Port-xen archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: [patch] x86_*fence replaced by membar_ops(3)
On Thu, Jan 15, 2009 at 03:13:59PM +0100, Jean-Yves Migeon wrote:
> >>What should I do? Drop it for the x86 generic bus code, and keep it for
> >>the Xen drivers?
> >
> >No, membar_ops won't work for bus_dma/bus_space either. membar_ops are
> >patched
> >to be NOP on UP kernels, still they're needed for interfaces with
> >devices.
>
> Hmm, I was not really clear on that one: I just meant to keep the
> membar_ops(3) routines for the xennet, xbd and xencons drivers: since we
> do not patch the LOCK prefix for UP Xen domains, they are close to the
> x86_*fence() ones.
Actually yes; but we'll probably want to use x86_patch() in the future.
>
> I will just handle it the other way around. I'll keep the x86 MD fences
> and replace the ones inside Xen with their xen_[rw]mb() equivalents.
>
> Any consideration on this one though:
>
> http://www.netbsd.org/~jym/if_xennet_xenbus.c.diff
>
> Is it really needed to have load-before-load ordering here? If we issue
> the hypercall, that will be a barrier anyway, and the RING macros from
> Xen do implement barrier for notify, so...
you're right, this barrier is not needed.
--
Manuel Bouyer, LIP6, Universite Paris VI.
Manuel.Bouyer%lip6.fr@localhost
NetBSD: 26 ans d'experience feront toujours la difference
--
Home |
Main Index |
Thread Index |
Old Index