Be extra-cautious and protect the remaining open() functions.
Signed-off-by: Jonathan Corbet <corbet@lwn.net>
#include <linux/kref.h>
#include <linux/compat.h>
#include <linux/semaphore.h>
+#include <linux/smp_lock.h>
#include <asm/uaccess.h>
struct ib_umad_file *file;
int ret = 0;
+ lock_kernel();
spin_lock(&port_lock);
port = umad_port[iminor(inode) - IB_UMAD_MINOR_BASE];
if (port)
kref_get(&port->umad_dev->ref);
spin_unlock(&port_lock);
- if (!port)
+ if (!port) {
+ unlock_kernel();
return -ENXIO;
+ }
mutex_lock(&port->file_mutex);
out:
mutex_unlock(&port->file_mutex);
+ unlock_kernel();
return ret;
}
#include <linux/file.h>
#include <linux/mount.h>
#include <linux/cdev.h>
+#include <linux/smp_lock.h>
#include <asm/uaccess.h>
struct ib_uverbs_file *file;
int ret;
+ lock_kernel();
spin_lock(&map_lock);
dev = dev_table[iminor(inode) - IB_UVERBS_BASE_MINOR];
if (dev)
kref_get(&dev->ref);
spin_unlock(&map_lock);
- if (!dev)
+ if (!dev) {
+ unlock_kernel();
return -ENXIO;
+ }
if (!try_module_get(dev->ib_dev->owner)) {
ret = -ENODEV;
filp->private_data = file;
+ unlock_kernel();
return 0;
err_module:
err:
kref_put(&dev->ref, ib_uverbs_release_dev);
-
+ unlock_kernel();
return ret;
}