* [PATCH for bkl-removal] IB/umad: BKL is not needed for ib_umad_open()
@ 2008-07-11 20:31 Roland Dreier
2008-07-11 20:54 ` [PATCH for bkl-removal v2] " Roland Dreier
0 siblings, 1 reply; 3+ messages in thread
From: Roland Dreier @ 2008-07-11 20:31 UTC (permalink / raw)
To: Jonathan Corbet; +Cc: linux-kernel, general
Remove explicit lock_kernel() calls and document why the code is safe.
Signed-off-by: Roland Dreier <rolandd@cisco.com>
---
Hi Jon, more BKL removal for your tree. Should be ready for 2.6.27.
diff --git a/drivers/infiniband/core/user_mad.c b/drivers/infiniband/core/user_mad.c
index 260b3df..d31e5bb 100644
--- a/drivers/infiniband/core/user_mad.c
+++ b/drivers/infiniband/core/user_mad.c
@@ -47,7 +47,6 @@
#include <linux/kref.h>
#include <linux/compat.h>
#include <linux/semaphore.h>
-#include <linux/smp_lock.h>
#include <asm/uaccess.h>
@@ -778,23 +777,33 @@ static long ib_umad_compat_ioctl(struct file *filp, unsigned int cmd,
}
#endif
+/*
+ * ib_umad_open() does not need the BKL:
+ *
+ * - umad_port[] accesses are protected by port_lock, the
+ * ib_umad_port structures are properly reference counted, and
+ * everything else is purely local to the file being created, so
+ * races against other open calls are not a proble;
+ * - the ioctl method does not affect any global state outside of the
+ * file structure being operated on;
+ * - the port is added to umad_port[] as the last part of module
+ * initialization so the open method will either immediately run
+ * -ENXIO, or all required initialization will be done.
+ */
static int ib_umad_open(struct inode *inode, struct file *filp)
{
struct ib_umad_port *port;
struct ib_umad_file *file;
int ret = 0;
- lock_kernel();
spin_lock(&port_lock);
port = umad_port[iminor(inode) - IB_UMAD_MINOR_BASE];
if (port)
kref_get(&port->umad_dev->ref);
spin_unlock(&port_lock);
- if (!port) {
- unlock_kernel();
+ if (!port)
return -ENXIO;
- }
mutex_lock(&port->file_mutex);
@@ -823,7 +832,6 @@ static int ib_umad_open(struct inode *inode, struct file *filp)
out:
mutex_unlock(&port->file_mutex);
- unlock_kernel();
return ret;
}
^ permalink raw reply related [flat|nested] 3+ messages in thread
* [PATCH for bkl-removal v2] IB/umad: BKL is not needed for ib_umad_open()
2008-07-11 20:31 [PATCH for bkl-removal] IB/umad: BKL is not needed for ib_umad_open() Roland Dreier
@ 2008-07-11 20:54 ` Roland Dreier
2008-07-11 22:42 ` Jonathan Corbet
0 siblings, 1 reply; 3+ messages in thread
From: Roland Dreier @ 2008-07-11 20:54 UTC (permalink / raw)
To: Jonathan Corbet; +Cc: linux-kernel, general
Remove explicit lock_kernel() calls and document why the code is safe.
Signed-off-by: Roland Dreier <rolandd@cisco.com>
---
Resending with s/proble/problem/
diff --git a/drivers/infiniband/core/user_mad.c b/drivers/infiniband/core/user_mad.c
index 260b3df..d31e5bb 100644
--- a/drivers/infiniband/core/user_mad.c
+++ b/drivers/infiniband/core/user_mad.c
@@ -47,7 +47,6 @@
#include <linux/kref.h>
#include <linux/compat.h>
#include <linux/semaphore.h>
-#include <linux/smp_lock.h>
#include <asm/uaccess.h>
@@ -778,23 +777,33 @@ static long ib_umad_compat_ioctl(struct file *filp, unsigned int cmd,
}
#endif
+/*
+ * ib_umad_open() does not need the BKL:
+ *
+ * - umad_port[] accesses are protected by port_lock, the
+ * ib_umad_port structures are properly reference counted, and
+ * everything else is purely local to the file being created, so
+ * races against other open calls are not a problem;
+ * - the ioctl method does not affect any global state outside of the
+ * file structure being operated on;
+ * - the port is added to umad_port[] as the last part of module
+ * initialization so the open method will either immediately run
+ * -ENXIO, or all required initialization will be done.
+ */
static int ib_umad_open(struct inode *inode, struct file *filp)
{
struct ib_umad_port *port;
struct ib_umad_file *file;
int ret = 0;
- lock_kernel();
spin_lock(&port_lock);
port = umad_port[iminor(inode) - IB_UMAD_MINOR_BASE];
if (port)
kref_get(&port->umad_dev->ref);
spin_unlock(&port_lock);
- if (!port) {
- unlock_kernel();
+ if (!port)
return -ENXIO;
- }
mutex_lock(&port->file_mutex);
@@ -823,7 +832,6 @@ static int ib_umad_open(struct inode *inode, struct file *filp)
out:
mutex_unlock(&port->file_mutex);
- unlock_kernel();
return ret;
}
^ permalink raw reply related [flat|nested] 3+ messages in thread
* Re: [PATCH for bkl-removal v2] IB/umad: BKL is not needed for ib_umad_open()
2008-07-11 20:54 ` [PATCH for bkl-removal v2] " Roland Dreier
@ 2008-07-11 22:42 ` Jonathan Corbet
0 siblings, 0 replies; 3+ messages in thread
From: Jonathan Corbet @ 2008-07-11 22:42 UTC (permalink / raw)
To: Roland Dreier; +Cc: linux-kernel, general
On Fri, 11 Jul 2008 13:54:40 -0700
Roland Dreier <rdreier@cisco.com> wrote:
> Remove explicit lock_kernel() calls and document why the code is safe.
Applied to the bkl-removal tree and pushed - thanks.
jon
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2008-07-11 22:42 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2008-07-11 20:31 [PATCH for bkl-removal] IB/umad: BKL is not needed for ib_umad_open() Roland Dreier
2008-07-11 20:54 ` [PATCH for bkl-removal v2] " Roland Dreier
2008-07-11 22:42 ` Jonathan Corbet
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox