diff options
author | Frederic Weisbecker <frederic@kernel.org> | 2020-11-17 18:16:33 +0300 |
---|---|---|
committer | Peter Zijlstra <peterz@infradead.org> | 2020-11-19 13:25:41 +0300 |
commit | 83c2da2e605c73aafcc02df04b2dbf1ccbfc24c0 (patch) | |
tree | 184692237332288e44c718580264c414fe0c7244 /crypto/api.c | |
parent | 51af3f23063946344330a77a7d1dece6fc6bb5d8 (diff) | |
download | linux-83c2da2e605c73aafcc02df04b2dbf1ccbfc24c0.tar.xz |
context_tracking: Introduce HAVE_CONTEXT_TRACKING_OFFSTACK
Historically, context tracking had to deal with fragile entry code path,
ie: before user_exit() is called and after user_enter() is called, in
case some of those spots would call schedule() or use RCU. On such
cases, the site had to be protected between exception_enter() and
exception_exit() that save the context tracking state in the task stack.
Such sleepable fragile code path had many different origins: tracing,
exceptions, early or late calls to context tracking on syscalls...
Aside of that not being pretty, saving the context tracking state on
the task stack forces us to run context tracking on all CPUs, including
housekeepers, and prevents us to completely shutdown nohz_full at
runtime on a CPU in the future as context tracking and its overhead
would still need to run system wide.
Now thanks to the extensive efforts to sanitize x86 entry code, those
conditions have been removed and we can now get rid of these workarounds
in this architecture.
Create a Kconfig feature to express this achievement.
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Link: https://lkml.kernel.org/r/20201117151637.259084-2-frederic@kernel.org
Diffstat (limited to 'crypto/api.c')
0 files changed, 0 insertions, 0 deletions