Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1548304ybl; Fri, 23 Aug 2019 23:07:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqzZXw8EZdpZLI4W1gmIYlIphANCNKzEi7QOLlzwhgy/tLx9ApIPXVY6CA4pxBGVzW9iKST0 X-Received: by 2002:a63:2157:: with SMTP id s23mr7235797pgm.167.1566626867437; Fri, 23 Aug 2019 23:07:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566626867; cv=none; d=google.com; s=arc-20160816; b=n7WZeOBGIy3UkuHx4qdaYZQLwZwRck9HRogcAzvdRUZL3tSJezKZlZhITzee/d+0Sw 1MhXAy7htAVMhRwRWiyzZriZN9EIkGOHQC0e0354LGTAz2now8UTVy3mOoY0YnvyZyl6 hIYguiLvtt9tn2mqeEnoVvd7uKeYiz/TttKAzMNaCUnkT4KvaXRPLy8aCyftV6LwF69n Ff70dy8Pefi0jHLTD2BvMcTxHQMP7LVPDeO1IRh+3RHnA8+IWJQpad4R89lIv4zZbT7F OCmXp7iOh+hdR5dUGIypokmaPJMRK27eRIMprdU+CTTPQfuUnhvjVm/f2BwjTvJo6krp DbeQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=234sLOzVHB5hCj+BQKTblG2UsxBEUB0HpiZuWiY8m1k=; b=006HKcTBULs+qh4COZlrWyaVYCiBA4es0DVKaYGeSFYhaAMnVKdurhfwQS2rt2nOs5 V+0+WSB0Nbxn+cJfQv0soqQqqXPP25Ez1rJJbdpF0wQBQ2vnI++b4aq6kYqZzp6Q/5mK x0FIfTW2KC59xIZkWdUQAXtfUAR86CbRVxui73CVox2zBKRDH/VQWgrNggVDxjPdcWKH 2KnEvwQPNsoDJP5erdCrP0h9JU/PKcYH4XB6LaOpjYn46xv6qykplMeObPoSbwz6ITWs I3LQ2s2YrXaoqoJr0UfiDtAFqvITRywOuCnHiQCiAfhH7KfK7nH2Hc/jEM1SMXD3TchI P3yw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h69si3680336pge.543.2019.08.23.23.07.31; Fri, 23 Aug 2019 23:07:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727554AbfHXGFV (ORCPT + 99 others); Sat, 24 Aug 2019 02:05:21 -0400 Received: from mail-pg1-f195.google.com ([209.85.215.195]:42051 "EHLO mail-pg1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727107AbfHXGFU (ORCPT ); Sat, 24 Aug 2019 02:05:20 -0400 Received: by mail-pg1-f195.google.com with SMTP id p3so7042214pgb.9 for ; Fri, 23 Aug 2019 23:05:20 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=234sLOzVHB5hCj+BQKTblG2UsxBEUB0HpiZuWiY8m1k=; b=jDcrYvDLO06TdXo0tX3+P2EONDU7sq+u2bT6w4HNbXiC5wuLXfBaLY0Oj6ftMbaUvi TzRFazIbiahYv8o/B432hWShx4RMLZ7m/TO6qzk0CKY1tACKSvAqbWbLgacoymHDTJrf DLFwdSa37Q0w93NFfr8VhKEUdKfuwt6jmQy818uwG8U0gg5QfvVEj22yKJ/GHjKpNAcj 1kPgxKRCisnOey5o+rOhKtLryR2PBpyiUn0YOZ71vO/eJbJJYcVDtnpiM49OyAJ3BofT +fb4jKpiAnEvGoeLXmnZNWaA9rX+TRmgDBKnYKcjl86z4Zq4q/Jh81fv9/jnDDBNnKbw Fszg== X-Gm-Message-State: APjAAAUnOfZYRRdbl5yIdXzebmzQ6VyYnpLoE21OQo5TKUGdOt25xAfK vxvEm1Kig5zTfU+6GAyYrbY= X-Received: by 2002:aa7:90c9:: with SMTP id k9mr9011756pfk.171.1566626719471; Fri, 23 Aug 2019 23:05:19 -0700 (PDT) Received: from sc2-haas01-esx0118.eng.vmware.com ([66.170.99.1]) by smtp.gmail.com with ESMTPSA id w2sm4300882pjr.27.2019.08.23.23.05.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 23 Aug 2019 23:05:18 -0700 (PDT) From: Nadav Amit To: Peter Zijlstra Cc: x86@kernel.org, linux-kernel@vger.kernel.org, Thomas Gleixner , Thomas Garnier , Ingo Molnar , Nadav Amit Subject: [PATCH 5/7] percpu: Assume preemption is disabled on per_cpu_ptr() Date: Fri, 23 Aug 2019 15:44:22 -0700 Message-Id: <20190823224424.15296-6-namit@vmware.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190823224424.15296-1-namit@vmware.com> References: <20190823224424.15296-1-namit@vmware.