From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 246D9E7718F for ; Thu, 26 Dec 2024 17:07:39 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 7E7C86B009D; Thu, 26 Dec 2024 12:07:35 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 794A16B009E; Thu, 26 Dec 2024 12:07:35 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 63A466B009F; Thu, 26 Dec 2024 12:07:35 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 418696B009D for ; Thu, 26 Dec 2024 12:07:35 -0500 (EST) Received: from smtpin24.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay01.hostedemail.com (Postfix) with ESMTP id E960C1C9139 for ; Thu, 26 Dec 2024 17:07:34 +0000 (UTC) X-FDA: 82937740410.24.FD3D290 Received: from mail-pl1-f201.google.com (mail-pl1-f201.google.com [209.85.214.201]) by imf07.hostedemail.com (Postfix) with ESMTP id BCF6F4001A for ; Thu, 26 Dec 2024 17:06:21 +0000 (UTC) Authentication-Results: imf07.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=v1ZQmY2j; spf=pass (imf07.hostedemail.com: domain of 3U41tZwYKCGYWYVIRFKSSKPI.GSQPMRYb-QQOZEGO.SVK@flex--surenb.bounces.google.com designates 209.85.214.201 as permitted sender) smtp.mailfrom=3U41tZwYKCGYWYVIRFKSSKPI.GSQPMRYb-QQOZEGO.SVK@flex--surenb.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1735232824; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=3UFX636acVjy8McvbWwNjOMeHy5jkJa1vw72jY/LAWg=; b=SPLRQYEvtzWWQn/pL7mQE7diPgED1Rr/tJzUOMDc8VQbuK39aYEI8nZC1vZFKoLVR4WFEU UnDZIxzNYXequPtz9T5vAAeFiBmf4LZsfyPB4OcR9cveXXtAvhrjEsOIMsTo3hoHUKvsi9 7w3rfNb8ZT5EJCfoyxcSkiphXAk0EM0= ARC-Authentication-Results: i=1; imf07.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=v1ZQmY2j; spf=pass (imf07.hostedemail.com: domain of 3U41tZwYKCGYWYVIRFKSSKPI.GSQPMRYb-QQOZEGO.SVK@flex--surenb.bounces.google.com designates 209.85.214.201 as permitted sender) smtp.mailfrom=3U41tZwYKCGYWYVIRFKSSKPI.GSQPMRYb-QQOZEGO.SVK@flex--surenb.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1735232824; a=rsa-sha256; cv=none; b=bVYKwlcv/hQlEvuYZa8/HU38utSfU1/BXvhn/lzIHOF7rTkHtplIp7EKpvnrkaWGzw7S3M sXeYLpu1eWlH0T/XgRCJZ8NWMZpvwT5YKdEdGmEN2LAswwnW/b4mWutdmN7k5oKsmejifr l+qPPw8ii3xXnYR2jEO+FWw04AMqLyg= Received: by mail-pl1-f201.google.com with SMTP id d9443c01a7336-2166d99341eso84110135ad.0 for ; Thu, 26 Dec 2024 09:07:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1735232852; x=1735837652; darn=kvack.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=3UFX636acVjy8McvbWwNjOMeHy5jkJa1vw72jY/LAWg=; b=v1ZQmY2j8NEHv3Y6zrfymU7Q2esb5Y+npUIjtywy1zVSYvj3/veG2wpsdhiyW4gH6Q F9noMVOkO5uua9KzLwzihEu61kMZwjfEQmd3co/JW4b3VND1KtfAMIJV7ofo58+eAcLu ZeFeALFsVouibGEhTqQlz/s205q4y6qipwlqrrUcobhfzhHwqFH/hEVed4GGdnZ+hu+C pjv37jrKYwCQn59KljPN2pU5J8In/k/5NB/Bfoc5usMePULDf/XWyyumFNpkW9WRyd6I pZf465rjWtYZ4nzyrqIT+vm/3OsQzwvNP1gf8HQ7P2+cgt80+d6tgFGEnfIPm8PDWILl j3lA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1735232852; x=1735837652; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=3UFX636acVjy8McvbWwNjOMeHy5jkJa1vw72jY/LAWg=; b=MNh8NNyTBIZ61uadWrx+W86PjmQ7+qGlg/NSpQFzOvVJmpQ+6YbykhCXt37jQQHJlV eDIr5BDx6ts2fIyMHseiDVYWOvmU45xj+KppKRt0b0QJeUJyG7d+ZqaTWqMDP6XsegG1 s/wjHD+DFQ6jdXPB8VBLNh8mNDlSEoldfJjAuCI3GVg3MLFSFFw58CdOdeFt/5yuCF2n XfLKLeQTUjmIcTnro/UupjH18GdwAd8/dD6k1e8azSsqO4cskW5FZdrBdnwYDRIsET/w DaWFwEjKP5nftDWojKCZdnv505QRR5iBFjwPaa0psJIvZjvr55qkmwoJWcjen2UlooQq JV3Q== X-Forwarded-Encrypted: i=1; AJvYcCVmqiJMV1WpQUgDanNmLVVqrI/k5iCXzwWzkdj19X5T12el6AoC2CSMkQf+b5jOTmEqOdbDWNBdWA==@kvack.org