Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp19475pxy; Tue, 4 May 2021 17:30:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw4oixlZbmzsaK1jN5HQKFcGi5EsdboDpFra4ndX/QEvXnI5VeNI58jX9569sV8A+iP2yxg X-Received: by 2002:a05:6402:3513:: with SMTP id b19mr28519814edd.368.1620174645286; Tue, 04 May 2021 17:30:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620174645; cv=none; d=google.com; s=arc-20160816; b=apbaBLGjURIxDm2mnk5ZGYXUEwbbc27XkXmBrcgVxP1HqQ6DNIKJsXA/4x5mphckfq 07/58mwJiAExLQkd0hXTz4GRkfMAHr+q1Y++PbdduL7a8U+wb5m2Tz4aOeJ9oxVsEWMp sKTbphgKqTkVDBpC7SHhTL7bJIqIgJsV4VyBN2JDQHjhE1P8rbM7qiWHQb75BU96wEBy IAJUTMDLJexoGAWEFTu7a8CgoGPcWdE3hDJbjInop62vmuA34osOin8YQ+KHsEAdO04T DYh5NBtLo2+g2ngiUU15JL0aJR/0DDkcD5HL8EWrLkc0cjFpu1v/KZVCwaJ04ryjS9Pr +MSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:reply-to:dkim-signature; bh=mmTWozcWBi2FK+Q6OuZX/h80Hy/DwHBNP8NYlW2aHTE=; b=deGyvm4NLcMYvIXBQ/6px6nLBxMbLG0S0AIJf3JvkNA6bBkureBTIhIHB7AElupVaK 93OchW0106IXvd8WxGByjzSGM+7dqOvq6pR7bQQQqNlCcAsZWMwACfRLYcuc5hVeRMAx z7XCsM8y6vzhNUsaT2o2e09tLt+6XZjnYl04muRCFBmXmle4zkQDljojOAx1+w0qoNEx DtOwdFM2jVYe33ii2ZmVJMPkNsFCQmk8RJla9zYhojnOezKg/xvTatyXgqD+5IBGpfY8 aNaRRzluRTzNs4QO2nVC/UcF6+Cd/vuUwMjjugePlllcIgsMGdsTArdKqDnsCwxC/VB2 azcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=MzU5EwW0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y16si14365136edc.193.2021.05.04.17.30.21; Tue, 04 May 2021 17:30:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=MzU5EwW0; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231625AbhEEA3A (ORCPT + 99 others); Tue, 4 May 2021 20:29:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50428 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231530AbhEEA24 (ORCPT ); Tue, 4 May 2021 20:28:56 -0400 Received: from mail-qv1-xf49.google.com (mail-qv1-xf49.google.com [IPv6:2607:f8b0:4864:20::f49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 84A5AC061343 for ; Tue, 4 May 2021 17:27:59 -0700 (PDT) Received: by mail-qv1-xf49.google.com with SMTP id f20-20020a0caa940000b02901c5058e5813so440906qvb.23 for ; Tue, 04 May 2021 17:27:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=reply-to:date:in-reply-to:message-id:mime-version:references :subject:from:to:cc; bh=mmTWozcWBi2FK+Q6OuZX/h80Hy/DwHBNP8NYlW2aHTE=; b=MzU5EwW03jdk8Xpe+TbMXoV1533AYBgiSYQLBdBhlT5LsKkddFKG2zpsv93CYTC6gr ArM42tV2t27zKHe6mV7SRH3Xb+KXiyrAhPjy/iQZTY4KhJH4k3+43ZoW8RY/7T0AKdHL XvmppOO8j4s+Ttx4OUFkQjGzXNCcAblC3XLrBLnBhY7UV5Sa9nhARs1voFWtDKOxc+pI I6YFXQrcV7nDiniYxJr5VmNThibJxMPk94xkIr80XS7Jk/+kEd/3G4M6J8LPHfj5MUfo Z3HC3+JFMXKBLWQs0Ys0z1Rv4I7bSY6UlOvlg7XEl9mkW/GDlUz+zNpmWKgM30+YtsAq tsGw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:reply-to:date:in-reply-to:message-id :mime-version:references:subject:from:to:cc; bh=mmTWozcWBi2FK+Q6OuZX/h80Hy/DwHBNP8NYlW2aHTE=; b=lN2cbD7xLl3TeIwohjEzgE8YEK2I8NatuLVOPjukKgFurHgcmvCEoQsbaQdl1va0pz 4EuCUv6y1lgMeI+L1A+jJWdvF8Qz9N6PsL6bCghVOTBp6EEJswdlgcZ8yVgGhX7qKNjc LyozQn1KT5uS1nvw8xO4unaoZB3pU/j2o+SmgSQ2DG2eK6DERarBYSli47oXgR3xZX/2 VK71XXy9cqAxcXiyo7VtcjwBgr/fUcDic2E0tvBYnjTtsoT0+FULfKJzhMWenbsVrXek zMosMVn1yVNfug2YtIhFN5R12TDfO3BKcbDZ66FDrCAcIZLyLBA0y+nYmEoLXfX+m8pN Wu3g== X-Gm-Message-State: AOAM531h2j3z8Goe6o8vCU1JHiI/4gYdYe6zQIbUTUo9F7SXLrV4tXKy JW4sC/QXVvfZDEs7ERXf1c10IRuHxNg= X-Received: from seanjc798194.pdx.corp.google.com ([2620:15c:f:10:df57:48cb:ea33:a156]) (user=seanjc job=sendgmr) by 2002:a0c:bd96:: with SMTP id n22mr28039059qvg.44.1620174478767; Tue, 04 May 2021 17:27:58 -0700 (PDT) Reply-To: Sean Christopherson Date: Tue, 4 May 2021 17:27:33 -0700 In-Reply-To: <20210505002735.1684165-1-seanjc@google.com> Message-Id: <20210505002735.1684165-7-seanjc@google.com> Mime-Version: 1.0 References: <20210505002735.1684165-1-seanjc@google.com> X-Mailer: git-send-email 2.31.1.527.g47e6f16901-goog Subject: [PATCH v4 6/8] context_tracking: Consolidate guest enter/exit wrappers From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Thomas Gleixner , Michael Tokarev , Christian Borntraeger , Frederic Weisbecker Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Consolidate the guest enter/exit wrappers, providing and tweaking stubs as needed. This will allow moving the wrappers under KVM without having to bleed #ifdefs into the soon-to-be KVM code. No functional change intended. Cc: Frederic Weisbecker Signed-off-by: Sean Christopherson --- include/linux/context_tracking.h | 65 ++++++++++++-------------------- 1 file changed, 24 insertions(+), 41 deletions(-) diff --git a/include/linux/context_tracking.h b/include/linux/context_tracking.h index 56c648bdbde8..aa58c2ac67ca 100644 --- a/include/linux/context_tracking.h +++ b/include/linux/context_tracking.h @@ -71,6 +71,19 @@ static inline void exception_exit(enum ctx_state prev_ctx) } } +static __always_inline bool context_tracking_guest_enter(void) +{ + if (context_tracking_enabled()) + __context_tracking_enter(CONTEXT_GUEST); + + return context_tracking_enabled_this_cpu(); +} + +static __always_inline void context_tracking_guest_exit(void) +{ + if (context_tracking_enabled()) + __context_tracking_exit(CONTEXT_GUEST); +} /** * ct_state() - return the current context tracking state if known @@ -92,6 +105,9 @@ static inline void user_exit_irqoff(void) { } static inline enum ctx_state exception_enter(void) { return 0; } static inline void exception_exit(enum ctx_state prev_ctx) { } static inline enum ctx_state ct_state(void) { return CONTEXT_DISABLED; } +static inline bool context_tracking_guest_enter(void) { return false; } +static inline void context_tracking_guest_exit(void) { } + #endif /* !CONFIG_CONTEXT_TRACKING */ #define CT_WARN_ON(cond) WARN_ON(context_tracking_enabled() && (cond)) @@ -102,74 +118,41 @@ extern void context_tracking_init(void); static inline void context_tracking_init(void) { } #endif /* CONFIG_CONTEXT_TRACKING_FORCE */ - -#ifdef CONFIG_VIRT_CPU_ACCOUNTING_GEN /* must be called with irqs disabled */ static __always_inline void guest_enter_irqoff(void) { + /* + * This is running in ioctl context so its safe to assume that it's the + * stime pending cputime to flush. + */ instrumentation_begin(); - if (vtime_accounting_enabled_this_cpu()) - vtime_guest_enter(current); - else - current->flags |= PF_VCPU; + vtime_account_guest_enter(); instrumentation_end(); - if (context_tracking_enabled()) - __context_tracking_enter(CONTEXT_GUEST); - - /* KVM does not hold any references to rcu protected data when it + /* + * KVM does not hold any references to rcu protected data when it * switches CPU into a guest mode. In fact switching to a guest mode * is very similar to exiting to userspace from rcu point of view. In * addition CPU may stay in a guest mode for quite a long time (up to * one time slice). Lets treat guest mode as quiescent state, just like * we do with user-mode execution. */ - if (!context_tracking_enabled_this_cpu()) { + if (!context_tracking_guest_enter()) { instrumentation_begin(); rcu_virt_note_context_switch(smp_processor_id()); instrumentation_end(); } } -static __always_inline void context_tracking_guest_exit(void) -{ - if (context_tracking_enabled()) - __context_tracking_exit(CONTEXT_GUEST); -} - static __always_inline void guest_exit_irqoff(void) { context_tracking_guest_exit(); - instrumentation_begin(); - vtime_account_guest_exit(); - instrumentation_end(); -} - -#else -static __always_inline void guest_enter_irqoff(void) -{ - /* - * This is running in ioctl context so its safe - * to assume that it's the stime pending cputime - * to flush. - */ - instrumentation_begin(); - vtime_account_guest_enter(); - rcu_virt_note_context_switch(smp_processor_id()); - instrumentation_end(); -} - -static __always_inline void context_tracking_guest_exit(void) { } - -static __always_inline void guest_exit_irqoff(void) -{ instrumentation_begin(); /* Flush the guest cputime we spent on the guest */ vtime_account_guest_exit(); instrumentation_end(); } -#endif /* CONFIG_VIRT_CPU_ACCOUNTING_GEN */ static inline void guest_exit(void) { -- 2.31.1.527.g47e6f16901-goog