2020-03-02 19:59:20 +00:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0+ */
|
|
|
|
/*
|
|
|
|
* Task-based RCU implementations.
|
|
|
|
*
|
|
|
|
* Copyright (C) 2020 Paul E. McKenney
|
|
|
|
*/
|
|
|
|
|
2020-03-15 21:51:20 +00:00
|
|
|
#ifdef CONFIG_TASKS_RCU_GENERIC
|
2021-11-09 00:18:57 +00:00
|
|
|
#include "rcu_segcblist.h"
|
2020-03-03 19:49:21 +00:00
|
|
|
|
|
|
|
////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// Generic data structures.
|
|
|
|
|
|
|
|
struct rcu_tasks;
|
|
|
|
typedef void (*rcu_tasks_gp_func_t)(struct rcu_tasks *rtp);
|
2020-03-05 01:31:43 +00:00
|
|
|
typedef void (*pregp_func_t)(void);
|
|
|
|
typedef void (*pertask_func_t)(struct task_struct *t, struct list_head *hop);
|
2020-03-22 20:18:54 +00:00
|
|
|
typedef void (*postscan_func_t)(struct list_head *hop);
|
2020-03-05 01:31:43 +00:00
|
|
|
typedef void (*holdouts_func_t)(struct list_head *hop, bool ndrpt, bool *frptp);
|
2020-03-16 19:13:33 +00:00
|
|
|
typedef void (*postgp_func_t)(struct rcu_tasks *rtp);
|
2020-03-02 19:59:20 +00:00
|
|
|
|
2020-03-02 23:16:57 +00:00
|
|
|
/**
|
2021-11-06 04:52:00 +00:00
|
|
|
* struct rcu_tasks_percpu - Per-CPU component of definition for a Tasks-RCU-like mechanism.
|
2021-11-09 00:18:57 +00:00
|
|
|
* @cblist: Callback list.
|
2021-11-09 00:52:02 +00:00
|
|
|
* @lock: Lock protecting per-CPU callback list.
|
2021-11-22 21:38:42 +00:00
|
|
|
* @rtp_jiffies: Jiffies counter value for statistics.
|
|
|
|
* @rtp_n_lock_retries: Rough lock-contention statistic.
|
2021-11-10 23:56:40 +00:00
|
|
|
* @rtp_work: Work queue for invoking callbacks.
|
2021-11-24 00:16:50 +00:00
|
|
|
* @rtp_irq_work: IRQ work queue for deferred wakeups.
|
2021-11-11 22:53:43 +00:00
|
|
|
* @barrier_q_head: RCU callback for barrier operation.
|
|
|
|
* @cpu: CPU number corresponding to this entry.
|
|
|
|
* @rtpp: Pointer to the rcu_tasks structure.
|
2021-11-06 04:52:00 +00:00
|
|
|
*/
|
|
|
|
struct rcu_tasks_percpu {
|
2021-11-09 00:18:57 +00:00
|
|
|
struct rcu_segcblist cblist;
|
2021-11-09 00:52:02 +00:00
|
|
|
raw_spinlock_t __private lock;
|
2021-11-22 21:38:42 +00:00
|
|
|
unsigned long rtp_jiffies;
|
|
|
|
unsigned long rtp_n_lock_retries;
|
2021-11-10 23:56:40 +00:00
|
|
|
struct work_struct rtp_work;
|
2021-11-24 00:16:50 +00:00
|
|
|
struct irq_work rtp_irq_work;
|
2021-11-11 22:53:43 +00:00
|
|
|
struct rcu_head barrier_q_head;
|
2021-11-10 23:56:40 +00:00
|
|
|
int cpu;
|
|
|
|
struct rcu_tasks *rtpp;
|
2021-11-06 04:52:00 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* struct rcu_tasks - Definition for a Tasks-RCU-like mechanism.
|
2021-03-23 05:29:10 +00:00
|
|
|
* @cbs_wq: Wait queue allowing new callback to get kthread's attention.
|
2021-11-06 04:52:00 +00:00
|
|
|
* @cbs_gbl_lock: Lock protecting callback list.
|
2020-03-02 23:16:57 +00:00
|
|
|
* @kthread_ptr: This flavor's grace-period/callback-invocation kthread.
|
2020-03-03 19:49:21 +00:00
|
|
|
* @gp_func: This flavor's grace-period-wait function.
|
2020-03-16 19:13:33 +00:00
|
|
|
* @gp_state: Grace period's most recent state transition (debugging).
|
2020-09-10 05:05:41 +00:00
|
|
|
* @gp_sleep: Per-grace-period sleep to prevent CPU-bound looping.
|
2020-09-10 04:36:34 +00:00
|
|
|
* @init_fract: Initial backoff sleep interval.
|
2020-03-16 19:13:33 +00:00
|
|
|
* @gp_jiffies: Time of last @gp_state transition.
|
|
|
|
* @gp_start: Most recent grace-period start in jiffies.
|
2021-11-08 22:14:43 +00:00
|
|
|
* @tasks_gp_seq: Number of grace periods completed since boot.
|
2020-03-18 17:54:05 +00:00
|
|
|
* @n_ipis: Number of IPIs sent to encourage grace periods to end.
|
2020-03-25 21:36:05 +00:00
|
|
|
* @n_ipis_fails: Number of IPI-send failures.
|
2020-03-05 01:31:43 +00:00
|
|
|
* @pregp_func: This flavor's pre-grace-period function (optional).
|
|
|
|
* @pertask_func: This flavor's per-task scan function (optional).
|
|
|
|
* @postscan_func: This flavor's post-task scan function (optional).
|
2021-01-25 07:41:05 +00:00
|
|
|
* @holdouts_func: This flavor's holdout-list scan function (optional).
|
2020-03-05 01:31:43 +00:00
|
|
|
* @postgp_func: This flavor's post-grace-period function (optional).
|
2020-03-03 19:49:21 +00:00
|
|
|
* @call_func: This flavor's call_rcu()-equivalent function.
|
2021-11-06 04:52:00 +00:00
|
|
|
* @rtpcpu: This flavor's rcu_tasks_percpu structure.
|
2021-11-08 18:51:13 +00:00
|
|
|
* @percpu_enqueue_shift: Shift down CPU ID this much when enqueuing callbacks.
|
2021-11-29 19:46:33 +00:00
|
|
|
* @percpu_enqueue_lim: Number of per-CPU callback queues in use for enqueuing.
|
|
|
|
* @percpu_dequeue_lim: Number of per-CPU callback queues in use for dequeuing.
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
* @percpu_dequeue_gpseq: RCU grace-period number to propagate enqueue limit to dequeuers.
|
2021-11-11 22:53:43 +00:00
|
|
|
* @barrier_q_mutex: Serialize barrier operations.
|
|
|
|
* @barrier_q_count: Number of queues being waited on.
|
|
|
|
* @barrier_q_completion: Barrier wait/wakeup mechanism.
|
|
|
|
* @barrier_q_seq: Sequence number for barrier operations.
|
2020-03-03 23:50:31 +00:00
|
|
|
* @name: This flavor's textual name.
|
|
|
|
* @kname: This flavor's kthread name.
|
2020-03-02 23:16:57 +00:00
|
|
|
*/
|
|
|
|
struct rcu_tasks {
|
|
|
|
struct wait_queue_head cbs_wq;
|
2021-11-06 04:52:00 +00:00
|
|
|
raw_spinlock_t cbs_gbl_lock;
|
2020-03-16 19:13:33 +00:00
|
|
|
int gp_state;
|
2020-09-10 05:05:41 +00:00
|
|
|
int gp_sleep;
|
2020-09-10 04:36:34 +00:00
|
|
|
int init_fract;
|
2020-03-16 19:13:33 +00:00
|
|
|
unsigned long gp_jiffies;
|
2020-03-17 15:57:02 +00:00
|
|
|
unsigned long gp_start;
|
2021-11-08 22:14:43 +00:00
|
|
|
unsigned long tasks_gp_seq;
|
2020-03-18 17:54:05 +00:00
|
|
|
unsigned long n_ipis;
|
2020-03-25 21:36:05 +00:00
|
|
|
unsigned long n_ipis_fails;
|
2020-03-02 23:16:57 +00:00
|
|
|
struct task_struct *kthread_ptr;
|
2020-03-03 19:49:21 +00:00
|
|
|
rcu_tasks_gp_func_t gp_func;
|
2020-03-05 01:31:43 +00:00
|
|
|
pregp_func_t pregp_func;
|
|
|
|
pertask_func_t pertask_func;
|
|
|
|
postscan_func_t postscan_func;
|
|
|
|
holdouts_func_t holdouts_func;
|
|
|
|
postgp_func_t postgp_func;
|
2020-03-03 19:49:21 +00:00
|
|
|
call_rcu_func_t call_func;
|
2021-11-06 04:52:00 +00:00
|
|
|
struct rcu_tasks_percpu __percpu *rtpcpu;
|
2021-11-08 18:51:13 +00:00
|
|
|
int percpu_enqueue_shift;
|
2021-11-09 19:11:32 +00:00
|
|
|
int percpu_enqueue_lim;
|
2021-11-29 19:46:33 +00:00
|
|
|
int percpu_dequeue_lim;
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
unsigned long percpu_dequeue_gpseq;
|
2021-11-11 22:53:43 +00:00
|
|
|
struct mutex barrier_q_mutex;
|
|
|
|
atomic_t barrier_q_count;
|
|
|
|
struct completion barrier_q_completion;
|
|
|
|
unsigned long barrier_q_seq;
|
2020-03-03 23:50:31 +00:00
|
|
|
char *name;
|
|
|
|
char *kname;
|
2020-03-02 23:16:57 +00:00
|
|
|
};
|
|
|
|
|
2021-11-24 00:16:50 +00:00
|
|
|
static void call_rcu_tasks_iw_wakeup(struct irq_work *iwp);
|
|
|
|
|
2021-11-06 04:52:00 +00:00
|
|
|
#define DEFINE_RCU_TASKS(rt_name, gp, call, n) \
|
|
|
|
static DEFINE_PER_CPU(struct rcu_tasks_percpu, rt_name ## __percpu) = { \
|
2021-11-09 00:52:02 +00:00
|
|
|
.lock = __RAW_SPIN_LOCK_UNLOCKED(rt_name ## __percpu.cbs_pcpu_lock), \
|
2021-11-24 00:16:50 +00:00
|
|
|
.rtp_irq_work = IRQ_WORK_INIT(call_rcu_tasks_iw_wakeup), \
|
2021-11-06 04:52:00 +00:00
|
|
|
}; \
|
|
|
|
static struct rcu_tasks rt_name = \
|
|
|
|
{ \
|
|
|
|
.cbs_wq = __WAIT_QUEUE_HEAD_INITIALIZER(rt_name.cbs_wq), \
|
|
|
|
.cbs_gbl_lock = __RAW_SPIN_LOCK_UNLOCKED(rt_name.cbs_gbl_lock), \
|
|
|
|
.gp_func = gp, \
|
|
|
|
.call_func = call, \
|
|
|
|
.rtpcpu = &rt_name ## __percpu, \
|
|
|
|
.name = n, \
|
2022-02-02 23:42:36 +00:00
|
|
|
.percpu_enqueue_shift = order_base_2(CONFIG_NR_CPUS), \
|
2021-11-09 19:11:32 +00:00
|
|
|
.percpu_enqueue_lim = 1, \
|
2021-11-29 19:46:33 +00:00
|
|
|
.percpu_dequeue_lim = 1, \
|
2021-11-11 22:53:43 +00:00
|
|
|
.barrier_q_mutex = __MUTEX_INITIALIZER(rt_name.barrier_q_mutex), \
|
|
|
|
.barrier_q_seq = (0UL - 50UL) << RCU_SEQ_CTR_SHIFT, \
|
2021-11-06 04:52:00 +00:00
|
|
|
.kname = #rt_name, \
|
2020-03-02 23:16:57 +00:00
|
|
|
}
|
|
|
|
|
2020-03-02 19:59:20 +00:00
|
|
|
/* Track exiting tasks in order to allow them to be waited for. */
|
|
|
|
DEFINE_STATIC_SRCU(tasks_rcu_exit_srcu);
|
|
|
|
|
2020-03-17 18:39:26 +00:00
|
|
|
/* Avoid IPIing CPUs early in the grace period. */
|
2020-09-10 04:51:09 +00:00
|
|
|
#define RCU_TASK_IPI_DELAY (IS_ENABLED(CONFIG_TASKS_TRACE_RCU_READ_MB) ? HZ / 2 : 0)
|
2020-03-17 18:39:26 +00:00
|
|
|
static int rcu_task_ipi_delay __read_mostly = RCU_TASK_IPI_DELAY;
|
|
|
|
module_param(rcu_task_ipi_delay, int, 0644);
|
|
|
|
|
2020-03-02 19:59:20 +00:00
|
|
|
/* Control stall timeouts. Disable with <= 0, otherwise jiffies till stall. */
|
|
|
|
#define RCU_TASK_STALL_TIMEOUT (HZ * 60 * 10)
|
|
|
|
static int rcu_task_stall_timeout __read_mostly = RCU_TASK_STALL_TIMEOUT;
|
|
|
|
module_param(rcu_task_stall_timeout, int, 0644);
|
|
|
|
|
2021-11-12 15:33:40 +00:00
|
|
|
static int rcu_task_enqueue_lim __read_mostly = -1;
|
|
|
|
module_param(rcu_task_enqueue_lim, int, 0444);
|
|
|
|
|
2021-11-24 23:12:15 +00:00
|
|
|
static bool rcu_task_cb_adjust;
|
|
|
|
static int rcu_task_contend_lim __read_mostly = 100;
|
|
|
|
module_param(rcu_task_contend_lim, int, 0444);
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
static int rcu_task_collapse_lim __read_mostly = 10;
|
|
|
|
module_param(rcu_task_collapse_lim, int, 0444);
|
2021-11-24 23:12:15 +00:00
|
|
|
|
2020-03-16 19:13:33 +00:00
|
|
|
/* RCU tasks grace-period state for debugging. */
|
|
|
|
#define RTGS_INIT 0
|
|
|
|
#define RTGS_WAIT_WAIT_CBS 1
|
|
|
|
#define RTGS_WAIT_GP 2
|
|
|
|
#define RTGS_PRE_WAIT_GP 3
|
|
|
|
#define RTGS_SCAN_TASKLIST 4
|
|
|
|
#define RTGS_POST_SCAN_TASKLIST 5
|
|
|
|
#define RTGS_WAIT_SCAN_HOLDOUTS 6
|
|
|
|
#define RTGS_SCAN_HOLDOUTS 7
|
|
|
|
#define RTGS_POST_GP 8
|
|
|
|
#define RTGS_WAIT_READERS 9
|
|
|
|
#define RTGS_INVOKE_CBS 10
|
|
|
|
#define RTGS_WAIT_CBS 11
|
2020-05-29 03:03:48 +00:00
|
|
|
#ifndef CONFIG_TINY_RCU
|
2020-03-16 19:13:33 +00:00
|
|
|
static const char * const rcu_tasks_gp_state_names[] = {
|
|
|
|
"RTGS_INIT",
|
|
|
|
"RTGS_WAIT_WAIT_CBS",
|
|
|
|
"RTGS_WAIT_GP",
|
|
|
|
"RTGS_PRE_WAIT_GP",
|
|
|
|
"RTGS_SCAN_TASKLIST",
|
|
|
|
"RTGS_POST_SCAN_TASKLIST",
|
|
|
|
"RTGS_WAIT_SCAN_HOLDOUTS",
|
|
|
|
"RTGS_SCAN_HOLDOUTS",
|
|
|
|
"RTGS_POST_GP",
|
|
|
|
"RTGS_WAIT_READERS",
|
|
|
|
"RTGS_INVOKE_CBS",
|
|
|
|
"RTGS_WAIT_CBS",
|
|
|
|
};
|
2020-05-29 03:03:48 +00:00
|
|
|
#endif /* #ifndef CONFIG_TINY_RCU */
|
2020-03-16 19:13:33 +00:00
|
|
|
|
2020-03-03 19:49:21 +00:00
|
|
|
////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// Generic code.
|
|
|
|
|
2021-11-10 23:56:40 +00:00
|
|
|
static void rcu_tasks_invoke_cbs_wq(struct work_struct *wp);
|
|
|
|
|
2020-03-16 19:13:33 +00:00
|
|
|
/* Record grace-period phase and time. */
|
|
|
|
static void set_tasks_gp_state(struct rcu_tasks *rtp, int newstate)
|
|
|
|
{
|
|
|
|
rtp->gp_state = newstate;
|
|
|
|
rtp->gp_jiffies = jiffies;
|
|
|
|
}
|
|
|
|
|
2020-05-29 03:03:48 +00:00
|
|
|
#ifndef CONFIG_TINY_RCU
|
2020-03-16 19:13:33 +00:00
|
|
|
/* Return state name. */
|
|
|
|
static const char *tasks_gp_state_getname(struct rcu_tasks *rtp)
|
|
|
|
{
|
|
|
|
int i = data_race(rtp->gp_state); // Let KCSAN detect update races
|
|
|
|
int j = READ_ONCE(i); // Prevent the compiler from reading twice
|
|
|
|
|
|
|
|
if (j >= ARRAY_SIZE(rcu_tasks_gp_state_names))
|
|
|
|
return "???";
|
|
|
|
return rcu_tasks_gp_state_names[j];
|
|
|
|
}
|
2020-05-29 03:03:48 +00:00
|
|
|
#endif /* #ifndef CONFIG_TINY_RCU */
|
2020-03-16 19:13:33 +00:00
|
|
|
|
2021-11-06 04:52:00 +00:00
|
|
|
// Initialize per-CPU callback lists for the specified flavor of
|
|
|
|
// Tasks RCU.
