Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp5457088ybi; Tue, 28 May 2019 13:27:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqwMIA/1QfI8WQFutXjZj0V0QtxHDWgo8QzZ089YsnjflOekQKh6+5pFd6mTCmZ5aDGLBbGH X-Received: by 2002:a65:4306:: with SMTP id j6mr32673858pgq.418.1559075225953; Tue, 28 May 2019 13:27:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559075225; cv=none; d=google.com; s=arc-20160816; b=k2OmaZZD9yyNwPsB0BsAKnmOlhKTbVCJve+f611Otj2I6/XmioTls+kA6IVwlKoWDX x35qlF/EpdvNFj0jg65mqaAp+BN5z90OBSrHlHhJ5LgZA+oy1c75CC1F4eZubYfNmJqd aauPOw3oKCx5ekvnHPzus69Nq6b6niuPkW76cdVaacybpHXxgxUGf2erVxAxK1To4C0f nTd9VIGJdtMsn5ANSElt6bXjqZJoeoKBoZ3dmgztx3NzLACJZGG7iKrqZnMvkDAVelt1 gPl64eq4BF3ydLPn7fnsQqZMIYmWYVyR69cNU6XE111FQfVp+QgHs+dGljTFqIkHYFn5 E9dA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=CZU9rfW8nSOc4u3WOwnTVIA3CZHkFWB1l1BBXho+t1E=; b=EB40h6xgisPS2q6TPivNfwl6iu6/lZFGvw6iRujLTifSsU8jSQzyC01LIF/yy+wgfV D6hfXDxjRVZ/BdeXAXmhO8szZe38Vyg83QodaKQzHYQdQgfCgYiKKvXaQPvZ1dAXwI4/ TG3GTsqRBS/4yyclTKkPFKqV5Pva1h4eaFTRjI548ncD/tX62BfiNAGsbZvnWorQK66z ua/KRPbkwym2hjg5ATHYPAN9GK7FtHXbTeygaf9uJbpZMu02OLphfhBHCG+7ru7g3q1v PGNyXpm+QKvUigDhTw9HAzXwX/7aRVxQYOVyZqqZ5RzPPlnGgzrs/mhDO3kyIvnwOgl7 X3hA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=FzPaGIqy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id gn12si21842351plb.394.2019.05.28.13.26.50; Tue, 28 May 2019 13:27:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=FzPaGIqy; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727328AbfE1TAL (ORCPT + 99 others); Tue, 28 May 2019 15:00:11 -0400 Received: from mail-pg1-f193.google.com ([209.85.215.193]:34073 "EHLO mail-pg1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727273AbfE1TAL (ORCPT ); Tue, 28 May 2019 15:00:11 -0400 Received: by mail-pg1-f193.google.com with SMTP id h2so8470724pgg.1 for ; Tue, 28 May 2019 12:00:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=CZU9rfW8nSOc4u3WOwnTVIA3CZHkFWB1l1BBXho+t1E=; b=FzPaGIqytxNT9NZViSpOmKVdl43I/21qdH/XEJADRxqiPUmFgFNy39u6WxcswLTBGy K+vsCbgHOaP7qUNzE6C4Fj/tvaTKPTM185KhjLV+BAv6HAbPzauWOPcsW6lrAG1Kdrpj 3WaNK0LBsCsiCRknaUJOFjgk1xpIOYEEQ9ly4= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=CZU9rfW8nSOc4u3WOwnTVIA3CZHkFWB1l1BBXho+t1E=; b=BAQGHZNM7+neQR9WUILiR42ddiu9+DPJbLMM/LpuFBroSvvDZMX2DBHSMQcYg5j4yi qvDlpPrnK4ox+PfjSQMckQJABck5f5rTqdpWADZ2oNwMPDiVquAm88zc33ZG7gKNRXn7 APqBF7uYjmL5Rtz8OvxC7uWZeIucCp9qiclaBHPqIkOSDA8K+pPoS0L8P961X9dDKsp6 Bmx2U5emWmP6IvOotDTUWJ+5c1jQBeMLu5/Sx1R0nknp4YZE3vMdHiN9+B30+qZi8mKX w9bg5pdD68QLhIqKIiCbbXUO1bKVwlsR083/tR69U0jK7VLQk4v288MGGQnRhlF8/GZb 4I0Q== X-Gm-Message-State: APjAAAWpC/VIh6Att5OyMN2dCnhoF/yg3A2VQ3MAJhpJSDz4tL1YAExu mWkTZrnT2IljKztBqKHNH8poQA== X-Received: by 2002:a63:4d0b:: with SMTP id a11mr46097351pgb.74.1559070009971; Tue, 28 May 2019 12:00:09 -0700 (PDT) Received: from localhost ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id c17sm14847688pfi.116.2019.05.28.12.00.08 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 28 May 2019 12:00:08 -0700 (PDT) Date: Tue, 28 May 2019 15:00:07 -0400 From: Joel Fernandes To: "Paul E. McKenney" Cc: Steven Rostedt , linux-kernel@vger.kernel.org, Benjamin Herrenschmidt , Ingo Molnar , Jonathan Corbet , Josh Triplett , kvm-ppc@vger.kernel.org, Lai Jiangshan , linux-doc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, Mathieu Desnoyers , Michael Ellerman , Miguel Ojeda , Paul Mackerras , rcu@vger.kernel.org Subject: Re: [PATCH RFC 0/5] Remove some notrace RCU APIs Message-ID: <20190528190007.GC252809@google.com> References: <20190524234933.5133-1-joel@joelfernandes.org> <20190524232458.4bcf4eb4@gandalf.local.home> <20190525081444.GC197789@google.com> <20190525070826.16f76ee7@gandalf.local.home> <20190525141954.GA176647@google.com> <20190525155035.GE28207@linux.ibm.com> <20190525181407.GA220326@google.com> <20190528122447.GS28207@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190528122447.GS28207@linux.ibm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 28, 2019 at 05:24:47AM -0700, Paul E. McKenney wrote: > On Sat, May 25, 2019 at 02:14:07PM -0400, Joel Fernandes wrote: > > On Sat, May 25, 2019 at 08:50:35AM -0700, Paul E. McKenney wrote: > > > On Sat, May 25, 2019 at 10:19:54AM -0400, Joel Fernandes wrote: > > > > On Sat, May 25, 2019 at 07:08:26AM -0400, Steven Rostedt wrote: > > > > > On Sat, 25 May 2019 04:14:44 -0400 > > > > > Joel Fernandes wrote: > > > > > > > > > > > > I guess the difference between the _raw_notrace and just _raw variants > > > > > > > is that _notrace ones do a rcu_check_sparse(). Don't we want to keep > > > > > > > that check? > > > > > > > > > > > > This is true. > > > > > > > > > > > > Since the users of _raw_notrace are very few, is it worth keeping this API > > > > > > just for sparse checking? The API naming is also confusing. I was expecting > > > > > > _raw_notrace to do fewer checks than _raw, instead of more. Honestly, I just > > > > > > want to nuke _raw_notrace as done