From: lipeifeng Date: Thu, 22 Jun 2023 04:01:52 +0000 (+0800) Subject: mm: nommu: correct the range of mmap_sem_read_lock in task_mem() X-Git-Tag: v6.6.7~2549^2~1 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=341d51c8861fe05a8b3ea317f03f26aa0fb30710;p=platform%2Fkernel%2Flinux-starfive.git mm: nommu: correct the range of mmap_sem_read_lock in task_mem() During the seq_printf,the mmap_sem_read_lock protection is not required. Link: https://lkml.kernel.org/r/20230622040152.1173-1-lipeifeng@oppo.com Signed-off-by: lipeifeng Cc: David Hildenbrand Cc: Liam R. Howlett Cc: Matthew Wilcox Cc: Vlastimil Babka Signed-off-by: Andrew Morton --- diff --git a/fs/proc/task_nommu.c b/fs/proc/task_nommu.c index 0ec3507..2c8b622 100644 --- a/fs/proc/task_nommu.c +++ b/fs/proc/task_nommu.c @@ -51,7 +51,7 @@ void task_mem(struct seq_file *m, struct mm_struct *mm) sbytes += kobjsize(mm); else bytes += kobjsize(mm); - + if (current->fs && current->fs->users > 1) sbytes += kobjsize(current->fs); else @@ -69,13 +69,13 @@ void task_mem(struct seq_file *m, struct mm_struct *mm) bytes += kobjsize(current); /* includes kernel stack */ + mmap_read_unlock(mm); + seq_printf(m, "Mem:\t%8lu bytes\n" "Slack:\t%8lu bytes\n" "Shared:\t%8lu bytes\n", bytes, slack, sbytes); - - mmap_read_unlock(mm); } unsigned long task_vsize(struct mm_struct *mm)