCeRAnOppFwbAPxK /xkQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="QvaAR/Z1"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i29si863219edj.93.2020.05.19.22.31.28; Tue, 19 May 2020 22:31:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="QvaAR/Z1"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727818AbgETF3e (ORCPT + 99 others); Wed, 20 May 2020 01:29:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56454 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727920AbgETF31 (ORCPT ); Wed, 20 May 2020 01:29:27 -0400 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0738DC061A0E for ; Tue, 19 May 2020 22:29:26 -0700 (PDT) Received: by mail-yb1-xb4a.google.com with SMTP id h129so791968ybc.3 for ; Tue, 19 May 2020 22:29:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=l1uoa86T5i4IFuilenMyhOPWP4qckBe++S0EocRcQls=; b=QvaAR/Z1wFWclp2SJqNPyqR+d0jKSmW68eXhKD/5TIJ2urgqSmzVtXTqeojvszjNna zD3dHpNhkNSgq9KY5pNpqM1isqORrzmgBmmBy2t0RKNIvUDiXXVjlHDAbxxwN9kxm5yT EwlMBAvXuBJNOZAaMmCE4rw76wCn+y1ifVSQ1UFZBx0Md6wCB1QuGxrYRaUI/HQVNCfy GNvT5lMosujsnrREDE8eLE3XN6tOiSyfnKLOraUVB0d1FfvbF/Sjilw4KM/gYzHJBdvb FtJ+xmhCwLCSuAp+1RTUXcxGc7oQ1DlV5/m0u0BuNqjtQ4L0fCxtamAwhw/IzEOVLvEd C5nQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=l1uoa86T5i4IFuilenMyhOPWP4qckBe++S0EocRcQls=; b=n6+cwXtBetLFI2Z1LVsKL49t0OYPAlTduhGxpXKLQ05+3xeTKfaEh5podLXDvl8qhF IIKb1GgdPnxZSc3kUvCIL7eusWKKBiJzwZaDVRd7yzweNGfX9yj6T69gErr00jDKRa6Y caFKORSZXZ07yNbdN7D5W/HzvC1p6yFnsqDNnaMOhpNHnx2jW57TKqLFbtiG7IpZbVxj UWLcseDn8wmIwvF15WIgFQleBPonu6TrGmzEwCn2lOX8gz+R7C+qlP98fm9ueTwgAqdK 12jcYerM9lp6JQZoRTgEzMlCtUv350+B5oA2W41Aw6XLfT/IpijuCzKhVzJXS/ZYzqGR hPJA== X-Gm-Message-State: AOAM530fneplwPyHbZwkJ28BTI8XYniq/HlsXCaD9Sy/5CMt9cickMEA yyUIz37iUQwgfWpwv1jhLufVDbowbEA= X-Received: by 2002:a25:e86:: with SMTP id 128mr4998694ybo.344.1589952565280; Tue, 19 May 2020 22:29:25 -0700 (PDT) Date: Tue, 19 May 2020 22:29:02 -0700 In-Reply-To: <20200520052908.204642-1-walken@google.com> Message-Id: <20200520052908.204642-7-walken@google.com> Mime-Version: 1.0 References: <20200520052908.204642-1-walken@google.com> X-Mailer: git-send-email 2.26.2.761.g0e0b3e54be-goog Subject: [PATCH v6 06/12] mmap locking API: convert nested write lock sites From: Michel Lespinasse To: Andrew Morton , linux-mm Cc: LKML , Peter Zijlstra , Laurent Dufour , Vlastimil Babka , Matthew Wilcox , Liam Howlett , Jerome Glisse , Davidlohr Bueso , David Rientjes , Hugh Dickins , Ying Han , Jason Gunthorpe , Daniel Jordan , John Hubbard , Michel Lespinasse Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add API for nested write locks and convert the few call sites doing that. Signed-off-by: Michel Lespinasse Reviewed-by: Daniel Jordan Reviewed-by: Laurent Dufour Reviewed-by: Vlastimil Babka --- arch/um/include/asm/mmu_context.h | 3 ++- include/linux/mmap_lock.h | 5 +++++ kernel/fork.c | 2 +- 3 files changed, 8 insertions(+), 2 deletions(-) diff --git a/arch/um/include/asm/mmu_context.h b/arch/um/include/asm/mmu_context.h index 62262c5c7785..17ddd4edf875 100644 --- a/arch/um/include/asm/mmu_context.h +++ b/arch/um/include/asm/mmu_context.h @@ -8,6 +8,7 @@ #include #include +#include #include @@ -47,7 +48,7 @@ static inline void activate_mm(struct mm_struct *old, struct mm_struct *new) * when the new ->mm is used for the first time. */ __switch_mm(&new->context.id); - down_write_nested(&new->mmap_sem, 1); + mmap_write_lock_nested(new, SINGLE_DEPTH_NESTING); uml_setup_stubs(new); mmap_write_unlock(new); } diff --git a/include/linux/mmap_lock.h b/include/linux/mmap_lock.h index 97ac53b66052..a757cb30ae77 100644 --- a/include/linux/mmap_lock.h +++ b/include/linux/mmap_lock.h @@ -11,6 +11,11 @@ static inline void mmap_write_lock(struct mm_struct *mm) down_write(&mm->mmap_sem); } +static inline void mmap_write_lock_nested(struct mm_struct *mm, int subclass) +{ + down_write_nested(&mm->mmap_sem, subclass); +} + static inline int mmap_write_lock_killable(struct mm_struct *mm) { return down_write_killable(&mm->mmap_sem); diff --git a/kernel/fork.c b/kernel/fork.c index a4db6bc952c6..e702e84897fa 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -499,7 +499,7 @@ static __latent_entropy int dup_mmap(struct mm_struct *mm, /* * Not linked in yet - no deadlock potential: */ - down_write_nested(&mm->mmap_sem, SINGLE_DEPTH_NESTING); + mmap_write_lock_nested(mm, SINGLE_DEPTH_NESTING); /* No ordering required: file already has been exposed. */ RCU_INIT_POINTER(mm->exe_file, get_mm_exe_file(oldmm)); -- 2.26.2.761.g0e0b3e54be-goog