Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp694944ybi; Fri, 24 May 2019 09:57:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqx4kPvSgPi98TW0s7BmIJ2/kLL5XoWfBdPy1gdmMLAM1w0kUnt7qE7ZTgZy+PP5XP2LzpPr X-Received: by 2002:a65:578b:: with SMTP id b11mr106103910pgr.446.1558717039250; Fri, 24 May 2019 09:57:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558717039; cv=none; d=google.com; s=arc-20160816; b=JXY6lddDNJj/wILUCTFoA3WzJ6QQCgk3QRsWDkj7fX0joom9bNc2TMnDmTX4hlvOBA /RPbFEVvvRLIO00F5V2+lqDz8FOvOJ6laL0pC+V1TZtIt85tvs4u2iAEkUSkK6i6m3if AgR8BIS4/a9sGIBnXPdcJGJ6fFO2KCi7I1w+RMav+bt1OlMqs5ZXAz9BxyvomAjIS4YR 70iNEAPRYbVRmG8abVbAjVtm04pOoG4begNb+clM60640ixnsCkngIef7bBs9pp0qryh KW5WZPJkWXZWyg+lb8EAxPRKo55WgrDq+DCdnIL26A1wz+3SE+T7TiydHADxGX4YNuM/ sISg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from; bh=CHRZL7Tz7XKu4m7dtFEMbCoNwfhpbb2jDfe/3ypQzCY=; b=T5T3A0ihHZ6KGmGzIprOhCWdb4tW1q2dx1fdzr/gzRqvZUcaXR8FcpwhJ8f6LyTjIN LL0M23wMwjSiiZBE/v0LKFVWRLJs2Sqtzc4pRJIEOnSJV8AcCf2ixhwyne3R6XY0QO26 LNkTz5yMOCu7I1Wdi6hMqrmfgCNN/uKIMTnllghcT3boNDQH/vJi54/mZUv62MLBfMeo rb2UHd9TNnh9lhl02JXrEPSMXrQULU2ni72EuSGV7feE7FFUWXnKgx0hF0jmNivRCkfZ FKgyyA/3w6t+7Ba5zUEex+i8UrsZlvXhm5CgAfCGPTNblXO/OI00lYOaFUxVHfnIcITs WCuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g9si4328300pjv.56.2019.05.24.09.57.02; Fri, 24 May 2019 09:57:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391043AbfEXQyA (ORCPT + 99 others); Fri, 24 May 2019 12:54:00 -0400 Received: from mx1.redhat.com ([209.132.183.28]:49818 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2390346AbfEXQyA (ORCPT ); Fri, 24 May 2019 12:54:00 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.phx2.redhat.com [10.5.11.13]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 142EB81121; Fri, 24 May 2019 16:54:00 +0000 (UTC) Received: from llong.com (dhcp-17-85.bos.redhat.com [10.18.17.85]) by smtp.corp.redhat.com (Postfix) with ESMTP id 2E0086092D; Fri, 24 May 2019 16:53:56 +0000 (UTC) From: Waiman Long To: Peter Zijlstra , Ingo Molnar , Will Deacon , Thomas Gleixner , Borislav Petkov , "H. Peter Anvin" Cc: linux-kernel@vger.kernel.org, x86@kernel.org, Davidlohr Bueso , Linus Torvalds , Tim Chen , huang ying , Waiman Long Subject: [PATCH v2] locking/lock_events: Use this_cpu_add() when necessary Date: Fri, 24 May 2019 12:53:46 -0400 Message-Id: <20190524165346.26373-1-longman@redhat.com> X-Scanned-By: MIMEDefang 2.79 on 10.5.11.13 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.28]); Fri, 24 May 2019 16:54:00 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The kernel test robot has reported that the use of __this_cpu_add() causes bug messages like: BUG: using __this_cpu_add() in preemptible [00000000] code: ... This is only an issue on preempt kernel where preemption can happen in the middle of a percpu operation. We are still using __this_cpu_*() for !preempt kernel to avoid additional overhead in case CONFIG_PREEMPT_COUNT is set. v2: Simplify the condition to just preempt or !preempt. Fixes: a8654596f0371 ("locking/rwsem: Enable lock event counting") Signed-off-by: Waiman Long --- kernel/locking/lock_events.h | 23 +++++++++++++++++++++-- 1 file changed, 21 insertions(+), 2 deletions(-) diff --git a/kernel/locking/lock_events.h b/kernel/locking/lock_events.h index feb1acc54611..05f34068ec06 100644 --- a/kernel/locking/lock_events.h +++ b/kernel/locking/lock_events.h @@ -30,13 +30,32 @@ enum lock_events { */ DECLARE_PER_CPU(unsigned long, lockevents[lockevent_num]); +/* + * The purpose of the lock event counting subsystem is to provide a low + * overhead way to record the number of specific locking events by using + * percpu counters. It is the percpu sum that matters, not specifically + * how many of them happens in each cpu. + * + * In !preempt kernel, we can just use __this_cpu_*() as preemption + * won't happen in the middle of the percpu operation. In preempt kernel, + * preemption happens in the middle of the percpu operation may produce + * incorrect result. + */ +#ifdef CONFIG_PREEMPT +#define lockevent_percpu_inc(x) this_cpu_inc(x) +#define lockevent_percpu_add(x, v) this_cpu_add(x, v) +#else +#define lockevent_percpu_inc(x) __this_cpu_inc(x) +#define lockevent_percpu_add(x, v) __this_cpu_add(x, v) +#endif + /* * Increment the PV qspinlock statistical counters */ static inline void __lockevent_inc(enum lock_events event, bool cond) { if (cond) - __this_cpu_inc(lockevents[event]); + lockevent_percpu_inc(lockevents[event]); } #define lockevent_inc(ev) __lockevent_inc(LOCKEVENT_ ##ev, true) @@ -44,7 +63,7 @@ static inline void __lockevent_inc(enum lock_events event, bool cond) static inline void __lockevent_add(enum lock_events event, int inc) { - __this_cpu_add(lockevents[event], inc); + lockevent_percpu_add(lockevents[event], inc); } #define lockevent_add(ev, c) __lockevent_add(LOCKEVENT_ ##ev, c) -- 2.18.1