Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp2956386ybi; Thu, 18 Jul 2019 18:04:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqzIA07Kkpdwv3PAON7OvxG3RiMIWQ/5S43iyFcXW2zONB/gCBXDiMYRBMe+gfai2/6ud3Ag X-Received: by 2002:a17:902:b789:: with SMTP id e9mr52032241pls.294.1563498288110; Thu, 18 Jul 2019 18:04:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563498288; cv=none; d=google.com; s=arc-20160816; b=QlHlILO9W6sPaAC1A7TnrNcadFxQKR5zkSuZONJihN9H54lsEym9QwRb9zn6qQ/ll8 6khEuUlv9jtuNbBQYIk9onDKYGJzL3Qmyt83zKQv4oV5x5ltVZoxD7iotuWCl/tA/lJZ M37Rbbj0JSaf+qKNAhQQ4NcPvobcEIz619+003EiA/k8dn0QGLKD2mX2yAex1nC4AtvX sUt5eWeHhJ5sJoTh6Cg5BhICNT/TGwU4A9JpMJCR2oD+54gkG1QFF2OXhjBw3kH9XuOl aOtyLKJZnGg5Jc93a7ihn8/CsfZRRPhJw9S4MUyuuRA2+5J//ekol47iG3bnsJXPP6Cw KRIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=234sLOzVHB5hCj+BQKTblG2UsxBEUB0HpiZuWiY8m1k=; b=ROu7gKWiygLGOv8Ef3AAqQWYNjeGaX1DG62x8F1GQIlHH/5MVYYhylaq7x6gnKkhO5 lnwVaO6Mz2S5C8zHgD9F5HJBIHXTg44L+3eH8zk+2+2zsmQY18x/8UER0r90DYgWquqd QKTA4hVCKil7Cn82hV72vLgLbrehzQUPqb4Q0kx6lJjscmiHrEpUBjOzZMspv6L6V0ep yXcH0fUullGzqbWIEXQFICtNxggv3x3gzjRWnkFGPT3UoGx4mZyroS1avTVYtnV6xQ/K DgOBy/P27BAIs8j4KmcNNs/yJqOodoM6dBZbhXEunrN7ILUj1K83AZMmxoOOjH4kBpLs m4gQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t27si783274pgk.502.2019.07.18.18.04.32; Thu, 18 Jul 2019 18:04:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726674AbfGSBD7 (ORCPT + 99 others); Thu, 18 Jul 2019 21:03:59 -0400 Received: from mail-pg1-f196.google.com ([209.85.215.196]:34162 "EHLO mail-pg1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726573AbfGSBD5 (ORCPT ); Thu, 18 Jul 2019 21:03:57 -0400 Received: by mail-pg1-f196.google.com with SMTP id n9so7439792pgc.1 for ; Thu, 18 Jul 2019 18:03:56 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=234sLOzVHB5hCj+BQKTblG2UsxBEUB0HpiZuWiY8m1k=; b=fIn/C+oxIkXyH3rgsASOjz9QnUUYWGfYapVj08rHpJUVzsLcJ0/RXEhrvjzoNv+LJC tf638XI6ng1o7PbvomKPkCwgNP2auqSxI6Im+cpd79YpTaFpsLKNpZla/NiEeAlrn/KQ hr6rkw+VKP7wv81GhwekEquH459W2H0iLYTNzbyDj/oJSV8+IWoWrSUit53GDdgIkR18 ih6iincWXDm9Sy6Q/MnWbIatD5w7VMViOebN/Oaja6tD+VbghK7TtEApuMbr6OYwNzQE TEY7Bg5xrboMwdMFsh9JX+4FYV6EdfYkPSqT+IoNgBf8kIUXjlLBkvlT8t+nKX7BJF0r iT/w== X-Gm-Message-State: APjAAAVBXYlLFuTTkBK2QQaYeX0YekZAzI4C1cYNXXxTcFI9poPjgUJI 7chdPBzjhaqu6PI/kiOqsJ0= X-Received: by 2002:a17:90a:20a2:: with SMTP id f31mr53921159pjg.90.1563498236261; Thu, 18 Jul 2019 18:03:56 -0700 (PDT) Received: from sc2-haas01-esx0118.eng.vmware.com ([66.170.99.1]) by smtp.gmail.com with ESMTPSA id q144sm28887612pfc.103.2019.07.18.18.03.55 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Thu, 18 Jul 2019 18:03:55 -0700 (PDT) From: Nadav Amit To: Peter Zijlstra Cc: Andy Lutomirski , x86@kernel.org, linux-kernel@vger.kernel.org, Dave Hansen , Thomas Gleixner , Ingo Molnar , Nadav Amit Subject: [RFC 5/7] percpu: Assume preemption is disabled on per_cpu_ptr() Date: Thu, 18 Jul 2019 10:41:08 -0700 Message-Id: <20190718174110.4635-6-namit@vmware.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190718174110.4635-1-namit@vmware.com> References: <20190718174110.4635-1-namit@vmware.