Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp2842465ybh; Mon, 16 Mar 2020 10:44:16 -0700 (PDT) X-Google-Smtp-Source: ADFU+vsauxAEuoLZlUKYLb67RQ3V4kkbVkfBRNy9TdRSSuxjCOdsMBe8daubSjJ7cnA2nVmuhfp7 X-Received: by 2002:a05:6808:8c5:: with SMTP id k5mr500196oij.64.1584380655897; Mon, 16 Mar 2020 10:44:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584380655; cv=none; d=google.com; s=arc-20160816; b=RYSKR4rpN/MWa+aJGHDxprb/U/fojDoXdStU5gLbwaBeHMXQ9Lzo+iTsad3+rJtmaU k/+SaBLx1GV8eRI5Ze0q7nuR7fwcoqFPOsQvwuQ4gOQcXCU6/Gyafunh9hXUg70UGXTJ /bDYqQZWE31IzoqSLbQdecTm+FJs98lnCbolPUpuJ2M1HS9ks+PxlyuRm58BE3LArRXG EkBXc4KKbXGapx2cHWzLOjM0/D+mQ/3bnwACwgHGd7lPBDHVHn/AExaQekK8xE4QMjKS g7U5J4ARlQ9AFXbnThmPgcjvYc6GK3GZy+Z1u9O65w6OfzOgNypT2ZApII9B5qKslYPk KcEg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=ID3H30czz/FP3Uv6UAzC/d4Q+G/GcberRTPzu1ZMo3E=; b=dE+igPmNIWNzl44i7u0A1eZrDLwB9PbricZw0A/pN23SxqUDyjvsYQhRgpf7iPkGwx LcWsnIu5sN+zpK72i8J62cE8lL+9YGm5Zk03uGMyyn+Q64ypuXz2JyD3R+OzWThsa/YV qOscTQ1/nadEdAZMZ0obVM44J3Psm2yvO8JpwQ5QKZABUmLkdp5mYODLt7Z/XOjapgE4 4qufYBIxnwdiv3Y3B7h4TX2xS3DGUAgAvtta3kdTq1lhph/KlY7N3aeaM65BmZzDnrHI Qowt2rKPclfEZUB+x/2WiRrVD1/uOi3Myz0nQSUNHG4yzfHc3+6yx8lNzrakiQXlQgvy xdOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=pUjrMXS0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w10si294423oti.165.2020.03.16.10.44.03; Mon, 16 Mar 2020 10:44:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=pUjrMXS0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732140AbgCPRmY (ORCPT + 99 others); Mon, 16 Mar 2020 13:42:24 -0400 Received: from mail-qk1-f196.google.com ([209.85.222.196]:34359 "EHLO mail-qk1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732008AbgCPRmY (ORCPT ); Mon, 16 Mar 2020 13:42:24 -0400 Received: by mail-qk1-f196.google.com with SMTP id f3so27694285qkh.1 for ; Mon, 16 Mar 2020 10:42:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=ID3H30czz/FP3Uv6UAzC/d4Q+G/GcberRTPzu1ZMo3E=; b=pUjrMXS0RNct/9Enu86BqiyDEyDA19V03PxzPGB6D8+iM2iV7UoDhLF8BPum0uzAyr T/IufEnDOIte1DkXg/9yRlJhtFt8uoXQCuWg9Czdg7Ow+DEVIAOhl/Zj2NnOrEHNhuXG bR9IifFrczz8icm/pyp4HFEjqnfA/Mhi0e1ik= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=ID3H30czz/FP3Uv6UAzC/d4Q+G/GcberRTPzu1ZMo3E=; b=MytV7uIY42T9fJxtnmOaOvABbssUb3oDQxAP/jT1y9jVWpnFxWlAx58jf9jz1qB70Y QssorblLQNQo5Sbm0GTotFXIys5t+GXlc9clJ/TxthCJZNdYLor7kpcmy6DZIII/u+1B 2jSKgbSwfnzN3qcjn2sC5HhZ5vs5A3qLxxSpe2/bzFRHEaZKC7UP51VTpMcfvAGgM738 M52E9vpGO1nFrY/67mW6gZ7wUzZ29nANxsYV50a0WtlWZpx+TNIxdOOEMA4TG2vdUDLp c6zZLjA1332hWAbVCUGkZUnS/Fe7Be0p26j9UfLOJECIdjRU7QRz5iAZ0AbOzkX8ys/+ szig== X-Gm-Message-State: ANhLgQ0K1smk6VPuiKcIMm0Ajz3N0nlQdIvb3ggWtFN9j1XI5WW+mrv3 siQVxV6WGS5sRd+oKfV6zkK0vODMdAk= X-Received: by 2002:a37:e47:: with SMTP id 68mr807305qko.17.1584380542178; Mon, 16 Mar 2020 10:42:22 -0700 (PDT) Received: from joelaf.cam.corp.google.com ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id h138sm205962qke.86.2020.03.16.10.42.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Mar 2020 10:42:21 -0700 (PDT) From: "Joel Fernandes (Google)" To: linux-kernel@vger.kernel.org Cc: "Joel Fernandes (Google)" , Andrew Morton , Davidlohr Bueso , Ingo Molnar , Josh Triplett , Lai Jiangshan , linux-mm@kvack.org, Mathieu Desnoyers , "Paul E. McKenney" , rcu@vger.kernel.org, Sakari Ailus , Steven Rostedt , "Uladzislau Rezki (Sony)" Subject: [RFC] Simplify debug_objects handling in kfree_rcu Date: Mon, 16 Mar 2020 13:42:18 -0400 Message-Id: <20200316174218.154090-1-joel@joelfernandes.org> X-Mailer: git-send-email 2.25.1.481.gfbce0eb801-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In order to prepare for future changes to headless