]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/commitdiff
context-tracking: Introduce CONFIG_HAVE_TIF_NOHZ
authorFrederic Weisbecker <frederic@kernel.org>
Mon, 27 Jan 2020 15:41:52 +0000 (16:41 +0100)
committerFrederic Weisbecker <frederic@kernel.org>
Fri, 14 Feb 2020 15:05:04 +0000 (16:05 +0100)
A few archs (x86, arm, arm64) don't rely anymore on TIF_NOHZ to call
into context tracking on user entry/exit but instead use static keys
(or not) to optimize those calls. Ideally every arch should migrate to
that behaviour in the long run.

Settle a config option to let those archs remove their TIF_NOHZ
definitions.

Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Andy Lutomirski <luto@kernel.org>
Cc: Russell King <linux@armlinux.org.uk>
Cc: Catalin Marinas <catalin.marinas@arm.com>
Cc: Will Deacon <will@kernel.org>
Cc: Ralf Baechle <ralf@linux-mips.org>
Cc: Paul Burton <paulburton@kernel.org>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Paul Mackerras <paulus@samba.org>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: David S. Miller <davem@davemloft.net>
arch/Kconfig
arch/arm/Kconfig
arch/arm64/Kconfig
arch/mips/Kconfig
arch/powerpc/Kconfig
arch/sparc/Kconfig
arch/x86/Kconfig
kernel/context_tracking.c

index 98de654b79b312eca4737efff9b6b1460cb94f37..dbf420a9f87b9f9f64c05e21106aaf65a401f857 100644 (file)
@@ -540,11 +540,17 @@ config HAVE_CONTEXT_TRACKING
        help
          Provide kernel/user boundaries probes necessary for subsystems
          that need it, such as userspace RCU extended quiescent state.
-         Syscalls need to be wrapped inside user_exit()-user_enter() through
-         the slow path using TIF_NOHZ flag. Exceptions handlers must be
-         wrapped as well. Irqs are already protected inside
-         rcu_irq_enter/rcu_irq_exit() but preemption or signal handling on
-         irq exit still need to be protected.
+         Syscalls need to be wrapped inside user_exit()-user_enter(), either
+         optimized behind static key or through the slow path using TIF_NOHZ
+         flag. Exceptions handlers must be wrapped as well. Irqs are already
+         protected inside rcu_irq_enter/rcu_irq_exit() but preemption or signal
+         handling on irq exit still need to be protected.
+
+config HAVE_TIF_NOHZ
+       bool
+       help
+         Arch relies on TIF_NOHZ and syscall slow path to implement context
+         tracking calls to user_enter()/user_exit().
 
 config HAVE_VIRT_CPU_ACCOUNTING
        bool
index 97864aabc2a6fa2aa7c86df3b19454b7e68c3dda..38b764cae559afe8d3355c5427490da1e9112c47 100644 (file)
@@ -72,6 +72,7 @@ config ARM
        select HAVE_ARM_SMCCC if CPU_V7
        select HAVE_EBPF_JIT if !CPU_ENDIAN_BE32
        select HAVE_CONTEXT_TRACKING
+       select HAVE_TIF_NOHZ
        select HAVE_COPY_THREAD_TLS
        select HAVE_C_RECORDMCOUNT
        select HAVE_DEBUG_KMEMLEAK if !XIP_KERNEL
index 0b30e884e0889ae0203258360e76d849dc2f133e..5c945fa3df260c02bd6415587f67d6de0166ed17 100644 (file)
@@ -140,6 +140,7 @@ config ARM64
        select HAVE_CMPXCHG_DOUBLE
        select HAVE_CMPXCHG_LOCAL
        select HAVE_CONTEXT_TRACKING
+       select HAVE_TIF_NOHZ
        select HAVE_COPY_THREAD_TLS
        select HAVE_DEBUG_BUGVERBOSE
        select HAVE_DEBUG_KMEMLEAK
index 797d7f1ad5fe8841410bb0bbcdb53f730ba5edbb..2589d4760e45f8d50ca2860b82d433e4da61a6af 100644 (file)
@@ -51,6 +51,7 @@ config MIPS
        select HAVE_ASM_MODVERSIONS
        select HAVE_CBPF_JIT if !64BIT && !CPU_MICROMIPS
        select HAVE_CONTEXT_TRACKING
+       select HAVE_TIF_NOHZ
        select HAVE_COPY_THREAD_TLS
        select HAVE_C_RECORDMCOUNT
        select HAVE_DEBUG_KMEMLEAK
index 497b7d0b2d7edf7cbefe4c1a86f678502c3fd8dc..6f40af294685c555d2ed9b77ebdf746b19772638 100644 (file)
@@ -182,6 +182,7 @@ config PPC
        select HAVE_STACKPROTECTOR              if PPC64 && $(cc-option,-mstack-protector-guard=tls -mstack-protector-guard-reg=r13)
        select HAVE_STACKPROTECTOR              if PPC32 && $(cc-option,-mstack-protector-guard=tls -mstack-protector-guard-reg=r2)
        select HAVE_CONTEXT_TRACKING            if PPC64
+       select HAVE_TIF_NOHZ                    if PPC64
        select HAVE_COPY_THREAD_TLS
        select HAVE_DEBUG_KMEMLEAK
        select HAVE_DEBUG_STACKOVERFLOW
index c1dd6dd642f43aa597154d929cae371e613e78e1..9cc9ab04bd993be72e07a7848a0a253455735299 100644 (file)
@@ -71,6 +71,7 @@ config SPARC64
        select HAVE_FTRACE_MCOUNT_RECORD
        select HAVE_SYSCALL_TRACEPOINTS
        select HAVE_CONTEXT_TRACKING
+       select HAVE_TIF_NOHZ
        select HAVE_DEBUG_KMEMLEAK
        select IOMMU_HELPER
        select SPARSE_IRQ
index beea77046f9bab3eef998e8dd4c3248932dbc004..549eed3460c961ddc348e072a956019ba31d7f38 100644 (file)
@@ -211,6 +211,7 @@ config X86
        select HAVE_STACK_VALIDATION            if X86_64
        select HAVE_RSEQ
        select HAVE_SYSCALL_TRACEPOINTS
+       select HAVE_TIF_NOHZ                    if X86_64
        select HAVE_UNSTABLE_SCHED_CLOCK
        select HAVE_USER_RETURN_NOTIFIER
        select HAVE_GENERIC_VDSO
index 0296b4bda8f1fb5f87c549edbf83093644ebaabf..ce430885c26c6d79d63ee86cf5e6c66ed32a396c 100644 (file)
@@ -198,11 +198,13 @@ void __init context_tracking_cpu_set(int cpu)
        if (initialized)
                return;
 
+#ifdef CONFIG_HAVE_TIF_NOHZ
        /*
         * Set TIF_NOHZ to init/0 and let it propagate to all tasks through fork
         * This assumes that init is the only task at this early boot stage.
         */
        set_tsk_thread_flag(&init_task, TIF_NOHZ);
+#endif
        WARN_ON_ONCE(!tasklist_empty());
 
        initialized = true;