Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3413881img; Mon, 25 Mar 2019 09:47:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqzoWChaTPBNb+bZBkhezfTl3j4UTbejz+7j0zQCz/t5Q2SaW/DmZErE5EOJnG1ehDyjVgDV X-Received: by 2002:a63:cc03:: with SMTP id x3mr23921725pgf.121.1553532435703; Mon, 25 Mar 2019 09:47:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553532435; cv=none; d=google.com; s=arc-20160816; b=lgUcETN4MMki8FhfeRLSoO77Hj7M8y2E1uUweFolBhteH6fVkPG378u7NicGupx2c0 6onhvwhg2OSh8Aln538KHPTZWasmSMOZ6Z1jy5RHi6ZRw+I/faGk/KK0FHWn9zY+jXI5 x9OC/jAg7/rfWQG6jIo5K8fEWKIGYF7EyWLGIYlViOxmUl55TvYprb11wbfSooOhubOm o4l/3lOe4jW/k/VGE+zG9DQlEy/3FMbMTKxf8oyAiLdAauumOnxJs7k1dWTNKUwr4C6z q5pstWv0swAO2yMtWcR5mz3mOMV8dbrAKV91ewjtl5cEXOMtDXJUR/J77plmty9rkaxg 03gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=t9zy/7o/wXxn8o9xiennO56tqny6qYj28o2PkgbCnMU=; b=OKJSlreaPnKjXPE8I3WZwlq3hFKwCp/85vnuX1NSSCJdLlUJVdYXo2Vh38Dk88icyo NTP/1FEP9rzjw40DxpQIqEobuQ1oCqLH/wpMjcP+aNV3ewo2uwGnP0b0S+NgO7MM5NfU BBMvzLC12kWPXAk7A4QhQKLFvzRssFDzbmwA1EV9vNYLi1dsszHY+QJ3UYruppu3vvxl 01L1641QcTEL567P1i96/na1jDr9fIzBY5HVTo7BGb36+rR66JyLRaU+X7nixOl5amoj pUlD9pIiH7U2XzZBY8YJ/kmNRsqaY46BJdHFnMKreT9vk9tUCkVx61KnvGcYUIeJXLOq o7SQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=MOvLGG5t; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d81si13839730pfm.252.2019.03.25.09.47.00; Mon, 25 Mar 2019 09:47:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=MOvLGG5t; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729853AbfCYQoo (ORCPT + 99 others); Mon, 25 Mar 2019 12:44:44 -0400 Received: from mail-pg1-f196.google.com ([209.85.215.196]:43980 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726024AbfCYQon (ORCPT ); Mon, 25 Mar 2019 12:44:43 -0400 Received: by mail-pg1-f196.google.com with SMTP id z9so563416pgu.10 for ; Mon, 25 Mar 2019 09:44:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=t9zy/7o/wXxn8o9xiennO56tqny6qYj28o2PkgbCnMU=; b=MOvLGG5tLn0biNvCmTTbgLuQZ4wsa0zeH2hjvDbu6XPQNhHyKLPuvOWEmvKaJL2Wtm P6+tZ/8XD+nwYi+BNde9/qrPsgN/VrpKZLhQ7VSMDb6xO6xH2yRxmUd+LXSQYQc8odOz EiVLbFLi4VQvv2j9LDA6TOIbjhaOaml7u5p/4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=t9zy/7o/wXxn8o9xiennO56tqny6qYj28o2PkgbCnMU=; b=OepltJCPL/6xDoFvaF+2h0rspyAl3F1UNgXYANXbplkJhNcuL1j7iECxYUGCY72esz ygzRySCdeV/qk0KLGmSwm1EpMfpG9zRsFpYxyRpsBt1S/a3eyqB0ggavv0w2iqy0tajv 0++5XTOUJoT4u3kmY1QdgH2/I8yEcUF/RfG13uZypJV8F7mBA1IU83RsiiY9SjQJL4Hh g8fasNL5kCbrJszpmEe5bP7suOWGoVhctOL/nAss8O51vIgV0e3k6dLcLUHO+tWt3Lmm PLJ9m3+qVbQEU9jXZHh5yo+XFYHZiyDKfgqvWo++HHidzCAMJhWndjW8FxVxY1QjlaYe 82oA== X-Gm-Message-State: APjAAAWNMC/4kt0fKYwp36tHSWtyNPG+Zox1kxtM3rLd++QFy/6QYaOR PLrc4/qaCIEFyofButxXM6iESw== X-Received: by 2002:a62:7049:: with SMTP id l70mr25082091pfc.78.1553532282631; Mon, 25 Mar 2019 09:44:42 -0700 (PDT) Received: from localhost ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id e21sm10803828pfd.177.2019.03.25.09.44.41 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Mon, 25 Mar 2019 09:44:41 -0700 (PDT) Date: Mon, 25 Mar 2019 12:44:40 -0400 From: Joel Fernandes To: "Paul E. McKenney" Cc: linux-kernel@vger.kernel.org, byungchul.park@lge.com, kernel-team@android.com, rcu@vger.kernel.org, Ingo Molnar , Josh Triplett , Lai Jiangshan , Mathieu Desnoyers , Peter Zijlstra , Steven Rostedt , Will Deacon Subject: Re: [RFC 2/2] rcutree: Add checks for dynticks counters in rcu_is_cpu_rrupt_from_idle Message-ID: <20190325164440.GA25975@google.com> References: <20190323012939.15185-1-joel@joelfernandes.org> <20190323012939.15185-2-joel@joelfernandes.org> <20190323030251.GB136835@google.com> <20190324234351.GX4102@linux.ibm.com> <20190325133646.GA182885@google.com> <20190325155341.GC4102@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190325155341.GC4102@linux.ibm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 