Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp6336407ybv; Tue, 18 Feb 2020 14:57:21 -0800 (PST) X-Google-Smtp-Source: APXvYqzhetHQR/DQpm2sQQTg8wcVOAMp40FLCJS/EGn2n5t0N3xo69SQts+4NtA81XmNFrTPZkes X-Received: by 2002:a05:6830:1011:: with SMTP id a17mr16496191otp.45.1582066640915; Tue, 18 Feb 2020 14:57:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582066640; cv=none; d=google.com; s=arc-20160816; b=NH78UMtk/tn80rY/58Jqas+kjoAUTprKZ1ayuK8eApNuCsLouHtgVIO9LZFpMd4rqm 5XfHsLUVYEZ7YvFbwEG84yiUKdjsn37EoZ2KSdkeoRqhT56l+IPbq+ri7im+ypUlZpER ADC1Mc5TuDI9dexq7t5bmRTD61cZcIBCPL/cxWcSWjwDNMeWn0wMJeN6EGl9szgEWCwv rN0AKGmAwmp1fJEfmUcD95DukayXkYcc7OOEPr9GSVtl5VQX3Na2RF8nb+qnvZlkmhMP zWmSpQQGixek8kdjXlOId20ISzsOiT+xvXo+fRCKoj+U9lX8Oq639vY95NYIrtx3xSrx +K/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=Qc8VmA7IvIkfZ3aDilxEP3JYnazu8phjcGk+X82Nr2Y=; b=md9jew8h7S269ZJKgsvPreKSWSDvygHAYntWAEb9qcWax/TITo6xH3wx66Ss/cCoh7 fq0J7H7rZpVn2dvAq2s5nWkngqVeqwBtyRBPlOcDUuCP+RoXcaK2xkDMZkMxCJkPLQH5 w3SSKdzSOLpxCg0I69NltI1f0X81SQTZBSsam0VQD0Tw7Mrez6LafoayyH+XiYGWCNn2 gUN9ZqWbQx1QUQqETyswoPZZI3KLH+AiF5ThYTd2i7w06c9R2dnuYOOlhj4lkuGiQt3s WnUkoJGrv01OVWn5v0RDx8nPtnpGQcqimHQVp4GKKbDxKyW5WMkcn7OsDcfrhQcIXVsU EnNQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EMmNe7Yv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a28si130799otd.257.2020.02.18.14.57.08; Tue, 18 Feb 2020 14:57:20 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=EMmNe7Yv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727206AbgBRWy5 (ORCPT + 99 others); Tue, 18 Feb 2020 17:54:57 -0500 Received: from mail.kernel.org ([198.145.29.99]:34282 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726427AbgBRWy5 (ORCPT ); Tue, 18 Feb 2020 17:54:57 -0500 Received: from paulmck-ThinkPad-P72.home (50-39-105-78.bvtn.or.frontiernet.net [50.39.105.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EA52D207FD; Tue, 18 Feb 2020 22:54:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582066496; bh=b57O7Q3xNzy0G0mohr9Qa5PA/2PUgMbA5hYF4Hu/4No=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=EMmNe7YvcJy9VW21eyqDg46Ch4m05ZrjnpmyvRDsmmZg6N8WmC/4VR0JnYzwvc9S2 4uBvmrn5meudDyKFNfThCqbtvQXLFE2iNmW6b1KsU+dpPjWUH2Rf/4Y8WWLb5hnZyj eQ6+5B2Fc7mq4nhMc+7FCSTf2dY//GEGdCcksmM4= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id BEB923520856; Tue, 18 Feb 2020 14:54:55 -0800 (PST) Date: Tue, 18 Feb 2020 14:54:55 -0800 From: "Paul E. McKenney" To: Steven Rostedt Cc: Peter Zijlstra , rcu@vger.kernel.org, linux-kernel@vger.kernel.org, kernel-team@fb.com, mingo@kernel.org, jiangshanlai@gmail.com, dipankar@in.ibm.com, akpm@linux-foundation.org, mathieu.desnoyers@efficios.com, josh@joshtriplett.org, tglx@linutronix.de, dhowells@redhat.com, edumazet@google.com, fweisbec@gmail.com, oleg@redhat.com, joel@joelfernandes.org Subject: Re: [PATCH tip/core/rcu 1/3] rcu-tasks: *_ONCE() for rcu_tasks_cbs_head Message-ID: <20200218225455.GN2935@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20200215002446.GA15663@paulmck-ThinkPad-P72> <20200215002520.15746-1-paulmck@kernel.org> <20200217123851.GR14914@hirez.programming.kicks-ass.net> <20200217181615.GP2935@paulmck-ThinkPad-P72> <20200218075648.GW14914@hirez.programming.kicks-ass.net> <20200218162719.GE2935@paulmck-ThinkPad-P72> <20200218201142.GF11457@worktop.programming.kicks-ass.net> <20200218202226.GJ2935@paulmck-ThinkPad-P72> <20200218174503.3d4e4750@gandalf.local.home> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200218174503.3d4e4750@gandalf.local.home> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 