Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp369467pxb; Wed, 22 Sep 2021 04:12:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw4xFZR+XMxuwyxnIm8HeRw3ED7EUCfhzOiBTMn6t6dLZxM8AHkQZ/W5Obl6iIh3A50+CG/ X-Received: by 2002:a05:6e02:1bc9:: with SMTP id x9mr25661861ilv.168.1632309172783; Wed, 22 Sep 2021 04:12:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632309172; cv=none; d=google.com; s=arc-20160816; b=DFjxqkR4W3fMq0UckOaCRrJIRuFkaNFIFUVLblrYYdvW0zvhQqS04cWjUcL7c1G5EJ DvsmaxnldLnvYCAIT4B2/6QEZ1jPffo1WXyUgSjPE+Au51kih0an3jkGiQyC/6gfjz0c QGusXjXZAxW1gQSK7PO4rx2aQx9N4I0p+YwFoCyF4NTRsI8qd810079vXLb1/+qvTqp8 T9mMZ9mbbxAsR2D5/OeeANnbhn45MZwWAslCf1T0B4J8ZjGaOlXjXE7mKvf5g6Dptv4u KKbXUnkOFieX9MqG5fS99Oiy8awfK3u9WSaWBp+394BgbpgGDsxNI0qS8sCrPkI4/ePm aVMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=n+paO4z/N4y94tvFOD3ATJhGweIoVYm2RoLOGgGtKKA=; b=Xdxt+4cb6ew0RPz7leIKWIfLuEKLkwn8glU7lpmGJUCUPXLI5NOpMkKbMT0eQHV/Q2 3zFD93696Y8M/alQiwWBE2I5jgd/XIXDsT0tRP8Xrc8bBPETLDvS7xckHelGAoa95rlD DJh1nbesZnRSsuGi/wOQ14Jrcce4Ks6hvj6iHUt+WwG+0FfbrqRBEbtKj+6J/4hrebKl UMyITm7NTNX2SSw+U4TKQrZl/wFUjHINdoG7aP+TjsdeEal7/rpTLmFlcD+B0omHTKIQ RGOiQCsIfEUlba+xc00SugZSGaTNWGr5annIFKhiKOYljBJJobU17oU8fBKS0C1SYPev NsWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Y2d16Jyh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id s10si2242247ilh.107.2021.09.22.04.12.26; Wed, 22 Sep 2021 04:12:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Y2d16Jyh; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235306AbhIVLLq (ORCPT + 99 others); Wed, 22 Sep 2021 07:11:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:33770 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235293AbhIVLLp (ORCPT ); Wed, 22 Sep 2021 07:11:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 03BBB61050; Wed, 22 Sep 2021 11:10:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1632309014; bh=heL9ashJZjDXOujO0aAimbm/D8yBEukgS7g+p+wZ0ps=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Y2d16Jyh5F/xzhvIwRlDHLRaVW7DbD3t+EZTg4COyDcZeIBU65zti9fqJZICzEwNo ltFnrILzJ3lCdMkDSq+vCfPWnLTGKrVkmP9GxT8NnOZ5kudw3G4VS6R3YKvYd8koQi nzci3jd+b/s8o2U9DLzMZJ0pCfHbFAxjjvI23BtSCu9txoTjddzX1lg/9tw85YWENo qBCcZWhKiGYS5DVFwyRkqCicyeXvs9FtOExuIyHsY8GbIdiuwtXJcWF++kMGLGUCeq l7d/SHcV4pInDsJri8BalseyYbCjDLbrP6Dvpa0H1SF7uidIb5i6kZZPPRYoEGxxkN hnbyZgXIJ8u/g== Date: Wed, 22 Sep 2021 13:10:12 +0200 From: Frederic Weisbecker To: Sebastian Andrzej Siewior Cc: Thomas Gleixner , Valentin Schneider , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, rcu@vger.kernel.org, linux-rt-users@vger.kernel.org, Catalin Marinas , Will Deacon , Ingo Molnar , Peter Zijlstra , Steven Rostedt , Daniel Bristot de Oliveira , "Paul E. McKenney" , Josh Triplett , Mathieu Desnoyers , Davidlohr Bueso , Lai Jiangshan , Joel Fernandes , Anshuman Khandual , Vincenzo Frascino , Steven Price , Ard Biesheuvel , Boqun Feng , Mike Galbraith Subject: Re: rcu/tree: Protect rcu_rdp_is_offloaded() invocations on RT Message-ID: <20210922111012.GA106513@lothringen> References: <20210811201354.1976839-1-valentin.schneider@arm.com> <20210811201354.1976839-4-valentin.schneider@arm.com> <874kae6n3g.ffs@tglx> <87pmt163al.ffs@tglx> <20210921234518.GB100318@lothringen> <20210922063208.ltf7sdou4tr5yrnc@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210922063208.ltf7sdou4tr5yrnc@linutronix.de> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 22, 2021 at 08:32:08AM +0200, Sebastian Andrzej Siewior wrote: > On 2021-09-22 01:45:18 [+0200], Frederic Weisbecker wrote: > > > > Also while at it, I'm asking again: traditionally softirqs could assume that > > manipulating a local state was safe against !irq_count() code fiddling with > > the same state on the same CPU. > > > > Now with preemptible softirqs, that assumption can be broken anytime. RCU was > > fortunate enough to have a warning for that. But who knows how many issues like > > this are lurking? > > If "local state" is modified then it is safe as long as it is modified > within a local_bh_disable() section. And we are in this section while > invoking a forced-threaded interrupt. The special part about RCU is > that it is used in_irq() as part of core-code. But local_bh_disable() was deemed for protecting from interrupting softirqs, not the other way around (softirqs being preempted by other tasks). The latter semantic is new and nobody had that in mind until softirqs have been made preemptible. For example: CPU 0 ----------------------------------------------- SOFTIRQ RANDOM TASK ------ ----------- int *X = &per_cpu(CPUX, 0) int *X = &per_cpu(CPUX, 0) int A, B; WRITE_ONCE(*X, 0); WRITE_ONCE(*X, 1); A = READ_ONCE(*X); B = READ_ONCE(*X); We used to have the guarantee that A == B. That's not true anymore. Now some new explicit local_bh_disable() should be carefully placed on RANDOM_TASK where it wasn't necessary before. RCU is not that special in this regard.