|
|
|
|
static void cblist_init_generic(struct rcu_tasks *rtp)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
unsigned long flags;
|
2021-11-12 15:33:40 +00:00
|
|
|
int lim;
|
2022-01-26 18:42:58 +00:00
|
|
|
int shift;
|
2021-11-06 04:52:00 +00:00
|
|
|
|
|
|
|
raw_spin_lock_irqsave(&rtp->cbs_gbl_lock, flags);
|
2021-11-24 23:12:15 +00:00
|
|
|
if (rcu_task_enqueue_lim < 0) {
|
|
|
|
rcu_task_enqueue_lim = 1;
|
|
|
|
rcu_task_cb_adjust = true;
|
|
|
|
pr_info("%s: Setting adjustable number of callback queues.\n", __func__);
|
|
|
|
} else if (rcu_task_enqueue_lim == 0) {
|
2021-11-12 15:33:40 +00:00
|
|
|
rcu_task_enqueue_lim = 1;
|
2021-11-24 23:12:15 +00:00
|
|
|
}
|
2021-11-12 15:33:40 +00:00
|
|
|
lim = rcu_task_enqueue_lim;
|
|
|
|
|
|
|
|
if (lim > nr_cpu_ids)
|
|
|
|
lim = nr_cpu_ids;
|
2022-01-26 18:42:58 +00:00
|
|
|
shift = ilog2(nr_cpu_ids / lim);
|
|
|
|
if (((nr_cpu_ids - 1) >> shift) >= lim)
|
|
|
|
shift++;
|
|
|
|
WRITE_ONCE(rtp->percpu_enqueue_shift, shift);
|
2021-11-29 19:46:33 +00:00
|
|
|
WRITE_ONCE(rtp->percpu_dequeue_lim, lim);
|
2021-11-12 15:33:40 +00:00
|
|
|
smp_store_release(&rtp->percpu_enqueue_lim, lim);
|
2021-11-06 04:52:00 +00:00
|
|
|
for_each_possible_cpu(cpu) {
|
|
|
|
struct rcu_tasks_percpu *rtpcp = per_cpu_ptr(rtp->rtpcpu, cpu);
|
|
|
|
|
|
|
|
WARN_ON_ONCE(!rtpcp);
|
|
|
|
if (cpu)
|
2021-11-09 00:52:02 +00:00
|
|
|
raw_spin_lock_init(&ACCESS_PRIVATE(rtpcp, lock));
|
|
|
|
raw_spin_lock_rcu_node(rtpcp); // irqs already disabled.
|
2021-11-09 00:18:57 +00:00
|
|
|
if (rcu_segcblist_empty(&rtpcp->cblist))
|
|
|
|
rcu_segcblist_init(&rtpcp->cblist);
|
2021-11-10 23:56:40 +00:00
|
|
|
INIT_WORK(&rtpcp->rtp_work, rcu_tasks_invoke_cbs_wq);
|
|
|
|
rtpcp->cpu = cpu;
|
|
|
|
rtpcp->rtpp = rtp;
|
2021-11-09 00:52:02 +00:00
|
|
|
raw_spin_unlock_rcu_node(rtpcp); // irqs remain disabled.
|
2021-11-06 04:52:00 +00:00
|
|
|
}
|
|
|
|
raw_spin_unlock_irqrestore(&rtp->cbs_gbl_lock, flags);
|
2021-11-12 15:33:40 +00:00
|
|
|
pr_info("%s: Setting shift to %d and lim to %d.\n", __func__, data_race(rtp->percpu_enqueue_shift), data_race(rtp->percpu_enqueue_lim));
|
2021-11-06 04:52:00 +00:00
|
|
|
}
|
|
|
|
|
2021-11-24 00:16:50 +00:00
|
|
|
// IRQ-work handler that does deferred wakeup for call_rcu_tasks_generic().
|
|
|
|
static void call_rcu_tasks_iw_wakeup(struct irq_work *iwp)
|
|
|
|
{
|
|
|
|
struct rcu_tasks *rtp;
|
|
|
|
struct rcu_tasks_percpu *rtpcp = container_of(iwp, struct rcu_tasks_percpu, rtp_irq_work);
|
|
|
|
|
|
|
|
rtp = rtpcp->rtpp;
|
|
|
|
wake_up(&rtp->cbs_wq);
|
|
|
|
}
|
|
|
|
|
2020-03-03 19:49:21 +00:00
|
|
|
// Enqueue a callback for the specified flavor of Tasks RCU.
|
|
|
|
static void call_rcu_tasks_generic(struct rcu_head *rhp, rcu_callback_t func,
|
|
|
|
struct rcu_tasks *rtp)
|
2020-03-02 19:59:20 +00:00
|
|
|
{
|
|
|
|
unsigned long flags;
|
2021-11-22 21:38:42 +00:00
|
|
|
unsigned long j;
|
2021-11-24 23:12:15 +00:00
|
|
|
bool needadjust = false;
|
2020-03-02 19:59:20 +00:00
|
|
|
bool needwake;
|
2021-11-06 04:52:00 +00:00
|
|
|
struct rcu_tasks_percpu *rtpcp;
|
2020-03-02 19:59:20 +00:00
|
|
|
|
|
|
|
rhp->next = NULL;
|
|
|
|
rhp->func = func;
|
2021-11-06 04:52:00 +00:00
|
|
|
local_irq_save(flags);
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
rcu_read_lock();
|
2021-11-08 18:51:13 +00:00
|
|
|
rtpcp = per_cpu_ptr(rtp->rtpcpu,
|
|
|
|
smp_processor_id() >> READ_ONCE(rtp->percpu_enqueue_shift));
|
2021-11-22 21:38:42 +00:00
|
|
|
if (!raw_spin_trylock_rcu_node(rtpcp)) { // irqs already disabled.
|
|
|
|
raw_spin_lock_rcu_node(rtpcp); // irqs already disabled.
|
|
|
|
j = jiffies;
|
|
|
|
if (rtpcp->rtp_jiffies != j) {
|
|
|
|
rtpcp->rtp_jiffies = j;
|
|
|
|
rtpcp->rtp_n_lock_retries = 0;
|
|
|
|
}
|
2021-11-24 23:12:15 +00:00
|
|
|
if (rcu_task_cb_adjust && ++rtpcp->rtp_n_lock_retries > rcu_task_contend_lim &&
|
|
|
|
READ_ONCE(rtp->percpu_enqueue_lim) != nr_cpu_ids)
|
|
|
|
needadjust = true; // Defer adjustment to avoid deadlock.
|
2021-11-22 21:38:42 +00:00
|
|
|
}
|
2021-11-09 00:18:57 +00:00
|
|
|
if (!rcu_segcblist_is_enabled(&rtpcp->cblist)) {
|
2021-11-09 00:52:02 +00:00
|
|
|
raw_spin_unlock_rcu_node(rtpcp); // irqs remain disabled.
|
2021-11-06 04:52:00 +00:00
|
|
|
cblist_init_generic(rtp);
|
2021-11-09 00:52:02 +00:00
|
|
|
raw_spin_lock_rcu_node(rtpcp); // irqs already disabled.
|
2021-11-06 04:52:00 +00:00
|
|
|
}
|
2021-11-09 00:18:57 +00:00
|
|
|
needwake = rcu_segcblist_empty(&rtpcp->cblist);
|
|
|
|
rcu_segcblist_enqueue(&rtpcp->cblist, rhp);
|
2021-11-09 00:52:02 +00:00
|
|
|
raw_spin_unlock_irqrestore_rcu_node(rtpcp, flags);
|
2021-11-24 23:12:15 +00:00
|
|
|
if (unlikely(needadjust)) {
|
|
|
|
raw_spin_lock_irqsave(&rtp->cbs_gbl_lock, flags);
|
|
|
|
if (rtp->percpu_enqueue_lim != nr_cpu_ids) {
|
2022-02-02 23:42:36 +00:00
|
|
|
WRITE_ONCE(rtp->percpu_enqueue_shift, order_base_2(nr_cpu_ids));
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
WRITE_ONCE(rtp->percpu_dequeue_lim, nr_cpu_ids);
|
2021-11-24 23:12:15 +00:00
|
|
|
smp_store_release(&rtp->percpu_enqueue_lim, nr_cpu_ids);
|
|
|
|
pr_info("Switching %s to per-CPU callback queuing.\n", rtp->name);
|
|
|
|
}
|
|
|
|
raw_spin_unlock_irqrestore(&rtp->cbs_gbl_lock, flags);
|
|
|
|
}
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
rcu_read_unlock();
|
2020-03-02 19:59:20 +00:00
|
|
|
/* We can't create the thread unless interrupts are enabled. */
|
2020-03-02 23:16:57 +00:00
|
|
|
if (needwake && READ_ONCE(rtp->kthread_ptr))
|
2021-11-24 00:16:50 +00:00
|
|
|
irq_work_queue(&rtpcp->rtp_irq_work);
|
2020-03-02 19:59:20 +00:00
|
|
|
}
|
|
|
|
|
2020-03-03 19:49:21 +00:00
|
|
|
// Wait for a grace period for the specified flavor of Tasks RCU.
|
|
|
|
static void synchronize_rcu_tasks_generic(struct rcu_tasks *rtp)
|
2020-03-02 19:59:20 +00:00
|
|
|
{
|
|
|
|
/* Complain if the scheduler has not started. */
|
|
|
|
RCU_LOCKDEP_WARN(rcu_scheduler_active == RCU_SCHEDULER_INACTIVE,
|
|
|
|
"synchronize_rcu_tasks called too soon");
|
|
|
|
|
|
|
|
/* Wait for the grace period. */
|
2020-03-03 19:49:21 +00:00
|
|
|
wait_rcu_gp(rtp->call_func);
|
2020-03-02 19:59:20 +00:00
|
|
|
}
|
|
|
|
|
2021-11-11 22:53:43 +00:00
|
|
|
// RCU callback function for rcu_barrier_tasks_generic().
|
|
|
|
static void rcu_barrier_tasks_generic_cb(struct rcu_head *rhp)
|
|
|
|
{
|
|
|
|
struct rcu_tasks *rtp;
|
|
|
|
struct rcu_tasks_percpu *rtpcp;
|
|
|
|
|
|
|
|
rtpcp = container_of(rhp, struct rcu_tasks_percpu, barrier_q_head);
|
|
|
|
rtp = rtpcp->rtpp;
|
|
|
|
if (atomic_dec_and_test(&rtp->barrier_q_count))
|
|
|
|
complete(&rtp->barrier_q_completion);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for all in-flight callbacks for the specified RCU Tasks flavor.
|
|
|
|
// Operates in a manner similar to rcu_barrier().
|
|
|
|
static void rcu_barrier_tasks_generic(struct rcu_tasks *rtp)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
unsigned long flags;
|
|
|
|
struct rcu_tasks_percpu *rtpcp;
|
|
|
|
unsigned long s = rcu_seq_snap(&rtp->barrier_q_seq);
|
|
|
|
|
|
|
|
mutex_lock(&rtp->barrier_q_mutex);
|
|
|
|
if (rcu_seq_done(&rtp->barrier_q_seq, s)) {
|
|
|
|
smp_mb();
|
|
|
|
mutex_unlock(&rtp->barrier_q_mutex);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
rcu_seq_start(&rtp->barrier_q_seq);
|
|
|
|
init_completion(&rtp->barrier_q_completion);
|
|
|
|
atomic_set(&rtp->barrier_q_count, 2);
|
|
|
|
for_each_possible_cpu(cpu) {
|
2021-11-29 19:46:33 +00:00
|
|
|
if (cpu >= smp_load_acquire(&rtp->percpu_dequeue_lim))
|
2021-11-11 22:53:43 +00:00
|
|
|
break;
|
|
|
|
rtpcp = per_cpu_ptr(rtp->rtpcpu, cpu);
|
|
|
|
rtpcp->barrier_q_head.func = rcu_barrier_tasks_generic_cb;
|
|
|
|
raw_spin_lock_irqsave_rcu_node(rtpcp, flags);
|
|
|
|
if (rcu_segcblist_entrain(&rtpcp->cblist, &rtpcp->barrier_q_head))
|
|
|
|
atomic_inc(&rtp->barrier_q_count);
|
|
|
|
raw_spin_unlock_irqrestore_rcu_node(rtpcp, flags);
|
|
|
|
}
|
|
|
|
if (atomic_sub_and_test(2, &rtp->barrier_q_count))
|
|
|
|
complete(&rtp->barrier_q_completion);
|
|
|
|
wait_for_completion(&rtp->barrier_q_completion);
|
|
|
|
rcu_seq_end(&rtp->barrier_q_seq);
|
|
|
|
mutex_unlock(&rtp->barrier_q_mutex);
|
|
|
|
}
|
|
|
|
|
2021-11-09 21:37:34 +00:00
|
|
|
// Advance callbacks and indicate whether either a grace period or
|
|
|
|
// callback invocation is needed.
|
|
|
|
static int rcu_tasks_need_gpcb(struct rcu_tasks *rtp)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
unsigned long flags;
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
long n;
|
|
|
|
long ncbs = 0;
|
|
|
|
long ncbsnz = 0;
|
2021-11-09 21:37:34 +00:00
|
|
|
int needgpcb = 0;
|
|
|
|
|
2021-11-29 19:46:33 +00:00
|
|
|
for (cpu = 0; cpu < smp_load_acquire(&rtp->percpu_dequeue_lim); cpu++) {
|
2021-11-09 21:37:34 +00:00
|
|
|
struct rcu_tasks_percpu *rtpcp = per_cpu_ptr(rtp->rtpcpu, cpu);
|
|
|
|
|
|
|
|
/* Advance and accelerate any new callbacks. */
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
if (!rcu_segcblist_n_cbs(&rtpcp->cblist))
|
2021-11-09 21:37:34 +00:00
|
|
|
continue;
|
|
|
|
raw_spin_lock_irqsave_rcu_node(rtpcp, flags);
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
// Should we shrink down to a single callback queue?
|
|
|
|
n = rcu_segcblist_n_cbs(&rtpcp->cblist);
|
|
|
|
if (n) {
|
|
|
|
ncbs += n;
|
|
|
|
if (cpu > 0)
|
|
|
|
ncbsnz += n;
|
|
|
|
}
|
2021-11-09 21:37:34 +00:00
|
|
|
rcu_segcblist_advance(&rtpcp->cblist, rcu_seq_current(&rtp->tasks_gp_seq));
|
|
|
|
(void)rcu_segcblist_accelerate(&rtpcp->cblist, rcu_seq_snap(&rtp->tasks_gp_seq));
|
|
|
|
if (rcu_segcblist_pend_cbs(&rtpcp->cblist))
|
|
|
|
needgpcb |= 0x3;
|
|
|
|
if (!rcu_segcblist_empty(&rtpcp->cblist))
|
|
|
|
needgpcb |= 0x1;
|
|
|
|
raw_spin_unlock_irqrestore_rcu_node(rtpcp, flags);
|
|
|
|
}
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
|
|
|
|
// Shrink down to a single callback queue if appropriate.
|
|
|
|
// This is done in two stages: (1) If there are no more than
|
|
|
|
// rcu_task_collapse_lim callbacks on CPU 0 and none on any other
|
|
|
|
// CPU, limit enqueueing to CPU 0. (2) After an RCU grace period,
|
|
|
|
// if there has not been an increase in callbacks, limit dequeuing
|
|
|
|
// to CPU 0. Note the matching RCU read-side critical section in
|
|
|
|
// call_rcu_tasks_generic().
|
|
|
|
if (rcu_task_cb_adjust && ncbs <= rcu_task_collapse_lim) {
|
|
|
|
raw_spin_lock_irqsave(&rtp->cbs_gbl_lock, flags);
|
|
|
|
if (rtp->percpu_enqueue_lim > 1) {
|
2022-02-02 23:42:36 +00:00
|
|
|
WRITE_ONCE(rtp->percpu_enqueue_shift, order_base_2(nr_cpu_ids));
|
rcu-tasks: Use fewer callbacks queues if callback flood ends
By default, when lock contention is encountered, the RCU Tasks flavors
of RCU switch to using per-CPU queueing. However, if the callback
flood ends, per-CPU queueing continues to be used, which introduces
significant additional overhead, especially for callback invocation,
which fans out a series of workqueue handlers.
This commit therefore switches back to single-queue operation if at the
beginning of a grace period there are very few callbacks. The definition
of "very few" is set by the rcupdate.rcu_task_collapse_lim module
parameter, which defaults to 10. This switch happens in two phases,
with the first phase causing future callbacks to be enqueued on CPU 0's
queue, but with all queues continuing to be checked for grace periods
and callback invocation. The second phase checks to see if an RCU grace
period has elapsed and if all remaining RCU-Tasks callbacks are queued
on CPU 0. If so, only CPU 0 is checked for future grace periods and
callback operation.
Of course, the return of contention anywhere during this process will
result in returning to per-CPU callback queueing.
