Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp4919123pxb; Tue, 28 Sep 2021 06:58:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxWWDAA/ajeJVbjemmLKFfuTO24JZkx4inG5dLlvvLwSYOTXX7p+M1/3bkVcj0tvoFTEoUQ X-Received: by 2002:a17:90a:353:: with SMTP id 19mr6912pjf.83.1632837505957; Tue, 28 Sep 2021 06:58:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632837505; cv=none; d=google.com; s=arc-20160816; b=zy+Bk12CZ9CaggxlYzRs16/bTFNTB328P5PTCKqf46aVC4qflwPjzG3aLI8txED4Yn QlVzHAs4bxnGPYSViv9mmFY7SYBqR6UtPtBXmmKsFm5Pzpy97km9EDk3AridwztXDTLe GRUDzIAl+LzvHVoNGhsdA8hyym/KDrmEM5Ky2GsF0YOXeeihN9jCWtz39NVp++h1DnX0 zJxr21nkn4tXVWH2O+Q/2nPxAraGWQBgINKRoWxB+uKTUs7WAGow8KySfKdFFF1rElc4 EsoWgVSiw5C1dsJy7C3/EXjpfzu9y2e+s9pFnHmcU13JraVRfno17am4TEhyvHkTv32c Ux/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=3xMgSxDubsVnyJZlFBidQ2VjEUMM5ugcOJpbTpfxfI0=; b=xyLQW7AerPsmMV0ljMRNCMgo9yVzy4wkMH/VxolcOUIr/DBdg5IdjuP7c1/EUyNq1W hQiea07/ih/RMU5jMJpTSDCav1OIZyVeNk6hdvTRQ/wIRwX8X4WOWdIikCLSNv9O1VuA /TihXaSNXM4StBEfW7Zbuq4oJVhrBME6tCk6wDXTJEblRSxD27Whi+0YRode3G2UPBRG RHCkHbEPHFqoBL2RDqUY42wzJZRK5RNDkT05tQ+O9XjySXIF64XKaXaCtLckft6me3Aw L3BBdnbr9HsL50sUwG7Isf2JJL9axTbJ1M28Av7tbZrW6KwT6fWY20aaEn+DPQHtKlkQ 9VMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KYrmpqDD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b5si23868050pft.216.2021.09.28.06.58.09; Tue, 28 Sep 2021 06:58:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KYrmpqDD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241120AbhI1N5F (ORCPT + 99 others); Tue, 28 Sep 2021 09:57:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:57502 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240990AbhI1N5E (ORCPT ); Tue, 28 Sep 2021 09:57:04 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 754BB611CC; Tue, 28 Sep 2021 13:55:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1632837325; bh=1k4v3tC1JwNUmjoQ8aHoDiZ4QQ9+9/A+kPEX9ZHMF9Y=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=KYrmpqDDG75bPrLhyjM8HKBD7SzWu9rdQvm9QT1TqmWlk5rlf6jykaSqTKeccqlKv FGZNc10SLlrsJYsotlMqMj8yonl7us8t7uigOthDC8Sdflh7CAANO0kGyNAhdM4gLH lNNqDSW+pVNOiVYGEAtaAD7Fy0yrXIpvod8mwXjqKPrMSAiU3Q1mZtZ23V90IYVoVu MzrnjcnUcny8T42hmoTZZFK2xIYyE3FE7aSgoGHIiVKLbnop/FH3Wvtxsgm5RrYHUu cQHBkY1MbKaRy8jVtEw1d7fW+5y+qIN3Aq2Z9zP/yyhg5FWkrE4Q17flulCn9cVRAr csyTy+1KwS78w== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id 467575C0807; Tue, 28 Sep 2021 06:55:25 -0700 (PDT) Date: Tue, 28 Sep 2021 06:55:25 -0700 From: "Paul E. McKenney" To: Mark Rutland Cc: Pingfan Liu , Thomas Gleixner , linux-arm-kernel@lists.infradead.org, Catalin Marinas , Will Deacon , Marc Zyngier , Joey Gouly , Sami Tolvanen , Julien Thierry , Yuichi Ito , linux-kernel@vger.kernel.org, Sven Schnelle , Vasily Gorbik Subject: Re: [PATCHv2 0/5] arm64/irqentry: remove duplicate housekeeping of Message-ID: <20210928135525.GB880162@paulmck-ThinkPad-P17-Gen-1> Reply-To: paulmck@kernel.org References: <20210924132837.45994-1-kernelfans@gmail.com> <20210924173615.GA42068@C02TD0UTHF1T.local> <20210924225954.GN880162@paulmck-ThinkPad-P17-Gen-1> <20210927092303.GC1131@C02TD0UTHF1T.local> <20210928000922.GY880162@paulmck-ThinkPad-P17-Gen-1> <20210928083222.GA1924@C02TD0UTHF1T.local> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210928083222.GA1924@C02TD0UTHF1T.local> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Sep 28, 2021 at 09:32:22AM +0100, Mark Rutland wrote: > On Mon, Sep 27, 2021 at 05:09:22PM -0700, Paul E. McKenney wrote: > > On Mon, Sep 27, 2021 at 10:23:18AM +0100, Mark Rutland wrote: > > > On Fri, Sep 24, 2021 at 03:59:54PM -0700, Paul E. McKenney wrote: > > > > On Fri, Sep 24, 2021 at 06:36:15PM +0100, Mark Rutland wrote: > > > > > [Adding Paul for RCU, s390 folk for entry code RCU semantics] > > > > > > > > > > On Fri, Sep 24, 2021 at 09:28:32PM +0800, Pingfan Liu wrote: > > > > > > After introducing arm64/kernel/entry_common.c which is akin to > > > > > > kernel/entry/common.c , the housekeeping of rcu/trace are done twice as > > > > > > the following: > > > > > > enter_from_kernel_mode()->rcu_irq_enter(). > > > > > > And > > > > > > gic_handle_irq()->...