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When per_cpu_ptr() is used, the caller should have preemption disabled, as otherwise the pointer is meaningless. If the user wants an "unstable" pointer he should call raw_cpu_ptr(). Add an assertion to check that indeed preemption is disabled, and distinguish between the two cases to allow further, per-arch optimizations. Signed-off-by: Nadav Amit --- include/asm-generic/percpu.h | 12 ++++++++++++ include/linux/percpu-defs.h | 33 ++++++++++++++++++++++++++++++++- 2 files changed, 44 insertions(+), 1 deletion(-) diff --git a/include/asm-generic/percpu.h b/include/asm-generic/percpu.h index c2de013b2cf4..7853605f4210 100644 --- a/include/asm-generic/percpu.h +++ b/include/asm-generic/percpu.h @@ -36,6 +36,14 @@ extern unsigned long __per_cpu_offset[NR_CPUS]; #define my_cpu_offset __my_cpu_offset #endif +/* + * Determine the offset of the current active processor when preemption is + * disabled. Can be overriden by arch code. + */ +#ifndef __raw_my_cpu_offset +#define __raw_my_cpu_offset __my_cpu_offset +#endif + /* * Arch may define arch_raw_cpu_ptr() to provide more efficient address * translations for raw_cpu_ptr(). @@ -44,6 +52,10 @@ extern unsigned long __per_cpu_offset[NR_CPUS]; #define arch_raw_cpu_ptr(ptr) SHIFT_PERCPU_PTR(ptr, __my_cpu_offset) #endif +#ifndef arch_raw_cpu_ptr_preemptable +#define arch_raw_cpu_ptr_preemptable(ptr) SHIFT_PERCPU_PTR(ptr, __raw_my_cpu_offset) +#endif + #ifdef CONFIG_HAVE_SETUP_PER_CPU_AREA extern void setup_per_cpu_areas(void); #endif diff --git a/include/linux/percpu-defs.h b/include/linux/percpu-defs.h index a6fabd865211..13afca8a37e7 100644 --- a/include/linux/percpu-defs.h +++ b/include/linux/percpu-defs.h @@ -237,20 +237,51 @@ do { \ SHIFT_PERCPU_PTR((ptr), per_cpu_offset((cpu))); \ }) +#ifndef arch_raw_cpu_ptr_preemption_disabled +#define arch_raw_cpu_ptr_preemption_disabled(ptr) \ + arch_raw_cpu_ptr(ptr) +#endif + +#define raw_cpu_ptr_preemption_disabled(ptr) \ +({ \ + __verify_pcpu_ptr(ptr); \ + arch_raw_cpu_ptr_preemption_disabled(ptr); \ +}) + +/* + * If preemption is enabled, we need to read the pointer atomically on + * raw_cpu_ptr(). However if it is disabled, we can use the + * raw_cpu_ptr_nopreempt(), which is potentially more efficient. Similarly, we + * can use the preemption-disabled version if the kernel is non-preemptable or + * if voluntary preemption is used. + */ +#ifdef CONFIG_PREEMPT + #define raw_cpu_ptr(ptr) \ ({ \ __verify_pcpu_ptr(ptr); \ arch_raw_cpu_ptr(ptr); \ }) +#else + +#define raw_cpu_ptr(ptr) raw_cpu_ptr_preemption_disabled(ptr) + +#endif + #ifdef CONFIG_DEBUG_PREEMPT +/* + * Unlike other this_cpu_* operations, this_cpu_ptr() requires that preemption + * will be disabled. In contrast, raw_cpu_ptr() does not require that. + */ #define this_cpu_ptr(ptr) \ ({ \ + __this_cpu_preempt_check("ptr"); \ __verify_pcpu_ptr(ptr); \ SHIFT_PERCPU_PTR(ptr, my_cpu_offset); \ }) #else -#define this_cpu_ptr(ptr) raw_cpu_ptr(ptr) +#define this_cpu_ptr(ptr) raw_cpu_ptr_preemption_disabled(ptr) #endif #else /* CONFIG_SMP */ -- 2.17.1