Reported-by: Martin Lau <kafai@fb.com>
Cc: Neeraj Upadhyay <neeraj.iitr10@gmail.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-11-30 00:52:31 +00:00
|
|
|
smp_store_release(&rtp->percpu_enqueue_lim, 1);
|
|
|
|
rtp->percpu_dequeue_gpseq = get_state_synchronize_rcu();
|
|
|
|
pr_info("Starting switch %s to CPU-0 callback queuing.\n", rtp->name);
|
|
|
|
}
|
|
|
|
raw_spin_unlock_irqrestore(&rtp->cbs_gbl_lock, flags);
|
|
|
|
}
|
|
|
|
if (rcu_task_cb_adjust && !ncbsnz &&
|
|
|
|
poll_state_synchronize_rcu(rtp->percpu_dequeue_gpseq)) {
|
|
|
|
raw_spin_lock_irqsave(&rtp->cbs_gbl_lock, flags);
|
|
|
|
if (rtp->percpu_enqueue_lim < rtp->percpu_dequeue_lim) {
|
|
|
|
WRITE_ONCE(rtp->percpu_dequeue_lim, 1);
|
|
|
|
pr_info("Completing switch %s to CPU-0 callback queuing.\n", rtp->name);
|
|
|
|
}
|
|
|
|
raw_spin_unlock_irqrestore(&rtp->cbs_gbl_lock, flags);
|
|
|
|
}
|
|
|
|
|
2021-11-09 21:37:34 +00:00
|
|
|
return needgpcb;
|
|
|
|
}
|
|
|
|
|
2021-11-09 23:34:56 +00:00
|
|
|
// Advance callbacks and invoke any that are ready.
|
2021-11-10 23:56:40 +00:00
|
|
|
static void rcu_tasks_invoke_cbs(struct rcu_tasks *rtp, struct rcu_tasks_percpu *rtpcp)
|
2020-03-02 19:59:20 +00:00
|
|
|
{
|
2021-11-09 23:34:56 +00:00
|
|
|
int cpu;
|
2021-11-10 23:56:40 +00:00
|
|
|
int cpunext;
|
2020-03-02 19:59:20 +00:00
|
|
|
unsigned long flags;
|
2021-11-09 00:18:57 +00:00
|
|
|
int len;
|
|
|
|
struct rcu_head *rhp;
|
2021-11-10 23:56:40 +00:00
|
|
|
struct rcu_cblist rcl = RCU_CBLIST_INITIALIZER(rcl);
|
|
|
|
struct rcu_tasks_percpu *rtpcp_next;
|
|
|
|
|
|
|
|
cpu = rtpcp->cpu;
|
|
|
|
cpunext = cpu * 2 + 1;
|
2021-11-29 19:46:33 +00:00
|
|
|
if (cpunext < smp_load_acquire(&rtp->percpu_dequeue_lim)) {
|
2021-11-10 23:56:40 +00:00
|
|
|
rtpcp_next = per_cpu_ptr(rtp->rtpcpu, cpunext);
|
|
|
|
queue_work_on(cpunext, system_wq, &rtpcp_next->rtp_work);
|
|
|
|
cpunext++;
|
2021-11-29 19:46:33 +00:00
|
|
|
if (cpunext < smp_load_acquire(&rtp->percpu_dequeue_lim)) {
|
2021-11-10 23:56:40 +00:00
|
|
|
rtpcp_next = per_cpu_ptr(rtp->rtpcpu, cpunext);
|
|
|
|
queue_work_on(cpunext, system_wq, &rtpcp_next->rtp_work);
|
2021-11-09 23:34:56 +00:00
|
|
|
}
|
|
|
|
}
|
2021-11-10 23:56:40 +00:00
|
|
|
|
|
|
|
if (rcu_segcblist_empty(&rtpcp->cblist))
|
|
|
|
return;
|
|
|
|
raw_spin_lock_irqsave_rcu_node(rtpcp, flags);
|
|
|
|
rcu_segcblist_advance(&rtpcp->cblist, rcu_seq_current(&rtp->tasks_gp_seq));
|
|
|
|
rcu_segcblist_extract_done_cbs(&rtpcp->cblist, &rcl);
|
|
|
|
raw_spin_unlock_irqrestore_rcu_node(rtpcp, flags);
|
|
|
|
len = rcl.len;
|
|
|
|
for (rhp = rcu_cblist_dequeue(&rcl); rhp; rhp = rcu_cblist_dequeue(&rcl)) {
|
|
|
|
local_bh_disable();
|
|
|
|
rhp->func(rhp);
|
|
|
|
local_bh_enable();
|
|
|
|
cond_resched();
|
|
|
|
}
|
|
|
|
raw_spin_lock_irqsave_rcu_node(rtpcp, flags);
|
|
|
|
rcu_segcblist_add_len(&rtpcp->cblist, -len);
|
|
|
|
(void)rcu_segcblist_accelerate(&rtpcp->cblist, rcu_seq_snap(&rtp->tasks_gp_seq));
|
|
|
|
raw_spin_unlock_irqrestore_rcu_node(rtpcp, flags);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Workqueue flood to advance callbacks and invoke any that are ready.
|
|
|
|
static void rcu_tasks_invoke_cbs_wq(struct work_struct *wp)
|
|
|
|
{
|
|
|
|
struct rcu_tasks *rtp;
|
|
|
|
struct rcu_tasks_percpu *rtpcp = container_of(wp, struct rcu_tasks_percpu, rtp_work);
|
|
|
|
|
|
|
|
rtp = rtpcp->rtpp;
|
|
|
|
rcu_tasks_invoke_cbs(rtp, rtpcp);
|
2021-11-09 23:34:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* RCU-tasks kthread that detects grace periods and invokes callbacks. */
|
|
|
|
static int __noreturn rcu_tasks_kthread(void *arg)
|
|
|
|
{
|
|
|
|
int needgpcb;
|
2020-03-02 23:16:57 +00:00
|
|
|
struct rcu_tasks *rtp = arg;
|
2020-03-02 19:59:20 +00:00
|
|
|
|
|
|
|
/* Run on housekeeping CPUs by default. Sysadm can move if desired. */
|
|
|
|
housekeeping_affine(current, HK_FLAG_RCU);
|
2020-03-02 23:16:57 +00:00
|
|
|
WRITE_ONCE(rtp->kthread_ptr, current); // Let GPs start!
|
2020-03-02 19:59:20 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Each pass through the following loop makes one check for
|
|
|
|
* newly arrived callbacks, and, if there are some, waits for
|
|
|
|
* one RCU-tasks grace period and then invokes the callbacks.
|
|
|
|
* This loop is terminated by the system going down. ;-)
|
|
|
|
*/
|
|
|
|
for (;;) {
|
2021-08-11 16:07:44 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_WAIT_CBS);
|
2020-03-02 19:59:20 +00:00
|
|
|
|
|
|
|
/* If there were none, wait a bit and start over. */
|
2021-11-09 21:37:34 +00:00
|
|
|
wait_event_idle(rtp->cbs_wq, (needgpcb = rcu_tasks_need_gpcb(rtp)));
|
2020-03-02 19:59:20 +00:00
|
|
|
|
2021-11-09 21:37:34 +00:00
|
|
|
if (needgpcb & 0x2) {
|
|
|
|
// Wait for one grace period.
|
|
|
|
set_tasks_gp_state(rtp, RTGS_WAIT_GP);
|
|
|
|
rtp->gp_start = jiffies;
|
|
|
|
rcu_seq_start(&rtp->tasks_gp_seq);
|
|
|
|
rtp->gp_func(rtp);
|
|
|
|
rcu_seq_end(&rtp->tasks_gp_seq);
|
|
|
|
}
|
2020-03-02 19:59:20 +00:00
|
|
|
|
2021-11-09 23:34:56 +00:00
|
|
|
/* Invoke callbacks. */
|
2020-03-16 19:13:33 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_INVOKE_CBS);
|
2021-11-10 23:56:40 +00:00
|
|
|
rcu_tasks_invoke_cbs(rtp, per_cpu_ptr(rtp->rtpcpu, 0));
|
2021-11-09 23:34:56 +00:00
|
|
|
|
2020-03-02 19:59:20 +00:00
|
|
|
/* Paranoid sleep to keep this from entering a tight loop */
|
2020-09-10 05:05:41 +00:00
|
|
|
schedule_timeout_idle(rtp->gp_sleep);
|
2020-03-02 19:59:20 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-12-09 20:27:31 +00:00
|
|
|
/* Spawn RCU-tasks grace-period kthread. */
|
2020-03-03 19:49:21 +00:00
|
|
|
static void __init rcu_spawn_tasks_kthread_generic(struct rcu_tasks *rtp)
|
2020-03-02 19:59:20 +00:00
|
|
|
{
|
|
|
|
struct task_struct *t;
|
|
|
|
|
2020-03-03 23:50:31 +00:00
|
|
|
t = kthread_run(rcu_tasks_kthread, rtp, "%s_kthread", rtp->kname);
|
|
|
|
if (WARN_ONCE(IS_ERR(t), "%s: Could not start %s grace-period kthread, OOM is now expected behavior\n", __func__, rtp->name))
|
2020-03-03 19:49:21 +00:00
|
|
|
return;
|
2020-03-02 19:59:20 +00:00
|
|
|
smp_mb(); /* Ensure others see full kthread. */
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifndef CONFIG_TINY_RCU
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Print any non-default Tasks RCU settings.
|
|
|
|
*/
|
|
|
|
static void __init rcu_tasks_bootup_oddness(void)
|
|
|
|
{
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
#if defined(CONFIG_TASKS_RCU) || defined(CONFIG_TASKS_TRACE_RCU)
|
2020-03-02 19:59:20 +00:00
|
|
|
if (rcu_task_stall_timeout != RCU_TASK_STALL_TIMEOUT)
|
|
|
|
pr_info("\tTasks-RCU CPU stall warnings timeout set to %d (rcu_task_stall_timeout).\n", rcu_task_stall_timeout);
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
#endif /* #ifdef CONFIG_TASKS_RCU */
|
|
|
|
#ifdef CONFIG_TASKS_RCU
|
|
|
|
pr_info("\tTrampoline variant of Tasks RCU enabled.\n");
|
2020-03-02 19:59:20 +00:00
|
|
|
#endif /* #ifdef CONFIG_TASKS_RCU */
|
2020-03-03 05:06:43 +00:00
|
|
|
#ifdef CONFIG_TASKS_RUDE_RCU
|
|
|
|
pr_info("\tRude variant of Tasks RCU enabled.\n");
|
|
|
|
#endif /* #ifdef CONFIG_TASKS_RUDE_RCU */
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
#ifdef CONFIG_TASKS_TRACE_RCU
|
|
|
|
pr_info("\tTracing variant of Tasks RCU enabled.\n");
|
|
|
|
#endif /* #ifdef CONFIG_TASKS_TRACE_RCU */
|
2020-03-02 19:59:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* #ifndef CONFIG_TINY_RCU */
|
2020-03-03 19:49:21 +00:00
|
|
|
|
2020-05-29 03:03:48 +00:00
|
|
|
#ifndef CONFIG_TINY_RCU
|
2020-03-16 18:01:55 +00:00
|
|
|
/* Dump out rcutorture-relevant state common to all RCU-tasks flavors. */
|
|
|
|
static void show_rcu_tasks_generic_gp_kthread(struct rcu_tasks *rtp, char *s)
|
|
|
|
{
|
2021-11-06 04:52:00 +00:00
|
|
|
struct rcu_tasks_percpu *rtpcp = per_cpu_ptr(rtp->rtpcpu, 0); // for_each...
|
2020-03-25 21:36:05 +00:00
|
|
|
pr_info("%s: %s(%d) since %lu g:%lu i:%lu/%lu %c%c %s\n",
|
2020-03-16 18:01:55 +00:00
|
|
|
rtp->kname,
|
2020-03-25 21:36:05 +00:00
|
|
|
tasks_gp_state_getname(rtp), data_race(rtp->gp_state),
|
2020-03-16 19:13:33 +00:00
|
|
|
jiffies - data_race(rtp->gp_jiffies),
|
2021-11-08 22:14:43 +00:00
|
|
|
data_race(rcu_seq_current(&rtp->tasks_gp_seq)),
|
2020-03-25 21:36:05 +00:00
|
|
|
data_race(rtp->n_ipis_fails), data_race(rtp->n_ipis),
|
2020-03-16 18:01:55 +00:00
|
|
|
".k"[!!data_race(rtp->kthread_ptr)],
|
2021-11-09 00:18:57 +00:00
|
|
|
".C"[!data_race(rcu_segcblist_empty(&rtpcp->cblist))],
|
2020-03-16 18:01:55 +00:00
|
|
|
s);
|
|
|
|
}
|
2020-09-16 00:08:03 +00:00
|
|
|
#endif // #ifndef CONFIG_TINY_RCU
|
2020-03-16 18:01:55 +00:00
|
|
|
|
2020-04-06 03:49:13 +00:00
|
|
|
static void exit_tasks_rcu_finish_trace(struct task_struct *t);
|
|
|
|
|
|
|
|
#if defined(CONFIG_TASKS_RCU) || defined(CONFIG_TASKS_TRACE_RCU)
|
2020-03-03 19:49:21 +00:00
|
|
|
|
2020-03-06 01:07:07 +00:00
|
|
|
////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// Shared code between task-list-scanning variants of Tasks RCU.
|
|
|
|
|
|
|
|
/* Wait for one RCU-tasks grace period. */
|
|
|
|
static void rcu_tasks_wait_gp(struct rcu_tasks *rtp)
|
|
|
|
{
|
|
|
|
struct task_struct *g, *t;
|
|
|
|
unsigned long lastreport;
|
|
|
|
LIST_HEAD(holdouts);
|
|
|
|
int fract;
|
|
|
|
|
2020-03-16 19:13:33 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_PRE_WAIT_GP);
|
2020-03-06 01:07:07 +00:00
|
|
|
rtp->pregp_func();
|
|
|
|
|
|
|
|
/*
|
|
|
|
* There were callbacks, so we need to wait for an RCU-tasks
|
|
|
|
* grace period. Start off by scanning the task list for tasks
|
|
|
|
* that are not already voluntarily blocked. Mark these tasks
|
|
|
|
* and make a list of them in holdouts.
|
|
|
|
*/
|
2020-03-16 19:13:33 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_SCAN_TASKLIST);
|
2020-03-06 01:07:07 +00:00
|
|
|
rcu_read_lock();
|
|
|
|
for_each_process_thread(g, t)
|
|
|
|
rtp->pertask_func(t, &holdouts);
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
2020-03-16 19:13:33 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_POST_SCAN_TASKLIST);
|
2020-03-22 20:18:54 +00:00
|
|
|
rtp->postscan_func(&holdouts);
|
2020-03-06 01:07:07 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Each pass through the following loop scans the list of holdout
|
|
|
|
* tasks, removing any that are no longer holdouts. When the list
|
|
|
|
* is empty, we are done.
|
|
|
|
*/
|
|
|
|
lastreport = jiffies;
|
|
|
|
|
2020-09-10 04:36:34 +00:00
|
|
|
// Start off with initial wait and slowly back off to 1 HZ wait.
|
|
|
|
fract = rtp->init_fract;
|
2020-03-06 01:07:07 +00:00
|
|
|
|
2020-09-15 22:41:50 +00:00
|
|
|
while (!list_empty(&holdouts)) {
|
2020-03-06 01:07:07 +00:00
|
|
|
bool firstreport;
|
|
|
|
bool needreport;
|
|
|
|
int rtst;
|
|
|
|
|
|
|
|
/* Slowly back off waiting for holdouts */
|
2020-03-16 19:13:33 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_WAIT_SCAN_HOLDOUTS);
|
2020-09-17 23:17:17 +00:00
|
|
|
schedule_timeout_idle(fract);
|
2020-03-06 01:07:07 +00:00
|
|
|
|
2020-09-17 23:17:17 +00:00
|
|
|
if (fract < HZ)
|
|
|
|
fract++;
|
2020-03-06 01:07:07 +00:00
|
|
|
|
|
|
|
rtst = READ_ONCE(rcu_task_stall_timeout);
|
|
|
|
needreport = rtst > 0 && time_after(jiffies, lastreport + rtst);
|
|
|
|
if (needreport)
|
|
|
|
lastreport = jiffies;
|
|
|
|
firstreport = true;
|
|
|
|
WARN_ON(signal_pending(current));
|
2020-03-16 19:13:33 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_SCAN_HOLDOUTS);
|
2020-03-06 01:07:07 +00:00
|
|
|
rtp->holdouts_func(&holdouts, needreport, &firstreport);
|
|
|
|
}
|
|
|
|
|
2020-03-16 19:13:33 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_POST_GP);
|
|
|
|
rtp->postgp_func(rtp);
|
2020-03-06 01:07:07 +00:00
|
|
|
}
|
|
|
|
|
2020-04-06 03:49:13 +00:00
|
|
|
#endif /* #if defined(CONFIG_TASKS_RCU) || defined(CONFIG_TASKS_TRACE_RCU) */
|
|
|
|
|
|
|
|
#ifdef CONFIG_TASKS_RCU
|
|
|
|
|
2020-03-03 19:49:21 +00:00
|
|
|
////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// Simple variant of RCU whose quiescent states are voluntary context
|
2021-09-15 16:24:18 +00:00
|
|
|
// switch, cond_resched_tasks_rcu_qs(), user-space execution, and idle.
|
2020-03-03 19:49:21 +00:00
|
|
|
// As such, grace periods can take one good long time. There are no
|
|
|
|
// read-side primitives similar to rcu_read_lock() and rcu_read_unlock()
|
|
|
|
// because this implementation is intended to get the system into a safe
|
|
|
|
// state for some of the manipulations involved in tracing and the like.
|
|
|
|
// Finally, this implementation does not support high call_rcu_tasks()
|
|
|
|
// rates from multiple CPUs. If this is required, per-CPU callback lists
|
|
|
|
// will be needed.
|
2021-03-04 22:41:47 +00:00
|
|
|
//
|
|
|
|
// The implementation uses rcu_tasks_wait_gp(), which relies on function
|
|
|
|
// pointers in the rcu_tasks structure. The rcu_spawn_tasks_kthread()
|
|
|
|
// function sets these function pointers up so that rcu_tasks_wait_gp()
|
|
|
|
// invokes these functions in this order:
|
|
|
|
//
|
|
|
|
// rcu_tasks_pregp_step():
|
|
|
|
// Invokes synchronize_rcu() in order to wait for all in-flight
|
|
|
|
// t->on_rq and t->nvcsw transitions to complete. This works because
|
|
|
|
// all such transitions are carried out with interrupts disabled.
|
|
|
|
// rcu_tasks_pertask(), invoked on every non-idle task:
|
|
|
|
// For every runnable non-idle task other than the current one, use
|
|
|
|
// get_task_struct() to pin down that task, snapshot that task's
|
|
|
|
// number of voluntary context switches, and add that task to the
|
|
|
|
// holdout list.
|
|
|
|
// rcu_tasks_postscan():
|
|
|
|
// Invoke synchronize_srcu() to ensure that all tasks that were
|
|
|
|
// in the process of exiting (and which thus might not know to
|
|
|
|
// synchronize with this RCU Tasks grace period) have completed
|
|
|
|
// exiting.
|
|
|
|
// check_all_holdout_tasks(), repeatedly until holdout list is empty:
|
|
|
|
// Scans the holdout list, attempting to identify a quiescent state
|
|
|
|
// for each task on the list. If there is a quiescent state, the
|
|
|
|
// corresponding task is removed from the holdout list.
