Hi David, David Miller schrieb: > From: Peter Zijlstra <peterz@xxxxxxxxxxxxx> > Date: Wed, 23 Jul 2008 12:58:16 +0200 > > > So I guess my question is, is netif_tx_lock() here to stay, or is the > > right fix to convert all those drivers to use __netif_tx_lock() which > > locks only a single queue? > > It's staying. > > It's trying to block all potential calls into the ->hard_start_xmit() > method of the driver, and the only reliable way to do that is to take > all the TX queue locks. And in one form or another, we're going to > have this "grab/release all the TX queue locks" construct. > > I find it interesting that this cannot be simply described to lockdep > :-) I'm sure as hell, I miss sth. but can't it be done by this pseudo-code: netif_tx_lock(device) { mutex_lock(device->queue_entry_mutex); foreach_queue_entries(queue, device->queues) { spin_lock(queue->tx_lock); set_noop_tx_handler(queue); spin_unlock(queue->tx_lock); } mutex_unlock(device->queue_entry_mutex); } netif_tx_unlock(device) { mutex_lock(device->queue_entry_mutex); foreach_queue_entries(queue, device->queues) { spin_lock(queue->tx_lock); set_useful_tx_handler(queue); spin_unlock(queue->tx_lock); } mutex_unlock(device->queue_entry_mutex); } Then protect use of the queues by queue->tx_lock in transmit path. The first setup of the queue doesn't need to be protected, since no-one knows the device. The final cleanup of the device doesn't need to be protected either, because netif_tx_lock() and netif_tx_unlock() should not be called after entering the final cleanup. Some VM locking works this way... Best Regards Ingo Oeser -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html