Received: by 2002:a05:6a10:6006:0:0:0:0 with SMTP id w6csp147109pxa; Wed, 26 Aug 2020 07:06:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzpmN+/0pxqQIeYuzfJJul65YKeQK70P8bat8RKvkfRcEaR48bT4CS8/yVzl7PeGnOAFRJ4 X-Received: by 2002:a17:906:2313:: with SMTP id l19mr16657684eja.272.1598450801082; Wed, 26 Aug 2020 07:06:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1598450801; cv=none; d=google.com; s=arc-20160816; b=EyQT9D+7518DjDS9F1gaXXSYrvwWG0aEgimKW4IBe9JarhLRe2jIp1gNoQMw/iBOM+ lGaHwM5GwHkc05z4IZ+wNYu0qRsFcI/a1o1nuXS7S3gMagXlNRHxN3VzN5yLBjenLTTv NZjBDSzXQFTiVRKKJfiJhaeYfgNxAtd1kHD7Qt+ypj6LLYZ6O+zC3UXjeWM3Q01OVSt2 2gVJe/V6y54fsK0pVsmlxDaXwqh3pgUf9R5Z8D23+hletR9fIGYxo2C8fCwWvaljXww2 23NbNS+gurQJNRWphPDn9bMeNcF4YjCXVtQXvhLWXtqCDuGUdSalzBYuCsJ4GUl6L54H R2fQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=zYlO4QELlYFV53HMhbNhs3AYQsDZsbC4YmbWv6WyCuE=; b=BmoMhuyYWy/SaogcUcKmtLfqXfCJrBIFv0QN90Z/BzvG+Zj/tUH97Aygc5d7v69o+7 8iPcoU6oIcgG3AW9zJukkSSIEfvkz6qBbBI/ui3wGuELBdD5sQzkvCHoqA7VpGqiN0Rr XPH+6NtuX26MI8k+UPuFJLSTEpRONHPUc5UuRJyyrp80jTqARAEtQEdMSyRNH0a3vQ6J KZ9XQF2c1VZbuXYvuWBv0g2NCQbz2XbmNQFpwWNYgFUj6pyZWEkKAM42Ep9Y6zwN/cFM 434JyaNB3MnX7b8TdLwy5RGrhyXjglEbNXxZATI87fKZV0gdNzqSX4cUS+ShSejEWySP EVCQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="GEU0Xm/b"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b26si1551834eja.229.2020.08.26.07.06.16; Wed, 26 Aug 2020 07:06:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="GEU0Xm/b"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726944AbgHZISw (ORCPT + 99 others); Wed, 26 Aug 2020 04:18:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:40140 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726016AbgHZISu (ORCPT ); Wed, 26 Aug 2020 04:18:50 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 23DE520678; Wed, 26 Aug 2020 08:18:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1598429929; bh=+vJV+mRF0Lzjjr3fr3A1d25Ht5edbPCfJqUZ9mJTuZc=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=GEU0Xm/bx8cP15xViHXthdwpTyen+TUGLxiTYu1aQr59txHczphF0iSJ6zUYeHWWX KeG6A4r//Wu1oZzMeekzFUdHP4041f9NyizugHYCE97ojW+tbEj5IjPyO+fOYOD9T4 Wjw7xvPDwkn7MCG9zkXnTpGNV75HhW6BJRy8Z9QE= Date: Wed, 26 Aug 2020 10:19:05 +0200 From: Greg Kroah-Hartman To: Christoph Hellwig Cc: Jens Axboe , "Rafael J. Wysocki" , Denis Efremov , "David S. Miller" , Song Liu , Al Viro , linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-ide@vger.kernel.org, linux-raid@vger.kernel.org, linux-scsi@vger.kernel.org, linux-m68k@lists.linux-m68k.org Subject: Re: [PATCH 01/19] char_dev: replace cdev_map with an xarray Message-ID: <20200826081905.GB1796103@kroah.com> References: <20200826062446.31860-1-hch@lst.de> <20200826062446.31860-2-hch@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200826062446.31860-2-hch@lst.