|
|
|
|
// rcu_tasks_postgp():
|
|
|
|
// Invokes synchronize_rcu() in order to ensure that all prior
|
|
|
|
// t->on_rq and t->nvcsw transitions are seen by all CPUs and tasks
|
|
|
|
// to have happened before the end of this RCU Tasks grace period.
|
|
|
|
// Again, this works because all such transitions are carried out
|
|
|
|
// with interrupts disabled.
|
|
|
|
//
|
|
|
|
// For each exiting task, the exit_tasks_rcu_start() and
|
|
|
|
// exit_tasks_rcu_finish() functions begin and end, respectively, the SRCU
|
|
|
|
// read-side critical sections waited for by rcu_tasks_postscan().
|
|
|
|
//
|
2021-11-09 00:52:02 +00:00
|
|
|
// Pre-grace-period update-side code is ordered before the grace
|
|
|
|
// via the raw_spin_lock.*rcu_node(). Pre-grace-period read-side code
|
|
|
|
// is ordered before the grace period via synchronize_rcu() call in
|
|
|
|
// rcu_tasks_pregp_step() and by the scheduler's locks and interrupt
|
2021-03-04 22:41:47 +00:00
|
|
|
// disabling.
|
2020-03-03 19:49:21 +00:00
|
|
|
|
2020-03-05 01:31:43 +00:00
|
|
|
/* Pre-grace-period preparation. */
|
|
|
|
static void rcu_tasks_pregp_step(void)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Wait for all pre-existing t->on_rq and t->nvcsw transitions
|
|
|
|
* to complete. Invoking synchronize_rcu() suffices because all
|
|
|
|
* these transitions occur with interrupts disabled. Without this
|
|
|
|
* synchronize_rcu(), a read-side critical section that started
|
|
|
|
* before the grace period might be incorrectly seen as having
|
|
|
|
* started after the grace period.
|
|
|
|
*
|
|
|
|
* This synchronize_rcu() also dispenses with the need for a
|
|
|
|
* memory barrier on the first store to t->rcu_tasks_holdout,
|
|
|
|
* as it forces the store to happen after the beginning of the
|
|
|
|
* grace period.
|
|
|
|
*/
|
|
|
|
synchronize_rcu();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Per-task initial processing. */
|
|
|
|
static void rcu_tasks_pertask(struct task_struct *t, struct list_head *hop)
|
|
|
|
{
|
|
|
|
if (t != current && READ_ONCE(t->on_rq) && !is_idle_task(t)) {
|
|
|
|
get_task_struct(t);
|
|
|
|
t->rcu_tasks_nvcsw = READ_ONCE(t->nvcsw);
|
|
|
|
WRITE_ONCE(t->rcu_tasks_holdout, true);
|
|
|
|
list_add(&t->rcu_tasks_holdout_list, hop);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Processing between scanning taskslist and draining the holdout list. */
|
2020-05-29 02:27:06 +00:00
|
|
|
static void rcu_tasks_postscan(struct list_head *hop)
|
2020-03-05 01:31:43 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Wait for tasks that are in the process of exiting. This
|
|
|
|
* does only part of the job, ensuring that all tasks that were
|
|
|
|
* previously exiting reach the point where they have disabled
|
|
|
|
* preemption, allowing the later synchronize_rcu() to finish
|
|
|
|
* the job.
|
|
|
|
*/
|
|
|
|
synchronize_srcu(&tasks_rcu_exit_srcu);
|
|
|
|
}
|
|
|
|
|
2020-03-03 19:49:21 +00:00
|
|
|
/* See if tasks are still holding out, complain if so. */
|
|
|
|
static void check_holdout_task(struct task_struct *t,
|
|
|
|
bool needreport, bool *firstreport)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
if (!READ_ONCE(t->rcu_tasks_holdout) ||
|
|
|
|
t->rcu_tasks_nvcsw != READ_ONCE(t->nvcsw) ||
|
|
|
|
!READ_ONCE(t->on_rq) ||
|
|
|
|
(IS_ENABLED(CONFIG_NO_HZ_FULL) &&
|
|
|
|
!is_idle_task(t) && t->rcu_tasks_idle_cpu >= 0)) {
|
|
|
|
WRITE_ONCE(t->rcu_tasks_holdout, false);
|
|
|
|
list_del_init(&t->rcu_tasks_holdout_list);
|
|
|
|
put_task_struct(t);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
rcu_request_urgent_qs_task(t);
|
|
|
|
if (!needreport)
|
|
|
|
return;
|
|
|
|
if (*firstreport) {
|
|
|
|
pr_err("INFO: rcu_tasks detected stalls on tasks:\n");
|
|
|
|
*firstreport = false;
|
|
|
|
}
|
|
|
|
cpu = task_cpu(t);
|
|
|
|
pr_alert("%p: %c%c nvcsw: %lu/%lu holdout: %d idle_cpu: %d/%d\n",
|
|
|
|
t, ".I"[is_idle_task(t)],
|
|
|
|
"N."[cpu < 0 || !tick_nohz_full_cpu(cpu)],
|
|
|
|
t->rcu_tasks_nvcsw, t->nvcsw, t->rcu_tasks_holdout,
|
|
|
|
t->rcu_tasks_idle_cpu, cpu);
|
|
|
|
sched_show_task(t);
|
|
|
|
}
|
|
|
|
|
2020-03-05 01:31:43 +00:00
|
|
|
/* Scan the holdout lists for tasks no longer holding out. */
|
|
|
|
static void check_all_holdout_tasks(struct list_head *hop,
|
|
|
|
bool needreport, bool *firstreport)
|
|
|
|
{
|
|
|
|
struct task_struct *t, *t1;
|
|
|
|
|
|
|
|
list_for_each_entry_safe(t, t1, hop, rcu_tasks_holdout_list) {
|
|
|
|
check_holdout_task(t, needreport, firstreport);
|
|
|
|
cond_resched();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Finish off the Tasks-RCU grace period. */
|
2020-03-16 19:13:33 +00:00
|
|
|
static void rcu_tasks_postgp(struct rcu_tasks *rtp)
|
2020-03-05 01:31:43 +00:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Because ->on_rq and ->nvcsw are not guaranteed to have a full
|
|
|
|
* memory barriers prior to them in the schedule() path, memory
|
|
|
|
* reordering on other CPUs could cause their RCU-tasks read-side
|
|
|
|
* critical sections to extend past the end of the grace period.
|
|
|
|
* However, because these ->nvcsw updates are carried out with
|
|
|
|
* interrupts disabled, we can use synchronize_rcu() to force the
|
|
|
|
* needed ordering on all such CPUs.
|
|
|
|
*
|
|
|
|
* This synchronize_rcu() also confines all ->rcu_tasks_holdout
|
|
|
|
* accesses to be within the grace period, avoiding the need for
|
|
|
|
* memory barriers for ->rcu_tasks_holdout accesses.
|
|
|
|
*
|
|
|
|
* In addition, this synchronize_rcu() waits for exiting tasks
|
|
|
|
* to complete their final preempt_disable() region of execution,
|
|
|
|
* cleaning up after the synchronize_srcu() above.
|
|
|
|
*/
|
|
|
|
synchronize_rcu();
|
|
|
|
}
|
|
|
|
|
2020-03-03 19:49:21 +00:00
|
|
|
void call_rcu_tasks(struct rcu_head *rhp, rcu_callback_t func);
|
2020-03-03 23:50:31 +00:00
|
|
|
DEFINE_RCU_TASKS(rcu_tasks, rcu_tasks_wait_gp, call_rcu_tasks, "RCU Tasks");
|
2020-03-03 19:49:21 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* call_rcu_tasks() - Queue an RCU for invocation task-based grace period
|
|
|
|
* @rhp: structure to be used for queueing the RCU updates.
|
|
|
|
* @func: actual callback function to be invoked after the grace period
|
|
|
|
*
|
|
|
|
* The callback function will be invoked some time after a full grace
|
|
|
|
* period elapses, in other words after all currently executing RCU
|
|
|
|
* read-side critical sections have completed. call_rcu_tasks() assumes
|
|
|
|
* that the read-side critical sections end at a voluntary context
|
2021-09-15 16:24:18 +00:00
|
|
|
* switch (not a preemption!), cond_resched_tasks_rcu_qs(), entry into idle,
|
2020-03-03 19:49:21 +00:00
|
|
|
* or transition to usermode execution. As such, there are no read-side
|
|
|
|
* primitives analogous to rcu_read_lock() and rcu_read_unlock() because
|
|
|
|
* this primitive is intended to determine that all tasks have passed
|
2021-03-23 05:29:10 +00:00
|
|
|
* through a safe state, not so much for data-structure synchronization.
|
2020-03-03 19:49:21 +00:00
|
|
|
*
|
|
|
|
* See the description of call_rcu() for more detailed information on
|
|
|
|
* memory ordering guarantees.
|
|
|
|
*/
|
|
|
|
void call_rcu_tasks(struct rcu_head *rhp, rcu_callback_t func)
|
|
|
|
{
|
|
|
|
call_rcu_tasks_generic(rhp, func, &rcu_tasks);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(call_rcu_tasks);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* synchronize_rcu_tasks - wait until an rcu-tasks grace period has elapsed.
|
|
|
|
*
|
|
|
|
* Control will return to the caller some time after a full rcu-tasks
|
|
|
|
* grace period has elapsed, in other words after all currently
|
|
|
|
* executing rcu-tasks read-side critical sections have elapsed. These
|
|
|
|
* read-side critical sections are delimited by calls to schedule(),
|
|
|
|
* cond_resched_tasks_rcu_qs(), idle execution, userspace execution, calls
|
|
|
|
* to synchronize_rcu_tasks(), and (in theory, anyway) cond_resched().
|
|
|
|
*
|
|
|
|
* This is a very specialized primitive, intended only for a few uses in
|
|
|
|
* tracing and other situations requiring manipulation of function
|
|
|
|
* preambles and profiling hooks. The synchronize_rcu_tasks() function
|
|
|
|
* is not (yet) intended for heavy use from multiple CPUs.
|
|
|
|
*
|
|
|
|
* See the description of synchronize_rcu() for more detailed information
|
|
|
|
* on memory ordering guarantees.
|
|
|
|
*/
|
|
|
|
void synchronize_rcu_tasks(void)
|
|
|
|
{
|
|
|
|
synchronize_rcu_tasks_generic(&rcu_tasks);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(synchronize_rcu_tasks);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rcu_barrier_tasks - Wait for in-flight call_rcu_tasks() callbacks.
|
|
|
|
*
|
|
|
|
* Although the current implementation is guaranteed to wait, it is not
|
|
|
|
* obligated to, for example, if there are no pending callbacks.
|
|
|
|
*/
|
|
|
|
void rcu_barrier_tasks(void)
|
|
|
|
{
|
2021-11-11 22:53:43 +00:00
|
|
|
rcu_barrier_tasks_generic(&rcu_tasks);
|
2020-03-03 19:49:21 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(rcu_barrier_tasks);
|
|
|
|
|
|
|
|
static int __init rcu_spawn_tasks_kthread(void)
|
|
|
|
{
|
2021-11-06 04:52:00 +00:00
|
|
|
cblist_init_generic(&rcu_tasks);
|
2020-09-10 05:05:41 +00:00
|
|
|
rcu_tasks.gp_sleep = HZ / 10;
|
2020-09-17 23:17:17 +00:00
|
|
|
rcu_tasks.init_fract = HZ / 10;
|
2020-03-05 01:31:43 +00:00
|
|
|
rcu_tasks.pregp_func = rcu_tasks_pregp_step;
|
|
|
|
rcu_tasks.pertask_func = rcu_tasks_pertask;
|
|
|
|
rcu_tasks.postscan_func = rcu_tasks_postscan;
|
|
|
|
rcu_tasks.holdouts_func = check_all_holdout_tasks;
|
|
|
|
rcu_tasks.postgp_func = rcu_tasks_postgp;
|
2020-03-03 19:49:21 +00:00
|
|
|
rcu_spawn_tasks_kthread_generic(&rcu_tasks);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-16 00:08:03 +00:00
|
|
|
#if !defined(CONFIG_TINY_RCU)
|
|
|
|
void show_rcu_tasks_classic_gp_kthread(void)
|
2020-03-16 18:01:55 +00:00
|
|
|
{
|
|
|
|
show_rcu_tasks_generic_gp_kthread(&rcu_tasks, "");
|
|
|
|
}
|
2020-09-16 00:08:03 +00:00
|
|
|
EXPORT_SYMBOL_GPL(show_rcu_tasks_classic_gp_kthread);
|
|
|
|
#endif // !defined(CONFIG_TINY_RCU)
|
2020-03-16 18:01:55 +00:00
|
|
|
|
2020-04-06 03:49:13 +00:00
|
|
|
/* Do the srcu_read_lock() for the above synchronize_srcu(). */
|
|
|
|
void exit_tasks_rcu_start(void) __acquires(&tasks_rcu_exit_srcu)
|
|
|
|
{
|
|
|
|
preempt_disable();
|
|
|
|
current->rcu_tasks_idx = __srcu_read_lock(&tasks_rcu_exit_srcu);
|
|
|
|
preempt_enable();
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Do the srcu_read_unlock() for the above synchronize_srcu(). */
|
|
|
|
void exit_tasks_rcu_finish(void) __releases(&tasks_rcu_exit_srcu)
|
|
|
|
{
|
|
|
|
struct task_struct *t = current;
|
|
|
|
|
|
|
|
preempt_disable();
|
|
|
|
__srcu_read_unlock(&tasks_rcu_exit_srcu, t->rcu_tasks_idx);
|
|
|
|
preempt_enable();
|
|
|
|
exit_tasks_rcu_finish_trace(t);
|
|
|
|
}
|
|
|
|
|
2020-03-16 18:01:55 +00:00
|
|
|
#else /* #ifdef CONFIG_TASKS_RCU */
|
2020-04-06 03:49:13 +00:00
|
|
|
void exit_tasks_rcu_start(void) { }
|
|
|
|
void exit_tasks_rcu_finish(void) { exit_tasks_rcu_finish_trace(current); }
|
2020-03-16 18:01:55 +00:00
|
|
|
#endif /* #else #ifdef CONFIG_TASKS_RCU */
|
2020-03-03 05:06:43 +00:00
|
|
|
|
|
|
|
#ifdef CONFIG_TASKS_RUDE_RCU
|
|
|
|
|
|
|
|
////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// "Rude" variant of Tasks RCU, inspired by Steve Rostedt's trick of
|
|
|
|
// passing an empty function to schedule_on_each_cpu(). This approach
|
2021-06-22 18:57:15 +00:00
|
|
|
// provides an asynchronous call_rcu_tasks_rude() API and batching of
|
|
|
|
// concurrent calls to the synchronous synchronize_rcu_tasks_rude() API.
|
2021-03-04 22:46:59 +00:00
|
|
|
// This invokes schedule_on_each_cpu() in order to send IPIs far and wide
|
|
|
|
// and induces otherwise unnecessary context switches on all online CPUs,
|
|
|
|
// whether idle or not.
|
|
|
|
//
|
|
|
|
// Callback handling is provided by the rcu_tasks_kthread() function.
|
|
|
|
//
|
|
|
|
// Ordering is provided by the scheduler's context-switch code.
|
2020-03-03 05:06:43 +00:00
|
|
|
|
|
|
|
// Empty function to allow workqueues to force a context switch.
|
|
|
|
static void rcu_tasks_be_rude(struct work_struct *work)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait for one rude RCU-tasks grace period.
|
|
|
|
static void rcu_tasks_rude_wait_gp(struct rcu_tasks *rtp)
|
|
|
|
{
|
2020-03-18 17:54:05 +00:00
|
|
|
rtp->n_ipis += cpumask_weight(cpu_online_mask);
|
2020-03-03 05:06:43 +00:00
|
|
|
schedule_on_each_cpu(rcu_tasks_be_rude);
|
|
|
|
}
|
|
|
|
|
|
|
|
void call_rcu_tasks_rude(struct rcu_head *rhp, rcu_callback_t func);
|
2020-03-03 23:50:31 +00:00
|
|
|
DEFINE_RCU_TASKS(rcu_tasks_rude, rcu_tasks_rude_wait_gp, call_rcu_tasks_rude,
|
|
|
|
"RCU Tasks Rude");
|
2020-03-03 05:06:43 +00:00
|
|
|
|
|
|
|
/**
|
|
|
|
* call_rcu_tasks_rude() - Queue a callback rude task-based grace period
|
|
|
|
* @rhp: structure to be used for queueing the RCU updates.
|
|
|
|
* @func: actual callback function to be invoked after the grace period
|
|
|
|
*
|
|
|
|
* The callback function will be invoked some time after a full grace
|
|
|
|
* period elapses, in other words after all currently executing RCU
|
|
|
|
* read-side critical sections have completed. call_rcu_tasks_rude()
|
|
|
|
* assumes that the read-side critical sections end at context switch,
|
2021-09-15 16:24:18 +00:00
|
|
|
* cond_resched_tasks_rcu_qs(), or transition to usermode execution (as
|
2021-08-18 07:28:43 +00:00
|
|
|
* usermode execution is schedulable). As such, there are no read-side
|
|
|
|
* primitives analogous to rcu_read_lock() and rcu_read_unlock() because
|
|
|
|
* this primitive is intended to determine that all tasks have passed
|
|
|
|
* through a safe state, not so much for data-structure synchronization.
|
2020-03-03 05:06:43 +00:00
|
|
|
*
|
|
|
|
* See the description of call_rcu() for more detailed information on
|
|
|
|
* memory ordering guarantees.