in this series and later we can introduce a > > > > > > sparse checking version of _raw if need-be. The other option could be to > > > > > > always do sparse checking for _raw however that used to be the case and got > > > > > > changed in http://lists.infradead.org/pipermail/linux-afs/2016-July/001016.html > > > > > > > > > > What if we just rename _raw to _raw_nocheck, and _raw_notrace to _raw ? > > > > > > > > That would also mean changing 160 usages of _raw to _raw_nocheck in the > > > > kernel :-/. > > > > > > > > The tracing usage of _raw_notrace is only like 2 or 3 users. Can we just call > > > > rcu_check_sparse directly in the calling code for those and eliminate the APIs? > > > > > > > > I wonder what Paul thinks about the matter as well. > > > > > > My thought is that it is likely that a goodly number of the current uses > > > of _raw should really be some form of _check, with lockdep expressions > > > spelled out. Not that working out what exactly those lockdep expressions > > > should be is necessarily a trivial undertaking. ;-) > > > > Yes, currently where I am a bit stuck is the rcu_dereference_raw() > > cannot possibly know what SRCU domain it is under, so lockdep cannot check if > > an SRCU lock is held without the user also passing along the SRCU domain. I > > am trying to change lockdep to see if it can check if *any* srcu domain lock > > is held (regardless of which one) and complain if none are. This is at least > > better than no check at all. > > > > However, I think it gets tricky for mutexes. If you have something like: > > mutex_lock(some_mutex); > > p = rcu_dereference_raw(gp); > > mutex_unlock(some_mutex); > > > > This might be a perfectly valid invocation of _raw, however my checks (patch > > is still cooking) trigger a lockdep warning becase _raw cannot know that this > > is Ok. lockdep thinks it is not in a reader section. This then gets into the > > territory of a new rcu_derference_raw_protected(gp, assert_held(some_mutex)) > > which sucks because its yet another API. To circumvent this issue, can we > > just have callers of rcu_dereference_raw ensure that they call > > rcu_read_lock() if they are protecting dereferences by a mutex? That would > > make things a lot easier and also may be Ok since rcu_read_lock is quite > > cheap. > > Why not just rcu_dereference_protected(lockdep_is_held(some_mutex))? > The API is already there, and no need for spurious readers. Hmm, so I gave a bad example, here is a better example: fib_get_table calls hlist_for_each_entry_rcu() hlist_for_each_entry_rcu calls rcu_dereference_raw(). This is perfectly Ok to be called under rtnl_mutex. However rcu_dererence_raw in hlist_for_each_entry_rcu has no way of knowing that the rtnl_mutex held is sufficient for the protection since it is not directly called by the caller. I am almost sure I saw other examples of rcu_dereference_raw being called this way as well. I was trying to make an "automatic" lockdep check for all this, but it is quite hard to do so without passing down lockdep experessions down a call chain thus complicating all such callchains. Further I don't think code can trivially be converted from rcu_dereference_raw to rcu_dereference_protected even if the protection being offered is known, since the former does not do sparse checking and the latter might trigger false sparse checks in case the pointer in concern is protected both by RCU and non-RCU methods. I believe this is why you removed sparse checking from rcu_dereference_raw as well: http://lists.infradead.org/pipermail/linux-afs/2016-July/001016.html > > > That aside, if we are going to change the name of an API that is > > > used 160 places throughout the tree, we would need to have a pretty > > > good justification. Without such a justification, it will just look > > > like pointless churn to the various developers and maintainers on the > > > receiving end of the patches. > > > > Actually, the API name change is not something I want to do, it is Steven > > suggestion. My suggestion is let us just delete _raw_notrace and just use the > > _raw API for tracing, since _raw doesn't do any tracing anyway. Steve pointed > > that _raw_notrace does sparse checking unlike _raw, but I think that isn't an > > issue since _raw doesn't do such checking at the moment anyway.. (if possible > > check my cover letter again for details/motivation of this series). > > Understood, but regardless of who suggested it, if we are to go through > with it, good justification will be required. ;-) Ok ;-). About the names of the APIs, I thought of leaving rcu_dereference_raw and its callers intact, and just rename: * hlist_for_each_entry_rcu_notrace * rcu_dereference_raw_notrace to: * hlist_for_each_entry_rcu_sparse * rcu_dereference_raw_sparse The _sparse would stand for "sparse checking". However I am open to better names.. Such renaming would avoid confusion and keep the fact about sparse checking less ambiguous. thanks! - Joel