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 26, 2020 at 08:24:28AM +0200, Christoph Hellwig wrote: > None of the complicated overlapping regions bits of the kobj_map are > required for the character device lookup, so just a trivial xarray > instead. > > Signed-off-by: Christoph Hellwig Really? This is ok to use and just as fast? If so, wonderful, it would be great to clean up kobj_map users. But I don't think you got all of the needed bits here: > --- > fs/char_dev.c | 94 +++++++++++++++++++++++++-------------------------- > fs/dcache.c | 1 - > fs/internal.h | 5 --- > 3 files changed, 46 insertions(+), 54 deletions(-) > > diff --git a/fs/char_dev.c b/fs/char_dev.c > index ba0ded7842a779..6c4d6c4938f14b 100644 > --- a/fs/char_dev.c > +++ b/fs/char_dev.c > @@ -17,7 +17,6 @@ > #include > > #include > -#include > #include > #include > #include > @@ -25,8 +24,7 @@ > > #include "internal.h" > > -static struct kobj_map *cdev_map; > - > +static DEFINE_XARRAY(cdev_map); > static DEFINE_MUTEX(chrdevs_lock); > > #define CHRDEV_MAJOR_HASH_SIZE 255 > @@ -367,6 +365,29 @@ void cdev_put(struct cdev *p) > } > } > > +static struct cdev *cdev_lookup(dev_t dev) > +{ > + struct cdev *cdev; > + > +retry: > + mutex_lock(&chrdevs_lock); > + cdev = xa_load(&cdev_map, dev); > + if (!cdev) { > + mutex_unlock(&chrdevs_lock); > + > + if (request_module("char-major-%d-%d", > + MAJOR(dev), MINOR(dev)) > 0) > + /* Make old-style 2.4 aliases work */ > + request_module("char-major-%d", MAJOR(dev)); > + goto retry; > + } > + > + if (!cdev_get(cdev)) > + cdev = NULL; > + mutex_unlock(&chrdevs_lock); > + return cdev; > +} > + > /* > * Called every time a character special file is opened > */ > @@ -380,13 +401,10 @@ static int chrdev_open(struct inode *inode, struct file *filp) > spin_lock(&cdev_lock); > p = inode->i_cdev; > if (!p) { > - struct kobject *kobj; > - int idx; > spin_unlock(&cdev_lock); > - kobj = kobj_lookup(cdev_map, inode->i_rdev, &idx); > - if (!kobj) > + new = cdev_lookup(inode->i_rdev); > + if (!new) > return -ENXIO; > - new = container_of(kobj, struct cdev, kobj); > spin_lock(&cdev_lock); > /* Check i_cdev again in case somebody beat us to it while > we dropped the lock. */ > @@ -454,18 +472,6 @@ const struct file_operations def_chr_fops = { > .llseek = noop_llseek, > }; > > -static struct kobject *exact_match(dev_t dev, int *part, void *data) > -{ > - struct cdev *p = data; > - return &p->kobj; > -} > - > -static int exact_lock(dev_t dev, void *data) > -{ > - struct cdev *p = data; > - return cdev_get(p) ? 0 : -1; > -} > - > /** > * cdev_add() - add a char device to the system > * @p: the cdev structure for the device > @@ -478,7 +484,7 @@ static int exact_lock(dev_t dev, void *data) > */ > int cdev_add(struct cdev *p, dev_t dev, unsigned count) > { > - int error; > + int error, i; > > p->dev = dev; > p->count = count; > @@ -486,14 +492,22 @@ int cdev_add(struct cdev *p, dev_t dev, unsigned count) > if (WARN_ON(dev == WHITEOUT_DEV)) > return -EBUSY; > > - error = kobj_map(cdev_map, dev, count, NULL, > - exact_match, exact_lock, p); > - if (error) > - return error; > + mutex_lock(&chrdevs_lock); > + for (i = 0; i < count; i++) { > + error = xa_insert(&cdev_map, dev + i, p, GFP_KERNEL); > + if (error) > + goto out_unwind; > + } > + mutex_unlock(&chrdevs_lock); > > kobject_get(p->kobj.parent); Can't you drop this kobject_get() too? And also the "struct kobj" in struct cdev can be gone as well, as the kobj_map was the only "real" user of this structure. I know some drivers liked to touch that field as well, but it never actually did anything for them, so it was pointless, but it will take some 'make allmodconfig' builds to flush them out. thanks, greg k-h