|
|
|
|
*/
|
|
|
|
void call_rcu_tasks_rude(struct rcu_head *rhp, rcu_callback_t func)
|
|
|
|
{
|
|
|
|
call_rcu_tasks_generic(rhp, func, &rcu_tasks_rude);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(call_rcu_tasks_rude);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* synchronize_rcu_tasks_rude - wait for a rude rcu-tasks grace period
|
|
|
|
*
|
|
|
|
* Control will return to the caller some time after a rude rcu-tasks
|
|
|
|
* grace period has elapsed, in other words after all currently
|
|
|
|
* executing rcu-tasks read-side critical sections have elapsed. These
|
|
|
|
* read-side critical sections are delimited by calls to schedule(),
|
2021-08-18 07:28:43 +00:00
|
|
|
* cond_resched_tasks_rcu_qs(), userspace execution (which is a schedulable
|
|
|
|
* context), and (in theory, anyway) cond_resched().
|
2020-03-03 05:06:43 +00:00
|
|
|
*
|
|
|
|
* This is a very specialized primitive, intended only for a few uses in
|
|
|
|
* tracing and other situations requiring manipulation of function preambles
|
|
|
|
* and profiling hooks. The synchronize_rcu_tasks_rude() function is not
|
|
|
|
* (yet) intended for heavy use from multiple CPUs.
|
|
|
|
*
|
|
|
|
* See the description of synchronize_rcu() for more detailed information
|
|
|
|
* on memory ordering guarantees.
|
|
|
|
*/
|
|
|
|
void synchronize_rcu_tasks_rude(void)
|
|
|
|
{
|
|
|
|
synchronize_rcu_tasks_generic(&rcu_tasks_rude);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(synchronize_rcu_tasks_rude);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rcu_barrier_tasks_rude - Wait for in-flight call_rcu_tasks_rude() callbacks.
|
|
|
|
*
|
|
|
|
* Although the current implementation is guaranteed to wait, it is not
|
|
|
|
* obligated to, for example, if there are no pending callbacks.
|
|
|
|
*/
|
|
|
|
void rcu_barrier_tasks_rude(void)
|
|
|
|
{
|
2021-11-11 22:53:43 +00:00
|
|
|
rcu_barrier_tasks_generic(&rcu_tasks_rude);
|
2020-03-03 05:06:43 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(rcu_barrier_tasks_rude);
|
|
|
|
|
|
|
|
static int __init rcu_spawn_tasks_rude_kthread(void)
|
|
|
|
{
|
2021-11-06 04:52:00 +00:00
|
|
|
cblist_init_generic(&rcu_tasks_rude);
|
2020-09-10 05:05:41 +00:00
|
|
|
rcu_tasks_rude.gp_sleep = HZ / 10;
|
2020-03-03 05:06:43 +00:00
|
|
|
rcu_spawn_tasks_kthread_generic(&rcu_tasks_rude);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-16 00:08:03 +00:00
|
|
|
#if !defined(CONFIG_TINY_RCU)
|
|
|
|
void show_rcu_tasks_rude_gp_kthread(void)
|
2020-03-16 18:01:55 +00:00
|
|
|
{
|
|
|
|
show_rcu_tasks_generic_gp_kthread(&rcu_tasks_rude, "");
|
|
|
|
}
|
2020-09-16 00:08:03 +00:00
|
|
|
EXPORT_SYMBOL_GPL(show_rcu_tasks_rude_gp_kthread);
|
|
|
|
#endif // !defined(CONFIG_TINY_RCU)
|
|
|
|
#endif /* #ifdef CONFIG_TASKS_RUDE_RCU */
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
|
|
|
|
////////////////////////////////////////////////////////////////////////
|
|
|
|
//
|
|
|
|
// Tracing variant of Tasks RCU. This variant is designed to be used
|
|
|
|
// to protect tracing hooks, including those of BPF. This variant
|
|
|
|
// therefore:
|
|
|
|
//
|
|
|
|
// 1. Has explicit read-side markers to allow finite grace periods
|
|
|
|
// in the face of in-kernel loops for PREEMPT=n builds.
|
|
|
|
//
|
|
|
|
// 2. Protects code in the idle loop, exception entry/exit, and
|
|
|
|
// CPU-hotplug code paths, similar to the capabilities of SRCU.
|
|
|
|
//
|
2021-08-05 16:54:45 +00:00
|
|
|
// 3. Avoids expensive read-side instructions, having overhead similar
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
// to that of Preemptible RCU.
|
|
|
|
//
|
|
|
|
// There are of course downsides. The grace-period code can send IPIs to
|
|
|
|
// CPUs, even when those CPUs are in the idle loop or in nohz_full userspace.
|
|
|
|
// It is necessary to scan the full tasklist, much as for Tasks RCU. There
|
|
|
|
// is a single callback queue guarded by a single lock, again, much as for
|
|
|
|
// Tasks RCU. If needed, these downsides can be at least partially remedied.
|
|
|
|
//
|
|
|
|
// Perhaps most important, this variant of RCU does not affect the vanilla
|
|
|
|
// flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
|
|
|
|
// readers can operate from idle, offline, and exception entry/exit in no
|
|
|
|
// way allows rcu_preempt and rcu_sched readers to also do so.
|
2021-02-25 18:26:00 +00:00
|
|
|
//
|
|
|
|
// The implementation uses rcu_tasks_wait_gp(), which relies on function
|
|
|
|
// pointers in the rcu_tasks structure. The rcu_spawn_tasks_trace_kthread()
|
|
|
|
// function sets these function pointers up so that rcu_tasks_wait_gp()
|
|
|
|
// invokes these functions in this order:
|
|
|
|
//
|
|
|
|
// rcu_tasks_trace_pregp_step():
|
|
|
|
// Initialize the count of readers and block CPU-hotplug operations.
|
|
|
|
// rcu_tasks_trace_pertask(), invoked on every non-idle task:
|
|
|
|
// Initialize per-task state and attempt to identify an immediate
|
|
|
|
// quiescent state for that task, or, failing that, attempt to
|
|
|
|
// set that task's .need_qs flag so that task's next outermost
|
|
|
|
// rcu_read_unlock_trace() will report the quiescent state (in which
|
|
|
|
// case the count of readers is incremented). If both attempts fail,
|
2021-05-24 18:26:53 +00:00
|
|
|
// the task is added to a "holdout" list. Note that IPIs are used
|
|
|
|
// to invoke trc_read_check_handler() in the context of running tasks
|
|
|
|
// in order to avoid ordering overhead on common-case shared-variable
|
|
|
|
// accessses.
|
2021-02-25 18:26:00 +00:00
|
|
|
// rcu_tasks_trace_postscan():
|
|
|
|
// Initialize state and attempt to identify an immediate quiescent
|
|
|
|
// state as above (but only for idle tasks), unblock CPU-hotplug
|
|
|
|
// operations, and wait for an RCU grace period to avoid races with
|
|
|
|
// tasks that are in the process of exiting.
|
|
|
|
// check_all_holdout_tasks_trace(), repeatedly until holdout list is empty:
|
|
|
|
// Scans the holdout list, attempting to identify a quiescent state
|
|
|
|
// for each task on the list. If there is a quiescent state, the
|
|
|
|
// corresponding task is removed from the holdout list.
|
|
|
|
// rcu_tasks_trace_postgp():
|
|
|
|
// Wait for the count of readers do drop to zero, reporting any stalls.
|
|
|
|
// Also execute full memory barriers to maintain ordering with code
|
|
|
|
// executing after the grace period.
|
|
|
|
//
|
|
|
|
// The exit_tasks_rcu_finish_trace() synchronizes with exiting tasks.
|
|
|
|
//
|
|
|
|
// Pre-grace-period update-side code is ordered before the grace
|
|
|
|
// period via the ->cbs_lock and barriers in rcu_tasks_kthread().
|
|
|
|
// Pre-grace-period read-side code is ordered before the grace period by
|
|
|
|
// atomic_dec_and_test() of the count of readers (for IPIed readers) and by
|
|
|
|
// scheduler context-switch ordering (for locked-down non-running readers).
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
|
|
|
|
// The lockdep state must be outside of #ifdef to be useful.
|
|
|
|
#ifdef CONFIG_DEBUG_LOCK_ALLOC
|
|
|
|
static struct lock_class_key rcu_lock_trace_key;
|
|
|
|
struct lockdep_map rcu_trace_lock_map =
|
|
|
|
STATIC_LOCKDEP_MAP_INIT("rcu_read_lock_trace", &rcu_lock_trace_key);
|
|
|
|
EXPORT_SYMBOL_GPL(rcu_trace_lock_map);
|
|
|
|
#endif /* #ifdef CONFIG_DEBUG_LOCK_ALLOC */
|
|
|
|
|
|
|
|
#ifdef CONFIG_TASKS_TRACE_RCU
|
|
|
|
|
2020-06-09 16:24:51 +00:00
|
|
|
static atomic_t trc_n_readers_need_end; // Number of waited-for readers.
|
|
|
|
static DECLARE_WAIT_QUEUE_HEAD(trc_wait); // List of holdout tasks.
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
|
|
|
|
// Record outstanding IPIs to each CPU. No point in sending two...
|
|
|
|
static DEFINE_PER_CPU(bool, trc_ipi_to_cpu);
|
|
|
|
|
2020-03-22 20:34:34 +00:00
|
|
|
// The number of detections of task quiescent state relying on
|
|
|
|
// heavyweight readers executing explicit memory barriers.
|
2020-09-09 21:14:34 +00:00
|
|
|
static unsigned long n_heavy_reader_attempts;
|
|
|
|
static unsigned long n_heavy_reader_updates;
|
|
|
|
static unsigned long n_heavy_reader_ofl_updates;
|
2020-03-22 20:34:34 +00:00
|
|
|
|
2020-03-17 18:39:26 +00:00
|
|
|
void call_rcu_tasks_trace(struct rcu_head *rhp, rcu_callback_t func);
|
|
|
|
DEFINE_RCU_TASKS(rcu_tasks_trace, rcu_tasks_wait_gp, call_rcu_tasks_trace,
|
|
|
|
"RCU Tasks Trace");
|
|
|
|
|
2020-03-20 21:29:08 +00:00
|
|
|
/*
|
|
|
|
* This irq_work handler allows rcu_read_unlock_trace() to be invoked
|
|
|
|
* while the scheduler locks are held.
|
|
|
|
*/
|
|
|
|
static void rcu_read_unlock_iw(struct irq_work *iwp)
|
|
|
|
{
|
|
|
|
wake_up(&trc_wait);
|
|
|
|
}
|
|
|
|
static DEFINE_IRQ_WORK(rcu_tasks_trace_iw, rcu_read_unlock_iw);
|
|
|
|
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
/* If we are the last reader, wake up the grace-period kthread. */
|
2021-07-28 19:28:27 +00:00
|
|
|
void rcu_read_unlock_trace_special(struct task_struct *t)
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
{
|
2021-05-24 22:36:37 +00:00
|
|
|
int nq = READ_ONCE(t->trc_reader_special.b.need_qs);
|
2020-03-17 23:02:06 +00:00
|
|
|
|
2020-03-19 00:16:37 +00:00
|
|
|
if (IS_ENABLED(CONFIG_TASKS_TRACE_RCU_READ_MB) &&
|
|
|
|
t->trc_reader_special.b.need_mb)
|
2020-03-17 23:02:06 +00:00
|
|
|
smp_mb(); // Pairs with update-side barriers.
|
|
|
|
// Update .need_qs before ->trc_reader_nesting for irq/NMI handlers.
|
|
|
|
if (nq)
|
|
|
|
WRITE_ONCE(t->trc_reader_special.b.need_qs, false);
|
2021-07-28 19:28:27 +00:00
|
|
|
WRITE_ONCE(t->trc_reader_nesting, 0);
|
2020-03-17 23:02:06 +00:00
|
|
|
if (nq && atomic_dec_and_test(&trc_n_readers_need_end))
|
2020-03-20 21:29:08 +00:00
|
|
|
irq_work_queue(&rcu_tasks_trace_iw);
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(rcu_read_unlock_trace_special);
|
|
|
|
|
|
|
|
/* Add a task to the holdout list, if it is not already on the list. */
|
|
|
|
static void trc_add_holdout(struct task_struct *t, struct list_head *bhp)
|
|
|
|
{
|
|
|
|
if (list_empty(&t->trc_holdout_list)) {
|
|
|
|
get_task_struct(t);
|
|
|
|
list_add(&t->trc_holdout_list, bhp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Remove a task from the holdout list, if it is in fact present. */
|
|
|
|
static void trc_del_holdout(struct task_struct *t)
|
|
|
|
{
|
|
|
|
if (!list_empty(&t->trc_holdout_list)) {
|
|
|
|
list_del_init(&t->trc_holdout_list);
|
|
|
|
put_task_struct(t);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* IPI handler to check task state. */
|
|
|
|
static void trc_read_check_handler(void *t_in)
|
|
|
|
{
|
|
|
|
struct task_struct *t = current;
|
|
|
|
struct task_struct *texp = t_in;
|
|
|
|
|
|
|
|
// If the task is no longer running on this CPU, leave.
|
|
|
|
if (unlikely(texp != t)) {
|
|
|
|
goto reset_ipi; // Already on holdout list, so will check later.
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the task is not in a read-side critical section, and
|
|
|
|
// if this is the last reader, awaken the grace-period kthread.
|
2021-05-24 19:48:18 +00:00
|
|
|
if (likely(!READ_ONCE(t->trc_reader_nesting))) {
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
WRITE_ONCE(t->trc_reader_checked, true);
|
|
|
|
goto reset_ipi;
|
|
|
|
}
|
rcu-tasks: Fix grace-period/unlock race in RCU Tasks Trace
The more intense grace-period processing resulting from the 50x RCU
Tasks Trace grace-period speedups exposed the following race condition:
o Task A running on CPU 0 executes rcu_read_lock_trace(),
entering a read-side critical section.
o When Task A eventually invokes rcu_read_unlock_trace()
to exit its read-side critical section, this function
notes that the ->trc_reader_special.s flag is zero and
and therefore invoke wil set ->trc_reader_nesting to zero
using WRITE_ONCE(). But before that happens...
o The RCU Tasks Trace grace-period kthread running on some other
CPU interrogates Task A, but this fails because this task is
currently running. This kthread therefore sends an IPI to CPU 0.
o CPU 0 receives the IPI, and thus invokes trc_read_check_handler().
Because Task A has not yet cleared its ->trc_reader_nesting
counter, this function sees that Task A is still within its
read-side critical section. This function therefore sets the
->trc_reader_nesting.b.need_qs flag, AKA the .need_qs flag.
Except that Task A has already checked the .need_qs flag, which
is part of the ->trc_reader_special.s flag. The .need_qs flag
therefore remains set until Task A's next rcu_read_unlock_trace().
o Task A now invokes synchronize_rcu_tasks_trace(), which cannot
start a new grace period until the current grace period completes.
And thus cannot return until after that time.
But Task A's .need_qs flag is still set, which prevents the current
grace period from completing. And because Task A is blocked, it
will never execute rcu_read_unlock_trace() until its call to
synchronize_rcu_tasks_trace() returns.
We are therefore deadlocked.
This race is improbable, but 80 hours of rcutorture made it happen twice.
The race was possible before the grace-period speedup, but roughly 50x
less probable. Several thousand hours of rcutorture would have been
necessary to have a reasonable chance of making this happen before this
50x speedup.
This commit therefore eliminates this deadlock by setting
->trc_reader_nesting to a large negative number before checking the
.need_qs and zeroing (or decrementing with respect to its initial
value) ->trc_reader_nesting. For its part, the IPI handler's
trc_read_check_handler() function adds a check for negative values,
deferring evaluation of the task in this case. Taken together, these
changes avoid this deadlock scenario.
Fixes: 276c410448db ("rcu-tasks: Split ->trc_reader_need_end")
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: <bpf@vger.kernel.org>
Cc: <stable@vger.kernel.org> # 5.7.x
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-09-14 22:44:37 +00:00
|
|
|
// If we are racing with an rcu_read_unlock_trace(), try again later.
|
2021-07-28 17:53:41 +00:00
|
|
|
if (unlikely(READ_ONCE(t->trc_reader_nesting) < 0))
|
rcu-tasks: Fix grace-period/unlock race in RCU Tasks Trace
The more intense grace-period processing resulting from the 50x RCU
Tasks Trace grace-period speedups exposed the following race condition:
o Task A running on CPU 0 executes rcu_read_lock_trace(),
entering a read-side critical section.
o When Task A eventually invokes rcu_read_unlock_trace()
to exit its read-side critical section, this function
notes that the ->trc_reader_special.s flag is zero and
and therefore invoke wil set ->trc_reader_nesting to zero
using WRITE_ONCE(). But before that happens...
o The RCU Tasks Trace grace-period kthread running on some other
CPU interrogates Task A, but this fails because this task is
currently running. This kthread therefore sends an IPI to CPU 0.
o CPU 0 receives the IPI, and thus invokes trc_read_check_handler().
Because Task A has not yet cleared its ->trc_reader_nesting
counter, this function sees that Task A is still within its
read-side critical section. This function therefore sets the
->trc_reader_nesting.b.need_qs flag, AKA the .need_qs flag.
Except that Task A has already checked the .need_qs flag, which
is part of the ->trc_reader_special.s flag. The .need_qs flag
therefore remains set until Task A's next rcu_read_unlock_trace().
o Task A now invokes synchronize_rcu_tasks_trace(), which cannot
start a new grace period until the current grace period completes.
And thus cannot return until after that time.
But Task A's .need_qs flag is still set, which prevents the current
grace period from completing. And because Task A is blocked, it
will never execute rcu_read_unlock_trace() until its call to
synchronize_rcu_tasks_trace() returns.
We are therefore deadlocked.
This race is improbable, but 80 hours of rcutorture made it happen twice.
The race was possible before the grace-period speedup, but roughly 50x
less probable. Several thousand hours of rcutorture would have been
necessary to have a reasonable chance of making this happen before this
50x speedup.
This commit therefore eliminates this deadlock by setting
->trc_reader_nesting to a large negative number before checking the
.need_qs and zeroing (or decrementing with respect to its initial
value) ->trc_reader_nesting. For its part, the IPI handler's
trc_read_check_handler() function adds a check for negative values,
deferring evaluation of the task in this case. Taken together, these
changes avoid this deadlock scenario.
