[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87wnfczrt8.ffs@tglx>
Date: Tue, 26 Apr 2022 01:06:27 +0200
From: Thomas Gleixner <tglx@...utronix.de>
To: Marcelo Tosatti <mtosatti@...hat.com>, linux-kernel@...r.kernel.org
Cc: Nitesh Lal <nilal@...hat.com>,
Nicolas Saenz Julienne <nsaenzju@...hat.com>,
Frederic Weisbecker <frederic@...nel.org>,
Christoph Lameter <cl@...ux.com>,
Juri Lelli <juri.lelli@...hat.com>,
Peter Zijlstra <peterz@...radead.org>,
Alex Belits <abelits@...its.com>, Peter Xu <peterx@...hat.com>,
Daniel Bristot de Oliveira <bristot@...hat.com>,
Oscar Shiang <oscar0225@...email.tw>,
Marcelo Tosatti <mtosatti@...hat.com>
Subject: Re: [patch v12 05/13] task isolation: sync vmstats on return to
userspace
On Tue, Mar 15 2022 at 12:31, Marcelo Tosatti wrote:
> The logic to disable vmstat worker thread, when entering
> nohz full, does not cover all scenarios. For example, it is possible
> for the following to happen:
>
> 1) enter nohz_full, which calls refresh_cpu_vm_stats, syncing the stats.
> 2) app runs mlock, which increases counters for mlock'ed pages.
> 3) start -RT loop
>
> Since refresh_cpu_vm_stats from nohz_full logic can happen _before_
> the mlock, vmstat shepherd can restart vmstat worker thread on
> the CPU in question.
>
> To fix this, use the task isolation prctl interface to quiesce
> deferred actions when returning to userspace.
>
> This patch adds hooks to fork and exit code paths.
git grep 'This patch' Documentation/process/
> +void __task_isol_exit(struct task_struct *tsk);
> +static inline void task_isol_exit(struct task_struct *tsk)
I assume the amount of new lines per patch is restricted somehow, right?
Glueing the __task_isol_exit() declaration to the definition of
task_isol_exit() is just annoyingly disturbing the reading flow.
New lines exist for a reason.
> +{
> + if (tsk->task_isol_info)
> + __task_isol_exit(tsk);
> +}
> #else
but ...
> +static inline void task_isol_exit_to_user_mode(void)
> +{
> +}
> +
> static inline void task_isol_free(struct task_struct *tsk)
> {
> }
>
> +static inline void task_isol_exit(struct task_struct *tsk)
> +{
> +}
> +
here you use plenty of them where it does not matter at all....
What's wrong with:
static inline void task_isol_exit_to_user_mode(void) { }
static inline void task_isol_free(struct task_struct *tsk) { }
static inline void task_isol_exit(struct task_struct *tsk) { }
and spending at least one of the saved newlines for separating the
above:
+ void __task_isol_exit(struct task_struct *tsk);
+
+ static inline void task_isol_exit(struct task_struct *tsk)
Hmm?
> @@ -251,6 +257,11 @@ static int cfg_feat_quiesce_set(unsigned
> info->quiesce_mask = i_qctrl->quiesce_mask;
> info->oneshot_mask = i_qctrl->quiesce_oneshot_mask;
> info->conf_mask |= ISOL_F_QUIESCE;
> +
> + if ((info->active_mask & ISOL_F_QUIESCE) &&
> + (info->quiesce_mask & ISOL_F_QUIESCE_VMSTATS))
> + set_thread_flag(TIF_TASK_ISOL);
Yet more hard coded special purpose muck. Plus the proof of the
inconsistency I described before...
> +void task_isol_exit_to_user_mode(void)
> +{
> + struct task_isol_info *i;
*i is really a descriptive variable name. Is this supposed to be
submitted to the convoluted C-code contest?
Dammit, we are not short of characters here and 'i' is generally used as
iterator variable which is hardly of type struct task_isol_info *.
> + clear_thread_flag(TIF_TASK_ISOL);
What? See below....
> + i = current->task_isol_info;
> + if (!i)
> + return;
That really makes sense. Why can a task which has TIF_TASK_ISOL set,
have current->task_isol_info != NULL?
I'm all for defensive programming, but if you really want to check this
then this should be:
isol_info = current->task_isol_info;
if (WARN_ON_ONCE(!isol_info))
return;
No?
> + if (i->active_mask != ISOL_F_QUIESCE)
> + return;
Yay, more future proof hard coding!
> + if (i->quiesce_mask & ISOL_F_QUIESCE_VMSTATS) {
> + sync_vmstat();
> + if (i->oneshot_mask & ISOL_F_QUIESCE_VMSTATS)
> + i->quiesce_mask &= ~ISOL_F_QUIESCE_VMSTATS;
The point of this exercise is?
To clear quiesce_mask because this code path cannot be reached anymore
due to TIF_TASK_ISOL being cleared above.
Of course the active vs. no subfeature configured inconsistency is
preserved here for consistency reasons. At least something which is
consistent.
> /**
> * arch_check_user_regs - Architecture specific sanity check for user mode regs
> Index: linux-2.6/kernel/exit.c
> ===================================================================
> --- linux-2.6.orig/kernel/exit.c
> +++ linux-2.6/kernel/exit.c
> @@ -64,6 +64,7 @@
> #include <linux/compat.h>
> #include <linux/io_uring.h>
> #include <linux/kprobes.h>
> +#include <linux/task_isolation.h>
>
> #include <linux/uaccess.h>
> #include <asm/unistd.h>
> @@ -759,6 +760,7 @@ void __noreturn do_exit(long code)
> validate_creds_for_do_exit(tsk);
>
> io_uring_files_cancel();
> + task_isol_exit(tsk);
The purpose of this is?
> +static inline void task_isol_exit(struct task_struct *tsk)
> +{
> + if (tsk->task_isol_info)
> + __task_isol_exit(tsk);
> +}
and
>+ void __task_isol_exit(struct task_struct *tsk)
>+ {
>+ }
Makes a lot of sense and is thoroughly explained in the changelog and
comments....
Thanks,
tglx
Powered by blists - more mailing lists