summaryrefslogtreecommitdiff
path: root/fs/udf/file.c
diff options
context:
space:
mode:
authorAlessio Igor Bogani <abogani@texware.it>2010-11-16 18:40:49 +0100
committerJan Kara <jack@suse.cz>2011-01-06 17:03:57 +0100
commit9db9f9e31d7661dff35a75ed01ff9fc0d6acdaf8 (patch)
tree8e95c6f73b86b6f9e2089f61c9c964f44f08558a /fs/udf/file.c
parent7db09be629033b79792a1bf18f505f5f15914395 (diff)
downloadlinux-3.10-9db9f9e31d7661dff35a75ed01ff9fc0d6acdaf8.tar.gz
linux-3.10-9db9f9e31d7661dff35a75ed01ff9fc0d6acdaf8.tar.bz2
linux-3.10-9db9f9e31d7661dff35a75ed01ff9fc0d6acdaf8.zip
udf: Remove unnecessary bkl usages
The udf_readdir(), udf_lookup(), udf_create(), udf_mknod(), udf_mkdir(), udf_rmdir(), udf_link(), udf_get_parent() and udf_unlink() seems already adequately protected by i_mutex held by VFS invoking calls. The udf_rename() instead should be already protected by lock_rename again by VFS. The udf_ioctl(), udf_fill_super() and udf_evict_inode() don't requires any further protection. This work was supported by a hardware donation from the CE Linux Forum. Signed-off-by: Alessio Igor Bogani <abogani@texware.it> Signed-off-by: Jan Kara <jack@suse.cz>
Diffstat (limited to 'fs/udf/file.c')
-rw-r--r--fs/udf/file.c4
1 files changed, 0 insertions, 4 deletions
diff --git a/fs/udf/file.c b/fs/udf/file.c
index df0c5561cc7..4e3bbd81b57 100644
--- a/fs/udf/file.c
+++ b/fs/udf/file.c
@@ -32,7 +32,6 @@
#include <linux/string.h> /* memset */
#include <linux/capability.h>
#include <linux/errno.h>
-#include <linux/smp_lock.h>
#include <linux/pagemap.h>
#include <linux/buffer_head.h>
#include <linux/aio.h>
@@ -149,8 +148,6 @@ long udf_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
long old_block, new_block;
int result = -EINVAL;
- lock_kernel();
-
if (file_permission(filp, MAY_READ) != 0) {
udf_debug("no permission to access inode %lu\n", inode->i_ino);
result = -EPERM;
@@ -196,7 +193,6 @@ long udf_ioctl(struct file *filp, unsigned int cmd, unsigned long arg)
}
out:
- unlock_kernel();
return result;
}