Fixes: 276c410448db ("rcu-tasks: Split ->trc_reader_need_end")
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: <bpf@vger.kernel.org>
Cc: <stable@vger.kernel.org> # 5.7.x
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-09-14 22:44:37 +00:00
|
|
|
goto reset_ipi;
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
WRITE_ONCE(t->trc_reader_checked, true);
|
|
|
|
|
|
|
|
// Get here if the task is in a read-side critical section. Set
|
|
|
|
// its state so that it will awaken the grace-period kthread upon
|
|
|
|
// exit from that critical section.
|
2021-07-28 17:53:41 +00:00
|
|
|
atomic_inc(&trc_n_readers_need_end); // One more to wait on.
|
2021-05-24 22:36:37 +00:00
|
|
|
WARN_ON_ONCE(READ_ONCE(t->trc_reader_special.b.need_qs));
|
2020-03-17 23:02:06 +00:00
|
|
|
WRITE_ONCE(t->trc_reader_special.b.need_qs, true);
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
|
|
|
|
reset_ipi:
|
|
|
|
// Allow future IPIs to be sent on CPU and for task.
|
|
|
|
// Also order this IPI handler against any later manipulations of
|
|
|
|
// the intended task.
|
2021-06-30 14:08:02 +00:00
|
|
|
smp_store_release(per_cpu_ptr(&trc_ipi_to_cpu, smp_processor_id()), false); // ^^^
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
smp_store_release(&texp->trc_ipi_to_cpu, -1); // ^^^
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Callback function for scheduler to check locked-down task. */
|
2021-09-21 19:54:32 +00:00
|
|
|
static int trc_inspect_reader(struct task_struct *t, void *arg)
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
{
|
rcu-tasks: Avoid IPIing userspace/idle tasks if kernel is so built
Systems running CPU-bound real-time task do not want IPIs sent to CPUs
executing nohz_full userspace tasks. Battery-powered systems don't
want IPIs sent to idle CPUs in low-power mode. Unfortunately, RCU tasks
trace can and will send such IPIs in some cases.
Both of these situations occur only when the target CPU is in RCU
dyntick-idle mode, in other words, when RCU is not watching the
target CPU. This suggests that CPUs in dyntick-idle mode should use
memory barriers in outermost invocations of rcu_read_lock_trace()
and rcu_read_unlock_trace(), which would allow the RCU tasks trace
grace period to directly read out the target CPU's read-side state.
One challenge is that RCU tasks trace is not targeting a specific
CPU, but rather a task. And that task could switch from one CPU to
another at any time.
This commit therefore uses try_invoke_on_locked_down_task()
and checks for task_curr() in trc_inspect_reader_notrunning().
When this condition holds, the target task is running and cannot move.
If CONFIG_TASKS_TRACE_RCU_READ_MB=y, the new rcu_dynticks_zero_in_eqs()
function can be used to check if the specified integer (in this case,
t->trc_reader_nesting) is zero while the target CPU remains in that same
dyntick-idle sojourn. If so, the target task is in a quiescent state.
If not, trc_read_check_handler() must indicate failure so that the
grace-period kthread can take appropriate action or retry after an
appropriate delay, as the case may be.
With this change, given CONFIG_TASKS_TRACE_RCU_READ_MB=y, if a given
CPU remains idle or a given task continues executing in nohz_full mode,
the RCU tasks trace grace-period kthread will detect this without the
need to send an IPI.
Suggested-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-19 22:33:12 +00:00
|
|
|
int cpu = task_cpu(t);
|
2021-07-28 18:32:28 +00:00
|
|
|
int nesting;
|
2020-03-22 18:24:58 +00:00
|
|
|
bool ofl = cpu_is_offline(cpu);
|
rcu-tasks: Avoid IPIing userspace/idle tasks if kernel is so built
Systems running CPU-bound real-time task do not want IPIs sent to CPUs
executing nohz_full userspace tasks. Battery-powered systems don't
want IPIs sent to idle CPUs in low-power mode. Unfortunately, RCU tasks
trace can and will send such IPIs in some cases.
Both of these situations occur only when the target CPU is in RCU
dyntick-idle mode, in other words, when RCU is not watching the
target CPU. This suggests that CPUs in dyntick-idle mode should use
memory barriers in outermost invocations of rcu_read_lock_trace()
and rcu_read_unlock_trace(), which would allow the RCU tasks trace
grace period to directly read out the target CPU's read-side state.
One challenge is that RCU tasks trace is not targeting a specific
CPU, but rather a task. And that task could switch from one CPU to
another at any time.
This commit therefore uses try_invoke_on_locked_down_task()
and checks for task_curr() in trc_inspect_reader_notrunning().
When this condition holds, the target task is running and cannot move.
If CONFIG_TASKS_TRACE_RCU_READ_MB=y, the new rcu_dynticks_zero_in_eqs()
function can be used to check if the specified integer (in this case,
t->trc_reader_nesting) is zero while the target CPU remains in that same
dyntick-idle sojourn. If so, the target task is in a quiescent state.
If not, trc_read_check_handler() must indicate failure so that the
grace-period kthread can take appropriate action or retry after an
appropriate delay, as the case may be.
With this change, given CONFIG_TASKS_TRACE_RCU_READ_MB=y, if a given
CPU remains idle or a given task continues executing in nohz_full mode,
the RCU tasks trace grace-period kthread will detect this without the
need to send an IPI.
Suggested-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-19 22:33:12 +00:00
|
|
|
|
|
|
|
if (task_curr(t)) {
|
2020-06-09 16:24:51 +00:00
|
|
|
WARN_ON_ONCE(ofl && !is_idle_task(t));
|
2020-03-22 18:24:58 +00:00
|
|
|
|
rcu-tasks: Avoid IPIing userspace/idle tasks if kernel is so built
Systems running CPU-bound real-time task do not want IPIs sent to CPUs
executing nohz_full userspace tasks. Battery-powered systems don't
want IPIs sent to idle CPUs in low-power mode. Unfortunately, RCU tasks
trace can and will send such IPIs in some cases.
Both of these situations occur only when the target CPU is in RCU
dyntick-idle mode, in other words, when RCU is not watching the
target CPU. This suggests that CPUs in dyntick-idle mode should use
memory barriers in outermost invocations of rcu_read_lock_trace()
and rcu_read_unlock_trace(), which would allow the RCU tasks trace
grace period to directly read out the target CPU's read-side state.
One challenge is that RCU tasks trace is not targeting a specific
CPU, but rather a task. And that task could switch from one CPU to
another at any time.
This commit therefore uses try_invoke_on_locked_down_task()
and checks for task_curr() in trc_inspect_reader_notrunning().
When this condition holds, the target task is running and cannot move.
If CONFIG_TASKS_TRACE_RCU_READ_MB=y, the new rcu_dynticks_zero_in_eqs()
function can be used to check if the specified integer (in this case,
t->trc_reader_nesting) is zero while the target CPU remains in that same
dyntick-idle sojourn. If so, the target task is in a quiescent state.
If not, trc_read_check_handler() must indicate failure so that the
grace-period kthread can take appropriate action or retry after an
appropriate delay, as the case may be.
With this change, given CONFIG_TASKS_TRACE_RCU_READ_MB=y, if a given
CPU remains idle or a given task continues executing in nohz_full mode,
the RCU tasks trace grace-period kthread will detect this without the
need to send an IPI.
Suggested-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-19 22:33:12 +00:00
|
|
|
// If no chance of heavyweight readers, do it the hard way.
|
2020-03-22 18:24:58 +00:00
|
|
|
if (!ofl && !IS_ENABLED(CONFIG_TASKS_TRACE_RCU_READ_MB))
|
2021-09-21 19:54:32 +00:00
|
|
|
return -EINVAL;
|
rcu-tasks: Avoid IPIing userspace/idle tasks if kernel is so built
Systems running CPU-bound real-time task do not want IPIs sent to CPUs
executing nohz_full userspace tasks. Battery-powered systems don't
want IPIs sent to idle CPUs in low-power mode. Unfortunately, RCU tasks
trace can and will send such IPIs in some cases.
Both of these situations occur only when the target CPU is in RCU
dyntick-idle mode, in other words, when RCU is not watching the
target CPU. This suggests that CPUs in dyntick-idle mode should use
memory barriers in outermost invocations of rcu_read_lock_trace()
and rcu_read_unlock_trace(), which would allow the RCU tasks trace
grace period to directly read out the target CPU's read-side state.
One challenge is that RCU tasks trace is not targeting a specific
CPU, but rather a task. And that task could switch from one CPU to
another at any time.
This commit therefore uses try_invoke_on_locked_down_task()
and checks for task_curr() in trc_inspect_reader_notrunning().
When this condition holds, the target task is running and cannot move.
If CONFIG_TASKS_TRACE_RCU_READ_MB=y, the new rcu_dynticks_zero_in_eqs()
function can be used to check if the specified integer (in this case,
t->trc_reader_nesting) is zero while the target CPU remains in that same
dyntick-idle sojourn. If so, the target task is in a quiescent state.
If not, trc_read_check_handler() must indicate failure so that the
grace-period kthread can take appropriate action or retry after an
appropriate delay, as the case may be.
With this change, given CONFIG_TASKS_TRACE_RCU_READ_MB=y, if a given
CPU remains idle or a given task continues executing in nohz_full mode,
the RCU tasks trace grace-period kthread will detect this without the
need to send an IPI.
Suggested-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-19 22:33:12 +00:00
|
|
|
|
|
|
|
// If heavyweight readers are enabled on the remote task,
|
|
|
|
// we can inspect its state despite its currently running.
|
|
|
|
// However, we cannot safely change its state.
|
2020-03-22 20:34:34 +00:00
|
|
|
n_heavy_reader_attempts++;
|
2020-03-22 18:24:58 +00:00
|
|
|
if (!ofl && // Check for "running" idle tasks on offline CPUs.
|
|
|
|
!rcu_dynticks_zero_in_eqs(cpu, &t->trc_reader_nesting))
|
2021-09-21 19:54:32 +00:00
|
|
|
return -EINVAL; // No quiescent state, do it the hard way.
|
2020-03-22 20:34:34 +00:00
|
|
|
n_heavy_reader_updates++;
|
2020-03-22 21:09:45 +00:00
|
|
|
if (ofl)
|
|
|
|
n_heavy_reader_ofl_updates++;
|
2021-07-28 18:32:28 +00:00
|
|
|
nesting = 0;
|
rcu-tasks: Avoid IPIing userspace/idle tasks if kernel is so built
Systems running CPU-bound real-time task do not want IPIs sent to CPUs
executing nohz_full userspace tasks. Battery-powered systems don't
want IPIs sent to idle CPUs in low-power mode. Unfortunately, RCU tasks
trace can and will send such IPIs in some cases.
Both of these situations occur only when the target CPU is in RCU
dyntick-idle mode, in other words, when RCU is not watching the
target CPU. This suggests that CPUs in dyntick-idle mode should use
memory barriers in outermost invocations of rcu_read_lock_trace()
and rcu_read_unlock_trace(), which would allow the RCU tasks trace
grace period to directly read out the target CPU's read-side state.
One challenge is that RCU tasks trace is not targeting a specific
CPU, but rather a task. And that task could switch from one CPU to
another at any time.
This commit therefore uses try_invoke_on_locked_down_task()
and checks for task_curr() in trc_inspect_reader_notrunning().
When this condition holds, the target task is running and cannot move.
If CONFIG_TASKS_TRACE_RCU_READ_MB=y, the new rcu_dynticks_zero_in_eqs()
function can be used to check if the specified integer (in this case,
t->trc_reader_nesting) is zero while the target CPU remains in that same
dyntick-idle sojourn. If so, the target task is in a quiescent state.
If not, trc_read_check_handler() must indicate failure so that the
grace-period kthread can take appropriate action or retry after an
appropriate delay, as the case may be.
With this change, given CONFIG_TASKS_TRACE_RCU_READ_MB=y, if a given
CPU remains idle or a given task continues executing in nohz_full mode,
the RCU tasks trace grace-period kthread will detect this without the
need to send an IPI.
Suggested-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-19 22:33:12 +00:00
|
|
|
} else {
|
2021-05-24 19:48:18 +00:00
|
|
|
// The task is not running, so C-language access is safe.
|
2021-07-28 18:32:28 +00:00
|
|
|
nesting = t->trc_reader_nesting;
|
rcu-tasks: Avoid IPIing userspace/idle tasks if kernel is so built
Systems running CPU-bound real-time task do not want IPIs sent to CPUs
executing nohz_full userspace tasks. Battery-powered systems don't
want IPIs sent to idle CPUs in low-power mode. Unfortunately, RCU tasks
trace can and will send such IPIs in some cases.
Both of these situations occur only when the target CPU is in RCU
dyntick-idle mode, in other words, when RCU is not watching the
target CPU. This suggests that CPUs in dyntick-idle mode should use
memory barriers in outermost invocations of rcu_read_lock_trace()
and rcu_read_unlock_trace(), which would allow the RCU tasks trace
grace period to directly read out the target CPU's read-side state.
One challenge is that RCU tasks trace is not targeting a specific
CPU, but rather a task. And that task could switch from one CPU to
another at any time.
This commit therefore uses try_invoke_on_locked_down_task()
and checks for task_curr() in trc_inspect_reader_notrunning().
When this condition holds, the target task is running and cannot move.
If CONFIG_TASKS_TRACE_RCU_READ_MB=y, the new rcu_dynticks_zero_in_eqs()
function can be used to check if the specified integer (in this case,
t->trc_reader_nesting) is zero while the target CPU remains in that same
dyntick-idle sojourn. If so, the target task is in a quiescent state.
If not, trc_read_check_handler() must indicate failure so that the
grace-period kthread can take appropriate action or retry after an
appropriate delay, as the case may be.
With this change, given CONFIG_TASKS_TRACE_RCU_READ_MB=y, if a given
CPU remains idle or a given task continues executing in nohz_full mode,
the RCU tasks trace grace-period kthread will detect this without the
need to send an IPI.
Suggested-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-19 22:33:12 +00:00
|
|
|
}
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
|
2021-07-28 18:32:28 +00:00
|
|
|
// If not exiting a read-side critical section, mark as checked
|
|
|
|
// so that the grace-period kthread will remove it from the
|
|
|
|
// holdout list.
|
|
|
|
t->trc_reader_checked = nesting >= 0;
|
|
|
|
if (nesting <= 0)
|
2021-11-02 03:25:38 +00:00
|
|
|
return nesting ? -EINVAL : 0; // If in QS, done, otherwise try again later.
|
rcu-tasks: Avoid IPIing userspace/idle tasks if kernel is so built
Systems running CPU-bound real-time task do not want IPIs sent to CPUs
executing nohz_full userspace tasks. Battery-powered systems don't
want IPIs sent to idle CPUs in low-power mode. Unfortunately, RCU tasks
trace can and will send such IPIs in some cases.
Both of these situations occur only when the target CPU is in RCU
dyntick-idle mode, in other words, when RCU is not watching the
target CPU. This suggests that CPUs in dyntick-idle mode should use
memory barriers in outermost invocations of rcu_read_lock_trace()
and rcu_read_unlock_trace(), which would allow the RCU tasks trace
grace period to directly read out the target CPU's read-side state.
One challenge is that RCU tasks trace is not targeting a specific
CPU, but rather a task. And that task could switch from one CPU to
another at any time.
This commit therefore uses try_invoke_on_locked_down_task()
and checks for task_curr() in trc_inspect_reader_notrunning().
When this condition holds, the target task is running and cannot move.
If CONFIG_TASKS_TRACE_RCU_READ_MB=y, the new rcu_dynticks_zero_in_eqs()
function can be used to check if the specified integer (in this case,
t->trc_reader_nesting) is zero while the target CPU remains in that same
dyntick-idle sojourn. If so, the target task is in a quiescent state.
If not, trc_read_check_handler() must indicate failure so that the
grace-period kthread can take appropriate action or retry after an
appropriate delay, as the case may be.
With this change, given CONFIG_TASKS_TRACE_RCU_READ_MB=y, if a given
CPU remains idle or a given task continues executing in nohz_full mode,
the RCU tasks trace grace-period kthread will detect this without the
need to send an IPI.
Suggested-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-19 22:33:12 +00:00
|
|
|
|
|
|
|
// The task is in a read-side critical section, so set up its
|
|
|
|
// state so that it will awaken the grace-period kthread upon exit
|
|
|
|
// from that critical section.
|
|
|
|
atomic_inc(&trc_n_readers_need_end); // One more to wait on.
|
2021-05-24 22:36:37 +00:00
|
|
|
WARN_ON_ONCE(READ_ONCE(t->trc_reader_special.b.need_qs));
|
rcu-tasks: Avoid IPIing userspace/idle tasks if kernel is so built
Systems running CPU-bound real-time task do not want IPIs sent to CPUs
executing nohz_full userspace tasks. Battery-powered systems don't
want IPIs sent to idle CPUs in low-power mode. Unfortunately, RCU tasks
trace can and will send such IPIs in some cases.
Both of these situations occur only when the target CPU is in RCU
dyntick-idle mode, in other words, when RCU is not watching the
target CPU. This suggests that CPUs in dyntick-idle mode should use
memory barriers in outermost invocations of rcu_read_lock_trace()
and rcu_read_unlock_trace(), which would allow the RCU tasks trace
grace period to directly read out the target CPU's read-side state.
One challenge is that RCU tasks trace is not targeting a specific
CPU, but rather a task. And that task could switch from one CPU to
another at any time.
This commit therefore uses try_invoke_on_locked_down_task()
and checks for task_curr() in trc_inspect_reader_notrunning().
When this condition holds, the target task is running and cannot move.
If CONFIG_TASKS_TRACE_RCU_READ_MB=y, the new rcu_dynticks_zero_in_eqs()
function can be used to check if the specified integer (in this case,
t->trc_reader_nesting) is zero while the target CPU remains in that same
dyntick-idle sojourn. If so, the target task is in a quiescent state.
If not, trc_read_check_handler() must indicate failure so that the
grace-period kthread can take appropriate action or retry after an
appropriate delay, as the case may be.
