Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756624Ab1DMDDG (ORCPT ); Tue, 12 Apr 2011 23:03:06 -0400 Received: from mga09.intel.com ([134.134.136.24]:43778 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756095Ab1DMDDE (ORCPT ); Tue, 12 Apr 2011 23:03:04 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="4.64,202,1301900400"; d="scan'208";a="732587441" Subject: Re: [PATCH 3/4]percpu_counter: fix code for 32bit systems From: Shaohua Li To: Eric Dumazet Cc: lkml , Andrew Morton , "cl@linux.com" , "tj@kernel.org" In-Reply-To: <1302662853.2811.41.camel@edumazet-laptop> References: <1302595444.3981.129.camel@sli10-conroe> <1302599035.3233.27.camel@edumazet-laptop> <1302656465.3981.133.camel@sli10-conroe> <1302661927.2811.18.camel@edumazet-laptop> <1302662517.3981.161.camel@sli10-conroe> <1302662853.2811.41.camel@edumazet-laptop> Content-Type: text/plain; charset="UTF-8" Date: Wed, 13 Apr 2011 11:03:01 +0800 Message-ID: <1302663781.3981.169.camel@sli10-conroe> Mime-Version: 1.0 X-Mailer: Evolution 2.30.3 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2316 Lines: 62 On Wed, 2011-04-13 at 10:47 +0800, Eric Dumazet wrote: > Le mercredi 13 avril 2011 à 10:41 +0800, Shaohua Li a écrit : > > On Wed, 2011-04-13 at 10:32 +0800, Eric Dumazet wrote: > > > Le mercredi 13 avril 2011 à 09:01 +0800, Shaohua Li a écrit : > > > > On Tue, 2011-04-12 at 17:03 +0800, Eric Dumazet wrote: > > > > > > > > > > Hmm... did you test this with LOCKDEP on ? > > > > > > > > > > You add a possible deadlock here. > > > > > > > > > > Hint : Some percpu_counter are used from irq context. > > > > there are some places we didn't disable interrupt, for example > > > > percpu_counter_add. So the API isn't irq safe to me. > > > > > > > > > > So what ? Callers must disable IRQ before calling percpu_counter_add(), > > > and they actually do in network stack. Please check again, > > > tcp_sockets_allocated for example. > > Did you check other code? for example, __vm_enough_memory() doesn't > > disable IRQ before calling percpu_counter_add(). > > > > Did you read my mails ? > > I said : fix the buggy parts that's the difference. Why the parts are buggy? what I said is the interface is never IRQ safe. > dont add new bugs or slow down parts that > are OK. > > > > > > > This interface assumes caller take the appropriate locking. > > > > no comments say this, and some places we don't hold locking. > > > > for example, meminfo_proc_show. > > > > > > > > > > This doesnt answer my question about LOCKDEP ;) > > > > > > Just fix the few callers that might need a fix, since this is the only > > > way to deal with potential problems without adding performance penalty > > > (for stable trees) > > I mean the interface doesn't assume caller should take locking. Since > > there isn't locking taking, we should make the interface itself correct, > > instead of fixing caller. > > > > No _please_ > > Q: Is spin_lock() irq safe ? > A: No > > Q: Should we make it irq safe ? > A: just use spin_lock_... variants I can do this, but please give a reason. If network code is the only place requiring disable irq, why not network code do it? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/