Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp665762ybk; Wed, 13 May 2020 09:49:18 -0700 (PDT) X-Google-Smtp-Source: APiQypLAWrtwSxhtDIL2CNU6sGOxcp4hoLpEGT5gfKKLFEGiT60KypIwaNFD/qjnHcdv7ueKu2dl X-Received: by 2002:a17:906:4406:: with SMTP id x6mr24275006ejo.160.1589388558287; Wed, 13 May 2020 09:49:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589388558; cv=none; d=google.com; s=arc-20160816; b=nPZ6JileyxJ4PJ2bbmWL1TG/jRoSnE8ArtR4FERbj75fq++Hk2Exkk75RQ5QMA/lks v6dHhIULpl6JUGRTJusJSjlOJjHtd8l8wkm/Er1n/m1ORt4jkvGWAZnM4JF8vW446+Rb D211asX6OBJI5/+oB02Ut7c/qOqp2j4qkZSlvtMCuMy2Xo3pW3ZHpt6Pnni+iWF4j8sP HNhWbRTXNoW9yh3a71pqtIoPOut5Yk4yu6WrW/bWRzAHNOg6FJQPCWFyQMsYqMttaRkM NTI/ezW+56jZnvAVgpkJgN4ExTjr5pjg+G0z8RsUEqGENHXQpUgPyJ8D6GSwaGWx5Fwu oMog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=a898Q0yMCCfupLWdMLV6b0zBUR26xiWI1jVMRJ64xAU=; b=DW1JTnpbgSLt3yIeEO6InzfWzfn3ZDmWBdmjgBhQLQEuh1CMbyKAUhh1qgTwz732ZQ mZTva7/WB3rLUamMSA/2kbm2Ji5svMgoIzJGaUdCfX89TMXQmgJ2ERmUy+HLhW+WsfzF bKqChkvzjmRRaqRVX9S7FL+LiWJeXbNMGCyiNF59XVuWbWq5uAEIlixjol0eMFTCuxPz dRpTxo5fi92khom0yJhoWbav6IC8M0n14p8gBVikj+7DqbW+LfRnbNqaJchlhjw9GdOj BGlaTGDKW71sZ2tVbkKxj8geIu/LyIdhs7NoSeK8Yi+8isZwJJxIJO02S/9kwnA78vY0 C9cg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="IPW/zq5m"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c17si105169edt.167.2020.05.13.09.48.55; Wed, 13 May 2020 09:49:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="IPW/zq5m"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389696AbgEMQrY (ORCPT + 99 others); Wed, 13 May 2020 12:47:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:53128 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729328AbgEMQrV (ORCPT ); Wed, 13 May 2020 12:47:21 -0400 Received: from lenoir.home (lfbn-ncy-1-985-231.w90-101.abo.wanadoo.fr [90.101.63.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 87ACB20690; Wed, 13 May 2020 16:47:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589388442; bh=7E/fIz7wM1U/2tw53VAP5TR7b5+Gc4cizUa5GyslGks=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IPW/zq5mJ5MxavWnwbZp1e9Oo7o6aQh6c+7Ql2wOsSUCW12kSSo7TLbzSQTOWt9WB HCHyIndOdvRzDyRkOeXBdYuY8KCglWt1j1IwM3kuM6Bo3xw6rVmqmZs4QPM0+2FOak HSU9G9Gi2tIYkmE8TCXnkgzNn510LrE0PhMs4bzI= From: Frederic Weisbecker To: "Paul E . McKenney" Cc: LKML , Frederic Weisbecker , Steven Rostedt , Mathieu Desnoyers , Lai Jiangshan , Joel Fernandes , Josh Triplett Subject: [PATCH 01/10] rcu: Directly lock rdp->nocb_lock on nocb code entrypoints Date: Wed, 13 May 2020 18:47:05 +0200 Message-Id: <20200513164714.22557-2-frederic@kernel.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200513164714.22557-1-frederic@kernel.org> References: <20200513164714.22557-1-frederic@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Pure NOCB code entrypoints (nocb_cb kthread, nocb_gp kthread, nocb timers) can unconditionally lock rdp->nocb_lock as they always execute in the context of an offloaded rdp. This also prepare for toggling CPUs to/from callback's offloaded mode where the offloaded state will