[PATCH 06/12] BKL: Remove BKL from capifs

From: Arnd Bergmann
Date: Thu Sep 16 2010 - 13:48:47 EST


The BKL is only used in fill_super, which is protected by the superblocks
s_umount rw_semaphore. Therefore it is safe to remove the BKL entirely.

Signed-off-by: Arnd Bergmann <arnd@xxxxxxxx>
Cc: netdev@xxxxxxxxxxxxxxx
---
drivers/isdn/capi/capifs.c | 8 +-------
1 files changed, 1 insertions(+), 7 deletions(-)

diff --git a/drivers/isdn/capi/capifs.c b/drivers/isdn/capi/capifs.c
index c559b52..b0dcdbc 100644
--- a/drivers/isdn/capi/capifs.c
+++ b/drivers/isdn/capi/capifs.c
@@ -17,7 +17,6 @@
#include <linux/init.h>
#include <linux/ctype.h>
#include <linux/sched.h> /* current */
-#include <linux/smp_lock.h> /* For lock_kernel() */

#include "capifs.h"

@@ -100,8 +99,6 @@ capifs_fill_super(struct super_block *s, void *data, int silent)
{
struct inode * inode;

- lock_kernel();
-
s->s_blocksize = 1024;
s->s_blocksize_bits = 10;
s->s_magic = CAPIFS_SUPER_MAGIC;
@@ -119,15 +116,12 @@ capifs_fill_super(struct super_block *s, void *data, int silent)
inode->i_nlink = 2;

s->s_root = d_alloc_root(inode);
- if (s->s_root) {
- unlock_kernel();
+ if (s->s_root)
return 0;
- }

printk("capifs: get root dentry failed\n");
iput(inode);
fail:
- unlock_kernel();
return -ENOMEM;
}

--
1.7.1

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/