RCU support, make the debug_objects handling in kfree_rcu use the final 'pointer' value of the object, instead of depending on the head. Signed-off-by: Joel Fernandes (Google) --- Paul, Vlad, I am adding this to my rcu/kfree tree for further testing. Let me know any comments. I have only build-tested this patch. kernel/rcu/tree.c | 30 +++++++++++++----------------- 1 file changed, 13 insertions(+), 17 deletions(-) diff --git a/kernel/rcu/tree.c b/kernel/rcu/tree.c index 32152be9a09ac..0e2632622176b 100644 --- a/kernel/rcu/tree.c +++ b/kernel/rcu/tree.c @@ -2758,7 +2758,6 @@ struct kfree_rcu_bulk_data { unsigned long nr_records; void *records[KFREE_BULK_MAX_ENTR]; struct kfree_rcu_bulk_data *next; - struct rcu_head *head_free_debug; }; /** @@ -2808,11 +2807,11 @@ struct kfree_rcu_cpu { static DEFINE_PER_CPU(struct kfree_rcu_cpu, krc); static __always_inline void -debug_rcu_head_unqueue_bulk(struct rcu_head *head) +debug_rcu_bhead_unqueue(struct kfree_rcu_bulk_data *bhead) { #ifdef CONFIG_DEBUG_OBJECTS_RCU_HEAD - for (; head; head = head->next) - debug_rcu_head_unqueue(head); + for (int i = 0; i < bhead->nr_records; i++) + debug_rcu_head_unqueue((struct rcu_head *)(bhead->records[i])); #endif } @@ -2842,7 +2841,7 @@ static void kfree_rcu_work(struct work_struct *work) for (; bhead; bhead = bnext) { bnext = bhead->next; - debug_rcu_head_unqueue_bulk(bhead->head_free_debug); + debug_rcu_bhead_unqueue(bhead); rcu_lock_acquire(&rcu_callback_map); trace_rcu_invoke_kfree_bulk_callback(rcu_state.name, @@ -2864,14 +2863,15 @@ static void kfree_rcu_work(struct work_struct *work) */ for (; head; head = next) { unsigned long offset = (unsigned long)head->func; + void *ptr = (void *)head - offset; next = head->next; - debug_rcu_head_unqueue(head); + debug_rcu_head_unqueue((struct rcu_head *)ptr); rcu_lock_acquire(&rcu_callback_map); trace_rcu_invoke_kvfree_callback(rcu_state.name, head, offset); if (!WARN_ON_ONCE(!__is_kvfree_rcu_offset(offset))) - kvfree((void *)head - offset); + kvfree(ptr); rcu_lock_release(&rcu_callback_map); cond_resched_tasks_rcu_qs(); @@ -2995,18 +2995,11 @@ kfree_call_rcu_add_ptr_to_bulk(struct kfree_rcu_cpu *krcp, /* Initialize the new block. */ bnode->nr_records = 0; bnode->next = krcp->bhead; - bnode->head_free_debug = NULL; /* Attach it to the head. */ krcp->bhead = bnode; } -#ifdef CONFIG_DEBUG_OBJECTS_RCU_HEAD - head->func = func; - head->next = krcp->bhead->head_free_debug; - krcp->bhead->head_free_debug = head; -#endif - /* Finally insert. */ krcp->bhead->records[krcp->bhead->nr_records++] = (void *) head - (unsigned long) func; @@ -3030,14 +3023,17 @@ void kvfree_call_rcu(struct rcu_head *head, rcu_callback_t func) { unsigned long flags; struct kfree_rcu_cpu *krcp; + void *ptr; local_irq_save(flags); // For safely calling this_cpu_ptr(). krcp = this_cpu_ptr(&krc); if (krcp->initialized) spin_lock(&krcp->lock); + ptr = (void *)head - (unsigned long)func; + // Queue the object but don't yet schedule the batch. - if (debug_rcu_head_queue(head)) { + if (debug_rcu_head_queue(ptr)) { // Probable double kfree_rcu(), just leak. WARN_ONCE(1, "%s(): Double-freed call. rcu_head %p\n", __func__, head); @@ -3054,8 +3050,8 @@ void kvfree_call_rcu(struct rcu_head *head, rcu_callback_t func) * Under high memory pressure GFP_NOWAIT can fail, * in that case the emergency path is maintained. */ - if (is_vmalloc_addr((void *) head - (unsigned long) func) || - !kfree_call_rcu_add_ptr_to_bulk(krcp, head, func)) { + if (is_vmalloc_addr(ptr) || + !kfree_call_rcu_add_ptr_to_bulk(krcp, head, func)) { head->func = func; head->next = krcp->head; krcp->head = head; -- 2.25.1.481.gfbce0eb801-goog