IB/hf1: User context locking is inconsistent
There is a mixture of mutex and spinlocks to protect receive context (rcd/uctxt) information. This is not used consistently. Use the mutex to protect device receive context information only. Use the spinlock to protect sub context information only. Protect access to items in the rcd array with a spinlock and reference count. Remove spinlock around dd->rcd array cleanup. Since interrupts are disabled and cleaned up before this point, this lock is not useful. Reviewed-by: Mike Marciniszyn <mike.marciniszyn@intel.com> Reviewed-by: Sebastian Sanchez <sebastian.sanchez@intel.com> Signed-off-by: Michael J. Ruhl <michael.j.ruhl@intel.com> Signed-off-by: Dennis Dalessandro <dennis.dalessandro@intel.com> Signed-off-by: Doug Ledford <dledford@redhat.com>
This commit is contained in:

gecommit door
Doug Ledford

bovenliggende
f2a3bc00a0
commit
d295dbeb2a
@@ -114,24 +114,24 @@ TRACE_EVENT(hfi1_rcvhdr,
|
||||
);
|
||||
|
||||
TRACE_EVENT(hfi1_receive_interrupt,
|
||||
TP_PROTO(struct hfi1_devdata *dd, u16 ctxt),
|
||||
TP_ARGS(dd, ctxt),
|
||||
TP_PROTO(struct hfi1_devdata *dd, struct hfi1_ctxtdata *rcd),
|
||||
TP_ARGS(dd, rcd),
|
||||
TP_STRUCT__entry(DD_DEV_ENTRY(dd)
|
||||
__field(u32, ctxt)
|
||||
__field(u8, slow_path)
|
||||
__field(u8, dma_rtail)
|
||||
),
|
||||
TP_fast_assign(DD_DEV_ASSIGN(dd);
|
||||
__entry->ctxt = ctxt;
|
||||
if (dd->rcd[ctxt]->do_interrupt ==
|
||||
__entry->ctxt = rcd->ctxt;
|
||||
if (rcd->do_interrupt ==
|
||||
&handle_receive_interrupt) {
|
||||
__entry->slow_path = 1;
|
||||
__entry->dma_rtail = 0xFF;
|
||||
} else if (dd->rcd[ctxt]->do_interrupt ==
|
||||
} else if (rcd->do_interrupt ==
|
||||
&handle_receive_interrupt_dma_rtail){
|
||||
__entry->dma_rtail = 1;
|
||||
__entry->slow_path = 0;
|
||||
} else if (dd->rcd[ctxt]->do_interrupt ==
|
||||
} else if (rcd->do_interrupt ==
|
||||
&handle_receive_interrupt_nodma_rtail) {
|
||||
__entry->dma_rtail = 0;
|
||||
__entry->slow_path = 0;
|
||||
|
Verwijs in nieuw issue
Block a user