Hi Elad,
On 08.05.2016 15:44, Elad Kanfi wrote:
>
> After reviewing the code and your suggestion, it seems that we can do without
> the flag tx_packet_sent and therefor the first issue becomes irrelevant.
> The indication that a packet was sent is (tx_skb != NULL) , and the sequence
> will
Hi Elad,
On 08.05.2016 15:44, Elad Kanfi wrote:
>
> After reviewing the code and your suggestion, it seems that we can do without
> the flag tx_packet_sent and therefor the first issue becomes irrelevant.
> The indication that a packet was sent is (tx_skb != NULL) , and the sequence
> will
Hi Lino,
> Please see sections "SMP BARRIER PAIRING" and "EXAMPLES OF MEMORY BARRIER
> SEQUENCES" in
> memory-barriers.txt for a description why smp barriers have to be paired and
> a smp write barrier on CPU A without a read barrier on CPU B is _not_
> sufficient.
>
> Furthermore after having
Hi Lino,
> Please see sections "SMP BARRIER PAIRING" and "EXAMPLES OF MEMORY BARRIER
> SEQUENCES" in
> memory-barriers.txt for a description why smp barriers have to be paired and
> a smp write barrier on CPU A without a read barrier on CPU B is _not_
> sufficient.
>
> Furthermore after having
Hi Elad,
On 02.05.2016 12:21, Elad Kanfi wrote:
Since this driver handles one frame at a time, I couldn't find a case that
requires the paired barrier.
The order of reads is not critical once it is assured that the value is valid.
Please see sections "SMP BARRIER PAIRING" and "EXAMPLES
Hi Elad,
On 02.05.2016 12:21, Elad Kanfi wrote:
Since this driver handles one frame at a time, I couldn't find a case that
requires the paired barrier.
The order of reads is not critical once it is assured that the value is valid.
Please see sections "SMP BARRIER PAIRING" and "EXAMPLES
-Original Message-
From: David Miller [mailto:da...@davemloft.net]
Sent: Friday, April 29, 2016 12:11 AM
To: Elad Kanfi
Cc: Noam Camus; linux-kernel@vger.kernel.org; abrod...@synopsys.com; Tal
Zilcer; net...@vger.kernel.org
Subject: Re: [PATCH v2 1/2] net: nps_enet: Sync access
-Original Message-
From: David Miller [mailto:da...@davemloft.net]
Sent: Friday, April 29, 2016 12:11 AM
To: Elad Kanfi
Cc: Noam Camus; linux-kernel@vger.kernel.org; abrod...@synopsys.com; Tal
Zilcer; net...@vger.kernel.org
Subject: Re: [PATCH v2 1/2] net: nps_enet: Sync access
From: Elad Kanfi
Date: Wed, 27 Apr 2016 16:18:29 +0300
> From: Elad Kanfi
>
> Below is a description of a possible problematic
> sequence. CPU-A is sending a frame and CPU-B handles
> the interrupt that indicates the frame was sent. CPU-B
> reads an
From: Elad Kanfi
Date: Wed, 27 Apr 2016 16:18:29 +0300
> From: Elad Kanfi
>
> Below is a description of a possible problematic
> sequence. CPU-A is sending a frame and CPU-B handles
> the interrupt that indicates the frame was sent. CPU-B
> reads an invalid value of tx_packet_sent.
>
>
Hi,
On 27.04.2016 15:18, Elad Kanfi wrote:
From: Elad Kanfi
Below is a description of a possible problematic
sequence. CPU-A is sending a frame and CPU-B handles
the interrupt that indicates the frame was sent. CPU-B
reads an invalid value of tx_packet_sent.
Hi,
On 27.04.2016 15:18, Elad Kanfi wrote:
From: Elad Kanfi
Below is a description of a possible problematic
sequence. CPU-A is sending a frame and CPU-B handles
the interrupt that indicates the frame was sent. CPU-B
reads an invalid value of tx_packet_sent.
CPU-A
From: Elad Kanfi
Below is a description of a possible problematic
sequence. CPU-A is sending a frame and CPU-B handles
the interrupt that indicates the frame was sent. CPU-B
reads an invalid value of tx_packet_sent.
CPU-A CPU-B
From: Elad Kanfi
Below is a description of a possible problematic
sequence. CPU-A is sending a frame and CPU-B handles
the interrupt that indicates the frame was sent. CPU-B
reads an invalid value of tx_packet_sent.
CPU-A CPU-B
-
14 matches
Mail list logo