From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gate.crashing.org (gate.crashing.org [63.228.1.57]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by ozlabs.org (Postfix) with ESMTP id 97E3A67B98 for ; Thu, 30 Jun 2005 09:31:45 +1000 (EST) From: Benjamin Herrenschmidt To: Marcelo Tosatti In-Reply-To: <20050629155445.GA3560@logos.cnet> References: <20050625145318.GA32117@logos.cnet> <20050626143004.GA5198@logos.cnet> <20050627133930.GA9109@logos.cnet> <1119940208.5133.204.camel@gaston> <42C153E1.3060004@mrv.com> <1120018530.5133.241.camel@gaston> <42C2BF03.9000402@mrv.com> <20050629155445.GA3560@logos.cnet> Content-Type: text/plain Date: Thu, 30 Jun 2005 09:26:07 +1000 Message-Id: <1120087568.31924.14.camel@gaston> Mime-Version: 1.0 Cc: '@logos.cnet, linux-ppc-embedded Subject: Re: [PATCH] 8xx: get_mmu_context() for (very) FEW_CONTEXTS and KERNEL_PREEMPT race/starvation issue List-Id: Linux on Embedded PowerPC Developers Mail List List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , > Execution is resumed exactly where it has been interrupted. > > > The idea behind my patch was to get rid of that nr_free_contexts counter > > that is (I thing) redundant with the context_map. > > Apparently its there to avoid the spinlock exactly on !FEW_CONTEXTS machines. > > I suppose that what happens is that get_mmu_context() gets preempted after stealing > a context (so nr_free_contexts = 0), but before setting next_mmu_context to the > next entry > > next_mmu_context = (ctx + 1) & LAST_CONTEXT; Ugh ? Can switch_mm() be preempted at all ? Did I miss yet another "let's open 10 gazillion races for gun" Ingo patch ? > So if the now running higher prio tasks calls switch_mm() (which is likely to happen) > it loops forever on atomic_dec_if_positive(&nr_free_contexts), while steal_context() > sees "mm->context == CONTEXT". I think the race is only when destroy_context() is preempted, but maybe I missed something. > I think that you should try "preempt_disable()/preempt_enable" pair at entry and > exit of get_mmu_context() - I suppose around destroy_context() is not enough (you > can try that also). > > spinlock ends up calling preempt_disable().