Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp6186405rdb; Thu, 14 Dec 2023 10:28:20 -0800 (PST) X-Google-Smtp-Source: AGHT+IGjuKY8rAtaqxeFgwBSYkcDqDKMwImnndy0wOikQPZIwI7tAWmfthQW5nX4Mp8GQtH25J4Y X-Received: by 2002:a05:6a20:918b:b0:18f:97c:5b7e with SMTP id v11-20020a056a20918b00b0018f097c5b7emr5316064pzd.76.1702578500026; Thu, 14 Dec 2023 10:28:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702578500; cv=none; d=google.com; s=arc-20160816; b=s/IZ8/XOwJVrZSrEJscB3bJFx/Bh0GRNgzr7BHCFauaRD40p8CXLtIQK+QYqAypYMe I2CP472t29eFlle8YNpuPxpp0WmOwsRX8tbSDOdYPVTnBxvxqC6CHBijWfrWgtxxcvLf u4atkGt2IgSOUaEY03lVaxoO+TlsVGWdYnzHRHb09g1ym3ni7wVC7E2uTGjrbCk5M+B2 YUpuBRUYdoBMdTMM/KAM+jRWJI9auP0NHx6Q8Xm9xVOS+OhIJv/rd0vjRalICO705/Mg vLZgoGCjfdGjoxY/5hn2It17rvCN1pjwfpIXBr5gwXPGm4O0Of3ZZZ2re4ksv7chsADZ 5W2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=c15DaHIqOCcTBZD4sKGD1Vilv73t04cAOMQCEoLNtnA=; fh=V3EXrfhtPXQ8VZs+995Yo8T+zOpBnshrD4ANVkhZrjM=; b=NinnrOgU4lxgNRUXUn9PvGRi3hgP4kD2GJOsXCGOy7KxNNbxaXLiG8Aypg/TXBxofA 24f1cxmv/BUEIgXDS4XVVjXrBR3Np1chqn2EZCdjatYsE+LgiiK6dt70InpD7JO0YBYI PHtz0hoDPHMmGxllt747XvcXezzoRKwUtiR3VrvQCSQeCjrVQ9RyO5Pc6tQssYUmakJq rpZZujUP/t6ghy7uHwampbntQoO/17eUWZrCei9cz8kC1luURwfvpRUQG1H/WNek+/72 hFif3pvmwHjxg92k8NB+D6TCHl+K8zrvOvJ2bYTZowNr5ywR0Y4g5q7b3KwOgzFSTpbM beGg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id ay18-20020a056a00301200b006cdf615b690si11932281pfb.149.2023.12.14.10.28.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Dec 2023 10:28:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 3AA3F87507A6; Thu, 14 Dec 2023 10:28:17 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230324AbjLNS2C (ORCPT + 99 others); Thu, 14 Dec 2023 13:28:02 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38832 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229579AbjLNS2B (ORCPT ); Thu, 14 Dec 2023 13:28:01 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9240A112 for ; Thu, 14 Dec 2023 10:28:07 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C133EC15; Thu, 14 Dec 2023 10:28:52 -0800 (PST) Received: from [10.1.197.60] (eglon.cambridge.arm.com [10.1.197.60]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5E9B43F738; Thu, 14 Dec 2023 10:28:02 -0800 (PST) Message-ID: Date: Thu, 14 Dec 2023 18:28:01 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH v7 02/24] x86/resctrl: kfree() rmid_ptrs from rdtgroup_exit() Content-Language: en-GB To: Reinette Chatre , x86@kernel.org, linux-kernel@vger.kernel.org Cc: Fenghua Yu , Thomas Gleixner , Ingo Molnar , Borislav Petkov , H Peter Anvin , Babu Moger , shameerali.kolothum.thodi@huawei.com, D Scott Phillips OS , carl@os.amperecomputing.com, lcherian@marvell.com, bobo.shaobowang@huawei.com, tan.shaopeng@fujitsu.com, baolin.wang@linux.alibaba.com, Jamie Iles , Xin Hao , peternewman@google.com, dfustini@baylibre.com, amitsinght@marvell.com References: <20231025180345.28061-1-james.morse@arm.com> <20231025180345.28061-3-james.morse@arm.com> <208c3ade-a8c3-41cc-b136-4ab9b7e938e5@intel.com> From: James Morse In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Thu, 14 Dec 2023 10:28:17 -0800 (PST) Hi Reinette, On 13/12/2023 23:27, Reinette Chatre wrote: > Hi James, > > On 12/13/2023 10:03 AM, James Morse wrote: >> On 09/11/2023 17:39, Reinette Chatre wrote: >>> On 10/25/2023 11:03 AM, James Morse wrote: > > ... > >>>> diff --git a/arch/x86/kernel/cpu/resctrl/core.c b/arch/x86/kernel/cpu/resctrl/core.c >>>> index 19e0681f0435..0056c9962a44 100644 >>>> --- a/arch/x86/kernel/cpu/resctrl/core.c >>>> +++ b/arch/x86/kernel/cpu/resctrl/core.c >>>> @@ -992,7 +992,13 @@ late_initcall(resctrl_late_init); >>>> >>>> static void __exit resctrl_exit(void) >>>> { >>>> + struct rdt_resource *r = &rdt_resources_all[RDT_RESOURCE_L3].r_resctrl; >>>> + >>>> cpuhp_remove_state(rdt_online); >>>> + >>>> + if (r->mon_capable) >>>> + rdt_put_mon_l3_config(r); >>>> + >>>> rdtgroup_exit(); >>>> } >>> >>> I expect cleanup to do the inverse of init. I do not know what was the >>> motivation for the rdtgroup_exit() to follow cpuhp_remove_state() >> >> This will invoke the hotplug callbacks, making it look to resctrl like all CPUs are >> offline. This means it is then impossible for rdtgroup_exit() to race with the hotplug >> notifiers. (if you could run this code...) > hmmm ... if there is a risk of such a race would the init code not also be > vulnerable to that with the notifiers up before rdtgroup_init()? Nope, because this array is allocated behind rdt_get_mon_l3_config(), which ultimately comes from get_rdt_resources() in resctrl_late_init() - which calls cpuhp_setup_state() after all this init work has been done. (cpu hp always gives me a headache1) > The races you mention > are not obvious to me. I see the filesystem and hotplug code protected against races via > the mutex and static keys. Could you please elaborate on the flows of concern? Functions like __check_limbo() (calling __rmid_entry()) are called under the rdtgroup_mutex, but they don't consider that rmid_ptrs[] may be NULL. But this could only happen if the limbo work ran after cpuhp_remove_state() - this can't happen because the hotplug callbacks cancel the limbo work, and won't reschedule it if the domain is going offline. The only other path is via free_rmid(), I've not thought too much about this as resctrl_exit() can't actually be invoked - this code is discarded by the linker. It could be run on MPAM, but only in response to an 'error interrupt' (which is optional) - and all the MPAM error interrupts indicate a software bug. I've only invoked this path once, and rdtgroup_exit()s unregister_filesystem() didn't remove all the files. I anticipate digging into this teardown code more once the bulk of the MPAM driver is upstream. > I am not advocating for cpuhp_remove_state() to be called later. I understand that > it simplifies the flows to consider. > >>> but I >>> was expecting this new cleanup to be done after rdtgroup_exit() to be inverse >>> of init. This cleanup is inserted in middle of two existing cleanup - could >>> you please elaborate how this location was chosen? >> >> rdtgroup_exit() does nothing with the resctrl structures, it removes sysfs and debugfs >> entries, and unregisters the filesystem. >> >> Hypothetically, you can't observe any effect of the rmid_ptrs array being freed as >> all the CPUs are offline and the overflow/limbo threads should have been cancelled. >> Once cpuhp_remove_state() has been called, this really doesn't matter. > Sounds like nothing prevents this code from following the custom of cleanup to be > inverse of init (yet keep cpuhp_remove_state() first). I'll put the the rdt_put_mon_l3_config() call after rdtgroup_exit()... Thanks, James