lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fa1249f7-9a5d-4696-9246-4913365b6715@paulmck-laptop>
Date:   Mon, 4 Dec 2023 17:01:21 -0800
From:   "Paul E. McKenney" <paulmck@...nel.org>
To:     Thomas Gleixner <tglx@...utronix.de>
Cc:     Steven Rostedt <rostedt@...dmis.org>,
        Ankur Arora <ankur.a.arora@...cle.com>,
        linux-kernel@...r.kernel.org, peterz@...radead.org,
        torvalds@...ux-foundation.org, linux-mm@...ck.org, x86@...nel.org,
        akpm@...ux-foundation.org, luto@...nel.org, bp@...en8.de,
        dave.hansen@...ux.intel.com, hpa@...or.com, mingo@...hat.com,
        juri.lelli@...hat.com, vincent.guittot@...aro.org,
        willy@...radead.org, mgorman@...e.de, jon.grimm@....com,
        bharata@....com, raghavendra.kt@....com,
        boris.ostrovsky@...cle.com, konrad.wilk@...cle.com,
        jgross@...e.com, andrew.cooper3@...rix.com, mingo@...nel.org,
        bristot@...nel.org, mathieu.desnoyers@...icios.com,
        geert@...ux-m68k.org, glaubitz@...sik.fu-berlin.de,
        anton.ivanov@...bridgegreys.com, mattst88@...il.com,
        krypton@...ich-teichert.org, David.Laight@...lab.com,
        richard@....at, mjguzik@...il.com,
        Simon Horman <horms@...ge.net.au>,
        Julian Anastasov <ja@....bg>,
        Alexei Starovoitov <ast@...nel.org>,
        Daniel Borkmann <daniel@...earbox.net>
Subject: Re: [RFC PATCH 47/86] rcu: select PREEMPT_RCU if PREEMPT

On Tue, Nov 28, 2023 at 11:53:19AM +0100, Thomas Gleixner wrote:
> Paul!
> 
> On Tue, Nov 21 2023 at 07:19, Paul E. McKenney wrote:
> > On Tue, Nov 21, 2023 at 10:00:59AM -0500, Steven Rostedt wrote:
> >> Right now, the use of cond_resched() is basically a whack-a-mole game where
> >> we need to whack all the mole loops with the cond_resched() hammer. As
> >> Thomas said, this is backwards. It makes more sense to just not preempt in
> >> areas that can cause pain (like holding a mutex or in an RCU critical
> >> section), but still have the general kernel be fully preemptable.
> >
> > Which is quite true, but that whack-a-mole game can be ended without
> > getting rid of build-time selection of the preemption model.  Also,
> > that whack-a-mole game can be ended without eliminating all calls to
> > cond_resched().
> 
> Which calls to cond_resched() should not be eliminated?

The ones which, if eliminated, will result in excessive latencies.

This question is going to take some time to answer.  One type of potential
issue is where the cond_resched() precedes something like mutex_lock(),
where that mutex_lock() takes the fast path and preemption follows
shortly thereafter.  It would clearly have been better to have preempted
before acquisition.

Another is the aforementioned situations where removing the cond_resched()
increases latency.  Yes, capping the preemption latency is a wonderful
thing, and the people I chatted with are all for that, but it is only
natural that there would be a corresponding level of concern about the
cases where removing the cond_resched() calls increases latency.

There might be others as well.  These are the possibilities that have
come up thus far.

> They all suck and keeping some of them is just counterproductive as
> again people will sprinkle them all over the place for the very wrong
> reasons.

Yes, but do they suck enough and are they counterproductive enough to
be useful and necessary?  ;-)

> > Additionally, if the end goal is to be fully preemptible as in eventually
> > eliminating lazy preemption, you have a lot more convincing to do.
> 
> That's absolutely not the case. Even RT uses the lazy mode to prevent
> overeager preemption for non RT tasks.

OK, that is very good to hear.

> The whole point of the exercise is to keep the kernel always fully
> preemptible, but only enforce the immediate preemption at the next
> possible preemption point when necessary.
> 
> The decision when it is necessary is made by the scheduler and not
> delegated to the whim of cond/might_resched() placement.

I am not arguing that the developer placing a given cond_resched()
always knows best, but you have some work to do to convince me that the
scheduler always knows best.

> That is serving both worlds best IMO:
> 
>   1) LAZY preemption prevents the negative side effects of overeager
>      preemption, aka. lock contention and pointless context switching.
> 
>      The whole thing behaves like a NONE kernel unless there are
>      real-time tasks or a task did not comply to the lazy request within
>      a given time.

Almost, give or take the potential issues called out above for the
possible downsides of removing all of the cond_resched() invocations.

>   2) It does not prevent the scheduler from making decisions to preempt
>      at the next possible preemption point in order to get some
>      important computation on the CPU.
> 
>      A NONE kernel sucks vs. any sporadic [real-time] task. Just run
>      NONE and watch the latencies. The latencies are determined by the
>      interrupted context, the placement of the cond_resched() call and
>      the length of the loop which is running.
> 
>      People have complained about that and the only way out for them is
>      to switch to VOLUNTARY or FULL preemption and thereby paying the
>      price for overeager preemption.
> 
>      A price which you don't want to pay for good reasons but at the
>      same time you care about latencies in some aspects and the only
>      answer you have for that is cond_resched() or similar which is not
>      an answer at all.

All good points, but none of them are in conflict with the possibility
of leaving some cond_resched() calls behind if they ar needed.

>   3) Looking at the initial problem Ankur was trying to solve there is
>      absolutely no acceptable solution to solve that unless you think
>      that the semantically invers 'allow_preempt()/disallow_preempt()'
>      is anywhere near acceptable.

I am not arguing for allow_preempt()/disallow_preempt(), so for that
argument, you need to find someone else to argue with.  ;-)

							Thanx, Paul

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