25, 2019 at 08:53:41AM -0700, Paul E. McKenney wrote: > On Mon, Mar 25, 2019 at 09:36:46AM -0400, Joel Fernandes wrote: > > On Sun, Mar 24, 2019 at 04:43:51PM -0700, Paul E. McKenney wrote: > > > On Fri, Mar 22, 2019 at 11:02:51PM -0400, Joel Fernandes wrote: > > > > On Fri, Mar 22, 2019 at 09:29:39PM -0400, Joel Fernandes (Google) wrote: > > > > > In the future we would like to combine the dynticks and dynticks_nesting > > > > > counters thus leading to simplifying the code. At the moment we cannot > > > > > do that due to concerns about usermode upcalls appearing to RCU as half > > > > > of an interrupt. Byungchul tried to do it in [1] but the > > > > > "half-interrupt" concern was raised. It is half because, what RCU > > > > > expects is rcu_irq_enter() and rcu_irq_exit() pairs when the usermode > > > > > exception happens. However, only rcu_irq_enter() is observed. This > > > > > concern may not be valid anymore, but at least it used to be the case. > > > > > > > > > > Out of abundance of caution, Paul added warnings [2] in the RCU code > > > > > which if not fired by 2021 may allow us to assume that such > > > > > half-interrupt scenario cannot happen any more, which can lead to > > > > > simplification of this code. > > > > > > > > > > Summary of the changes are the following: > > > > > > > > > > (1) In preparation for this combination of counters in the future, we > > > > > first need to first be sure that rcu_rrupt_from_idle cannot be called > > > > > from anywhere but a hard-interrupt because previously, the comments > > > > > suggested otherwise so let us be sure. We discussed this here [3]. We > > > > > use the services of lockdep to accomplish this. > > > > > > > > > > (2) Further rcu_rrupt_from_idle() is not explicit about how it is using > > > > > the counters which can lead to weird future bugs. This patch therefore > > > > > makes it more explicit about the specific counter values being tested > > > > > > > > > > (3) Lastly, we check for counter underflows just to be sure these are > > > > > not happening, because the previous code in rcu_rrupt_from_idle() was > > > > > allowing the case where the counters can underflow, and the function > > > > > would still return true. Now we are checking for specific values so let > > > > > us be confident by additional checking, that such underflows don't > > > > > happen. Any case, if they do, we should fix them and the screaming > > > > > warning is appropriate. All these checks checks are NOOPs if PROVE_RCU > > > > > and PROVE_LOCKING are disabled. > > > > > > > > > > [1] https://lore.kernel.org/patchwork/patch/952349/ > > > > > [2] Commit e11ec65cc8d6 ("rcu: Add warning to detect half-interrupts") > > > > > [3] https://lore.kernel.org/lkml/20190312150514.GB249405@google.com/ > > > > > > > > > > Cc: byungchul.park@lge.com > > > > > Cc: kernel-team@android.com > > > > > Cc: rcu@vger.kernel.org > > > > > Signed-off-by: Joel Fernandes (Google) > > > > > --- > > > > > kernel/rcu/tree.c | 21 +++++++++++++++++---- > > > > > 1 file changed, 17 insertions(+), 4 deletions(-) > > > > > > > > > > diff --git a/kernel/rcu/tree.c b/kernel/rcu/tree.c > > > > > index 9180158756d2..d94c8ed29f6b 100644 > > > > > --- a/kernel/rcu/tree.c > > > > > +++ b/kernel/rcu/tree.c > > > > > @@ -381,16 +381,29 @@ static void __maybe_unused rcu_momentary_dyntick_idle(void) > > > > > } > > > > > > > > > > /** > > > > > - * rcu_is_cpu_rrupt_from_idle - see if idle or immediately interrupted from idle > > > > > + * rcu_is_cpu_rrupt_from_idle - see if interrupted from idle > > > > > * > > > > > - * If the current CPU is idle or running at a first-level (not nested) > > > > > + * If the current CPU is idle and running at a first-level (not nested) > > > > > * interrupt from idle, return true. The