Received: by 2002:a25:d80d:0:0:0:0:0 with SMTP id p13csp155665ybg; Sat, 23 May 2020 10:03:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyvjqOd/kffVTkWB8HSnvhjtqyPsH+O8Y1G7GDtskRABPC2QuYaQihZrWcDpamK1QppL4LH X-Received: by 2002:aa7:cd5a:: with SMTP id v26mr8205403edw.320.1590253407262; Sat, 23 May 2020 10:03:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590253407; cv=none; d=google.com; s=arc-20160816; b=oXeBclM1z3zKxACLb+vNhegxFHpdYfDPTYQoJ6SuwclI8QMSUmQGneZUeSeZQ9mPps 7S2qd8EvOchkDC+I8fMhGAFSBvU0fOc/t3Q/jj4TdJEbmVvpR9YT4JsT4LUtM1EvgtF8 67XqxWXHNOPtd+YVF3yW/jbgdsi8ck24GY3tFgdtAcLs6M3YHUgwoexLKjbbxRN2LEmX H608wBsg8VeLz8XHVhg6OGJ2UoC1exzT7+3LwDppAs8Gki6vVLQjQy408yDl6ZMgNj/R J7ZSuQVU5ngEyg8mqM9xxLQl3BrHdpEl968yWwNa94VcaL0cWUtOjHx0e9YCekeEk+FU dkIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=JXHaFOrabIw9rPRb5Idxr2G3Y9WGNwaXAG3+DKTCZhM=; b=w7ps/wB/HWpHeWICawcf6VnQGQBq6oYgcKGE1XvhhL+IQglPddXh+Q3ttN/dj71Xcb hXNvxwDR4fuOE2IYLYbaT24DqvVcZx8OE7eRkoBRioWLrdHCCT8n14/0cTmx9aWC0SeK aqp14rzYDvixMlJ1MMzcmJUIcsdKyA+bsPnmHQO3PGm3tQ547jHvlNnCWtUv1mINnKHn 27mYhV0ajK7rMgJfHcgnGu7h03twi53hd3Kj5ZxHkrd6KIn7qLVIPrEfcQ/TNa65mr0c E2EAU5OlCmYOZvb0PGFf5ykvQ3KN8WLxaK2t7q/XmfgcpccNTe8UJGKen8Wm8VMOy2o5 MHfg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TnLemG7d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id bu21si6444771edb.485.2020.05.23.10.03.02; Sat, 23 May 2020 10:03:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=TnLemG7d; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728234AbgEWQ7M (ORCPT + 99 others); Sat, 23 May 2020 12:59:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:52232 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727901AbgEWQ7M (ORCPT ); Sat, 23 May 2020 12:59:12 -0400 Received: from paulmck-ThinkPad-P72.home (50-39-105-78.bvtn.or.frontiernet.net [50.39.105.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9808920738; Sat, 23 May 2020 16:59:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1590253151; bh=sJKPAoS2JphcJsCNgw/SfE8Hx7/rTddjhOwUyHhfCZw=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=TnLemG7d+DdfKLmwDBpwm1W89zi3EHFbF2aXLJM0sbJJGF2WRyrld4TDAahCwRkqW hZ8o3uez1QcUnB+D/w47tqlG/00RTDzlQ333Q8dMDRd1Jtk9ntpsOVU0OEuxzLqrBB qx2HIk9qL9kbwrSUmg9QbzuULIICxleSVfBGCKxE= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id 7C8213522680; Sat, 23 May 2020 09:59:11 -0700 (PDT) Date: Sat, 23 May 2020 09:59:11 -0700 From: "Paul E. McKenney" To: Sebastian Andrzej Siewior Cc: Peter Zijlstra , linux-kernel@vger.kernel.org, Ingo Molnar , Steven Rostedt , Will Deacon , Thomas Gleixner , Linus Torvalds , Lai Jiangshan , Josh Triplett , Mathieu Desnoyers , rcu@vger.kernel.org Subject: Re: [PATCH 3/8] srcu: Use local_lock() for per-CPU struct srcu_data access Message-ID: <20200523165911.GQ2869@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20200519201912.1564477-1-bigeasy@linutronix.de> <20200519201912.1564477-4-bigeasy@linutronix.de> <20200520102407.GF317569@hirez.programming.kicks-ass.net> <20200520120608.mwros5jurmidxxfv@linutronix.de> <20200520184345.GU2869@paulmck-ThinkPad-P72> <20200522151255.rtqnuk2cl3dpruou@linutronix.de> <20200522173953.GI2869@paulmck-ThinkPad-P72> <20200523150831.wdrthklakwm6wago@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200523150831.wdrthklakwm6wago@linutronix.de> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, May 23, 2020 at 05:08:31PM +0200, Sebastian Andrzej Siewior wrote: > On 2020-05-22 10:39:53 [-0700], Paul E. McKenney wrote: > > It looks good to me, but I have not yet tested it. (Happy to let you > > take the first crack at rcutorture in any case, scenarios SRCU-P and > > SRCU-N.) > > on it. > > > > That check_init_srcu_struct() is needed, because otherwise: > > > > > > | BUG: spinlock bad magic on CPU#2, swapper/0/1 > > > | lock: 0xffff88803ed28ac0, .magic: 00000000, .owner: /-1, .owner_cpu: 0 > > > | CPU: 2 PID: 1 Comm: swapper/0 Not tainted 5.7.0-rc6+ #81 > > > | Call Trace: > > > | dump_stack+0x71/0xa0 > > > | do_raw_spin_lock+0x6c/0xb0 > > > | _raw_spin_lock_irqsave+0x33/0x40 > > > | synchronize_srcu+0x24/0xc9 > > > | wakeup_source_remove+0x4d/0x70 > > > | wakeup_source_unregister.part.0+0x9/0x40 > > > | device_wakeup_enable+0x99/0xc0 > > > > > > I'm not sure if there should be an explicit init of `wakeup_srcu' or if > > > an srcu function (like call_srcu()) is supposed to do it. > > > > It is fine. Beforehand, that check_init_srcu_struct() would have been > > invoked very shortly thereafter from __call_srcu(), and there is no > > instead harm invoking it a few microseconds earlier. ;-) > > Oki. I wasn't sure if an explizit initialized on wakeup_srcu's side was > missing or if this is new since we use the lock earlier. If you want to worry, the cause for concern that comes to mind is lock contention. Except that this is a per-CPU lock, and it isn't acquired all that often. And when it is acquired often (call_srcu() floods, for example), it is acquired on the CPU in question. So seems unlikely. But should lock contention nevertheless become a problem: 1. Tighten up any acquisitions to avoid unncessary off-CPU acquisition of this lock. 2. Convert this particular lock acquisition into a trylock, and make trylock failure return such that a non-expedited grace period results. But again, I don't see the need for these at the moment. Thanx, Paul