Displaying 6 results from an estimated 6 matches for "hwrng_attr_".
2014 Sep 09
2
mutex
...ult: cat process will get stuck, it will return if we kill dd process.
We have some static variables (eg, current_rng, data_avail, etc) in hw_random/core.c,
they are protected by rng_mutex. I try to workaround this issue by undelay(100)
after mutex_unlock() in rng_dev_read(). This gives chance for hwrng_attr_*_show()
to get mutex.
This patch also contains some cleanup, moving some code out of mutex
protection.
Do you have some suggestion? Thanks.
diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c
index aa30a25..fa69020 100644
--- a/drivers/char/hw_random/core.c
+++ b/drivers/...
2014 Sep 09
2
mutex
...ult: cat process will get stuck, it will return if we kill dd process.
We have some static variables (eg, current_rng, data_avail, etc) in hw_random/core.c,
they are protected by rng_mutex. I try to workaround this issue by undelay(100)
after mutex_unlock() in rng_dev_read(). This gives chance for hwrng_attr_*_show()
to get mutex.
This patch also contains some cleanup, moving some code out of mutex
protection.
Do you have some suggestion? Thanks.
diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c
index aa30a25..fa69020 100644
--- a/drivers/char/hw_random/core.c
+++ b/drivers/...
2014 Sep 10
2
RFC virtio-rng: fail to read sysfs of a busy device
...oesn't mean we shouldn't fix the issue here...)
> We have some static variables (eg, current_rng, data_avail, etc) in hw_random/core.c,
> they are protected by rng_mutex. I try to workaround this issue by undelay(100)
> after mutex_unlock() in rng_dev_read(). This gives chance for hwrng_attr_*_show()
> to get mutex.
>
> This patch also contains some cleanup, moving some code out of mutex
> protection.
>
> Do you have some suggestion? Thanks.
>
>
> diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c
> index aa30a25..fa69020 100644...
2014 Sep 10
2
RFC virtio-rng: fail to read sysfs of a busy device
...oesn't mean we shouldn't fix the issue here...)
> We have some static variables (eg, current_rng, data_avail, etc) in hw_random/core.c,
> they are protected by rng_mutex. I try to workaround this issue by undelay(100)
> after mutex_unlock() in rng_dev_read(). This gives chance for hwrng_attr_*_show()
> to get mutex.
>
> This patch also contains some cleanup, moving some code out of mutex
> protection.
>
> Do you have some suggestion? Thanks.
>
>
> diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c
> index aa30a25..fa69020 100644...
2014 Sep 09
0
RFC virtio-rng: fail to read sysfs of a busy device
...ult: cat process will get stuck, it will return if we kill dd process.
We have some static variables (eg, current_rng, data_avail, etc) in hw_random/core.c,
they are protected by rng_mutex. I try to workaround this issue by undelay(100)
after mutex_unlock() in rng_dev_read(). This gives chance for hwrng_attr_*_show()
to get mutex.
This patch also contains some cleanup, moving some code out of mutex
protection.
Do you have some suggestion? Thanks.
diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_random/core.c
index aa30a25..fa69020 100644
--- a/drivers/char/hw_random/core.c
+++ b/drivers/...
2014 Sep 10
0
RFC virtio-rng: fail to read sysfs of a busy device
...he issue here...)
Completely agree :-)
> > We have some static variables (eg, current_rng, data_avail, etc) in hw_random/core.c,
> > they are protected by rng_mutex. I try to workaround this issue by undelay(100)
> > after mutex_unlock() in rng_dev_read(). This gives chance for hwrng_attr_*_show()
> > to get mutex.
> >
> > This patch also contains some cleanup, moving some code out of mutex
> > protection.
> >
> > Do you have some suggestion? Thanks.
> >
> >
> > diff --git a/drivers/char/hw_random/core.c b/drivers/char/hw_rand...