18, 2020 at 05:45:03PM -0500, Steven Rostedt wrote: > On Tue, 18 Feb 2020 12:22:26 -0800 > "Paul E. McKenney" wrote: > > > On Tue, Feb 18, 2020 at 09:11:42PM +0100, Peter Zijlstra wrote: > > > On Tue, Feb 18, 2020 at 08:27:19AM -0800, Paul E. McKenney wrote: > > > > On Tue, Feb 18, 2020 at 08:56:48AM +0100, Peter Zijlstra wrote: > > > > > > > > I just took offence at the Changelog wording. It seems to suggest there > > > > > actually is a problem, there is not. > > > > > > > > Quoting the changelog: "Not appropriate for backporting due to failure > > > > being unlikely." > > > > > > That implies there is failure, however unlikely. > > > > > > In this particular case there is absolutely no failure, except perhaps > > > in KCSAN. This patch is a pure annotation such that KCSAN can understand > > > the code. > > > > > > Like said, I don't object to the actual patch, but I do think it is > > > important to call out false negatives or to describe the actual problem > > > found. > > > > I don't feel at all comfortable declaring that there is absolutely > > no possibility of failure. > > Perhaps wording it like so: > > "There's know known issue with the current code, but the *_ONCE() > annotations here makes KCSAN happy, allowing us to focus on KCSAN > warnings that can help bring about known issues in other code that we > can fix, without being distracted by KCSAN warnings that we do not see > a problem with." > > ? That sounds more like something I might put in rcutodo.html as a statement of the RCU approach to KCSAN reports. But switching to a different situation (for variety, if nothing else), what about the commit shown below? Thanx, Paul ------------------------------------------------------------------------ commit 35bc02b04a041f32470ae6d959c549bcce8483db Author: Paul E. McKenney Date: Tue Feb 18 13:41:02 2020 -0800 rcutorture: Mark data-race potential for rcu_barrier() test statistics The n_barrier_successes, n_barrier_attempts, and n_rcu_torture_barrier_error variables are updated (without access markings) by the main rcu_barrier() test kthread, and accessed (also without access markings) by the rcu_torture_stats() kthread. This of course can result in KCSAN complaints. Because the accesses are in diagnostic prints, this commit uses data_race() to excuse the diagnostic prints from the data race. If this were to ever cause bogus statistics prints (for example, due to store tearing), any misleading information would be disambiguated by the presence or absence of an rcutorture splat. This data race was reported by KCSAN. Not appropriate for backporting due to failure being unlikely and due to the mild consequences of the failure, namely a confusing rcutorture console message. Signed-off-by: Paul E. McKenney diff --git a/kernel/rcu/rcutorture.c b/kernel/rcu/rcutorture.c index 5453bd5..b3301f3 100644 --- a/kernel/rcu/rcutorture.c +++ b/kernel/rcu/rcutorture.c @@ -1444,9 +1444,9 @@ rcu_torture_stats_print(void) atomic_long_read(&n_rcu_torture_timers)); torture_onoff_stats(); pr_cont("barrier: %ld/%ld:%ld\n", - n_barrier_successes, - n_barrier_attempts, - n_rcu_torture_barrier_error); + data_race(n_barrier_successes), + data_race(n_barrier_attempts), + data_race(n_rcu_torture_barrier_error)); pr_alert("%s%s ", torture_type, TORTURE_FLAG); if (atomic_read(&n_rcu_torture_mberror) ||