->handle_domain_irq()->irq_enter()->rcu_irq_enter() > > > > > > > > > > > > Besides redundance, based on code analysis, the redundance also raise > > > > > > some mistake, e.g. rcu_data->dynticks_nmi_nesting inc 2, which causes > > > > > > rcu_is_cpu_rrupt_from_idle() unexpected. > > > > > > > > > > Hmmm... > > > > > > > > > > The fundamental questionss are: > > > > > > > > > > 1) Who is supposed to be responsible for doing the rcu entry/exit? > > > > > > > > > > 2) Is it supposed to matter if this happens multiple times? > > > > > > > > > > For (1), I'd generally expect that this is supposed to happen in the > > > > > arch/common entry code, since that itself (or the irqchip driver) could > > > > > depend on RCU, and if that's the case thatn handle_domain_irq() > > > > > shouldn't need to call rcu_irq_enter(). That would be consistent with > > > > > the way we handle all other exceptions. > > > > > > > > > > For (2) I don't know whether the level of nesting is suppoosed to > > > > > matter. I was under the impression it wasn't meant to matter in general, > > > > > so I'm a little surprised that rcu_is_cpu_rrupt_from_idle() depends on a > > > > > specific level of nesting. > > > > > > > > > > >From a glance it looks like this would cause rcu_sched_clock_irq() to > > > > > skip setting TIF_NEED_RESCHED, and to not call invoke_rcu_core(), which > > > > > doesn't sound right, at least... > > > > > > > > > > Thomas, Paul, thoughts? > > > > > > > > It is absolutely required that rcu_irq_enter() and rcu_irq_exit() calls > > > > be balanced. Normally, this is taken care of by the fact that irq_enter() > > > > invokes rcu_irq_enter() and irq_exit() invokes rcu_irq_exit(). Similarly, > > > > nmi_enter() invokes rcu_nmi_enter() and nmi_exit() invokes rcu_nmi_exit(). > > > > > > Sure; I didn't mean to suggest those weren't balanced! The problem here > > > is *nesting*. Due to the structure of our entry code and the core IRQ > > > code, when handling an IRQ we have a sequence: > > > > > > irq_enter() // arch code > > > irq_enter() // irq code > > > > > > < irq handler here > > > > > > > irq_exit() // irq code > > > irq_exit() // arch code > > > > > > ... and if we use something like rcu_is_cpu_rrupt_from_idle() in the > > > middle (e.g. as part of rcu_sched_clock_irq()), this will not give the > > > expected result because of the additional nesting, since > > > rcu_is_cpu_rrupt_from_idle() seems to expect that dynticks_nmi_nesting > > > is only incremented once per exception entry, when it does: > > > > > > /* Are we at first interrupt nesting level? */ > > > nesting = __this_cpu_read(rcu_data.dynticks_nmi_nesting); > > > if (nesting > 1) > > > return false; > > > > > > What I'm trying to figure out is whether that expectation is legitimate, > > > and assuming so, where the entry/exit should happen. > > > > Oooh... > > > > The penalty for fooling rcu_is_cpu_rrupt_from_idle() is that RCU will > > be unable to detect a userspace quiescent state for a non-nohz_full > > CPU. That could result in RCU CPU stall warnings if a user task runs > > continuously on a given CPU for more than 21 seconds (60 seconds in > > some distros). And this can easily happen if the user has a CPU-bound > > thread that is the only runnable task on that CPU. > > > > So, yes, this does need some sort of resolution. > > > > The traditional approach is (as you surmise) to have only a single call > > to irq_enter() on exception entry and only a single call to irq_exit() > > on exception exit. If this is feasible, it is highly recommended. > > Cool; that's