Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp5436454rwl; Sun, 8 Jan 2023 15:18:45 -0800 (PST) X-Google-Smtp-Source: AMrXdXvex7HZvqpYkG6utmkBBrjUNG55MJbYo3VSgiBZjC6BxxwIwiEBg2Zc1AoeAiPskUHwn3rj X-Received: by 2002:a05:6a20:3d1a:b0:a4:b2e4:c561 with SMTP id y26-20020a056a203d1a00b000a4b2e4c561mr93507358pzi.51.1673219925550; Sun, 08 Jan 2023 15:18:45 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673219925; cv=none; d=google.com; s=arc-20160816; b=fabDeLIEDqzAY2xLwYMYJfXjAiXSihzv390tDfSXCVWsoDbIPhT9prD3GVYVgvaZzZ 3SVpgVTOe/6WpzSYhSaVrqUHCIqXiFkcV3s4HgvtZFDSXjcMTRzmfzljvXIOsSLMLut/ WS2NneNwyNWui8w7AeXHgWG9PgeqamkQN1Veta8pWUp0CKkVrzBJuQfz4UnBd88OlbVB Fmo4y28tx3QWFm0tJiWCQVp3toBzfTfTI9Si9U2FsahYJRhKcfjU94rt1HAp2gcYKEye Yue0WH9LhBSKO9PaMRZ+ZKdCNwtVc0nGkuFMCzFQKji4/Jcq8KN5uAAZrI79OCkcdHCa xi8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=7D/BTxSI6pMSd/ybhOgWsInCDXH06o5sNamq5PoZbrE=; b=K4zon5C0PsOqCX/NE1hvi9NPmmpminZTj6HsWi1QjdLTb/sCh8gZb0oeDl2V5evxcE LA+5YD3bcL1UYaRrOunvZp60FYnmt7YyllExE3v7xtY4gIJKNFhCkiyw6F2QmhnUqyq6 vQPt/q21vaka+PjUvpPT55I+md8Uj2v0l9Zez9tKAt+AZ7N7w7gyZUXEKfnOiXEJtlK0 xBxUZvu9BOuDKHPGMgoeHK7HOc4GSjaf8hfrnWxz0SrTzsDCqP8DCkKUBnmuc5VQCh2D WfHQ2baD60S8PjL28s00hMwVWBSEUpw8SfAVkPc922jvWE3gA7W2+3zgGbhIlTuk4x9O UIQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Fk8qmE2/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a62-20020a639041000000b00463dbc5cec8si7993876pge.658.2023.01.08.15.18.39; Sun, 08 Jan 2023 15:18:45 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Fk8qmE2/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231238AbjAHXKR (ORCPT + 52 others); Sun, 8 Jan 2023 18:10:17 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40032 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234052AbjAHXJ5 (ORCPT ); Sun, 8 Jan 2023 18:09:57 -0500 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4FE5FB4B0; Sun, 8 Jan 2023 15:09:56 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id C6C5AB80BAB; Sun, 8 Jan 2023 23:09:54 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D9711C433D2; Sun, 8 Jan 2023 23:09:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1673219393; bh=CiXV87sI2yjAaSQoUCZaHTnYMhLou3ZeeRv1qp4rNx4=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Fk8qmE2/OqsB0wSJYz3QuN1T4ivvteaepTMxvx51v9utqUMse7IN1brSIsTa75hrq HwvtdVoJ/ESrWRLC20JBeEjP0WzYzSulmkzTwcxPQRvGPuDj+sjkarkb+ajFLwd6Az CwhNVvaS6/DBOyZTkiuD7d8sZZRb4VrhtRV28c3QzzNZZsNxJ9pybdNGr0/YdDWY3B f6aYNKURzLehMt/JotJxzpvMef9qaFzlaIMOOZBGgPWAfnEo5QY3ECN0Ydcyei93po gWZ/M+xOgXX3ofvp7ktxyLzxXL2fDXrEAy/UxeKqLy/b8JK+oDIQPGc7t8Ydmq0Q2m zyu4KX+U6id2Q== Date: Mon, 9 Jan 2023 00:09:48 +0100 From: Frederic Weisbecker To: Joel Fernandes Cc: paulmck@kernel.org, Zqiang , quic_neeraju@quicinc.com, rcu@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] rcu: Fix missing TICK_DEP_MASK_RCU_EXP dependency check Message-ID: References: <0BF2065B-1E02-498C-B999-EB52F005B62E@joelfernandes.