Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S941737AbcKQRm0 (ORCPT ); Thu, 17 Nov 2016 12:42:26 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:38374 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933798AbcKQRmW (ORCPT ); Thu, 17 Nov 2016 12:42:22 -0500 Date: Thu, 17 Nov 2016 09:42:09 -0800 From: "Paul E. McKenney" To: Lai Jiangshan Cc: Boqun Feng , LKML , Ingo Molnar , dipankar@in.ibm.com, akpm@linux-foundation.org, Mathieu Desnoyers , Josh Triplett , Thomas Gleixner , Peter Zijlstra , Steven Rostedt , David Howells , Eric Dumazet , dvhart@linux.intel.com, =?iso-8859-1?Q?Fr=E9d=E9ric?= Weisbecker , oleg@redhat.com, pranith kumar , ldr709@gmail.com Subject: Re: [PATCH RFC tip/core/rcu] SRCU rewrite Reply-To: paulmck@linux.vnet.ibm.com References: <20161114183636.GA28589@linux.vnet.ibm.com> <20161115014445.GC12110@tardis.cn.ibm.com> <20161115143700.GZ4127@linux.vnet.ibm.com> <20161117134957.GW3612@linux.vnet.ibm.com> <20161117143829.GA21600@linux.vnet.ibm.com> <20161117144544.GC5227@tardis.cn.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 X-Content-Scanned: Fidelis XPS MAILER x-cbid: 16111717-8235-0000-0000-000009A1E52F X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00006095; HX=3.00000240; KW=3.00000007; PH=3.00000004; SC=3.00000189; SDB=6.00782020; UDB=6.00377309; IPR=6.00559525; BA=6.00004889; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00013362; XFM=3.00000011; UTC=2016-11-17 17:42:13 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 16111717-8236-0000-0000-0000368BA147 Message-Id: <20161117174209.GG3612@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2016-11-17_09:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1609300000 definitions=main-1611170307 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3101 Lines: 62 On Thu, Nov 17, 2016 at 11:55:07PM +0800, Lai Jiangshan wrote: > On Thu, Nov 17, 2016 at 10:45 PM, Boqun Feng wrote: > > On Thu, Nov 17, 2016 at 06:38:29AM -0800, Paul E. McKenney wrote: > >> On Thu, Nov 17, 2016 at 05:49:57AM -0800, Paul E. McKenney wrote: > >> > On Thu, Nov 17, 2016 at 08:18:51PM +0800, Lai Jiangshan wrote: > >> > > On Tue, Nov 15, 2016 at 10:37 PM, Paul E. McKenney > >> > > wrote: > >> > > > On Tue, Nov 15, 2016 at 09:44:45AM +0800, Boqun Feng wrote: > >> > > > >> > > >> > >> > > >> __srcu_read_lock() used to be called with preemption disabled. I guess > >> > > >> the reason was because we have two percpu variables to increase. So with > >> > > >> only one percpu right, could we remove the preempt_{dis,en}able() in > >> > > >> srcu_read_lock() and use this_cpu_inc() here? > >> > > > > >> > > > Quite possibly... > >> > > > > >> > > > >> > > it will be nicer if it is removed. > >> > > > >> > > The reason for the preemption-disabled was also because we > >> > > have to disallow any preemption between the fetching of the idx > >> > > and the increasement. so that we have at most NR_CPUS worth > >> > > of readers using the old index that haven't incremented the counters. > >> > > > >> > > if we remove the preempt_{dis,en}able(). we must change the > >> > > "NR_CPUS" in the comment into ULONG_MAX/4. (I assume > >> > > one on-going reader needs at least need 4bytes at the stack). it is still safe. > >> > > > >> > > but we still need to think more if we want to remove the preempt_{dis,en}able(). > >> > > >> > Good points! Agreed, any change in the preemption needs careful thought > >> > and needs to be a separate patch. > >> > >> And one area needing special thought is the call to __srcu_read_lock() > >> and __srcu_read_unlock() in do_exit(). > >> > > > > So before commit 49f5903b473c5, we don't have the read of ->completed in > > preemption disable section? > > > > And following "git blame", I found commit 7a6b55e7108b3 ;-) > > Ouch, it shows 7a6b55e7108b3 at least has a bug in the comments about NR_CPUS. > > we should focus on the total number of all active readers instead the number > of the readers using the old index that haven't incremented the counters. > the later is smaller than the prior one which is smaller than the ULONG_MAX/4 > or even smaller. so that we can simplify the comments. > > + * Note that the sum of the ->lock_count[]s cannot increment enough > + * times to overflow and end up equal the sum of the ->unlock_count[]s, > + * even too much readers using the old index that haven't incremented > + * ->lock_count[] yet, as long as there are at most ULONG_MAX/4 > + * readers at a time. Therefore, the only way that the return values of > + * the two calls to srcu_readers_(un)lock_idx() can be equal is if there > + * are no active readers using this index. I would welcome a patch making the limitations simpler and more accurate. That is, once we work out exactly what those limitations are. ;-) Thanx, Paul