> Date: Wed, 23 Jun 2021 14:56:45 +0000
> From: Visa Hankala <v...@hankala.org>
> 
> On Tue, Jun 22, 2021 at 09:46:22AM -0500, Scott Cheloha wrote:
> > On Mon, Jun 21, 2021 at 02:04:30PM +0000, Visa Hankala wrote:
> > > On Thu, May 27, 2021 at 07:40:26PM -0500, Scott Cheloha wrote:
> > > > On Sun, May 23, 2021 at 09:05:24AM +0000, Visa Hankala wrote:
> > > > > When a CPU starts processing a soft interrupt, it reserves the handler
> > > > > to prevent concurrent execution. If the soft interrupt gets 
> > > > > rescheduled
> > > > > during processing, the handler is run again by the same CPU. This 
> > > > > breaks
> > > > > FIFO ordering, though.
> > > > 
> > > > If you want to preserve FIFO you can reinsert the handler at the queue
> > > > tail.  That would be more fair.
> > > > 
> > > > If FIFO is the current behavior I think we ought to keep it.
> > > 
> > > I have updated the patch to preserve the FIFO order.
> > > 
> > > > > +STAILQ_HEAD(x86_soft_intr_queue, x86_soft_intrhand);
> > > > > +
> > > > > +struct x86_soft_intr_queue softintr_queue[X86_NSOFTINTR];
> > > > 
> > > > Why did we switch to STAILQ?  I know we don't have very many
> > > > softintr_disestablish() calls but isn't O(1) removal worth the extra
> > > > pointer?
> > > 
> > > I used STAILQ because it avoids the hassle of updating the list nodes'
> > > back pointers. softintr_disestablish() with multiple items pending in
> > > the queue is very rare in comparison to the normal softintr_schedule() /
> > > softintr_dispatch() cycle.
> > > 
> > > However, I have changed the code back to using TAILQ.
> > 
> > This looks good to me.  I mean, it looked good before, but it still
> > looks good.
> > 
> > I will run with it for a few days.
> > 
> > Assuming I hit no issues I'll come back with an OK.
> > 
> > Is there an easy way to exercise this code from userspace?  There
> > aren't many softintr users.
> > 
> > Maybe audio drivers?
> 
> audio(4) is one option with a relatively high rate of scheduling.
> Serial communications drivers, such as com(4), might be useful for
> testing too.
> 
> softintr_disestablish() can be exercised with uaudio(4) and ucom(4)
> for example.
> 
> I am still uncertain whether the barrier in softintr_disestablish()
> is fully safe. The typical detach-side users are audio_detach(),
> com_detach() and usb_detach(). They should be fine because the
> surrounding code may sleep. However, sbus(4) worries me because it
> invokes softintr_disestablish() from PCMCIA intr_disestablish callback,
> and I do not know how wild the usage contexts can be. sbus(4) is
> specific to sparc64, though.

Suprise-removal is a thing for PCI as well as PCMCIA and USB.  And in
the PCI case this will call com_detach() and therefore
softintr_disestablish() from interrupt context, where you can't sleep.

So I don't think that using some sort of barrier that sleeps is an
option.

Reply via email to