From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751196AbeEVEPX (ORCPT ); Tue, 22 May 2018 00:15:23 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:44524 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750707AbeEVEPV (ORCPT ); Tue, 22 May 2018 00:15:21 -0400 Date: Mon, 21 May 2018 21:16:51 -0700 From: "Paul E. McKenney" To: Joel Fernandes Cc: Joel Fernandes , linux-kernel@vger.kernel.org, Josh Triplett , Steven Rostedt , Mathieu Desnoyers , Lai Jiangshan , byungchul.park@lge.com, kernel-team@android.com Subject: Re: [PATCH v3 4/4] rcu: Unlock non-start node only after accessing its gp_seq_needed Reply-To: paulmck@linux.vnet.ibm.com References: <20180521044220.123933-1-joel@joelfernandes.org> <20180521044220.123933-5-joel@joelfernandes.org> <20180521232537.GJ3803@linux.vnet.ibm.com> <20180522000734.GD40541@joelaf.mtv.corp.google.com> <20180522002823.GP3803@linux.vnet.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180522002823.GP3803@linux.vnet.ibm.com> User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 18052204-0024-0000-0000-0000035CAC45 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00009064; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000261; SDB=6.01035837; UDB=6.00529851; IPR=6.00814966; MB=3.00021230; MTD=3.00000008; XFM=3.00000015; UTC=2018-05-22 04:15:18 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18052204-0025-0000-0000-00004818604C Message-Id: <20180522041651.GA18405@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-05-22_01:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1805220050 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 21, 2018 at 05:28:23PM -0700, Paul E. McKenney wrote: > On Mon, May 21, 2018 at 05:07:34PM -0700, Joel Fernandes wrote: > > On Mon, May 21, 2018 at 04:25:38PM -0700, Paul E. McKenney wrote: > > > On Sun, May 20, 2018 at 09:42:20PM -0700, Joel Fernandes wrote: > > > > We acquire gp_seq_needed locklessly. To be safe, lets do the unlocking > > > > after the access. > > > > > > Actually, no, we hold rnp_start's ->lock throughout. And this CPU (or in > > > the case of no-CBs CPUs, this task) is in charge of rdp->gp_seq_needed, > > > so nothing else is accessing it. Or at least that is the intent. ;-) > > > > I was talking about protecting the internal node's rnp->gp_seq_needed, not > > the rnp_start's gp_seq_needed. > > Ah, good point, I missed the "if" condition. This can be argued to work, > sort of, given that we still hold the leaf rcu_node structure's lock, > so that there is a limit to how far grace periods can advance. > > But the code would of course be much cleaner with your change. > > > We are protecting them in the loop: > > > > like this: > > for(...) > > if (rnp != rnp_start) > > raw_spin_lock_rcu_node(rnp); > > [...] > > // access rnp->gp_seq and rnp->gp_seq_needed > > [...] > > if (rnp != rnp_start) > > raw_spin_unlock_rcu_node(rnp); > > > > But we don't need to do such protection in unlock_out ? I'm sorry if I'm > > missing something, but I'm wondering if rnp->gp_seq_needed of an internal > > node can be accessed locklessly, then why can't that be done also in the > > funnel locking loop - after all we are holding the rnp_start's lock through > > out right? > > I was focused on the updates, and missed the rnp->gp_seq_req access in the > "if" statement. The current code does sort of work, but only assuming > that the compiler doesn't tear the load, and so your change would help. > Could you please resend with your other two updated patches? It depends > on one of the earlier patches, so does not apply cleanly as-is. I could > hand-apply it, but that sounds like a good way to make your updated > series fail to apply. ;-) > > But could you also make the commit log explicitly call out the "if" > condition as being the offending access? Never mind, me being stupid. I need to apply this change to the original commit "rcu: Make rcu_nocb_wait_gp() check if GP already requested", which I have done with this attribution: [ paulmck: Move lock release past "if" as suggested by Joel Fernandes. ] I have rebased my stack on top of the updated commit. Thanx, Paul