caller must have at least > > > > > * disabled preemption. > > > > > */ > > > > > static int rcu_is_cpu_rrupt_from_idle(void) > > > > > { > > > > > - return __this_cpu_read(rcu_data.dynticks_nesting) <= 0 && > > > > > - __this_cpu_read(rcu_data.dynticks_nmi_nesting) <= 1; > > > > > + /* Called only from within the scheduling-clock interrupt */ > > > > > + lockdep_assert_in_irq(); > > > > > + > > > > > + /* Check for counter underflows */ > > > > > + RCU_LOCKDEP_WARN( > > > > > + (__this_cpu_read(rcu_data.dynticks_nesting) < 0) && > > > > > + (__this_cpu_read(rcu_data.dynticks_nmi_nesting) < 0), > > > > > > > > > > > > This condition for the warning is supposed to be || instead of &&. Sorry. > > > > > > > > Or, I will just use 2 RCU_LOCKDEP_WARN(s) here, that's better. > > > > > > Also, the dynticks_nmi_nesting being zero is a bug given that we know > > > we are in an interrupt handler, right? Or am I off by one again? > > > > You are right, we can do additional checking for making sure its never zero. > > I refreshed the patch as below, does this look Ok? > > > > ---8<----------------------- > > > > From: "Joel Fernandes (Google)" > > Subject: [RFC v2] rcutree: Add checks for dynticks counters in > > > > In the future we would like to combine the dynticks and dynticks_nesting > > counters thus leading to simplifying the code. At the moment we cannot > > do that due to concerns about usermode upcalls appearing to RCU as half > > of an interrupt. Byungchul tried to do it in [1] but the > > "half-interrupt" concern was raised. It is half because, what RCU > > expects is rcu_irq_enter() and rcu_irq_exit() pairs when the usermode > > exception happens. However, only rcu_irq_enter() is observed. This > > concern may not be valid anymore, but at least it used to be the case. > > > > Out of abundance of caution, Paul added warnings [2] in the RCU code > > which if not fired by 2021 may allow us to assume that such > > half-interrupt scenario cannot happen any more, which can lead to > > simplification of this code. > > > > Summary of the changes are the following: > > > > (1) In preparation for this combination of counters in the future, we > > first need to first be sure that rcu_rrupt_from_idle cannot be called > > from anywhere but a hard-interrupt because previously, the comments > > suggested otherwise so let us be sure. We discussed this here [3]. We > > use the services of lockdep to accomplish this. > > > > (2) Further rcu_rrupt_from_idle() is not explicit about how it is using > > the counters which can lead to weird future bugs. This patch therefore > > makes it more explicit about the specific counter values being tested > > > > (3) Lastly, we check for counter underflows just to be sure these are > > not happening, because the previous code in rcu_rrupt_from_idle() was > > allowing the case where the counters can underflow, and the function > > would still return true. Now we are checking for specific values so let > > us be confident by additional checking, that such underflows don't > > happen. Any case, if they do, we should fix them and the screaming > > warning is appropriate. All these checks checks are NOOPs if PROVE_RCU > > and PROVE_LOCKING are disabled. > > > > [1] https://lore.kernel.org/patchwork/patch/952349/ > > [2] Commit e11ec65cc8d6 ("rcu: Add warning to detect half-interrupts") > > [3] https://lore.kernel.org/lkml/20190312150514.GB249405@google.com/ > > > > Cc: byungchul.park@lge.com > > Cc: kernel-team@android.com > > Cc: rcu@vger.kernel.org > > Signed-off-by: Joel Fernandes (Google) > > Looks better! I have applied this and its predecessor, if in backwards > order. (Will fix, rebase coming up anyway.) > > I do like your Cc-ing kernel-team@android.com -- one less thing for me > to remember! ;-) Thanks a lot Paul! :) - Joel