Received: by 2002:a05:6a10:9afc:0:0:0:0 with SMTP id t28csp135525pxm; Wed, 2 Mar 2022 11:57:16 -0800 (PST) X-Google-Smtp-Source: ABdhPJwP0HT+2lUmt1Dz63IEfpwLacynUd0YG9MFJivu4M4e+dvCck/j5+Oeo0dOZnHWbJTE09ri X-Received: by 2002:a17:90a:2e04:b0:1bc:a5db:bcdb with SMTP id q4-20020a17090a2e0400b001bca5dbbcdbmr1512184pjd.116.1646251036032; Wed, 02 Mar 2022 11:57:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646251036; cv=none; d=google.com; s=arc-20160816; b=xgVurZtTRX6makmkrGdYixa4f5fMy376mv6L2InJH7kABQka5gPG0L3ys06NjzKaDv yYRX3pptXchg1aP+wFrWFVHURwhFmj9p0vFUu1sk9wUCXYzTRtxnLRcE0R6u7E5Xkw0e +2GVWI/dYRYfwFAdNlUOzmOi4KlFtzuBJqpJHdU1ZIaloksQj1wVZjOHBn2K1FYxCynC /YnRLr8ulyqULFObOd2WwFGif1UY3DfMsSXWo1iuBB5s+FoJUuX7H6xsnp7Dj29taxDM dK4Nf4GWPbe56Wh2+QXZVc4J5hkXCIPEa5n1KlNMIyW+WeT8WwfeDNwFvvG7Poa223zp rxTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=+U/YzdV2xertCgGhKBmoHqgoLYpk+3Kki/5nG2/5chQ=; b=YI3nTJLDZrTOIYDW5iMzsRMe7CRC7w1T8fD5tf7C0/oMDQelvF4mRkq/pFObhgnICn XWydzkykZ6rDwxqOvTdJdsXJNh9vi4WtEa91UuL/GJOvBZta14/I9D9LpiAbk2004GWh FaxHF26gjA+jwMGiODEwSA6b+vI5a4dBHMu1Lb5Wtu4+aUhgY+lTUggfWdHnS+1ytiny RDYApgLWQAWmfyybYXkOCDd9jziAfI/UpYPla0j/+G/Jhlgv8CzMse6l2QvVA8B4PGyj n+QC+SPLsoVvmtTlOmERaGnXu4yfUcLYw8d/KVLtH4FlynUcpRenfGzbj6nx9mfwFoCJ Ox8A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=URMHZj4P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d11-20020a170903230b00b00151974bb3b0si2475612plh.317.2022.03.02.11.56.59; Wed, 02 Mar 2022 11:57:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=URMHZj4P; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239225AbiCBPvS (ORCPT + 99 others); Wed, 2 Mar 2022 10:51:18 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58732 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242415AbiCBPuX (ORCPT ); Wed, 2 Mar 2022 10:50:23 -0500 Received: from sin.source.kernel.org (sin.source.kernel.org [145.40.73.55]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 700F158E55 for ; Wed, 2 Mar 2022 07:49:19 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id D412ECE2189 for ; Wed, 2 Mar 2022 15:49:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1321EC340F1; Wed, 2 Mar 2022 15:49:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1646236156; bh=gZi+CrUhT+iAU5seHENLkIn+v+3EqQ+aMPe1Xaq/+2E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=URMHZj4PS6XkbGAyr/CSCcrtqunr94F9hlGp6C3Z+wWSswDU/90ksVNbipPCgMOID KIA9KwdCMzXqhnmLbVPFUBUE0+ScTuP/gtnWMjnf10X+jnGPCwZvn/+1NGUc067VV+ vJxu2oV+jAmeIUMAeJUu/ROCiYriksQY0VhhNZqOh4kut/JbDW4eSr0qW4xUCFbg7F F7ylaURzj+CAo5c331wu+kVVa0cymsbHpcjREtXBsfGgiXvQ8rb8SI/gI3oiyDsdYZ tUUrj+VP8Yp+F1BM9f0il9sdf/Md0fJsBbkurT3oppIVlTlMbnX6JEZb0m8P3OF+F2 hE4Gw0in4Jr1Q== From: Frederic Weisbecker To: LKML Cc: Frederic Weisbecker , Peter Zijlstra , Phil Auld , Alex Belits , Nicolas Saenz Julienne , Xiongfeng Wang , Neeraj Upadhyay , Thomas Gleixner , Yu Liao , Boqun Feng , "Paul E . McKenney" , Marcelo Tosatti , Paul Gortmaker , Uladzislau Rezki , Joel Fernandes Subject: [PATCH 16/19] context_tracking: Convert state to atomic_t Date: Wed, 2 Mar 2022 16:48:07 +0100 Message-Id: <20220302154810.42308-17-frederic@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220302154810.42308-1-frederic@kernel.org> References: <20220302154810.42308-1-frederic@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.5 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Context tracking's state and dynticks counter are going to be merged in a single field so that both updates can happen atomically and at the same time. Prepare for that with converting the state into an atomic_t. Signed-off-by: Frederic Weisbecker Cc: Paul E. McKenney Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: Neeraj Upadhyay Cc: Uladzislau Rezki Cc: Joel Fernandes Cc: Boqun Feng Cc: Nicolas Saenz Julienne Cc: Marcelo Tosatti Cc: Xiongfeng Wang Cc: Yu Liao Cc: Phil Auld Cc: Paul Gortmaker Cc: Alex Belits --- include/linux/context_tracking.h | 18 ++--------- include/linux/context_tracking_state.h | 42 +++++++++++++++++++++----- kernel/context_tracking.c | 15 +++++---- 3 files changed, 47 insertions(+), 28 deletions(-) diff --git a/include/linux/context_tracking.h b/include/linux/context_tracking.h index 086546569d14..63343c34ab4e 100644 --- a/include/linux/context_tracking.h +++ b/include/linux/context_tracking.h @@ -56,7 +56,7 @@ static inline enum ctx_state exception_enter(void) !context_tracking_enabled()) return 0; - prev_ctx = this_cpu_read(context_tracking.state); + prev_ctx = __ct_state(); if (prev_ctx != CONTEXT_KERNEL) ct_user_exit(prev_ctx); @@ -86,26 +86,14 @@ static __always_inline void context_tracking_guest_exit(void) __ct_user_exit(CONTEXT_GUEST); } -/** - * ct_state() - return the current context tracking state if known - * - * Returns the current cpu's context tracking state if context tracking - * is enabled. If context tracking is disabled, returns - * CONTEXT_DISABLED. This should be used primarily for debugging. - */ -static __always_inline enum ctx_state ct_state(void) -{ - return context_tracking_enabled() ? - this_cpu_read(context_tracking.state) : CONTEXT_DISABLED; -} #else static inline void user_enter(void) { } static inline void user_exit(void) { } static inline void user_enter_irqoff(void) { } static inline void user_exit_irqoff(void) { } -static inline enum ctx_state exception_enter(void) { return 0; } +static inline int exception_enter(void) { return 0; } static inline void exception_exit(enum ctx_state prev_ctx) { } -static inline enum ctx_state ct_state(void) { return CONTEXT_DISABLED; } +static inline int ct_state(void) { return -1; } static __always_inline bool context_tracking_guest_enter(void) { return false; } static inline void context_tracking_guest_exit(void) { } diff --git a/include/linux/context_tracking_state.h b/include/linux/context_tracking_state.h index 4efb97fe6518..3da44987dc71 100644 --- a/include/linux/context_tracking_state.h +++ b/include/linux/context_tracking_state.h @@ -9,6 +9,13 @@ /* Offset to allow distinguishing irq vs. task-based idle entry/exit. */ #define DYNTICK_IRQ_NONIDLE ((LONG_MAX / 2) + 1) +enum ctx_state { + CONTEXT_DISABLED = -1, /* returned by ct_state() if unknown */ + CONTEXT_KERNEL = 0, + CONTEXT_USER, + CONTEXT_GUEST, +}; + struct context_tracking { #ifdef CONFIG_CONTEXT_TRACKING_USER /* @@ -19,12 +26,7 @@ struct context_tracking { */ bool active; int recursion; - enum ctx_state { - CONTEXT_DISABLED = -1, /* returned by ct_state() if unknown */ - CONTEXT_KERNEL = 0, - CONTEXT_USER, - CONTEXT_GUEST, - } state; + atomic_t