From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751863AbdFFRvN (ORCPT ); Tue, 6 Jun 2017 13:51:13 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:55998 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751441AbdFFRvJ (ORCPT ); Tue, 6 Jun 2017 13:51:09 -0400 Date: Tue, 6 Jun 2017 10:50:48 -0700 From: "Paul E. McKenney" To: Peter Zijlstra Cc: linux-kernel@vger.kernel.org, mingo@kernel.org, jiangshanlai@gmail.com, dipankar@in.ibm.com, akpm@linux-foundation.org, mathieu.desnoyers@efficios.com, josh@joshtriplett.org, tglx@linutronix.de, rostedt@goodmis.org, dhowells@redhat.com, edumazet@google.com, fweisbec@gmail.com, oleg@redhat.com, Paolo Bonzini , kvm@vger.kernel.org, Linus Torvalds Subject: Re: [PATCH RFC tip/core/rcu 1/2] srcu: Allow use of Tiny/Tree SRCU from both process and interrupt context Reply-To: paulmck@linux.vnet.ibm.com References: <20170605220919.GA27820@linux.vnet.ibm.com> <1496700591-30177-1-git-send-email-paulmck@linux.vnet.ibm.com> <20170606172342.r4zicqm4jb3nbwsz@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170606172342.r4zicqm4jb3nbwsz@hirez.programming.kicks-ass.net> User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 17060617-0048-0000-0000-0000019D157C X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00007184; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000212; SDB=6.00871040; UDB=6.00433188; IPR=6.00651032; BA=6.00005403; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00015721; XFM=3.00000015; UTC=2017-06-06 17:50:51 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17060617-0049-0000-0000-0000416A3BC7 Message-Id: <20170606175048.GH3721@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-06-06_12:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1703280000 definitions=main-1706060306 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 06, 2017 at 07:23:42PM +0200, Peter Zijlstra wrote: > On Mon, Jun 05, 2017 at 03:09:50PM -0700, Paul E. McKenney wrote: > > diff --git a/kernel/rcu/srcutree.c b/kernel/rcu/srcutree.c > > index 3ae8474557df..157654fa436a 100644 > > --- a/kernel/rcu/srcutree.c > > +++ b/kernel/rcu/srcutree.c > > @@ -357,7 +357,7 @@ EXPORT_SYMBOL_GPL(cleanup_srcu_struct); > > > > /* > > * Counts the new reader in the appropriate per-CPU element of the > > - * srcu_struct. Must be called from process context. > > + * srcu_struct. > > * Returns an index that must be passed to the matching srcu_read_unlock(). > > */ > > int __srcu_read_lock(struct srcu_struct *sp) > > @@ -365,7 +365,7 @@ int __srcu_read_lock(struct srcu_struct *sp) > > int idx; > > > > idx = READ_ONCE(sp->srcu_idx) & 0x1; > > - __this_cpu_inc(sp->sda->srcu_lock_count[idx]); > > + this_cpu_inc(sp->sda->srcu_lock_count[idx]); > > smp_mb(); /* B */ /* Avoid leaking the critical section. */ > > return idx; > > } > > So again, the change is to make this an IRQ safe operation, however if > we have this balance requirement, the IRQ will not visibly change the > value and load-store should be good again, no? > > Or am I missing some other detail with this implementation? Unlike Tiny SRCU, Classic and Tree SRCU increment one counter (->srcu_lock_count[]) and decrement another (->srcu_unlock_count[]). So balanced srcu_read_lock() and srcu_read_unlock() within an irq handler would increment both counters, with no decrements. Therefore, __srcu_read_lock()'s counter manipulation needs to be irq-safe. Thanx, Paul