* David Brownell <[email protected]> wrote:
> > > 1 ALWAYS complete() with IRQs disabled
> > >
> > > 2 NEVER complete() with them disabled
> > >
> > > 3 SOMETIMEs complete() with them disabled.
> > >
> > > Right now we're with #1 which is simple, consistent and guaranteed.
> > >
> > > We couldn't switch to #2 with patches that simple. They'd in fact
> > > be rather involved ...
> >
> > I'm in favor of #2 on general principle.
>
> Which principle would that be, though? :)
it's the basic Linux kernel principle of never disabling interrupts,
unless really, really necessary.
but the main issue isnt with disabling interrupts in general, the issue
is with "naked" (i.e. lock-less) disabling of interrupts. Let me try to
explain. Stuff like:
spin_lock_irq(&lock);
stuff1();
spin_unlock(&lock);
stuff2();
local_irq_enable();
is outright dangerous, because it could hide SMP bugs that do not
trigger on UP. SMP systems are becoming the norm these days, so we
cannot hide behind "most people use UP" arguments anymore. IRQ flags
management needs to be tightened up. (The good news is that it can be
done gradually and i'm doing it, so it's no extra work for you.)
so in the process of identifying naked IRQ-flags use i asked why the USB
code was doing it, and i'm happy that the answer is "no good reason,
mostly historic". (naked IRQ flags use also happens to be a problem for
PREEMPT_RT, where i also have a debug warning about such IRQ flags
assymetries, but you need not worry about that one.)
the only logistical problem with "unifying" the IRQ flags operations
with their respective spin_lock functions is their transitive nature,
e.g. in the above example, if stuff2() does:
stuff2()
{
spin_lock(&lock2);
stuff3();
spin_unlock(&lock2);
}
then the irqs-off condition needs to be propagated into the function:
stuff2()
{
spin_lock_irq(&lock2);
stuff3();
spin_unlock_irq(&lock2);
}
IFF 'lock2' can be used from an interrupt or softirq context. Obviously
the latter code form is much more preferred, because it self-documents
that lock2 is irq-safe. Nested, implicit irqs-off assumptions are
another common source of locking bugs.
but fortunately this is a relatively straightforward process, and it
seems Alan has identified most of the affected functions. I'd be happy
if you could point out more candidates. In the worst-case, if any
function is missed by accident then it's easy to debug it. I'm now
testing the patches posted in this thread in the -RT tree, they are
looking good so far.
to make such cleanups of irq-flags use easier i'm also thinking about
automating the process of checking for the irq-safety of spinlocks, by
adding a new spinlock type via:
DEFINE_SPINLOCK_IRQSAFE(lock2);
(and a spin_lock_init_irqsafe() function too)
this will be useful for the whole kernel, not properly managing the irq
flags is a common locking mistake. With this new debug feature enabled,
the kernel will warn if an irq-safe lock is taken with interrupts still
enabled.
furthermore, the debug feature will also warn if a spinlock _not_ marked
irqsafe is used from an interrupt context. This is another common type
of locking mistake.
the spinlock-consolidation patch currently cooking in -mm (to be merged
to 2.6.14) makes it easy to add such new spinlock debugging features
without having to change assembly code in 22 architectures.
[ we could even take this one step further and completely automate
irq-safe locks - i.e. not manage irq-flags at all and only have
spin_lock() and spin_unlock(). That would cause some minimal runtime
overhead for irqsafe locks though. But i digress. ]
Ingo
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
|
|