lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Fri, 8 Jun 2007 12:55:50 -0700
From:	"Waskiewicz Jr, Peter P" <>
To:	"Krishna Kumar2" <>,
	"Sridhar Samudrala" <>
Cc:	"Kok, Auke-jan H" <>,
	"David Miller" <>, <>,
	"Brandeburg, Jesse" <>,
	<>, <>
Subject: RE: [PATCH] NET: Multiqueue network device support.

> I thought the correct use is to get this lock on clean_tx 
> side which can get called on a different cpu on rx (which 
> also cleans up slots for skbs that have finished xmit). Both 
> TX and clean_tx uses the same tx_ring's head/tail ptrs and 
> should be exclusive. But I don't find clean tx using this 
> lock in the code, so I am confused :-)

>From e1000_main.c, e1000_clean():

        /* e1000_clean is called per-cpu.  This lock protects
         * tx_ring[0] from being cleaned by multiple cpus
         * simultaneously.  A failure obtaining the lock means
         * tx_ring[0] is currently being cleaned anyway. */
        if (spin_trylock(&adapter->tx_queue_lock)) {
                tx_cleaned = e1000_clean_tx_irq(adapter,

In a multi-ring implementation of the driver, this is wrapped with for
(i = 0; i < adapter->num_tx_queues; i++) and &adapter->tx_ring[i].  This
lock also prevents the clean routine from stomping on xmit_frame() when
transmitting.  Also in the multi-ring implementation, the tx_lock is
pushed down into the individual tx_ring struct, not at the adapter


-PJ Waskiewicz
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to
More majordomo info at

Powered by blists - more mailing lists