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When per_cpu_ptr() is used, the caller should have preemption disabled, as otherwise the pointer is meaningless. If the user wants an "unstable" pointer he should call raw_cpu_ptr(). Add an assertion to check that indeed preemption is disabled, and distinguish between the two cases to allow further, per-arch optimizations. Signed-off-by: Nadav Amit --- include/asm-generic/percpu.h | 12 ++++++++++++ include/linux/percpu-defs.h | 33 ++++++++++++++++++++++++++++++++- 2 files changed, 44 insertions(+), 1 deletion(-) diff --git a/include/asm-generic/percpu.h b/include/asm-generic/percpu.h index c2de013b2cf4..7853605f4210 100644 --- a/include/asm-generic/percpu.h +++ b/include/asm-generic/percpu.h @@ -36,6 +36,14 @@ extern unsigned long __per_cpu_offset[NR_CPUS]; #define my_cpu_offset __my_cpu_offset #endif +/* + * Determine the offset of the current active processor when preemption is + * disabled. Can be overriden by arch code. + */ +#ifndef __raw_my_cpu_offset +#define __raw_my_cpu_offset __my_cpu_offset +#endif + /* * Arch may define arch_raw_cpu_ptr() to provide more efficient address * translations for raw_cpu_ptr(). @@ -44,6 +52,10 @@ extern unsigned long __per_cpu_offset[NR_CPUS]; #define arch_raw_cpu_ptr(ptr) SHIFT_PERCPU_PTR(ptr, __my_cpu_offset) #endif +#ifndef arch_raw_cpu_ptr_preemptable +#define arch_raw_cpu_ptr_preemptable(ptr) SHIFT_PERCPU_PTR(ptr, __raw_my_cpu_offset) +#endif + #ifdef CONFIG_HAVE_SETUP_PER_CPU_AREA extern void setup_per_cpu_areas(void); #endif diff --git a/include/linux/percpu-defs.h b/include/linux/percpu-defs.h index a6fabd865211..13afca8a37e7 100644 --- a/include/linux/percpu-defs.h +++ b/include/linux/percpu-defs.h @@ -237,20 +237,51 @@ do { \ SHIFT_PERCPU_PTR((ptr), per_cpu_offset((cpu))); \ }) +#ifndef arch_raw_cpu_ptr_preemption_disabled +#define arch_raw_cpu_ptr_preemption_disabled(ptr) \ + arch_raw_cpu_ptr(ptr) +#endif + +#define raw_cpu_ptr_preemption_disabled(ptr) \ +({ \ + __verify_pcpu_ptr(ptr); \ + arch_raw_cpu_ptr_preemption_disabled(ptr); \ +}) + +/* + * If preemption is enabled, we need to read the pointer atomically on + * raw_cpu_ptr(). However if it is disabled, we can use the + * raw_cpu_ptr_nopreempt(), which is potentially more efficient. Similarly, we + * can use the preemption-disabled version if the kernel is non-preemptable or + * if voluntary preemption is used. + */ +#ifdef CONFIG_PREEMPT + #define raw_cpu_ptr(ptr) \ ({ \ __verify_pcpu_ptr(ptr); \ arch_raw_cpu_ptr(ptr); \ }) +#else + +#define raw_cpu_ptr(ptr) raw_cpu_ptr_preemption_disabled(ptr) + +#endif + #ifdef CONFIG_DEBUG_PREEMPT +/* + * Unlike other this_cpu_* operations, this_cpu_ptr() requires that preemption + * will be disabled. In contrast, raw_cpu_ptr() does not require that. + */ #define this_cpu_ptr(ptr) \ ({ \ + __this_cpu_preempt_check("ptr"); \ __verify_pcpu_ptr(ptr); \ SHIFT_PERCPU_PTR(ptr, my_cpu_offset); \ }) #else -#define this_cpu_ptr(ptr) raw_cpu_ptr(ptr) +#define this_cpu_ptr(ptr) raw_cpu_ptr_preemption_disabled(ptr) #endif #else /* CONFIG_SMP */ -- 2.17.1