diff options
| author | Tejun Heo <tj@kernel.org> | 2010-01-05 09:17:33 +0900 | 
|---|---|---|
| committer | Tejun Heo <tj@kernel.org> | 2010-01-05 09:17:33 +0900 | 
| commit | 32032df6c2f6c9c6b2ada2ce42322231824f70c2 (patch) | |
| tree | b1ce838a37044bb38dfc128e2116ca35630e629a /lib/kernel_lock.c | |
| parent | 22b737f4c75197372d64afc6ed1bccd58c00e549 (diff) | |
| parent | c5974b835a909ff15c3b7e6cf6789b5eb919f419 (diff) | |
Merge branch 'master' into percpu
Conflicts:
	arch/powerpc/platforms/pseries/hvCall.S
	include/linux/percpu.h
Diffstat (limited to 'lib/kernel_lock.c')
| -rw-r--r-- | lib/kernel_lock.c | 46 | 
1 files changed, 28 insertions, 18 deletions
| diff --git a/lib/kernel_lock.c b/lib/kernel_lock.c index 39f1029e352..b135d04aa48 100644 --- a/lib/kernel_lock.c +++ b/lib/kernel_lock.c @@ -5,10 +5,13 @@   * relegated to obsolescence, but used by various less   * important (or lazy) subsystems.   */ -#include <linux/smp_lock.h>  #include <linux/module.h>  #include <linux/kallsyms.h>  #include <linux/semaphore.h> +#include <linux/smp_lock.h> + +#define CREATE_TRACE_POINTS +#include <trace/events/bkl.h>  /*   * The 'big kernel lock' @@ -20,7 +23,7 @@   *   * Don't use in new code.   */ -static  __cacheline_aligned_in_smp DEFINE_SPINLOCK(kernel_flag); +static  __cacheline_aligned_in_smp DEFINE_RAW_SPINLOCK(kernel_flag);  /* @@ -33,12 +36,12 @@ static  __cacheline_aligned_in_smp DEFINE_SPINLOCK(kernel_flag);   * If it successfully gets the lock, it should increment   * the preemption count like any spinlock does.   * - * (This works on UP too - _raw_spin_trylock will never + * (This works on UP too - do_raw_spin_trylock will never   * return false in that case)   */  int __lockfunc __reacquire_kernel_lock(void)  { -	while (!_raw_spin_trylock(&kernel_flag)) { +	while (!do_raw_spin_trylock(&kernel_flag)) {  		if (need_resched())  			return -EAGAIN;  		cpu_relax(); @@ -49,27 +52,27 @@ int __lockfunc __reacquire_kernel_lock(void)  void __lockfunc __release_kernel_lock(void)  { -	_raw_spin_unlock(&kernel_flag); +	do_raw_spin_unlock(&kernel_flag);  	preempt_enable_no_resched();  }  /*   * These are the BKL spinlocks - we try to be polite about preemption.   * If SMP is not on (ie UP preemption), this all goes away because the - * _raw_spin_trylock() will always succeed. + * do_raw_spin_trylock() will always succeed.   */  #ifdef CONFIG_PREEMPT  static inline void __lock_kernel(void)  {  	preempt_disable(); -	if (unlikely(!_raw_spin_trylock(&kernel_flag))) { +	if (unlikely(!do_raw_spin_trylock(&kernel_flag))) {  		/*  		 * If preemption was disabled even before this  		 * was called, there's nothing we can be polite  		 * about - just spin.  		 */  		if (preempt_count() > 1) { -			_raw_spin_lock(&kernel_flag); +			do_raw_spin_lock(&kernel_flag);  			return;  		} @@ -79,10 +82,10 @@ static inline void __lock_kernel(void)  		 */  		do {  			preempt_enable(); -			while (spin_is_locked(&kernel_flag)) +			while (raw_spin_is_locked(&kernel_flag))  				cpu_relax();  			preempt_disable(); -		} while (!_raw_spin_trylock(&kernel_flag)); +		} while (!do_raw_spin_trylock(&kernel_flag));  	}  } @@ -93,7 +96,7 @@ static inline void __lock_kernel(void)   */  static inline void __lock_kernel(void)  { -	_raw_spin_lock(&kernel_flag); +	do_raw_spin_lock(&kernel_flag);  }  #endif @@ -103,7 +106,7 @@ static inline void __unlock_kernel(void)  	 * the BKL is not covered by lockdep, so we open-code the  	 * unlocking sequence (and thus avoid the dep-chain ops):  	 */ -	_raw_spin_unlock(&kernel_flag); +	do_raw_spin_unlock(&kernel_flag);  	preempt_enable();  } @@ -113,21 +116,28 @@ static inline void __unlock_kernel(void)   * This cannot happen asynchronously, so we only need to   * worry about other CPU's.   */ -void __lockfunc lock_kernel(void) +void __lockfunc _lock_kernel(const char *func, const char *file, int line)  { -	int depth = current->lock_depth+1; -	if (likely(!depth)) +	int depth = current->lock_depth + 1; + +	trace_lock_kernel(func, file, line); + +	if (likely(!depth)) { +		might_sleep();  		__lock_kernel(); +	}  	current->lock_depth = depth;  } -void __lockfunc unlock_kernel(void) +void __lockfunc _unlock_kernel(const char *func, const char *file, int line)  {  	BUG_ON(current->lock_depth < 0);  	if (likely(--current->lock_depth < 0))  		__unlock_kernel(); + +	trace_unlock_kernel(func, file, line);  } -EXPORT_SYMBOL(lock_kernel); -EXPORT_SYMBOL(unlock_kernel); +EXPORT_SYMBOL(_lock_kernel); +EXPORT_SYMBOL(_unlock_kernel); | 
