Received: by 2002:ac0:a594:0:0:0:0:0 with SMTP id m20-v6csp1090445imm; Mon, 21 May 2018 21:15:59 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoPdFAH2NBfPb4/7tAEiX1OhHe595lcxStRxNHQcU6UbrsLfoDPIuijUDOAjiIG2eB3Loaa X-Received: by 2002:a65:4dca:: with SMTP id q10-v6mr17800097pgt.22.1526962559827; Mon, 21 May 2018 21:15:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1526962559; cv=none; d=google.com; s=arc-20160816; b=hz5ibDQdN7QTC4lbrl3+gBh6YNqkbe2PhH3vld3iQ3LmAMVb4DpVpAhKU5cm01DF3e bCV7RjhJ7cvjtgomIHtLkGJXVdkbUBfRtvqnUybI+MnO95QFEULRVfC6+JNgEc1b0ARg Hy+5Cc47Q4g2NA3lFOBoPE1zGtiXr9X39szfJ2xBBHp9a3FWyadRzv4zmq2bGokRVOns j7Wewx7PAxOu5VBDeMRk0rF92mk+lSvw5xYBIt6OSODvIpFtb2DxnK0BHACRD/9Ukccw ZSbGHJtYYoon96alLW/CyaOApnTxvad7AtvYaf2oJcBR/I5JfP56/ZaxaRscxG8MEg28 I4Gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:subject:cc:to :from:date:arc-authentication-results; bh=riKXwf6gTcUG0wydczka+2+cV1Vn1muv3A4Xdb4UL4w=; b=tfReQpRM7m1Et+Xd4TG7hUrEbUAvvi0Kp3fKZuqicDJk4ERfIOPXWtZn04V/34tSzg zfDp1P03+E6O4b69pHgXfMfSdlNpeICcA6NxP05BumWM/XgHs8jAGGbG5CEGGx7eg08/ JAe7NFDu8Ifbo32BZDq93wDQsm6OpNBr1nDaSwnPUKcndKIfWhPwJol5M1frA4JjmSyl JyvgfIFp1khhZGuD+PTEN7KMT1Vn1NI1RALCEW+FMw4TO3E8FAx7mKTKTMSdUSSzj1Y/ 7KREOhHW9SQyJkYQILX9lUEC84hg5qcsTa9SxlHvzUjIAzRzisM2bIe6QBwf/FQAgelk txCw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p1-v6si12284990pgq.592.2018.05.21.21.15.34; Mon, 21 May 2018 21:15:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751114AbeEVEPX (ORCPT + 99 others); Tue, 22 May 2018 00:15:23 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:44524 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750707AbeEVEPV (ORCPT ); Tue, 22 May 2018 00:15:21 -0400 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w4M4EQxf080051 for ; Tue, 22 May 2018 00:15:20 -0400 Received: from e16.ny.us.ibm.com (e16.ny.us.ibm.com [129.33.205.206]) by mx0a-001b2d01.pphosted.com with ESMTP id 2j48muperb-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Tue, 22 May 2018 00:15:20 -0400 Received: from localhost by e16.ny.us.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Tue, 22 May 2018 00:15:19 -0400 Received: from b01cxnp22035.gho.pok.ibm.com (9.57.198.25) by e16.ny.us.ibm.com (146.89.104.203) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Tue, 22 May 2018 00:15:15 -0400 Received: from b01ledav003.gho.pok.ibm.com (b01ledav003.gho.pok.ibm.com [9.57.199.108]) by b01cxnp22035.gho.pok.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w4M4FEri57344154 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Tue, 22 May 2018 04:15:14 GMT Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 6A16CB206B; Tue, 22 May 2018 01:17:05 -0400 (EDT) Received: from b01ledav003.gho.pok.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 49591B2065; Tue, 22 May 2018 01:17:05 -0400 (EDT) Received: from paulmck-ThinkPad-W541 (unknown [9.80.227.37]) by b01ledav003.gho.pok.ibm.com (Postfix) with ESMTP; Tue, 22 May 2018 01:17:05 -0400 (EDT) Received: by paulmck-ThinkPad-W541 (Postfix, from userid 1000) id 60C3116C428E; Mon, 21 May 2018 21:16:51 -0700 (PDT) Date: Mon, 21 May 2018 21:16:51 -0700 From: "Paul E. McKenney" To: Joel Fernandes Cc: Joel Fernandes , linux-kernel@vger.kernel.org, Josh Triplett , Steven Rostedt , Mathieu Desnoyers , Lai Jiangshan , byungchul.park@lge.com, kernel-team@android.com Subject: Re: [PATCH v3 4/4] rcu: Unlock non-start node only after accessing its gp_seq_needed Reply-To: paulmck@linux.vnet.ibm.com References: <20180521044220.123933-1-joel@joelfernandes.org> <20180521044220.123933-5-joel@joelfernandes.org> <20180521232537.GJ3803@linux.vnet.ibm.com> <20180522000734.GD40541@joelaf.mtv.corp.google.com> <20180522002823.GP3803@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180522002823.GP3803@linux.vnet.ibm.