> On Wed, 6 Sep 2006 10:58:15 -0700 (PDT) > [EMAIL PROTECTED] wrote: > >> Hello All, >> >> I have a question about the use of the tx_ring->next_to_use variable in >> the e1000. Specifically, I'm wondering about a race between the use of >> next_to_use in e1000_xmit_frame and the clearing of next_to_use in >> e1000_down via e1000_clean_tx_ring. >> >> Thread 1 (_xmit) -> first = adapter->tx_ring.next_to_use; >> e1000_tx_map(); >> Thread 2 (_down) -> e1000_clean_tx_ring(); >> tx_ring->next_to_use = 0; >> Thread 1 (_xmit) -> e1000_tx_queue(); >> >> It seems that tx_ring.next_to_use could change between the time the >> skbuff >> is mapped in e1000_tx_map and the time it is reported to the hardware in >> e1000_tx_queue. While I don't see any memory leaks or possible oops, it >> does seem possible that that an skbuff could be "lost" in the ring as it >> will not be queued in the subsequent e1000_queue. >> >> If the race is possible, perhaps this could be the culprit behind the tx >> timeouts we've seen reported in this list? The watchdog will eventually >> find the "lost" skbuff and mistakenly think that the hardware transmit >> has >> hung and stop the queue. >> >> Could one of you plese tell me how this race is avoided, if indeed it >> is? >> >> Thanks, >> Shaw >> > > e1000_down calls netif_stop_queue() and that stops transmit requests. > It doesn't handle the case of a transmit in flight during the e1000_down. > > Shouldn't clean_tx_ring acquire tx_ring->tx_lock to avoid that?
Hi Stephen, Yes, holding the adapter->tx_lock is all that is needed. e1000_irq_disable has been called prior to e1000_clean_tx_ring or the interrupt has never been enabled (e1000_open), so a simple spin_lock should suffice. I've included a patch against Garzik's netdev git tree. Thanks, Shaw Protect against the race to modify tx_ring->next_to_use in the case of a transmit in flight during e1000_down. Signed-off-by: Shaw Vrana <[EMAIL PROTECTED]> --- drivers/net/e1000/e1000_main.c | 4 ++++ 1 files changed, 4 insertions(+), 0 deletions(-) diff --git a/drivers/net/e1000/e1000_main.c b/drivers/net/e1000/e1000_main.c index 726f43d..b327976 100644 --- a/drivers/net/e1000/e1000_main.c +++ b/drivers/net/e1000/e1000_main.c @@ -1937,6 +1937,8 @@ e1000_clean_tx_ring(struct e1000_adapter unsigned long size; unsigned int i; + spin_lock(&tx_ring->tx_lock); + /* Free all the Tx ring sk_buffs */ for (i = 0; i < tx_ring->count; i++) { @@ -1957,6 +1959,8 @@ e1000_clean_tx_ring(struct e1000_adapter writel(0, adapter->hw.hw_addr + tx_ring->tdh); writel(0, adapter->hw.hw_addr + tx_ring->tdt); + + spin_unlock(&tx_ring->tx_lock); } /** - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html