possibly change when rdp->nocb_lock isn't taken. We'll still want the entrypoints to lock the rdp in any case. Signed-off-by: Frederic Weisbecker Cc: Paul E. McKenney Cc: Josh Triplett Cc: Steven Rostedt Cc: Mathieu Desnoyers Cc: Lai Jiangshan Cc: Joel Fernandes --- kernel/rcu/tree_plugin.h | 14 +++++++------- 1 file changed, 7 insertions(+), 7 deletions(-) diff --git a/kernel/rcu/tree_plugin.h b/kernel/rcu/tree_plugin.h index 097635c41135..523570469864 100644 --- a/kernel/rcu/tree_plugin.h +++ b/kernel/rcu/tree_plugin.h @@ -1909,7 +1909,7 @@ static void do_nocb_bypass_wakeup_timer(struct timer_list *t) struct rcu_data *rdp = from_timer(rdp, t, nocb_bypass_timer); trace_rcu_nocb_wake(rcu_state.name, rdp->cpu, TPS("Timer")); - rcu_nocb_lock_irqsave(rdp, flags); + raw_spin_lock_irqsave(&rdp->nocb_lock, flags); smp_mb__after_spinlock(); /* Timer expire before wakeup. */ __call_rcu_nocb_wake(rdp, true, flags); } @@ -1942,7 +1942,7 @@ static void nocb_gp_wait(struct rcu_data *my_rdp) */ for (rdp = my_rdp; rdp; rdp = rdp->nocb_next_cb_rdp) { trace_rcu_nocb_wake(rcu_state.name, rdp->cpu, TPS("Check")); - rcu_nocb_lock_irqsave(rdp, flags); + raw_spin_lock_irqsave(&rdp->nocb_lock, flags); bypass_ncbs = rcu_cblist_n_cbs(&rdp->nocb_bypass); if (bypass_ncbs && (time_after(j, READ_ONCE(rdp->nocb_bypass_first) + 1) || @@ -1951,7 +1951,7 @@ static void nocb_gp_wait(struct rcu_data *my_rdp) (void)rcu_nocb_try_flush_bypass(rdp, j); bypass_ncbs = rcu_cblist_n_cbs(&rdp->nocb_bypass); } else if (!bypass_ncbs && rcu_segcblist_empty(&rdp->cblist)) { - rcu_nocb_unlock_irqrestore(rdp, flags); + raw_spin_unlock_irqrestore(&rdp->nocb_lock, flags); continue; /* No callbacks here, try next. */ } if (bypass_ncbs) { @@ -1996,7 +1996,7 @@ static void nocb_gp_wait(struct rcu_data *my_rdp) } else { needwake = false; } - rcu_nocb_unlock_irqrestore(rdp, flags); + raw_spin_unlock_irqrestore(&rdp->nocb_lock, flags); if (needwake) { swake_up_one(&rdp->nocb_cb_wq); gotcbs = true; @@ -2084,7 +2084,7 @@ static void nocb_cb_wait(struct rcu_data *rdp) rcu_do_batch(rdp); local_bh_enable(); lockdep_assert_irqs_enabled(); - rcu_nocb_lock_irqsave(rdp, flags); + raw_spin_lock_irqsave(&rdp->nocb_lock, flags); if (rcu_segcblist_nextgp(&rdp->cblist, &cur_gp_seq) && rcu_seq_done(&rnp->gp_seq, cur_gp_seq) && raw_spin_trylock_rcu_node(rnp)) { /* irqs already disabled. */ @@ -2092,7 +2092,7 @@ static void nocb_cb_wait(struct rcu_data *rdp) raw_spin_unlock_rcu_node(rnp); /* irqs remain disabled. */ } if (rcu_segcblist_ready_cbs(&rdp->cblist)) { - rcu_nocb_unlock_irqrestore(rdp, flags); + raw_spin_unlock_irqrestore(&rdp->nocb_lock, flags); if (needwake_gp) rcu_gp_kthread_wake(); return; @@ -2100,7 +2100,7 @@ static void nocb_cb_wait(struct rcu_data *rdp) trace_rcu_nocb_wake(rcu_state.name, rdp->cpu, TPS("CBSleep")); WRITE_ONCE(rdp->nocb_cb_sleep, true); - rcu_nocb_unlock_irqrestore(rdp, flags); + raw_spin_unlock_irqrestore(&rdp->nocb_lock, flags); if (needwake_gp) rcu_gp_kthread_wake(); swait_event_interruptible_exclusive(rdp->nocb_cb_wq, -- 2.25.0