With this change, given CONFIG_TASKS_TRACE_RCU_READ_MB=y, if a given
CPU remains idle or a given task continues executing in nohz_full mode,
the RCU tasks trace grace-period kthread will detect this without the
need to send an IPI.
Suggested-by: Mathieu Desnoyers <mathieu.desnoyers@efficios.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-19 22:33:12 +00:00
|
|
|
WRITE_ONCE(t->trc_reader_special.b.need_qs, true);
|
2021-09-21 19:54:32 +00:00
|
|
|
return 0;
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Attempt to extract the state for the specified task. */
|
|
|
|
static void trc_wait_for_one_reader(struct task_struct *t,
|
|
|
|
struct list_head *bhp)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
// If a previous IPI is still in flight, let it complete.
|
|
|
|
if (smp_load_acquire(&t->trc_ipi_to_cpu) != -1) // Order IPI
|
|
|
|
return;
|
|
|
|
|
|
|
|
// The current task had better be in a quiescent state.
|
|
|
|
if (t == current) {
|
|
|
|
t->trc_reader_checked = true;
|
2021-05-24 19:48:18 +00:00
|
|
|
WARN_ON_ONCE(READ_ONCE(t->trc_reader_nesting));
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to nail down the task for inspection.
|
|
|
|
get_task_struct(t);
|
2021-09-21 19:54:32 +00:00
|
|
|
if (!task_call_func(t, trc_inspect_reader, NULL)) {
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
put_task_struct(t);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
put_task_struct(t);
|
|
|
|
|
2021-05-24 18:26:53 +00:00
|
|
|
// If this task is not yet on the holdout list, then we are in
|
|
|
|
// an RCU read-side critical section. Otherwise, the invocation of
|
2021-08-18 07:28:39 +00:00
|
|
|
// trc_add_holdout() that added it to the list did the necessary
|
2021-05-24 18:26:53 +00:00
|
|
|
// get_task_struct(). Either way, the task cannot be freed out
|
|
|
|
// from under this code.
|
|
|
|
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
// If currently running, send an IPI, either way, add to list.
|
|
|
|
trc_add_holdout(t, bhp);
|
2020-09-10 04:51:09 +00:00
|
|
|
if (task_curr(t) &&
|
|
|
|
time_after(jiffies + 1, rcu_tasks_trace.gp_start + rcu_task_ipi_delay)) {
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
// The task is currently running, so try IPIing it.
|
|
|
|
cpu = task_cpu(t);
|
|
|
|
|
|
|
|
// If there is already an IPI outstanding, let it happen.
|
|
|
|
if (per_cpu(trc_ipi_to_cpu, cpu) || t->trc_ipi_to_cpu >= 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
per_cpu(trc_ipi_to_cpu, cpu) = true;
|
|
|
|
t->trc_ipi_to_cpu = cpu;
|
2020-03-18 17:54:05 +00:00
|
|
|
rcu_tasks_trace.n_ipis++;
|
2021-07-28 17:53:41 +00:00
|
|
|
if (smp_call_function_single(cpu, trc_read_check_handler, t, 0)) {
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
// Just in case there is some other reason for
|
|
|
|
// failure than the target CPU being offline.
|
rcu-tasks: Fix IPI failure handling in trc_wait_for_one_reader
The trc_wait_for_one_reader() function is called at multiple stages
of trace rcu-tasks GP function, rcu_tasks_wait_gp():
- First, it is called as part of per task function -
rcu_tasks_trace_pertask(), for all non-idle tasks. As part of per task
processing, this function add the task in the holdout list and if the
task is currently running on a CPU, it sends IPI to the task's CPU.
The IPI handler takes action depending on whether task is in trace
rcu-tasks read side critical section or not:
- a. If the task is in trace rcu-tasks read side critical section
(t->trc_reader_nesting != 0), the IPI handler sets the task's
->trc_reader_special.b.need_qs, so that this task notifies exit
from its outermost read side critical section (by decrementing
trc_n_readers_need_end) to the GP handling function.
trc_wait_for_one_reader() also increments trc_n_readers_need_end,
so that the trace rcu-tasks GP handler function waits for this
task's read side exit notification. The IPI handler also sets
t->trc_reader_checked to true, and no further IPIs are sent for
this task, for this trace rcu-tasks grace period and this
task can be removed from holdout list.
- b. If the task is in the process of exiting its trace rcu-tasks
read side critical section, (t->trc_reader_nesting < 0), defer
this task's processing to future calls to trc_wait_for_one_reader().
- c. If task is not in rcu-task read side critical section,
t->trc_reader_nesting == 0, ->trc_reader_checked is set for this
task, so that this task is removed from holdout list.
- Second, trc_wait_for_one_reader() is called as part of post scan, in
function rcu_tasks_trace_postscan(), for all idle tasks.
- Third, in function check_all_holdout_tasks_trace(), this function is
called for each task in the holdout list, but only if there isn't
a pending IPI for the task (->trc_ipi_to_cpu == -1). This function
removed the task from holdout list, if IPI handler has completed the
required work, to ensure that the current trace rcu-tasks grace period
either waits for this task, or this task is not in a trace rcu-tasks
read side critical section.
Now, considering the scenario where smp_call_function_single() fails in
first case, inside rcu_tasks_trace_pertask(). In this case,
->trc_ipi_to_cpu is set to the current CPU for that task. This will
result in trc_wait_for_one_reader() getting skipped in third case,
inside check_all_holdout_tasks_trace(), for this task. This further
results in ->trc_reader_checked never getting set for this task,
and the task not getting removed from holdout list. This can cause
the current trace rcu-tasks grace period to stall.
Fix the above problem, by resetting ->trc_ipi_to_cpu to -1, on
smp_call_function_single() failure, so that future IPI calls can
be send for this task.
Note that all three of the trc_wait_for_one_reader() function's
callers (rcu_tasks_trace_pertask(), rcu_tasks_trace_postscan(),
check_all_holdout_tasks_trace()) hold cpu_read_lock(). This means
that smp_call_function_single() cannot race with CPU hotplug, and thus
should never fail. Therefore, also add a warning in order to report
any such failure in case smp_call_function_single() grows some other
reason for failure.
Signed-off-by: Neeraj Upadhyay <neeraju@codeaurora.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-08-27 08:13:35 +00:00
|
|
|
WARN_ONCE(1, "%s(): smp_call_function_single() failed for CPU: %d\n",
|
|
|
|
__func__, cpu);
|
2020-03-25 21:36:05 +00:00
|
|
|
rcu_tasks_trace.n_ipis_fails++;
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
per_cpu(trc_ipi_to_cpu, cpu) = false;
|
rcu-tasks: Fix IPI failure handling in trc_wait_for_one_reader
The trc_wait_for_one_reader() function is called at multiple stages
of trace rcu-tasks GP function, rcu_tasks_wait_gp():
- First, it is called as part of per task function -
rcu_tasks_trace_pertask(), for all non-idle tasks. As part of per task
processing, this function add the task in the holdout list and if the
task is currently running on a CPU, it sends IPI to the task's CPU.
The IPI handler takes action depending on whether task is in trace
rcu-tasks read side critical section or not:
- a. If the task is in trace rcu-tasks read side critical section
(t->trc_reader_nesting != 0), the IPI handler sets the task's
->trc_reader_special.b.need_qs, so that this task notifies exit
from its outermost read side critical section (by decrementing
trc_n_readers_need_end) to the GP handling function.
trc_wait_for_one_reader() also increments trc_n_readers_need_end,
so that the trace rcu-tasks GP handler function waits for this
task's read side exit notification. The IPI handler also sets
t->trc_reader_checked to true, and no further IPIs are sent for
this task, for this trace rcu-tasks grace period and this
task can be removed from holdout list.
- b. If the task is in the process of exiting its trace rcu-tasks
read side critical section, (t->trc_reader_nesting < 0), defer
this task's processing to future calls to trc_wait_for_one_reader().
- c. If task is not in rcu-task read side critical section,
t->trc_reader_nesting == 0, ->trc_reader_checked is set for this
task, so that this task is removed from holdout list.
- Second, trc_wait_for_one_reader() is called as part of post scan, in
function rcu_tasks_trace_postscan(), for all idle tasks.
- Third, in function check_all_holdout_tasks_trace(), this function is
called for each task in the holdout list, but only if there isn't
a pending IPI for the task (->trc_ipi_to_cpu == -1). This function
removed the task from holdout list, if IPI handler has completed the
required work, to ensure that the current trace rcu-tasks grace period
either waits for this task, or this task is not in a trace rcu-tasks
read side critical section.
Now, considering the scenario where smp_call_function_single() fails in
first case, inside rcu_tasks_trace_pertask(). In this case,
->trc_ipi_to_cpu is set to the current CPU for that task. This will
result in trc_wait_for_one_reader() getting skipped in third case,
inside check_all_holdout_tasks_trace(), for this task. This further
results in ->trc_reader_checked never getting set for this task,
and the task not getting removed from holdout list. This can cause
the current trace rcu-tasks grace period to stall.
Fix the above problem, by resetting ->trc_ipi_to_cpu to -1, on
smp_call_function_single() failure, so that future IPI calls can
be send for this task.
Note that all three of the trc_wait_for_one_reader() function's
callers (rcu_tasks_trace_pertask(), rcu_tasks_trace_postscan(),
check_all_holdout_tasks_trace()) hold cpu_read_lock(). This means
that smp_call_function_single() cannot race with CPU hotplug, and thus
should never fail. Therefore, also add a warning in order to report
any such failure in case smp_call_function_single() grows some other
reason for failure.
Signed-off-by: Neeraj Upadhyay <neeraju@codeaurora.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-08-27 08:13:35 +00:00
|
|
|
t->trc_ipi_to_cpu = -1;
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Initialize for a new RCU-tasks-trace grace period. */
|
|
|
|
static void rcu_tasks_trace_pregp_step(void)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
// Allow for fast-acting IPIs.
|
|
|
|
atomic_set(&trc_n_readers_need_end, 1);
|
|
|
|
|
|
|
|
// There shouldn't be any old IPIs, but...
|
|
|
|
for_each_possible_cpu(cpu)
|
|
|
|
WARN_ON_ONCE(per_cpu(trc_ipi_to_cpu, cpu));
|
2020-03-22 17:10:07 +00:00
|
|
|
|
|
|
|
// Disable CPU hotplug across the tasklist scan.
|
|
|
|
// This also waits for all readers in CPU-hotplug code paths.
|
|
|
|
cpus_read_lock();
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Do first-round processing for the specified task. */
|
|
|
|
static void rcu_tasks_trace_pertask(struct task_struct *t,
|
|
|
|
struct list_head *hop)
|
|
|
|
{
|
2020-12-09 20:27:31 +00:00
|
|
|
// During early boot when there is only the one boot CPU, there
|
|
|
|
// is no idle task for the other CPUs. Just return.
|
|
|
|
if (unlikely(t == NULL))
|
|
|
|
return;
|
|
|
|
|
2020-03-17 23:02:06 +00:00
|
|
|
WRITE_ONCE(t->trc_reader_special.b.need_qs, false);
|
2020-03-17 03:38:29 +00:00
|
|
|
WRITE_ONCE(t->trc_reader_checked, false);
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
t->trc_ipi_to_cpu = -1;
|
|
|
|
trc_wait_for_one_reader(t, hop);
|
|
|
|
}
|
|
|
|
|
2020-03-22 20:18:54 +00:00
|
|
|
/*
|
|
|
|
* Do intermediate processing between task and holdout scans and
|
|
|
|
* pick up the idle tasks.
|
|
|
|
*/
|
|
|
|
static void rcu_tasks_trace_postscan(struct list_head *hop)
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
{
|
2020-03-22 20:18:54 +00:00
|
|
|
int cpu;
|
|
|
|
|
|
|
|
for_each_possible_cpu(cpu)
|
|
|
|
rcu_tasks_trace_pertask(idle_task(cpu), hop);
|
|
|
|
|
2020-03-22 17:10:07 +00:00
|
|
|
// Re-enable CPU hotplug now that the tasklist scan has completed.
|
|
|
|
cpus_read_unlock();
|
|
|
|
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
// Wait for late-stage exiting tasks to finish exiting.
|
|
|
|
// These might have passed the call to exit_tasks_rcu_finish().
|
|
|
|
synchronize_rcu();
|
|
|
|
// Any tasks that exit after this point will set ->trc_reader_checked.
|
|
|
|
}
|
|
|
|
|
2021-11-09 11:22:14 +00:00
|
|
|
/* Communicate task state back to the RCU tasks trace stall warning request. */
|
|
|
|
struct trc_stall_chk_rdr {
|
|
|
|
int nesting;
|
|
|
|
int ipi_to_cpu;
|
|
|
|
u8 needqs;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int trc_check_slow_task(struct task_struct *t, void *arg)
|
|
|
|
{
|
|
|
|
struct trc_stall_chk_rdr *trc_rdrp = arg;
|
|
|
|
|
|
|
|
if (task_curr(t))
|
|
|
|
return false; // It is running, so decline to inspect it.
|
|
|
|
trc_rdrp->nesting = READ_ONCE(t->trc_reader_nesting);
|
|
|
|
trc_rdrp->ipi_to_cpu = READ_ONCE(t->trc_ipi_to_cpu);
|
|
|
|
trc_rdrp->needqs = READ_ONCE(t->trc_reader_special.b.need_qs);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2020-03-10 19:13:53 +00:00
|
|
|
/* Show the state of a task stalling the current RCU tasks trace GP. */
|
|
|
|
static void show_stalled_task_trace(struct task_struct *t, bool *firstreport)
|
|
|
|
{
|
|
|
|
int cpu;
|
2021-11-09 11:22:14 +00:00
|
|
|
struct trc_stall_chk_rdr trc_rdr;
|
|
|
|
bool is_idle_tsk = is_idle_task(t);
|
2020-03-10 19:13:53 +00:00
|
|
|
|
|
|
|
if (*firstreport) {
|
|
|
|
pr_err("INFO: rcu_tasks_trace detected stalls on tasks:\n");
|
|
|
|
*firstreport = false;
|
|
|
|
}
|
|
|
|
cpu = task_cpu(t);
|
2021-11-09 11:22:14 +00:00
|
|
|
if (!task_call_func(t, trc_check_slow_task, &trc_rdr))
|
|
|
|
pr_alert("P%d: %c\n",
|
|
|
|
t->pid,
|
|
|
|
".i"[is_idle_tsk]);
|
|
|
|
else
|
|
|
|
pr_alert("P%d: %c%c%c nesting: %d%c cpu: %d\n",
|
|
|
|
t->pid,
|
|
|
|
".I"[trc_rdr.ipi_to_cpu >= 0],
|
|
|
|
".i"[is_idle_tsk],
|
|
|
|
".N"[cpu >= 0 && tick_nohz_full_cpu(cpu)],
|
|
|
|
trc_rdr.nesting,
|
|
|
|
" N"[!!trc_rdr.needqs],
|
|
|
|
cpu);
|
2020-03-10 19:13:53 +00:00
|
|
|
sched_show_task(t);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* List stalled IPIs for RCU tasks trace. */
|
|
|
|
static void show_stalled_ipi_trace(void)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
for_each_possible_cpu(cpu)
|
|
|
|
if (per_cpu(trc_ipi_to_cpu, cpu))
|
|
|
|
pr_alert("\tIPI outstanding to CPU %d\n", cpu);
|
|
|
|
}
|
|
|
|
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
/* Do one scan of the holdout list. */
|
|
|
|
static void check_all_holdout_tasks_trace(struct list_head *hop,
|
2020-03-10 19:13:53 +00:00
|
|
|
bool needreport, bool *firstreport)
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
{
|
|
|
|
struct task_struct *g, *t;
|
|
|
|
|
2020-03-22 17:10:07 +00:00
|
|
|
// Disable CPU hotplug across the holdout list scan.
|
|
|
|
cpus_read_lock();
|
|
|
|
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
list_for_each_entry_safe(t, g, hop, trc_holdout_list) {
|
|
|
|
// If safe and needed, try to check the current task.
|
|
|
|
if (READ_ONCE(t->trc_ipi_to_cpu) == -1 &&
|
|
|
|
!READ_ONCE(t->trc_reader_checked))
|
|
|
|
trc_wait_for_one_reader(t, hop);
|
|
|
|
|
|
|
|
// If check succeeded, remove this task from the list.
|
2021-09-19 03:40:48 +00:00
|
|
|
if (smp_load_acquire(&t->trc_ipi_to_cpu) == -1 &&
|
|
|
|
READ_ONCE(t->trc_reader_checked))
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
trc_del_holdout(t);
|
2020-03-10 19:13:53 +00:00
|
|
|
else if (needreport)
|
|
|
|
show_stalled_task_trace(t, firstreport);
|
|
|
|
}
|
2020-03-22 17:10:07 +00:00
|
|
|
|
|
|
|
// Re-enable CPU hotplug now that the holdout list scan has completed.
|
|
|
|
cpus_read_unlock();
|
|
|
|
|
2020-03-10 19:13:53 +00:00
|
|
|
if (needreport) {
|
2021-08-18 07:28:40 +00:00
|
|
|
if (*firstreport)
|
2020-03-10 19:13:53 +00:00
|
|
|
pr_err("INFO: rcu_tasks_trace detected stalls? (Late IPI?)\n");
|
|
|
|
show_stalled_ipi_trace();
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-07-30 19:17:59 +00:00
|
|
|
static void rcu_tasks_trace_empty_fn(void *unused)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
/* Wait for grace period to complete and provide ordering. */
|
2020-03-16 19:13:33 +00:00
|
|
|
static void rcu_tasks_trace_postgp(struct rcu_tasks *rtp)
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
{
|
2021-07-30 19:17:59 +00:00
|
|
|
int cpu;
|
2020-03-10 19:13:53 +00:00
|
|
|
bool firstreport;
|
|
|
|
struct task_struct *g, *t;
|
|
|
|
LIST_HEAD(holdouts);
|
|
|
|
long ret;
|
|
|
|
|
2021-07-30 19:17:59 +00:00
|
|
|
// Wait for any lingering IPI handlers to complete. Note that
|
|
|
|
// if a CPU has gone offline or transitioned to userspace in the
|
|
|
|
// meantime, all IPI handlers should have been drained beforehand.
