From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1760092AbZCCAdp (ORCPT ); Mon, 2 Mar 2009 19:33:45 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1757649AbZCCAdf (ORCPT ); Mon, 2 Mar 2009 19:33:35 -0500 Received: from mx2.mail.elte.hu ([157.181.151.9]:60145 "EHLO mx2.mail.elte.hu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757496AbZCCAde (ORCPT ); Mon, 2 Mar 2009 19:33:34 -0500 Date: Tue, 3 Mar 2009 01:32:37 +0100 From: Ingo Molnar To: Mathieu Desnoyers , Peter Zijlstra Cc: Masami Hiramatsu , Andrew Morton , Nick Piggin , Steven Rostedt , Andi Kleen , linux-kernel@vger.kernel.org, Thomas Gleixner , Peter Zijlstra , Frederic Weisbecker , Linus Torvalds , Arjan van de Ven , Rusty Russell , "H. Peter Anvin" , Steven Rostedt Subject: Re: [PATCH] Text Edit Lock - Architecture Independent Code Message-ID: <20090303003237.GA30221@elte.hu> References: <49A853CD.3020607@redhat.com> <49AC10E9.1090102@redhat.com> <20090302171914.GB21735@Krystal> <49AC5A87.7000604@redhat.com> <20090302222254.GA31962@elte.hu> <49AC63FA.70801@redhat.com> <20090302230915.GA11626@elte.hu> <49AC6DEA.2050304@redhat.com> <20090302234910.GA17956@elte.hu> <20090303000054.GC3906@Krystal> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20090303000054.GC3906@Krystal> User-Agent: Mutt/1.5.18 (2008-05-17) X-ELTE-VirusStatus: clean X-ELTE-SpamScore: -1.5 X-ELTE-SpamLevel: X-ELTE-SpamCheck: no X-ELTE-SpamVersion: ELTE 2.0 X-ELTE-SpamCheck-Details: score=-1.5 required=5.9 tests=BAYES_00 autolearn=no SpamAssassin version=3.2.3 -1.5 BAYES_00 BODY: Bayesian spam probability is 0 to 1% [score: 0.0000] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Mathieu Desnoyers wrote: > +/* > + * Take and release the kernel text modification lock, used for code patching. > + * Users of this lock can sleep. > + */ > +extern void kernel_text_lock(void); > +extern void kernel_text_unlock(void); Locking APIs with hidden semantics are very ugly. Remember lock_kernel()? > +/* > + * mutex protecting text section modification (dynamic code patching). > + * some users need to sleep (allocating memory...) while they hold this lock. > + */ > +static DEFINE_MUTEX(text_mutex); Please update those sites to do an explicit: mutex_lock(&text_mutex); instead. That way we save a function call, and we'll also see exactly what type of lock is being taken, etc. Ingo