Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp3066148ybh; Mon, 16 Mar 2020 15:12:34 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtrf14zOWcF9knfwo3s90LrKFvPnDrN8pz0BWA9jCeb6NaFXB/GGYGo7Y/uUOM6c2yRNtnO X-Received: by 2002:aca:c70f:: with SMTP id x15mr1304266oif.80.1584396754110; Mon, 16 Mar 2020 15:12:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584396754; cv=none; d=google.com; s=arc-20160816; b=TxBKHumIURKsUdrPGZDuwoLF3uVRWUhcHa/9tEyG43P/aN3Qcb56X8XpwGeEeqGqIr +mHgPYV4IDm18IvOvcg6dCCYemD3cBNAdu+zeXZ7BC4uZq7NDJ4SPfAI4ugWhtPP2wVg t8jy51v2ivBtAyiUs1H4tayzmgDDVlJK+kdnIY2/cWDkJx5IVu7MLApnq+fbPqcqItBr uA8vkcqBLBRKqnQbryhGu0OxQ51+E7m5by5QO4APVYLZvH4Rm6LVkeqKdtg4cRWEta9M zUAxlh2JClw7XYYbJebZpMc6JEaQt8lmkoDJwCscL7csShEfxCptzWB3qUr+KDQMulrO 7BBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=5s5JRQ6eUwaiRILaxST2pfmYWraugG5t6ehqV+G50q0=; b=KP92JcuKZ/eGD28kaNRE/471DbfToAHrcczjc0g1Dum6WxkVz+P2+EiwmfoH8sNvQa 2fjwu+ezyCO5aa99lRsRcRt/9yC0odUdOm6XFiq18pBDn03ayaKl8HLjFigIgVkCsRp+ OjH+8+lftec4IDcrSHqYOLKXrrxb201b+SltrsK+DddsmhI0GBRXb8kBOlHg0IJrqvOB N4iZtC2KlZh9xVfTiHM6DjSyEt6UbiupEtPvGEjx9uD/6QHQaLiiURsMR8XbLzUE81XH W3jm1bZk2jPv7TXQdo2usQJU5N9Qu9iDV5kSZoth7IyNRs1eYhnmi6r2EpAVSt72nzw8 SExg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pL5bpfS8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w31si573513otb.59.2020.03.16.15.12.21; Mon, 16 Mar 2020 15:12:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pL5bpfS8; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732773AbgCPWLY (ORCPT + 99 others); Mon, 16 Mar 2020 18:11:24 -0400 Received: from mail.kernel.org ([198.145.29.99]:54136 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732723AbgCPWLY (ORCPT ); Mon, 16 Mar 2020 18:11:24 -0400 Received: from paulmck-ThinkPad-P72.home (50-39-105-78.bvtn.or.frontiernet.net [50.39.105.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 91945205ED; Mon, 16 Mar 2020 22:11:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1584396683; bh=KeVG4Jc5wntUChsOVL8AqSALhUZuXAUTmPr7Acqdg74=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=pL5bpfS8SDGh0vbqTBsAoG9qlJszB/MqkJCqpwUkH4si1x8IjuDod4hsezzWO5Ubm NJBOt3mmIQ/1heiixLyQ9BXwqsQxCVcXY+qzW/JALku5Sgo/w7D13nF9IWG0/T8KVW BHF0Kg++oITnKkZWWaoe+4DgubFzDzLwk0e5btwg= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id 404973522E56; Mon, 16 Mar 2020 15:11:23 -0700 (PDT) Date: Mon, 16 Mar 2020 15:11:23 -0700 From: "Paul E. McKenney" To: Steven Rostedt Cc: Joel Fernandes , rcu , LKML , "kernel-team@fb.com," , Ingo Molnar , Lai Jiangshan , dipankar , Andrew Morton , Mathieu Desnoyers , Josh Triplett , Thomas Glexiner , Peter Zijlstra , David Howells , Eric Dumazet , Frederic Weisbecker , Oleg Nesterov Subject: Re: [PATCH RFC tip/core/rcu 09/16] rcu-tasks: Add an RCU-tasks rude variant Message-ID: <20200316221123.GC3199@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20200312181618.GA21271@paulmck-ThinkPad-P72> <20200312181702.8443-9-paulmck@kernel.org> <20200316194754.GA172196@google.com> <20200316203241.GB3199@paulmck-ThinkPad-P72> <20200316173219.1f8b7443@gandalf.local.home> <20200316180352.4816cb99@gandalf.local.home> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200316180352.4816cb99@gandalf.local.home> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 16, 2020 at 06:03:52PM -0400, Steven Rostedt wrote: > On Mon, 16 Mar 2020 17:45:40 -0400 > Joel Fernandes wrote: > > > > > > > Same for the function side (if not even more so). This would require adding > > > a srcu_read_lock() to all functions that can be traced! That would be a huge > > > kill in performance. Probably to the point no one would bother even using > > > function tracer. > > > > Point well taken! Thanks, > > Actually, it's worse than that. (We talked about this on IRC but I wanted > it documented here too). > > You can't use any type of locking, unless you insert it around all the > callers of the nops (which is unreasonable). > > That is, we have gcc -pg -mfentry that creates at the start of all traced > functions: > > : > call __fentry__ > [code for function here] > > At boot up (or even by the compiler itself) we convert that to: > > : > nop > [code for function here] > > > When we want to trace this function we use text_poke (with current kernels) > and convert it to this: > > : > call trace_trampoline > [code for function here] > > > That trace_trampoline can be allocated, which means when its no longer > needed, it must be freed. But when do we know it's safe to free it? Here's > the issue. > > > : > call trace_trampoline <- interrupt happens just after the jump > [code for function here] > > Now the task has just executed the call to the trace_trampoline. Which > means the instruction pointer is set to the start of the trampoline. But it > has yet executed that trampoline. > > Now if the task is preempted, and a real time hog is keeping it from > running for minutes at a time (which is possible!). And in the mean time, > we are done with that trampoline and free it. What happens when that task > is scheduled back? There's no more trampoline to execute even though its > instruction pointer is to execute the first operand on the trampoline! > > I used the analogy of jumping off the cliff expecting a magic carpet to be > there to catch you, and just before you land, it disappears. That would be > a very bad day indeed! I never have thought of an analogy between Tasks RCU and magic carpets before. Maybe time to go watch Aladdin or something. ;-) Thanx, Paul > We have no way to add a grace period between the start of a function (can > be *any* function) and the start of the trampoline. Since the problem is > that the task was non-voluntarily preempted before it could execute the > trampoline, and that trampolines are not allowed (suppose) to call > schedule, then we have our quiescent state to track (voluntary scheduling). > When all tasks have either voluntarily scheduled, or entered user space > after disconnecting a trampoline from a function, we know that it is safe to > free the trampoline. > > -- Steve