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, Jan 07, 2023 at 09:55:22PM -0500, Joel Fernandes wrote: > > > > On Jan 7, 2023, at 9:48 PM, Joel Fernandes wrote: > > > >  > >>> On Jan 7, 2023, at 5:11 PM, Frederic Weisbecker wrote: > >>> > >>> On Fri, Jan 06, 2023 at 07:01:28PM -0500, Joel Fernandes wrote: > >>> (lost html content) > > > > My problem is the iPhone wises up when I put a web link in an email. I want to look into smtp relays but then if I spent time on fixing that, I might not get time to learn from emails like these... > > > >> I can't find a place where the exp grace period sends an IPI to > >> CPUs slow to report a QS. But anyway you really need the tick to poll > >> periodically on the CPU to chase a quiescent state. > > > > Ok. > > > >> Now arguably it's probably only useful when CONFIG_PREEMPT_COUNT=y > >> and rcu_exp_handler() has interrupted a preempt-disabled or bh-disabled > >> section. Although rcu_exp_handler() sets TIF_RESCHED, which is handled > >> by preempt_enable() and local_bh_enable() when CONFIG_PREEMPT=y. > >> So probably it's only useful when CONFIG_PREEMPT_COUNT=y and CONFIG_PREEMPT=n > >> (and there is also PREEMPT_DYNAMIC to consider). > > > > Makes sense. I think I was missing this use case and was going by the general design of exp grace periods. I was incorrectly assuming the IPIs were being sent repeatedly for hold out CPUs, which is not the case I think. But that would another way to fix it? > > > > But yeah I get your point, the first set of IPIs missed it, so we need the rescue-tick for long non-rcu_read_lock() implicit critical sections.. > > > >> If CONFIG_PREEMPT_COUNT=n, the tick can only report idle and user > >> as QS, but those are already reported explicitly on ct_kernel_exit() -> > >> rcu_preempt_deferred_qs(). > > > > Oh hmm, because that function is a NOOP for PREEMPT_COUNT=y and PREEMPT=n and will not report the deferred QS? Maybe it should then. However I think the tick is still useful if after the preempt disabled section, will still did not exit the kernel. > > I think meant I here, an atomic section (like bh or Irq disabled). There is no such thing as disabling preemption for CONFIG_PREEMPT=n. Or maybe I am confused again. This RCU thing… Right, so when CONFIG_PREEMPT_COUNT=n, there is no way for a tick to tell if the the interrupted code is safely considered as a QS. That's because preempt_disable() <-> preempt_enable() are no-ops so the whole kernel is assumed non-preemptible, and therefore the whole kernel is a READ side critical section, except for the explicit points reporting a QS. The only exception is when the tick interrupts idle (or user with nohz_full). But we already have an exp QS reported on idle (and user with nohz_full) entry through ct_kernel_exit(), and that happens on all RCU_TREE configs (PREEMPT or not). Therefore the tick doesn't appear to be helpful at all on a nohz_full CPU with CONFIG_PREEMPT_COUNT=n. I suggest we don't bother optimizing that case though... To summarize: 1) nohz_full && !CONFIG_PREEMPT_COUNT && !CONFIG_PREEMPT_RCU: Tick isn't helpful. It can only report idle/user QS, but that is already reported explicitly. 2) nohz_full && CONFIG_PREEMPT_COUNT && !CONFIG_PREEMPT_RCU: Tick is very helpful because it can tell if the kernel is in a QS state. 3) nohz_full && CONFIG_PREEMPT_RCU: Tick doesn't appear to be helpful because: - If the rcu_exp_handler() fires in an rcu_read_lock'ed section, then the exp QS is reported on rcu_read_unlock() - If the rcu_exp_handler() fires in a preempt/bh disabled section, TIF_RESCHED is forced which is handled on preempt/bh re-enablement, reporting a QS. The case 2) is a niche, only useful for debugging. But anyway I'm not sure it's worth changing/optimizing the current state. Might be worth add a comment though. Thanks.