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 18052204-0024-0000-0000-0000035CAC45 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009064; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000261; SDB=6.01035837; UDB=6.00529851; IPR=6.00814966; MB=3.00021230; MTD=3.00000008; XFM=3.00000015; UTC=2018-05-22 04:15:18 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18052204-0025-0000-0000-00004818604C Message-Id: <20180522041651.GA18405@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-05-22_01:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1805220050 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 21, 2018 at 05:28:23PM -0700, Paul E. McKenney wrote: > On Mon, May 21, 2018 at 05:07:34PM -0700, Joel Fernandes wrote: > > On Mon, May 21, 2018 at 04:25:38PM -0700, Paul E. McKenney wrote: > > > On Sun, May 20, 2018 at 09:42:20PM -0700, Joel Fernandes wrote: > > > > We acquire gp_seq_needed locklessly. To be safe, lets do the unlocking > > > > after the access. > > > > > > Actually, no, we hold rnp_start's ->lock throughout. And this CPU (or in > > > the case of no-CBs CPUs, this task) is in charge of rdp->gp_seq_needed, > > > so nothing else is accessing it. Or at least that is the intent. ;-) > > > > I was talking about protecting the internal node's rnp->gp_seq_needed, not > > the rnp_start's gp_seq_needed. > > Ah, good point, I missed the "if" condition. This can be argued to work, > sort of, given that we still hold the leaf rcu_node structure's lock, > so that there is a limit to how far grace periods can advance. > > But the code would of course be much cleaner with your change. > > > We are protecting them in the loop: > > > > like this: > > for(...) > > if (rnp != rnp_start) > > raw_spin_lock_rcu_node(rnp); > > [...] > > // access rnp->gp_seq and rnp->gp_seq_needed > > [...] > > if (rnp != rnp_start) > > raw_spin_unlock_rcu_node(rnp); > > > > But we don't need to do such protection in unlock_out ? I'm sorry if I'm > > missing something, but I'm wondering if rnp->gp_seq_needed of an internal > > node can be accessed locklessly, then why can't that be done also in the > > funnel locking loop - after all we are holding the rnp_start's lock through > > out right? > > I was focused on the updates, and missed the rnp->gp_seq_req access in the > "if" statement. The current code does sort of work, but only assuming > that the compiler doesn't tear the load, and so your change would help. > Could you please resend with your other two updated patches? It depends > on one of the earlier patches, so does not apply cleanly as-is. I could > hand-apply it, but that sounds like a good way to make your updated > series fail to apply. ;-) > > But could you also make the commit log explicitly call out the "if" > condition as being the offending access? Never mind, me being stupid. I need to apply this change to the original commit "rcu: Make rcu_nocb_wait_gp() check if GP already requested", which I have done with this attribution: [ paulmck: Move lock release past "if" as suggested by Joel Fernandes. ] I have rebased my stack on top of the updated commit. Thanx, Paul