roughly what I was expecting / hoping to hear! > > > In theory, we could have that "1" in "nesting > 1" be a constant supplied > > by the architecture (you would want "3" if I remember correctly) but > > in practice could we please avoid this? For one thing, if there is > > some other path into the kernel for your architecture that does only a > > single irq_enter(), then rcu_is_cpu_rrupt_from_idle() just doesn't stand > > a chance. It would need to compare against a different value depending > > on what exception showed up. Even if that cannot happen, it would be > > better if your architecture could remain in blissful ignorance of the > > colorful details of ->dynticks_nmi_nesting manipulations. > > I completely agree. I think it's much harder to keep that in check than > to enforce a "once per architectural exception" policy in the arch code. > > > Another approach would be for the arch code to supply RCU a function that > > it calls. If there is such a function (or perhaps better, if some new > > Kconfig option is enabled), RCU invokes it. Otherwise, it compares to > > "1" as it does now. But you break it, you buy it! ;-) > > I guess we could look at the exception regs and inspect the original > context, but it sounds overkill... > > I think the cleanest thing is to leave this to arch code, and have the > common IRQ code stay well clear. Unfortunately most architectures > (including arch/arm) still need the common IRQ code to handle this, so > we'll have to make that conditional on Kconfig, something like the below > (build+boot tested only). > > If there are no objections, I'll go check who else needs the same > treatment (IIUC at least s390 will), and spin that as a real > patch/series. This approach (whether from you or Pinfan) looks good to me! Thanx, Paul > Thanks, > Mark. > > ---->8---- > diff --git a/arch/Kconfig b/arch/Kconfig > index 8df1c7102643..c59475e50e4c 100644 > --- a/arch/Kconfig > +++ b/arch/Kconfig > @@ -225,6 +225,12 @@ config GENERIC_SMP_IDLE_THREAD > config GENERIC_IDLE_POLL_SETUP > bool > > +config ARCH_ENTERS_IRQ > + bool > + help > + An architecture should select this when it performs irq entry > + management itself (e.g. calling irq_enter() and irq_exit()). > + > config ARCH_HAS_FORTIFY_SOURCE > bool > help > diff --git a/arch/arm64/Kconfig b/arch/arm64/Kconfig > index 5c7ae4c3954b..fa6476bf2b4d 100644 > --- a/arch/arm64/Kconfig > +++ b/arch/arm64/Kconfig > @@ -16,6 +16,7 @@ config ARM64 > select ARCH_ENABLE_MEMORY_HOTREMOVE > select ARCH_ENABLE_SPLIT_PMD_PTLOCK if PGTABLE_LEVELS > 2 > select ARCH_ENABLE_THP_MIGRATION if TRANSPARENT_HUGEPAGE > + select ARCH_ENTERS_IRQ > select ARCH_HAS_CACHE_LINE_SIZE > select ARCH_HAS_DEBUG_VIRTUAL > select ARCH_HAS_DEBUG_VM_PGTABLE > diff --git a/kernel/irq/irqdesc.c b/kernel/irq/irqdesc.c > index 4e3c29bb603c..6affa12222e0 100644 > --- a/kernel/irq/irqdesc.c > +++ b/kernel/irq/irqdesc.c > @@ -677,6 +677,15 @@ int generic_handle_domain_irq(struct irq_domain *domain, unsigned int hwirq) > EXPORT_SYMBOL_GPL(generic_handle_domain_irq); > > #ifdef CONFIG_HANDLE_DOMAIN_IRQ > + > +#ifdef ARCH_ENTERS_IRQ > +#define handle_irq_enter() > +#define handle_irq_exit() > +#else > +#define handle_irq_enter() irq_enter() > +#define handle_irq_exit() irq_exit() > +#endif > + > /** > * handle_domain_irq - Invoke the handler for a HW irq belonging to a domain, > * usually for a root interrupt controller > @@ -693,7 +702,7 @@ int handle_domain_irq(struct irq_domain *domain, > struct irq_desc *desc; > int ret = 0; > > - irq_enter(); > + handle_irq_enter(); > > /* The irqdomain code provides boundary checks */ > desc = irq_resolve_mapping(domain, hwirq); > @@ -702,7 +711,7 @@ int handle_domain_irq(struct irq_domain *domain, > else > ret = -EINVAL; > > - irq_exit(); > + handle_irq_exit(); > set_irq_regs(old_regs); > return ret; > } >