state; #endif atomic_t dynticks; /* Even value for idle, else odd. */ long dynticks_nesting; /* Track process nesting level. */ @@ -33,6 +35,11 @@ struct context_tracking { #ifdef CONFIG_CONTEXT_TRACKING DECLARE_PER_CPU(struct context_tracking, context_tracking); + +static __always_inline int __ct_state(void) +{ + return atomic_read(this_cpu_ptr(&context_tracking.state)); +} #endif #ifdef CONFIG_CONTEXT_TRACKING_USER @@ -53,9 +60,30 @@ static inline bool context_tracking_enabled_this_cpu(void) return context_tracking_enabled() && __this_cpu_read(context_tracking.active); } +/** + * ct_state() - return the current context tracking state if known + * + * Returns the current cpu's context tracking state if context tracking + * is enabled. If context tracking is disabled, returns + * CONTEXT_DISABLED. This should be used primarily for debugging. + */ +static __always_inline int ct_state(void) +{ + int ret; + + if (!context_tracking_enabled()) + return CONTEXT_DISABLED; + + preempt_disable(); + ret = __ct_state(); + preempt_enable(); + + return ret; +} + static __always_inline bool context_tracking_in_user(void) { - return __this_cpu_read(context_tracking.state) == CONTEXT_USER; + return __ct_state() == CONTEXT_USER; } #else static inline bool context_tracking_in_user(void) { return false; } diff --git a/kernel/context_tracking.c b/kernel/context_tracking.c index de247e758767..69db43548768 100644 --- a/kernel/context_tracking.c +++ b/kernel/context_tracking.c @@ -337,6 +337,7 @@ static __always_inline void context_tracking_recursion_exit(void) */ void noinstr __ct_user_enter(enum ctx_state state) { + struct context_tracking *ct = this_cpu_ptr(&context_tracking); lockdep_assert_irqs_disabled(); /* Kernel threads aren't supposed to go to userspace */ @@ -345,8 +346,8 @@ void noinstr __ct_user_enter(enum ctx_state state) if (!context_tracking_recursion_enter()) return; - if ( __this_cpu_read(context_tracking.state) != state) { - if (__this_cpu_read(context_tracking.active)) { + if (__ct_state() != state) { + if (ct->active) { /* * At this stage, only low level arch entry code remains and * then we'll run in userspace. We can assume there won't be @@ -387,7 +388,7 @@ void noinstr __ct_user_enter(enum ctx_state state) * OTOH we can spare the calls to vtime and RCU when context_tracking.active * is false because we know that CPU is not tickless. */ - __this_cpu_write(context_tracking.state, state); + atomic_set(&ct->state, state); } context_tracking_recursion_exit(); } @@ -440,11 +441,13 @@ NOKPROBE_SYMBOL(user_enter_callable); */ void noinstr __ct_user_exit(enum ctx_state state) { + struct context_tracking *ct = this_cpu_ptr(&context_tracking); + if (!context_tracking_recursion_enter()) return; - if (__this_cpu_read(context_tracking.state) == state) { - if (__this_cpu_read(context_tracking.active)) { + if (__ct_state() == state) { + if (ct->active) { /* * Exit RCU idle mode while entering the kernel because it can * run a RCU read side critical section anytime. @@ -457,7 +460,7 @@ void noinstr __ct_user_exit(enum ctx_state state) instrumentation_end(); } } - __this_cpu_write(context_tracking.state, CONTEXT_KERNEL); + atomic_set(&ct->state, CONTEXT_KERNEL); } context_tracking_recursion_exit(); } -- 2.25.1