Re: [PATCH RFC] BKL not necessary in cpuid_open
From: Frederic Weisbecker
Date: Wed Oct 07 2009 - 15:14:15 EST
On Wed, Oct 07, 2009 at 08:19:32PM +0200, John Kacur wrote:
>
> I've been staring at the BKL lock in cpuid_open, and I can't see what it
> is protecting. However, I may have missed something - even something
> obvious, so comments are welcome.
>
> From 25c0f07b3ec5533c0e690e06198baa4300ee4a8c Mon Sep 17 00:00:00 2001
> From: John Kacur <jkacur@xxxxxxxxxx>
> Date: Wed, 7 Oct 2009 20:06:12 +0200
> Subject: [PATCH] The BKL is not necessary in cpuid_open
> Most of the variables are local to the function. It IS possible that for
> struct cpuinfo_x86 *c
> c could point to the same area. However, this is used read only.
>
> Signed-off-by: John Kacur <jkacur@xxxxxxxxxx>
> ---
> arch/x86/kernel/cpuid.c | 3 ---
> 1 files changed, 0 insertions(+), 3 deletions(-)
>
> diff --git a/arch/x86/kernel/cpuid.c b/arch/x86/kernel/cpuid.c
> index 6a52d4b..8bb8401 100644
> --- a/arch/x86/kernel/cpuid.c
> +++ b/arch/x86/kernel/cpuid.c
> @@ -118,8 +118,6 @@ static int cpuid_open(struct inode *inode, struct file *file)
> struct cpuinfo_x86 *c;
> int ret = 0;
>
> - lock_kernel();
> -
> cpu = iminor(file->f_path.dentry->d_inode);
> if (cpu >= nr_cpu_ids || !cpu_online(cpu)) {
> ret = -ENXIO; /* No such CPU */
> @@ -129,7 +127,6 @@ static int cpuid_open(struct inode *inode, struct file *file)
> if (c->cpuid_level < 0)
> ret = -EIO; /* CPUID not supported */
> out:
> - unlock_kernel();
> return ret;
> }
Everything look safe there.
Looking at what happens if the targeted cpu is removed:
I don't know if device_destroy() waits for the last reader to
complete on the given device file, but if it does, it's really
safe, if not:
- The cpu_data(cpu) won't be released anyway, only some values inside
c will be changed, wich is not that a big issue, and the bkl
doesn't help about that either
- We just checked if the cpu is online. It can be put offline
just after. Whatever the bkl or not, it can also be put offline
between open and read calls.
So I think this bkl doesn't protect anything.
Reviewed-by: Frederic Weisbecker <fweisbec@xxxxxxxxx>
PS: We have the exact same pattern in arch/x86/kernel/msr.c:msr_open()
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/