Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755532Ab3IEU0E (ORCPT ); Thu, 5 Sep 2013 16:26:04 -0400 Received: from hrndva-omtalb.mail.rr.com ([71.74.56.122]:5470 "EHLO hrndva-omtalb.mail.rr.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751880Ab3IEU0B (ORCPT ); Thu, 5 Sep 2013 16:26:01 -0400 X-Authority-Analysis: v=2.0 cv=ddwCLAre c=1 sm=0 a=Sro2XwOs0tJUSHxCKfOySw==:17 a=Drc5e87SC40A:10 a=JDfofD-L5ZgA:10 a=5SG0PmZfjMsA:10 a=kj9zAlcOel0A:10 a=meVymXHHAAAA:8 a=KGjhK52YXX0A:10 a=5p3hctMY2UsA:10 a=VnNF1IyMAAAA:8 a=dauyWH8gal7cKoPJGKwA:9 a=CjuIK1q_8ugA:10 a=jeBq3FmKZ4MA:10 a=Sro2XwOs0tJUSHxCKfOySw==:117 X-Cloudmark-Score: 0 X-Authenticated-User: X-Originating-IP: 67.255.60.225 Date: Thu, 5 Sep 2013 16:25:58 -0400 From: Steven Rostedt To: paulmck@linux.vnet.ibm.com Cc: linux-kernel@vger.kernel.org, mingo@elte.hu, laijs@cn.fujitsu.com, dipankar@in.ibm.com, akpm@linux-foundation.org, mathieu.desnoyers@efficios.com, josh@joshtriplett.org, niv@us.ibm.com, tglx@linutronix.de, peterz@infradead.org, dhowells@redhat.com, edumazet@google.com, darren@dvhart.com, fweisbec@gmail.com, sbw@mit.edu Subject: Re: [PATCH] rcu: Is it safe to enter an RCU read-side critical section? Message-ID: <20130905162558.6f13add0@gandalf.local.home> In-Reply-To: <20130905195234.GA20555@linux.vnet.ibm.com> References: <20130905195234.GA20555@linux.vnet.ibm.com> X-Mailer: Claws Mail 3.9.2 (GTK+ 2.24.20; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2687 Lines: 72 On Thu, 5 Sep 2013 12:52:34 -0700 "Paul E. McKenney" wrote: > There is currently no way for kernel code to determine whether it > is safe to enter an RCU read-side critical section, in other words, > whether or not RCU is paying attention to the currently running CPU. > Given the large and increasing quantity of code shared by the idle loop > and non-idle code, the this shortcoming is becoming increasingly painful. > > This commit therefore adds rcu_watching_this_cpu(), which returns true > if it is safe to enter an RCU read-side critical section on the currently > running CPU. This function is quite fast, using only a __this_cpu_read(). > However, the caller must disable preemption. > > Reported-by: Steven Rostedt > Signed-off-by: Paul E. McKenney Thanks Paul! > > include/linux/rcupdate.h | 1 + > kernel/rcutree.c | 12 ++++++++++++ > 2 files changed, 13 insertions(+) > > diff --git a/include/linux/rcupdate.h b/include/linux/rcupdate.h > index 15d33d9..1c7112c 100644 > --- a/include/linux/rcupdate.h > +++ b/include/linux/rcupdate.h > @@ -225,6 +225,7 @@ extern void rcu_idle_enter(void); > extern void rcu_idle_exit(void); > extern void rcu_irq_enter(void); > extern void rcu_irq_exit(void); > +extern bool rcu_watching_this_cpu(void); > > #ifdef CONFIG_RCU_USER_QS > extern void rcu_user_enter(void); > diff --git a/kernel/rcutree.c b/kernel/rcutree.c > index a06d172..7b8fcee 100644 > --- a/kernel/rcutree.c > +++ b/kernel/rcutree.c Don't we also need a rcutiny version too? Otherwise I'm guessing that it wont compile if I use it with rcutiny (even if it always returns true). -- Steve > @@ -710,6 +710,18 @@ EXPORT_SYMBOL_GPL(rcu_lockdep_current_cpu_online); > #endif /* #if defined(CONFIG_PROVE_RCU) && defined(CONFIG_HOTPLUG_CPU) */ > > /** > + * rcu_watching_this_cpu - are RCU read-side critical sections safe? > + * > + * Return true if RCU is watching the running CPU, which means that this > + * CPU can safely enter RCU read-side critical sections. The caller must > + * have at least disabled preemption. > + */ > +bool rcu_watching_this_cpu(void) > +{ > + return !!__this_cpu_read(rcu_dynticks.dynticks_nesting); > +} > + > +/** > * rcu_is_cpu_rrupt_from_idle - see if idle or immediately interrupted from idle > * > * If the current CPU is idle or running at a first-level (not nested) -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/