On Thu, 17 Feb 2005, Davide Rossetti wrote:

maybe RTFM...
a module:
- char device driver for..
- a PCI device

any clue as to how to protect from module unloading while there is still some process opening it??? have I to sleep in the remove_one() pci driver function till last process closes its file descriptor???


The kernel code is supposed to prevent module removal when it is still in use. Have you discovered a bug where the kernel will allow unloading when it's still being used???

There used to be MOD_INC_USE_COUNT and MOD_DEC_USE_COUNT
macros to be using in open() and close(). However their
use has been depreciated in favor of some internal kernel
magic. So, unless you have discovered a bug, your code
doesn't have to worry anymore.

static void __devexit apedev_remove_one(struct pci_dev *pdev)
{
  ApeDev* apedev = pci_get_drvdata(pdev);

  if(test_bit(APEDEV_FLAG_OPEN, &apedev->flags)) {
      PERROR("still open flag on!!! (flags=0x%08x)\n", apedev->flags);

      // sleep here till it gets closed...

  }
  ...
}

static struct pci_driver apedev_driver = {
  .name     =  DEVNAME,
  .id_table =  apedev_pci_tbl,
  .probe    =  apedev_init_one,
  .remove   =  __devexit_p(apedev_remove_one),
};


Cheers, Dick Johnson Penguin : Linux version 2.6.10 on an i686 machine (5537.79 BogoMips). Notice : All mail here is now cached for review by Dictator Bush. 98.36% of all statistics are fiction. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

Reply via email to