Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758152AbaGWQfD (ORCPT ); Wed, 23 Jul 2014 12:35:03 -0400 Received: from cdptpa-outbound-snat.email.rr.com ([107.14.166.228]:50318 "EHLO cdptpa-oedge-vip.email.rr.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754176AbaGWQfB convert rfc822-to-8bit (ORCPT ); Wed, 23 Jul 2014 12:35:01 -0400 Date: Wed, 23 Jul 2014 12:34:58 -0400 From: Steven Rostedt To: Frederic Weisbecker Cc: "Paul E. McKenney" , Petr =?ISO-8859-1?B?TWzhZGVr?= , Ingo Molnar , Jiri Kosina , linux-kernel@vger.kernel.org Subject: Re: [PATCH v3] ring-buffer: Race when writing and swapping cpu buffer in parallel Message-ID: <20140723123458.314a43fa@gandalf.local.home> In-Reply-To: <20140723162845.GF23175@localhost.localdomain> References: <1405501084-16135-1-git-send-email-pmladek@suse.cz> <20140716124356.398e21f4@gandalf.local.home> <20140718153443.GC6774@pathway.suse.cz> <20140721144324.GG20751@pathway.suse.cz> <20140721154317.GS8690@linux.vnet.ibm.com> <20140723162845.GF23175@localhost.localdomain> X-Mailer: Claws Mail 3.10.1 (GTK+ 2.24.24; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 8BIT X-RR-Connecting-IP: 107.14.168.142:25 X-Cloudmark-Score: 0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 23 Jul 2014 18:28:48 +0200 Frederic Weisbecker wrote: > On Mon, Jul 21, 2014 at 08:43:17AM -0700, Paul E. McKenney wrote: > > On Mon, Jul 21, 2014 at 04:43:24PM +0200, Petr Ml?dek wrote: > > > 2. Go back, do the swap on any CPU, and do memory barriers via IPI. > > > > > > I wonder if the needed memory barrier in rb_reserve_next_event() > > > could be avoided by calling IPI from ring_buffer_swap_cpu(). > > > > > > I mean that rb_reserve_next_event() will include the current check > > > for swapped ring buffer without barriers. But > > > ring_buffer_swap_cpu() will interrupt the affected CPU and > > > basically do the barrier there only when needed. > > > > > > But I am not sure how this is different from calling > > > smp_call_function_single() from ring_buffer_swap_cpu(). > > > And I am back on the question why it is dangerous with disabled > > > interrupts. I can't find any clue in git history. And I miss this > > > part of the picture :-( > > > > IIRC, deadlock in the case where two CPUs attempt to invoke > > smp_call_function_single() at each other, but both have > > interrupts disabled. It might be possible to avoid this by telling > > smp_call_function_single() not to wait for a response, but this often > > just re-introduces the deadlock at a higher level. > > FWIW, this is what smp_call_function_single_async() does. But then the call > must synchronized such that no concurrent call happen until the IPI completion. > > Otherwise you also have irq_work_queue_on() (not yet upstream but in tip/timers/nohz > and tip/sched/core). Well, the code in question must wait for the IPI to finish, thus as Paul said, we just push the issue to the caller. -- Steve -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/