Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753572Ab1BRDQZ (ORCPT ); Thu, 17 Feb 2011 22:16:25 -0500 Received: from mail-qy0-f174.google.com ([209.85.216.174]:40077 "EHLO mail-qy0-f174.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751268Ab1BRDQW (ORCPT ); Thu, 17 Feb 2011 22:16:22 -0500 DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; b=gEpaXXYbIII5A4GJGsZrV2XiWJPL8Tg/UhR4077/5LBczVw9MjQPDiod/1wXVwEtIT MhYEDEXD03cjyXvmeU1daPFVNYAVuJEpWfd+he/SYph6XElXDW7o4LukDuxNoBF2/2EM q/WZu9TGbHLXVK4MO386pbEl6kiNO/JaQIIXc= MIME-Version: 1.0 In-Reply-To: <4D5DACC5.60105@tilera.com> References: <4D5DA60A.8080201@tilera.com> <20110217.145333.232751283.davem@davemloft.net> <4D5DA96D.5060200@tilera.com> <20110217.151147.35033921.davem@davemloft.net> <4D5DACC5.60105@tilera.com> Date: Fri, 18 Feb 2011 11:16:20 +0800 Message-ID: Subject: Re: IGMP and rwlock: Dead ocurred again on TILEPro From: Cypher Wu To: Chris Metcalf Cc: David Miller , xiyou.wangcong@gmail.com, linux-kernel@vger.kernel.org, eric.dumazet@gmail.com, netdev@vger.kernel.org Content-Type: text/plain; charset=ISO-8859-1 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3299 Lines: 82 On Fri, Feb 18, 2011 at 7:18 AM, Chris Metcalf wrote: > On 2/17/2011 6:11 PM, David Miller wrote: >> From: Chris Metcalf >> Date: Thu, 17 Feb 2011 18:04:13 -0500 >> >>> On 2/17/2011 5:53 PM, David Miller wrote: >>>> From: Chris Metcalf >>>> Date: Thu, 17 Feb 2011 17:49:46 -0500 >>>> >>>>> The fix is to disable interrupts for the arch_read_lock family of methods. >>>> How does that help handle the race when it happens between different >>>> cpus, instead of between IRQ and non-IRQ context on the same CPU? >>> There's no race in that case, since the lock code properly backs off and >>> retries until the other cpu frees it. The distinction here is that the >>> non-IRQ context is "wedged" by the IRQ context. >>> >>>> Why don't you just use the generic spinlock based rwlock code on Tile, >>>> since that is all that your atomic instructions can handle >>>> sufficiently? >>> The tile-specific code encodes reader/writer information in the same 32-bit >>> word that the test-and-set instruction manipulates, so it's more efficient >>> both in space and time. This may not really matter for rwlocks, since no >>> one cares much about them any more, but that was the motivation. >> Ok, but IRQ disabling is going to be very expensive. > > The interrupt architecture on Tile allows a write to a special-purpose > register to put you into a "critical section" where no interrupts or faults > are delivered. So we just need to bracket the read_lock operations with > two SPR writes; each takes six machine cycles, so we're only adding 12 > cycles to the total cost of taking or releasing a read lock on an rwlock. > > -- > Chris Metcalf, Tilera Corp. > http://www.tilera.com > > I agree that just lock interrupt for read operations should be enough, but read_unlock() is also the place we should lock interrupt, right? If interrupt occurred when it hold lock-val after TNS deadlock still can occur. When will you release out that patch? Since time is tight, so maybe I've to fix-up it myself. Though the problem is clearly now, I still have two questions to confirm: 1. If we use SPR_INTERRUPT_CRITICAL_SECTION it will disable all the interrupt which claimed 'CM', is that right? Should we have to same its original value and restore it later? There is some code in Linux: int __tns_atomic_acquire(atomic_t *lock) { int ret; u32 iterations = 0; BUG_ON(__insn_mfspr(SPR_INTERRUPT_CRITICAL_SECTION)); __insn_mtspr(SPR_INTERRUPT_CRITICAL_SECTION, 1); while((ret = __insn_tns(&lock->counter)) == 1) delay_backoff(iterations++); return ret; } It just use BUG_ON to check SPR_INTERRUPT_CRITICAL_SECTION have to be 0, is that means that SPR is only used in special situations like that? 2. Should we lock interrupt for the whole operation of read_lock()/read_unlock(), or we should leave interrupt critical section if it run into __raw_read_lock_slow() and before have to delay_backoff() some time, and re-enter interrupt critical section again before TNS? -- Cyberman Wu -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/