On Thu, 17 Feb 2005, Davide Rossetti wrote:
maybe RTFM...
a module:
- char device driver for..
- a PCI device
any clue as to how to protect from module unloading while there is still some
process opening it??? have I to sleep in the remove_one() pci driver function
till last process closes its file descriptor???
The kernel code is supposed to prevent module removal when it
is still in use. Have you discovered a bug where the kernel
will allow unloading when it's still being used???
There used to be MOD_INC_USE_COUNT and MOD_DEC_USE_COUNT
macros to be using in open() and close(). However their
use has been depreciated in favor of some internal kernel
magic. So, unless you have discovered a bug, your code
doesn't have to worry anymore.
static void __devexit apedev_remove_one(struct pci_dev *pdev)
{
ApeDev* apedev = pci_get_drvdata(pdev);
if(test_bit(APEDEV_FLAG_OPEN, &apedev->flags)) {
PERROR("still open flag on!!! (flags=0x%08x)\n", apedev->flags);
// sleep here till it gets closed...
}
...
}
static struct pci_driver apedev_driver = {
.name = DEVNAME,
.id_table = apedev_pci_tbl,
.probe = apedev_init_one,
.remove = __devexit_p(apedev_remove_one),
};
Cheers,
Dick Johnson
Penguin : Linux version 2.6.10 on an i686 machine (5537.79 BogoMips).
Notice : All mail here is now cached for review by Dictator Bush.
98.36% of all statistics are fiction.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/