|
|
|
|
// Yes, this assumes that CPUs process IPIs in order. If that ever
|
|
|
|
// changes, there will need to be a recheck and/or timed wait.
|
|
|
|
for_each_online_cpu(cpu)
|
2021-09-19 03:40:48 +00:00
|
|
|
if (WARN_ON_ONCE(smp_load_acquire(per_cpu_ptr(&trc_ipi_to_cpu, cpu))))
|
2021-07-30 19:17:59 +00:00
|
|
|
smp_call_function_single(cpu, rcu_tasks_trace_empty_fn, NULL, 1);
|
|
|
|
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
// Remove the safety count.
|
|
|
|
smp_mb__before_atomic(); // Order vs. earlier atomics
|
|
|
|
atomic_dec(&trc_n_readers_need_end);
|
|
|
|
smp_mb__after_atomic(); // Order vs. later atomics
|
|
|
|
|
|
|
|
// Wait for readers.
|
2020-03-16 19:13:33 +00:00
|
|
|
set_tasks_gp_state(rtp, RTGS_WAIT_READERS);
|
2020-03-10 19:13:53 +00:00
|
|
|
for (;;) {
|
|
|
|
ret = wait_event_idle_exclusive_timeout(
|
|
|
|
trc_wait,
|
|
|
|
atomic_read(&trc_n_readers_need_end) == 0,
|
|
|
|
READ_ONCE(rcu_task_stall_timeout));
|
|
|
|
if (ret)
|
|
|
|
break; // Count reached zero.
|
2020-03-16 19:13:33 +00:00
|
|
|
// Stall warning time, so make a list of the offenders.
|
2020-09-15 21:27:38 +00:00
|
|
|
rcu_read_lock();
|
2020-03-10 19:13:53 +00:00
|
|
|
for_each_process_thread(g, t)
|
2020-03-17 23:02:06 +00:00
|
|
|
if (READ_ONCE(t->trc_reader_special.b.need_qs))
|
2020-03-10 19:13:53 +00:00
|
|
|
trc_add_holdout(t, &holdouts);
|
2020-09-15 21:27:38 +00:00
|
|
|
rcu_read_unlock();
|
2020-03-10 19:13:53 +00:00
|
|
|
firstreport = true;
|
2020-09-15 21:03:34 +00:00
|
|
|
list_for_each_entry_safe(t, g, &holdouts, trc_holdout_list) {
|
|
|
|
if (READ_ONCE(t->trc_reader_special.b.need_qs))
|
2020-03-10 19:13:53 +00:00
|
|
|
show_stalled_task_trace(t, &firstreport);
|
2020-09-15 21:03:34 +00:00
|
|
|
trc_del_holdout(t); // Release task_struct reference.
|
|
|
|
}
|
2020-03-10 19:13:53 +00:00
|
|
|
if (firstreport)
|
|
|
|
pr_err("INFO: rcu_tasks_trace detected stalls? (Counter/taskslist mismatch?)\n");
|
|
|
|
show_stalled_ipi_trace();
|
|
|
|
pr_err("\t%d holdouts\n", atomic_read(&trc_n_readers_need_end));
|
|
|
|
}
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
smp_mb(); // Caller's code must be ordered after wakeup.
|
2020-03-17 03:38:29 +00:00
|
|
|
// Pairs with pretty much every ordering primitive.
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Report any needed quiescent state for this exiting task. */
|
2020-04-06 03:49:13 +00:00
|
|
|
static void exit_tasks_rcu_finish_trace(struct task_struct *t)
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
{
|
|
|
|
WRITE_ONCE(t->trc_reader_checked, true);
|
2021-05-24 19:48:18 +00:00
|
|
|
WARN_ON_ONCE(READ_ONCE(t->trc_reader_nesting));
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
WRITE_ONCE(t->trc_reader_nesting, 0);
|
2020-03-17 23:02:06 +00:00
|
|
|
if (WARN_ON_ONCE(READ_ONCE(t->trc_reader_special.b.need_qs)))
|
2021-07-28 19:28:27 +00:00
|
|
|
rcu_read_unlock_trace_special(t);
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* call_rcu_tasks_trace() - Queue a callback trace task-based grace period
|
|
|
|
* @rhp: structure to be used for queueing the RCU updates.
|
|
|
|
* @func: actual callback function to be invoked after the grace period
|
|
|
|
*
|
2021-08-25 07:10:50 +00:00
|
|
|
* The callback function will be invoked some time after a trace rcu-tasks
|
|
|
|
* grace period elapses, in other words after all currently executing
|
|
|
|
* trace rcu-tasks read-side critical sections have completed. These
|
|
|
|
* read-side critical sections are delimited by calls to rcu_read_lock_trace()
|
|
|
|
* and rcu_read_unlock_trace().
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
*
|
|
|
|
* See the description of call_rcu() for more detailed information on
|
|
|
|
* memory ordering guarantees.
|
|
|
|
*/
|
|
|
|
void call_rcu_tasks_trace(struct rcu_head *rhp, rcu_callback_t func)
|
|
|
|
{
|
|
|
|
call_rcu_tasks_generic(rhp, func, &rcu_tasks_trace);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(call_rcu_tasks_trace);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* synchronize_rcu_tasks_trace - wait for a trace rcu-tasks grace period
|
|
|
|
*
|
|
|
|
* Control will return to the caller some time after a trace rcu-tasks
|
2020-06-12 20:11:29 +00:00
|
|
|
* grace period has elapsed, in other words after all currently executing
|
2021-08-25 07:10:50 +00:00
|
|
|
* trace rcu-tasks read-side critical sections have elapsed. These read-side
|
2020-06-12 20:11:29 +00:00
|
|
|
* critical sections are delimited by calls to rcu_read_lock_trace()
|
|
|
|
* and rcu_read_unlock_trace().
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
*
|
|
|
|
* This is a very specialized primitive, intended only for a few uses in
|
|
|
|
* tracing and other situations requiring manipulation of function preambles
|
|
|
|
* and profiling hooks. The synchronize_rcu_tasks_trace() function is not
|
|
|
|
* (yet) intended for heavy use from multiple CPUs.
|
|
|
|
*
|
|
|
|
* See the description of synchronize_rcu() for more detailed information
|
|
|
|
* on memory ordering guarantees.
|
|
|
|
*/
|
|
|
|
void synchronize_rcu_tasks_trace(void)
|
|
|
|
{
|
|
|
|
RCU_LOCKDEP_WARN(lock_is_held(&rcu_trace_lock_map), "Illegal synchronize_rcu_tasks_trace() in RCU Tasks Trace read-side critical section");
|
|
|
|
synchronize_rcu_tasks_generic(&rcu_tasks_trace);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(synchronize_rcu_tasks_trace);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* rcu_barrier_tasks_trace - Wait for in-flight call_rcu_tasks_trace() callbacks.
|
|
|
|
*
|
|
|
|
* Although the current implementation is guaranteed to wait, it is not
|
|
|
|
* obligated to, for example, if there are no pending callbacks.
|
|
|
|
*/
|
|
|
|
void rcu_barrier_tasks_trace(void)
|
|
|
|
{
|
2021-11-11 22:53:43 +00:00
|
|
|
rcu_barrier_tasks_generic(&rcu_tasks_trace);
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(rcu_barrier_tasks_trace);
|
|
|
|
|
|
|
|
static int __init rcu_spawn_tasks_trace_kthread(void)
|
|
|
|
{
|
2021-11-06 04:52:00 +00:00
|
|
|
cblist_init_generic(&rcu_tasks_trace);
|
2020-09-10 04:36:34 +00:00
|
|
|
if (IS_ENABLED(CONFIG_TASKS_TRACE_RCU_READ_MB)) {
|
2020-09-10 05:05:41 +00:00
|
|
|
rcu_tasks_trace.gp_sleep = HZ / 10;
|
2020-09-17 23:17:17 +00:00
|
|
|
rcu_tasks_trace.init_fract = HZ / 10;
|
2020-09-10 04:36:34 +00:00
|
|
|
} else {
|
2020-09-10 05:05:41 +00:00
|
|
|
rcu_tasks_trace.gp_sleep = HZ / 200;
|
|
|
|
if (rcu_tasks_trace.gp_sleep <= 0)
|
|
|
|
rcu_tasks_trace.gp_sleep = 1;
|
2020-09-17 23:17:17 +00:00
|
|
|
rcu_tasks_trace.init_fract = HZ / 200;
|
2020-09-10 04:36:34 +00:00
|
|
|
if (rcu_tasks_trace.init_fract <= 0)
|
|
|
|
rcu_tasks_trace.init_fract = 1;
|
|
|
|
}
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
rcu_tasks_trace.pregp_func = rcu_tasks_trace_pregp_step;
|
|
|
|
rcu_tasks_trace.pertask_func = rcu_tasks_trace_pertask;
|
|
|
|
rcu_tasks_trace.postscan_func = rcu_tasks_trace_postscan;
|
|
|
|
rcu_tasks_trace.holdouts_func = check_all_holdout_tasks_trace;
|
|
|
|
rcu_tasks_trace.postgp_func = rcu_tasks_trace_postgp;
|
|
|
|
rcu_spawn_tasks_kthread_generic(&rcu_tasks_trace);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-09-16 00:08:03 +00:00
|
|
|
#if !defined(CONFIG_TINY_RCU)
|
|
|
|
void show_rcu_tasks_trace_gp_kthread(void)
|
2020-03-16 18:01:55 +00:00
|
|
|
{
|
2020-03-22 20:34:34 +00:00
|
|
|
char buf[64];
|
2020-03-16 18:01:55 +00:00
|
|
|
|
2020-03-22 21:09:45 +00:00
|
|
|
sprintf(buf, "N%d h:%lu/%lu/%lu", atomic_read(&trc_n_readers_need_end),
|
|
|
|
data_race(n_heavy_reader_ofl_updates),
|
2020-03-22 20:34:34 +00:00
|
|
|
data_race(n_heavy_reader_updates),
|
|
|
|
data_race(n_heavy_reader_attempts));
|
2020-03-16 18:01:55 +00:00
|
|
|
show_rcu_tasks_generic_gp_kthread(&rcu_tasks_trace, buf);
|
|
|
|
}
|
2020-09-16 00:08:03 +00:00
|
|
|
EXPORT_SYMBOL_GPL(show_rcu_tasks_trace_gp_kthread);
|
|
|
|
#endif // !defined(CONFIG_TINY_RCU)
|
2020-03-16 18:01:55 +00:00
|
|
|
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
#else /* #ifdef CONFIG_TASKS_TRACE_RCU */
|
2020-04-06 03:49:13 +00:00
|
|
|
static void exit_tasks_rcu_finish_trace(struct task_struct *t) { }
|
rcu-tasks: Add an RCU Tasks Trace to simplify protection of tracing hooks
Because RCU does not watch exception early-entry/late-exit, idle-loop,
or CPU-hotplug execution, protection of tracing and BPF operations is
needlessly complicated. This commit therefore adds a variant of
Tasks RCU that:
o Has explicit read-side markers to allow finite grace periods in
the face of in-kernel loops for PREEMPT=n builds. These markers
are rcu_read_lock_trace() and rcu_read_unlock_trace().
o Protects code in the idle loop, exception entry/exit, and
CPU-hotplug code paths. In this respect, RCU-tasks trace is
similar to SRCU, but with lighter-weight readers.
o Avoids expensive read-side instruction, having overhead similar
to that of Preemptible RCU.
There are of course downsides:
o The grace-period code can send IPIs to CPUs, even when those
CPUs are in the idle loop or in nohz_full userspace. This is
mitigated by later commits.
o It is necessary to scan the full tasklist, much as for Tasks RCU.
o There is a single callback queue guarded by a single lock,
again, much as for Tasks RCU. However, those early use cases
that request multiple grace periods in quick succession are
expected to do so from a single task, which makes the single
lock almost irrelevant. If needed, multiple callback queues
can be provided using any number of schemes.
Perhaps most important, this variant of RCU does not affect the vanilla
flavors, rcu_preempt and rcu_sched. The fact that RCU Tasks Trace
readers can operate from idle, offline, and exception entry/exit in no
way enables rcu_preempt and rcu_sched readers to do so.
The memory ordering was outlined here:
https://lore.kernel.org/lkml/20200319034030.GX3199@paulmck-ThinkPad-P72/
This effort benefited greatly from off-list discussions of BPF
requirements with Alexei Starovoitov and Andrii Nakryiko. At least
some of the on-list discussions are captured in the Link: tags below.
In addition, KCSAN was quite helpful in finding some early bugs.
Link: https://lore.kernel.org/lkml/20200219150744.428764577@infradead.org/
Link: https://lore.kernel.org/lkml/87mu8p797b.fsf@nanos.tec.linutronix.de/
Link: https://lore.kernel.org/lkml/20200225221305.605144982@linutronix.de/
Cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Andrii Nakryiko <andriin@fb.com>
[ paulmck: Apply feedback from Steve Rostedt and Joel Fernandes. ]
[ paulmck: Decrement trc_n_readers_need_end upon IPI failure. ]
[ paulmck: Fix locking issue reported by rcutorture. ]
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2020-03-10 02:56:53 +00:00
|
|
|
#endif /* #else #ifdef CONFIG_TASKS_TRACE_RCU */
|
2020-03-15 21:51:20 +00:00
|
|
|
|
2020-05-29 03:03:48 +00:00
|
|
|
#ifndef CONFIG_TINY_RCU
|
2020-03-16 18:01:55 +00:00
|
|
|
void show_rcu_tasks_gp_kthreads(void)
|
|
|
|
{
|
|
|
|
show_rcu_tasks_classic_gp_kthread();
|
|
|
|
show_rcu_tasks_rude_gp_kthread();
|
|
|
|
show_rcu_tasks_trace_gp_kthread();
|
|
|
|
}
|
2020-05-29 03:03:48 +00:00
|
|
|
#endif /* #ifndef CONFIG_TINY_RCU */
|
2020-03-16 18:01:55 +00:00
|
|
|
|
2020-12-09 20:27:32 +00:00
|
|
|
#ifdef CONFIG_PROVE_RCU
|
|
|
|
struct rcu_tasks_test_desc {
|
|
|
|
struct rcu_head rh;
|
|
|
|
const char *name;
|
|
|
|
bool notrun;
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct rcu_tasks_test_desc tests[] = {
|
|
|
|
{
|
|
|
|
.name = "call_rcu_tasks()",
|
|
|
|
/* If not defined, the test is skipped. */
|
|
|
|
.notrun = !IS_ENABLED(CONFIG_TASKS_RCU),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.name = "call_rcu_tasks_rude()",
|
|
|
|
/* If not defined, the test is skipped. */
|
|
|
|
.notrun = !IS_ENABLED(CONFIG_TASKS_RUDE_RCU),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
.name = "call_rcu_tasks_trace()",
|
|
|
|
/* If not defined, the test is skipped. */
|
|
|
|
.notrun = !IS_ENABLED(CONFIG_TASKS_TRACE_RCU)
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
|
|
|
static void test_rcu_tasks_callback(struct rcu_head *rhp)
|
|
|
|
{
|
|
|
|
struct rcu_tasks_test_desc *rttd =
|
|
|
|
container_of(rhp, struct rcu_tasks_test_desc, rh);
|
|
|
|
|
|
|
|
pr_info("Callback from %s invoked.\n", rttd->name);
|
|
|
|
|
|
|
|
rttd->notrun = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void rcu_tasks_initiate_self_tests(void)
|
|
|
|
{
|
|
|
|
pr_info("Running RCU-tasks wait API self tests\n");
|
|
|
|
#ifdef CONFIG_TASKS_RCU
|
|
|
|
synchronize_rcu_tasks();
|
|
|
|
call_rcu_tasks(&tests[0].rh, test_rcu_tasks_callback);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_TASKS_RUDE_RCU
|
|
|
|
synchronize_rcu_tasks_rude();
|
|
|
|
call_rcu_tasks_rude(&tests[1].rh, test_rcu_tasks_callback);
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_TASKS_TRACE_RCU
|
|
|
|
synchronize_rcu_tasks_trace();
|
|
|
|
call_rcu_tasks_trace(&tests[2].rh, test_rcu_tasks_callback);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static int rcu_tasks_verify_self_tests(void)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(tests); i++) {
|
|
|
|
if (!tests[i].notrun) { // still hanging.
|
|
|
|
pr_err("%s has been failed.\n", tests[i].name);
|
|
|
|
ret = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ret)
|
|
|
|
WARN_ON(1);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
late_initcall(rcu_tasks_verify_self_tests);
|
|
|
|
#else /* #ifdef CONFIG_PROVE_RCU */
|
|
|
|
static void rcu_tasks_initiate_self_tests(void) { }
|
|
|
|
#endif /* #else #ifdef CONFIG_PROVE_RCU */
|
|
|
|
|
2020-12-09 20:27:31 +00:00
|
|
|
void __init rcu_init_tasks_generic(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_TASKS_RCU
|
|
|
|
rcu_spawn_tasks_kthread();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_TASKS_RUDE_RCU
|
|
|
|
rcu_spawn_tasks_rude_kthread();
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_TASKS_TRACE_RCU
|
|
|
|
rcu_spawn_tasks_trace_kthread();
|
|
|
|
#endif
|
2020-12-09 20:27:32 +00:00
|
|
|
|
|
|
|
// Run the self-tests.
|
|
|
|
rcu_tasks_initiate_self_tests();
|
2020-12-09 20:27:31 +00:00
|
|
|
}
|
|
|
|
|
2020-03-15 21:51:20 +00:00
|
|
|
#else /* #ifdef CONFIG_TASKS_RCU_GENERIC */
|
|
|
|
static inline void rcu_tasks_bootup_oddness(void) {}
|
|
|
|
#endif /* #else #ifdef CONFIG_TASKS_RCU_GENERIC */
|