context_tracking.c 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201
  1. /*
  2. * Context tracking: Probe on high level context boundaries such as kernel
  3. * and userspace. This includes syscalls and exceptions entry/exit.
  4. *
  5. * This is used by RCU to remove its dependency on the timer tick while a CPU
  6. * runs in userspace.
  7. *
  8. * Started by Frederic Weisbecker:
  9. *
  10. * Copyright (C) 2012 Red Hat, Inc., Frederic Weisbecker <fweisbec@redhat.com>
  11. *
  12. * Many thanks to Gilad Ben-Yossef, Paul McKenney, Ingo Molnar, Andrew Morton,
  13. * Steven Rostedt, Peter Zijlstra for suggestions and improvements.
  14. *
  15. */
  16. #include <linux/context_tracking.h>
  17. #include <linux/rcupdate.h>
  18. #include <linux/sched.h>
  19. #include <linux/hardirq.h>
  20. #include <linux/export.h>
  21. #define CREATE_TRACE_POINTS
  22. #include <trace/events/context_tracking.h>
  23. struct static_key context_tracking_enabled = STATIC_KEY_INIT_FALSE;
  24. EXPORT_SYMBOL_GPL(context_tracking_enabled);
  25. DEFINE_PER_CPU(struct context_tracking, context_tracking);
  26. EXPORT_SYMBOL_GPL(context_tracking);
  27. void context_tracking_cpu_set(int cpu)
  28. {
  29. if (!per_cpu(context_tracking.active, cpu)) {
  30. per_cpu(context_tracking.active, cpu) = true;
  31. static_key_slow_inc(&context_tracking_enabled);
  32. }
  33. }
  34. /**
  35. * context_tracking_user_enter - Inform the context tracking that the CPU is going to
  36. * enter userspace mode.
  37. *
  38. * This function must be called right before we switch from the kernel
  39. * to userspace, when it's guaranteed the remaining kernel instructions
  40. * to execute won't use any RCU read side critical section because this
  41. * function sets RCU in extended quiescent state.
  42. */
  43. void context_tracking_user_enter(void)
  44. {
  45. unsigned long flags;
  46. /*
  47. * Some contexts may involve an exception occuring in an irq,
  48. * leading to that nesting:
  49. * rcu_irq_enter() rcu_user_exit() rcu_user_exit() rcu_irq_exit()
  50. * This would mess up the dyntick_nesting count though. And rcu_irq_*()
  51. * helpers are enough to protect RCU uses inside the exception. So
  52. * just return immediately if we detect we are in an IRQ.
  53. */
  54. if (in_interrupt())
  55. return;
  56. /* Kernel threads aren't supposed to go to userspace */
  57. WARN_ON_ONCE(!current->mm);
  58. local_irq_save(flags);
  59. if ( __this_cpu_read(context_tracking.state) != IN_USER) {
  60. if (__this_cpu_read(context_tracking.active)) {
  61. trace_user_enter(0);
  62. /*
  63. * At this stage, only low level arch entry code remains and
  64. * then we'll run in userspace. We can assume there won't be
  65. * any RCU read-side critical section until the next call to
  66. * user_exit() or rcu_irq_enter(). Let's remove RCU's dependency
  67. * on the tick.
  68. */
  69. vtime_user_enter(current);
  70. rcu_user_enter();
  71. }
  72. /*
  73. * Even if context tracking is disabled on this CPU, because it's outside
  74. * the full dynticks mask for example, we still have to keep track of the
  75. * context transitions and states to prevent inconsistency on those of
  76. * other CPUs.
  77. * If a task triggers an exception in userspace, sleep on the exception
  78. * handler and then migrate to another CPU, that new CPU must know where
  79. * the exception returns by the time we call exception_exit().
  80. * This information can only be provided by the previous CPU when it called
  81. * exception_enter().
  82. * OTOH we can spare the calls to vtime and RCU when context_tracking.active
  83. * is false because we know that CPU is not tickless.
