Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp780272ybk; Wed, 20 May 2020 11:45:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy+HlJrT3PNFYrZU9vJeH5l8dD93wih9FbQFWXBuQtz/A+8Jg958MxuhMT4e1gp2egMiYkM X-Received: by 2002:a17:906:90d4:: with SMTP id v20mr354910ejw.499.1590000336278; Wed, 20 May 2020 11:45:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590000336; cv=none; d=google.com; s=arc-20160816; b=G5CAqNgDZGxjXHWal65oMnKwA3VhyLTgp4ozFXsd1ZcfgTUgJ+tY/cPKwBnJMHlTC5 yOB1PMDY6rtya1UeGOya3ItJ1bGmPkO1udaQsUOj8Kzv3k1Ivcj1dX40xr9JMtNisDOT Y2ZpGyajQuq2CBJDO6GyxeqOf+VRh9kJq1LO25IhNOdt6pHoIP2R8Abr2KzBDEuw3Vg7 Pc6KFLkqZZbLrmZdXVxSNUeZv61eorJ2lzP4/okDHNUzUGLrbs3/SBiAVYo8O8u/A7WN eMV6xEEl2/ieufd29wq8WELZBYnzRlQ4HLPH7s/qfi6EwgjBkUfUsqxzjYYvGUZXACgv 1jwA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=Me/OIwAxbhs5O8usEF5TuvEKDz+OfTXiOj7O9q8nQv8=; b=UkY4WCSE7ptmC2xVnvxbreHpTl2aEylA6xGGcLabio3NXH84A2almMpMFroXnXTSZ6 WlAvyux6xULIgDDjWviD0yqW/89tKra6Fu+HCLtI1+6Ege/TYs0454UE63iOZqGKPLTb A0R4haY+XbyeQAYVqsonpIPfc5zAWj17qudubOYZDfMc8nMFDYsgKl3RnsYqWoioImE8 HaUUoqYKpDP7Kmb3M9sW1vwog74TlgJaqhvTVFJuxqFAwLbxWqMlk4KDvBHdLOYUIZnV /DnFWoXUij0i1Feu0Q4aM/5mOo9xIBcNEqGG5cuTttULCHAv4HZKnY1gpJOSKfGULrt9 9FYg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=StBvvx4l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o19si2060960ejc.483.2020.05.20.11.45.12; Wed, 20 May 2020 11:45:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=StBvvx4l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726785AbgETSnq (ORCPT + 99 others); Wed, 20 May 2020 14:43:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:49948 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726688AbgETSnq (ORCPT ); Wed, 20 May 2020 14:43:46 -0400 Received: from paulmck-ThinkPad-P72.home (50-39-105-78.bvtn.or.frontiernet.net [50.39.105.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EE1BB2072C; Wed, 20 May 2020 18:43:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590000226; bh=owmd5u00J5EiVH2Bk/mE1PizXwMz7BYeJOqOkWe+ZV4=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=StBvvx4lBl3cno5a4mqWpDoOstM5l0ZCDMY6G5r34semnxevm7xhNqhzoFtrEPcMu ydvPzGsJnRI0oNwJlKNR49Lz90gDD2ruiCbx5Z6s9q2k+ARwsupEKIUcxB9HTDpQlh vTNLSIQVTrnsvOHUxetEg7a+bqKt7BB38Ws79mng= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id CA0273522A2B; Wed, 20 May 2020 11:43:45 -0700 (PDT) Date: Wed, 20 May 2020 11:43:45 -0700 From: "Paul E. McKenney" To: Sebastian Andrzej Siewior Cc: Peter Zijlstra , linux-kernel@vger.kernel.org, Ingo Molnar , Steven Rostedt , Will Deacon , Thomas Gleixner , Linus Torvalds , Lai Jiangshan , Josh Triplett , Mathieu Desnoyers , rcu@vger.kernel.org Subject: Re: [PATCH 3/8] srcu: Use local_lock() for per-CPU struct srcu_data access Message-ID: <20200520184345.GU2869@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20200519201912.1564477-1-bigeasy@linutronix.de> <20200519201912.1564477-4-bigeasy@linutronix.de> <20200520102407.GF317569@hirez.programming.kicks-ass.net> <20200520120608.mwros5jurmidxxfv@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200520120608.mwros5jurmidxxfv@linutronix.de> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 20, 2020 at 02:06:08PM +0200, Sebastian Andrzej Siewior wrote: > On 2020-05-20 12:24:07 [+0200], Peter Zijlstra wrote: > > On Tue, May 19, 2020 at 10:19:07PM +0200, Sebastian Andrzej Siewior wrote: > > > > > diff --git a/kernel/rcu/srcutree.c b/kernel/rcu/srcutree.c > > > index 0c71505f0e19c..8d2b5f75145d7 100644 > > > --- a/kernel/rcu/srcutree.c > > > +++ b/kernel/rcu/srcutree.c > > > @@ -25,6 +25,7 @@ > > > #include > > > #include > > > #include > > > +#include > > > > > > #include "rcu.h" > > > #include "rcu_segcblist.h" > > > @@ -735,6 +736,7 @@ static void srcu_flip(struct srcu_struct *ssp) > > > smp_mb(); /* D */ /* Pairs with C. */ > > > } > > > > > > +static DEFINE_LOCAL_LOCK(sda_lock); > > > /* > > > * If SRCU is likely idle, return true, otherwise return false. > > > * > > > @@ -765,13 +767,13 @@ static bool srcu_might_be_idle(struct srcu_struct *ssp) > > > unsigned long tlast; > > > > > > /* If the local srcu_data structure has callbacks, not idle. */ > > > - local_irq_save(flags); > > > + local_lock_irqsave(sda_lock, flags); > > > sdp = this_cpu_ptr(ssp->sda); > > > if (rcu_segcblist_pend_cbs(&sdp->srcu_cblist)) { > > > - local_irq_restore(flags); > > > + local_unlock_irqrestore(sda_lock, flags); > > > return false; /* Callbacks already present, so not idle. */ > > > } > > > - local_irq_restore(flags); > > > + local_unlock_irqrestore(sda_lock, flags); > > > > Would it perhaps make sense to stick the local_lock in struct srcu_data ? > > In that case we would need something for pointer stability before the > lock is acquired. > I remember Paul looked at that patch a few years ago and he said that > that disabling interrupts here is important and matches the other part > instance where the interrupts are disabled. Looking at it now, it seems > that there is just pointer stability but I can't tell if > rcu_segcblist_pend_cbs() needs more than just this. Yes, that CPU's rcu_segcblist structure does need mutual exclusion in this case. This is because rcu_segcblist_pend_cbs() looks not just at the ->tails[] pointer, but also at the pointer referenced by the ->tails[] pointer. This last pointer is in an rcu_head structure, and not just any rcu_head structure, but one that is ready to be invoked. So this callback could vanish into the freelist (or worse) at any time. But callback invocation runs on the CPU that enqueued the callbacks (as long as that CPU remains online, anyway), so disabling interrupts suffices in mainline. Now, we could have srcu_might_be_idle() instead acquire the sdp->lock to protect the structure. What would be really nice is a primitive that acquires such a per-CPU lock and remains executing on that CPU, whether by the graces of preempt_disable(), local_irq_save(), migrate_disable(), or what have you. Thanx, Paul