X-Gm-Message-State: AOJu0Yyu+7NMMcH/STF01zZkkDK/X++fq4dH7EjEpdboQrDe6qGf3gqF fSwSnPOuDwUrIebKhDoCOrp4yiZTpUKyjUcom+WzkQO28yAtdK8+NtZ9sKYqMvKTOTzNxhjesTO 4Yg== X-Google-Smtp-Source: AGHT+IE+Il4aaMscBOZzUniftz3cly+CPDHxMUs/tHLaE2nxYIYJF6s9V97DoMW87H97O8rFF+TQEZN/e8w= X-Received: from plsp1.prod.google.com ([2002:a17:902:bd01:b0:212:5134:8485]) (user=surenb job=prod-delivery.src-stubby-dispatcher) by 2002:a17:903:2cc:b0:216:5867:976a with SMTP id d9443c01a7336-219e6f1176fmr305791325ad.45.1735232851873; Thu, 26 Dec 2024 09:07:31 -0800 (PST) Date: Thu, 26 Dec 2024 09:07:01 -0800 In-Reply-To: <20241226170710.1159679-1-surenb@google.com> Mime-Version: 1.0 References: <20241226170710.1159679-1-surenb@google.com> X-Mailer: git-send-email 2.47.1.613.gc27f4b7a9f-goog Message-ID: <20241226170710.1159679-10-surenb@google.com> Subject: [PATCH v7 09/17] mm: move mmap_init_lock() out of the header file From: Suren Baghdasaryan To: akpm@linux-foundation.org Cc: peterz@infradead.org, willy@infradead.org, liam.howlett@oracle.com, lorenzo.stoakes@oracle.com, mhocko@suse.com, vbabka@suse.cz, hannes@cmpxchg.org, mjguzik@gmail.com, oliver.sang@intel.com, mgorman@techsingularity.net, david@redhat.com, peterx@redhat.com, oleg@redhat.com, dave@stgolabs.net, paulmck@kernel.org, brauner@kernel.org, dhowells@redhat.com, hdanton@sina.com, hughd@google.com, lokeshgidra@google.com, minchan@google.com, jannh@google.com, shakeel.butt@linux.dev, souravpanda@google.com, pasha.tatashin@soleen.com, klarasmodin@gmail.com, corbet@lwn.net, linux-doc@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-team@android.com, surenb@google.com Content-Type: text/plain; charset="UTF-8" X-Rspamd-Server: rspam05 X-Stat-Signature: ejqhasr7gzk4sspz91okdajhq3mc3ad9 X-Rspamd-Queue-Id: BCF6F4001A X-Rspam-User: X-HE-Tag: 1735232781-323995 X-HE-Meta: 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 wu7zZMEL 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 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: mmap_init_lock() is used only from mm_init() in fork.c, therefore it does not have to reside in the header file. This move lets us avoid including additional headers in mmap_lock.h later, when mmap_init_lock() needs to initialize rcuwait object. Signed-off-by: Suren Baghdasaryan --- include/linux/mmap_lock.h | 6 ------ kernel/fork.c | 6 ++++++ 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/include/linux/mmap_lock.h b/include/linux/mmap_lock.h index 45a21faa3ff6..4706c6769902 100644 --- a/include/linux/mmap_lock.h +++ b/include/linux/mmap_lock.h @@ -122,12 +122,6 @@ static inline bool mmap_lock_speculate_retry(struct mm_struct *mm, unsigned int #endif /* CONFIG_PER_VMA_LOCK */ -static inline void mmap_init_lock(struct mm_struct *mm) -{ - init_rwsem(&mm->mmap_lock); - mm_lock_seqcount_init(mm); -} - static inline void mmap_write_lock(struct mm_struct *mm) { __mmap_lock_trace_start_locking(mm, true); diff --git a/kernel/fork.c b/kernel/fork.c index f2f9e7b427ad..d4c75428ccaf 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -1219,6 +1219,12 @@ static void mm_init_uprobes_state(struct mm_struct *mm) #endif } +static inline void mmap_init_lock(struct mm_struct *mm) +{ + init_rwsem(&mm->mmap_lock); + mm_lock_seqcount_init(mm); +} + static struct mm_struct *mm_init(struct mm_struct *mm, struct task_struct *p, struct user_namespace *user_ns) { -- 2.47.1.613.gc27f4b7a9f-goog