  84. */
  85. __this_cpu_write(context_tracking.state, IN_USER);
  86. }
  87. local_irq_restore(flags);
  88. }
  89. #ifdef CONFIG_PREEMPT
  90. /**
  91. * preempt_schedule_context - preempt_schedule called by tracing
  92. *
  93. * The tracing infrastructure uses preempt_enable_notrace to prevent
  94. * recursion and tracing preempt enabling caused by the tracing
  95. * infrastructure itself. But as tracing can happen in areas coming
  96. * from userspace or just about to enter userspace, a preempt enable
  97. * can occur before user_exit() is called. This will cause the scheduler
  98. * to be called when the system is still in usermode.
  99. *
  100. * To prevent this, the preempt_enable_notrace will use this function
  101. * instead of preempt_schedule() to exit user context if needed before
  102. * calling the scheduler.
  103. */
  104. void __sched notrace preempt_schedule_context(void)
  105. {
  106. enum ctx_state prev_ctx;
  107. if (likely(!preemptible()))
  108. return;
  109. /*
  110. * Need to disable preemption in case user_exit() is traced
  111. * and the tracer calls preempt_enable_notrace() causing
  112. * an infinite recursion.
  113. */
  114. preempt_disable_notrace();
  115. prev_ctx = exception_enter();
  116. preempt_enable_no_resched_notrace();
  117. preempt_schedule();
  118. preempt_disable_notrace();
  119. exception_exit(prev_ctx);
  120. preempt_enable_notrace();
  121. }
  122. EXPORT_SYMBOL_GPL(preempt_schedule_context);
  123. #endif /* CONFIG_PREEMPT */
  124. /**
  125. * context_tracking_user_exit - Inform the context tracking that the CPU is
  126. * exiting userspace mode and entering the kernel.
  127. *
  128. * This function must be called after we entered the kernel from userspace
  129. * before any use of RCU read side critical section. This potentially include
  130. * any high level kernel code like syscalls, exceptions, signal handling, etc...
  131. *
  132. * This call supports re-entrancy. This way it can be called from any exception
  133. * handler without needing to know if we came from userspace or not.
  134. */
  135. void context_tracking_user_exit(void)
  136. {
  137. unsigned long flags;
  138. if (in_interrupt())
  139. return;
  140. local_irq_save(flags);
  141. if (__this_cpu_read(context_tracking.state) == IN_USER) {
  142. if (__this_cpu_read(context_tracking.active)) {
  143. /*
  144. * We are going to run code that may use RCU. Inform
  145. * RCU core about that (ie: we may need the tick again).
  146. */
  147. rcu_user_exit();
  148. vtime_user_exit(current);
  149. trace_user_exit(0);
  150. }
  151. __this_cpu_write(context_tracking.state, IN_KERNEL);
  152. }
  153. local_irq_restore(flags);
  154. }
  155. /**
  156. * __context_tracking_task_switch - context switch the syscall callbacks
  157. * @prev: the task that is being switched out
  158. * @next: the task that is being switched in
  159. *
  160. * The context tracking uses the syscall slow path to implement its user-kernel
  161. * boundaries probes on syscalls. This way it doesn't impact the syscall fast
  162. * path on CPUs that don't do context tracking.
  163. *
  164. * But we need to clear the flag on the previous task because it may later
  165. * migrate to some CPU that doesn't do the context tracking. As such the TIF
  166. * flag may not be desired there.
  167. */
  168. void __context_tracking_task_switch(struct task_struct *prev,
  169. struct task_struct *next)
  170. {
  171. clear_tsk_thread_flag(prev, TIF_NOHZ);
  172. set_tsk_thread_flag(next, TIF_NOHZ);
  173. }
  174. #ifdef CONFIG_CONTEXT_TRACKING_FORCE
  175. void __init context_tracking_init(void)
  176. {
  177. int cpu;
  178. for_each_possible_cpu(cpu)
  179. context_tracking_cpu_set(cpu);
  180. }
  181. #endif