Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755953AbdLVBje (ORCPT ); Thu, 21 Dec 2017 20:39:34 -0500 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:43372 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1755845AbdLVBj2 (ORCPT ); Thu, 21 Dec 2017 20:39:28 -0500 Date: Thu, 21 Dec 2017 17:39:37 -0800 From: "Paul E. McKenney" To: Rao Shoaib Cc: Matthew Wilcox , linux-kernel@vger.kernel.org, brouer@redhat.com, linux-mm@kvack.org Subject: Re: [PATCH] Move kfree_call_rcu() to slab_common.c Reply-To: paulmck@linux.vnet.ibm.com References: <1513844387-2668-1-git-send-email-rao.shoaib@oracle.com> <20171221123630.GB22405@bombadil.infradead.org> <44044955-1ef9-1d1e-5311-d8edc006b812@oracle.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <44044955-1ef9-1d1e-5311-d8edc006b812@oracle.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 17122201-0008-0000-0000-000002B3B408 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00008240; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000244; SDB=6.00963692; UDB=6.00487558; IPR=6.00743678; BA=6.00005753; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00018666; XFM=3.00000015; UTC=2017-12-22 01:39:25 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17122201-0009-0000-0000-000037A9BC04 Message-Id: <20171222013937.GA7829@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-12-21_11:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1712220020 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3341 Lines: 95 On Thu, Dec 21, 2017 at 09:31:23AM -0800, Rao Shoaib wrote: > > > On 12/21/2017 04:36 AM, Matthew Wilcox wrote: > >On Thu, Dec 21, 2017 at 12:19:47AM -0800, rao.shoaib@oracle.com wrote: > >>This patch moves kfree_call_rcu() and related macros out of rcu code. A new > >>function __call_rcu_lazy() is created for calling __call_rcu() with the lazy > >>flag. > >Something you probably didn't know ... there are two RCU implementations > >in the kernel; Tree and Tiny. It looks like you've only added > >__call_rcu_lazy() to Tree and you'll also need to add it to Tiny. > I left it out on purpose because the call in tiny is a little different > > rcutiny.h: > > static inline void kfree_call_rcu(struct rcu_head *head, > ??? ??? ??? ??? ? void (*func)(struct rcu_head *rcu)) > { > ??? call_rcu(head, func); > } > > tree.c: > > void kfree_call_rcu(struct rcu_head *head, > ??? ??? ??? void (*func)(struct rcu_head *rcu)) > { > ??? __call_rcu(head, func, rcu_state_p, -1, 1); > } > EXPORT_SYMBOL_GPL(kfree_call_rcu); > > If we want the code to be exactly same I can create a lazy version > for tiny as well. However,? I don not know where to move > kfree_call_rcu() from it's current home in rcutiny.h though. Any > thoughts ? I might be missing something subtle here, but in case I am not, my suggestion is to simply rename rcutiny.h's kfree_call_rcu() and otherwise leave it as is. If you want to update the type of the second argument, which got missed back in the day, there is always this: static inline void call_rcu_lazy(struct rcu_head *head, rcu_callback_t func) { call_rcu(head, func); } The reason that Tiny RCU doesn't handle laziness specially is because Tree RCU's handling of laziness is a big no-op on the single CPU systems on which Tiny RCU runs. So Tiny RCU need do nothing special to support laziness. Thanx, Paul > >>Also moving macros generated following checkpatch noise. I do not know > >>how to silence checkpatch as there is nothing wrong. > >> > >>CHECK: Macro argument reuse 'offset' - possible side-effects? > >>#91: FILE: include/linux/slab.h:348: > >>+#define __kfree_rcu(head, offset) \ > >>+ do { \ > >>+ BUILD_BUG_ON(!__is_kfree_rcu_offset(offset)); \ > >>+ kfree_call_rcu(head, (rcu_callback_t)(unsigned long)(offset)); \ > >>+ } while (0) > >What checkpatch is warning you about here is that somebody might call > > > >__kfree_rcu(p, a++); > > > >and this would expand into > > > > do { \ > > BUILD_BUG_ON(!__is_kfree_rcu_offset(a++)); \ > > kfree_call_rcu(p, (rcu_callback_t)(unsigned long)(a++)); \ > > } while (0) > > > >which would increment 'a' twice, and cause pain and suffering. > > > >That's pretty unlikely usage of __kfree_rcu(), but I suppose it's not > >impossible. We have various hacks to get around this kind of thing; > >for example I might do this as:: > > > >#define __kfree_rcu(head, offset) \ > > do { \ > > unsigned long __o = offset; > > BUILD_BUG_ON(!__is_kfree_rcu_offset(__o)); \ > > kfree_call_rcu(head, (rcu_callback_t)(unsigned long)(__o)); \ > > } while (0) > > > >Now offset is only evaluated once per invocation of the macro. The other > >two warnings are the same problem. > > > Thanks. I was not sure if I was required to fix the noise or based > on inspection the noise could be ignored. I will make the change and > resubmit. > > Shoaib >