From: "Paul E. McKenney" <paulmck@linux.vnet.ibm.com>
To: Steven Rostedt <rostedt@goodmis.org>
Cc: mingo@kernel.org, linux-kernel@vger.kernel.org
Subject: Re: Use case for TASKS_RCU
Date: Mon, 15 May 2017 13:12:53 -0700 [thread overview]
Message-ID: <20170515201253.GW3956@linux.vnet.ibm.com> (raw)
In-Reply-To: <20170515144810.563a4d9b@gandalf.local.home>
On Mon, May 15, 2017 at 02:48:10PM -0400, Steven Rostedt wrote:
> On Mon, 15 May 2017 11:23:54 -0700
> "Paul E. McKenney" <paulmck@linux.vnet.ibm.com> wrote:
>
> > Hello!
> >
> > The question of the use case for TASKS_RCU came up, and here is my
> > understanding. Steve will not be shy about correcting any misconceptions
> > I might have. ;-)
> >
> > The use case is to support freeing of trampolines used in tracing/probing
> > in CONFIG_PREEMPT=y kernels. It is necessary to wait until any task
> > executing in the trampoline in question has left it, taking into account
> > that the trampoline's code might be interrupted and preempted. However,
> > the code in the trampolines is guaranteed never to context switch.
>
> nit, "never to voluntarily context switch" as it can still be
> preempted. It should never call schedule nor a mutex. And really it
> shouldn't even call any spinlocks. Although, trace_stack does, but it
> does so after checking if in_nmi(), which it bails if that is true.
Good catch, thank you! And thank you for the checking on the rest.
Ingo, thoughts?
Thanx, Paul
> > Note that in CONFIG_PREEMPT=n kernels, synchronize_sched() suffices.
> > It is therefore tempting to think in terms of disabling preemption across
> > the trampolines, but there is apparently not enough room to accommodate
> > the needed preempt_disable() and preempt_enable() in the code invoking
> > the trampoline, and putting the preempt_disable() and preempt_enable()
> > in the trampoline itself fails because of the possibility of preemption
> > just before the preempt_disable() and just after the preempt_enable().
> > Similar reasoning rules out use of rcu_read_lock() and rcu_read_unlock().
>
> Correct, as the jump to the trampoline may be preempted. And preemption
> happens just before the first instruction on the trampoline is being
> executed.
>
>
> >
> > Another possibility would be to place the trampolines in a known region
> > of memory, and check for the task's PC being in that region. This fails
> > because trampolines can be interrupted, and I vaguely recall something
> > about them calling function as well. Stack tracing could be added,
> > but stack tracing is not as reliable as it would need to be.
>
> Correct.
>
> >
> > The solution chosen relies on the fact that code in trampolines
> > (and code invoked from trampolines) is not permitted to do voluntary
> > context switches. Thus, if a trampoline is removed, and a given task
> > later does a voluntary context switch (or has been seen in usermode),
> > that task will never again reference that trampoline. Once all tasks
> > are accounted for, the trampoline may safely be removed.
>
> Correct.
>
> >
> > TASKS_RCU implements a flavor of RCU that does exactly this. It has
> > only a single use at the moment, but avoiding memory leaks on
> > production machines being instrumented seems to me to be quite valuable.
>
> Optimized kprobes can also benefit from this, as it currently is
> disabled on CONFIG_PREEMPT due to exactly the same issue. I'll poke
> Masami about this again. I should be seeing him in a couple of weeks at
> the Open Source Summit in Tokyo.
>
>
> >
> > So, Steve, please correct any misconceptions!
>
> Nope, all looks good.
>
> -- Steve
>
next prev parent reply other threads:[~2017-05-15 20:13 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-05-15 18:23 Use case for TASKS_RCU Paul E. McKenney
2017-05-15 18:48 ` Steven Rostedt
2017-05-15 20:12 ` Paul E. McKenney [this message]
2017-05-16 6:22 ` Ingo Molnar
2017-05-16 12:23 ` Paul E. McKenney
2017-05-16 13:07 ` Steven Rostedt
2017-05-24 9:37 ` Masami Hiramatsu
2017-05-19 6:23 ` Ingo Molnar
2017-05-19 13:35 ` Paul E. McKenney
2017-05-19 14:04 ` Steven Rostedt
2017-05-19 14:23 ` Steven Rostedt
2017-05-19 19:06 ` Paul E. McKenney
2017-05-23 0:00 ` Paul E. McKenney
2017-05-23 5:19 ` Steven Rostedt
2017-05-23 15:33 ` Paul E. McKenney
2017-05-23 19:39 ` Steven Rostedt
2017-05-23 20:00 ` Paul E. McKenney
2017-05-23 20:38 ` Steven Rostedt
2017-05-23 21:10 ` Paul E. McKenney
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170515201253.GW3956@linux.vnet.ibm.com \
--to=paulmck@linux.vnet.ibm.com \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@kernel.org \
--cc=rostedt@goodmis.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).