Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp626092iob; Tue, 3 May 2022 06:25:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzZFAbkzwk6oDtOESojEm6xOyX88sZnp0mQVylK4lZ5H7QRBGBxf9G5i8M3OKS9RKtalPiA X-Received: by 2002:a17:902:c3cb:b0:15c:e5d2:227e with SMTP id j11-20020a170902c3cb00b0015ce5d2227emr16315462plj.13.1651584334446; Tue, 03 May 2022 06:25:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651584334; cv=none; d=google.com; s=arc-20160816; b=zs/gn686ZnqZcIcc+z57C2jEx+tmtj5NSq+bz/aZBcFxWqHiW2dq8DvO3ZQ+uGF5ii oc2IRuSPXcTgHwPHBodJFlR2fRC9AsI1qbdpQpSAvw3bE/EU8xcGOtIt5SCBoz2kgmAv N+y7mBh+LNWj5jKPtQsWpy4S/zKLhwPSx8/onwMmSrmHR5pySP4okexSQXkdNqN3/+jP RNedOoBJd7x+YboQQ50bipHhxqeus9j03znlf+irf6S8nq5M4Odggim77QD7T3gpbDdE WARSOYZcYSVxzjj7kffb6Ugi3ViAoek/OYoVwV0zKh+aLyxIleL1BdVWqwxN8LJgOUf0 KlHw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=2VnHl25C9RgdeuZX2ZFekgF2bJHeAvRb4wKd6rQR0tg=; b=sqR6lQvL6rxUTnrNQLE868NlBF5rB37hfkw9I2x94uNN3rwtIxU7njGHsanDat9/XU D5GM86Fel3nGZLuHSopE17gzeIDhF06hmMHrrRRapuNkyn+3Xbs0YYZGYLEdnK9FIWVf lw7HWGz3UZQuhpIqyJ/Ex5Mcb29v4ZgfD0vLAVwQMmohENyXxUg+2sTJRQQnWcOzv6gv KdnGHfV4+MulPT9XIhTxc275OQrNjdBbG6KQHe+PcvL4/FaerFOHiBiqYlBLd2pdXG/s AdLusXFA7PA6Tv+v7gIsrW/Nzy/PjfwCweFCEVcXSq84qLAvMjJ92owwHsroOU2BgD30 yiJg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RikaItYA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h16-20020a17090ac39000b001d2c6c93948si1903987pjt.80.2022.05.03.06.25.16; Tue, 03 May 2022 06:25:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=RikaItYA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234020AbiECKGr (ORCPT + 99 others); Tue, 3 May 2022 06:06:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52864 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234232AbiECKGQ (ORCPT ); Tue, 3 May 2022 06:06:16 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5DE73396A5 for ; Tue, 3 May 2022 03:02:17 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E1B08B81A67 for ; Tue, 3 May 2022 10:02:15 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 7A0B8C385B2; Tue, 3 May 2022 10:02:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1651572134; bh=g8ewgdEUW3BVgsPYAoymr2WWvCzaMxjDdepxBcYRDLQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RikaItYA46lI/hRM8m9QydNKuwzOoBIiUPN4jPNiJRGnmyKdfOkJ2uuExcIv2UFQs N7O4BXCJyWKDik8IssVdiAs4Jdx61lsqIIQyRDzDubMo7f0kl4e8Pd2uG1l91p/Xx6 9vsAWd8UvwgFMHjt3m73UoDXiobG/iQg3ms+b62l58ZXIQ9NyLqtRMv/v1ty5L+eSM oeb3WCGn4k9p8dnAxbtmVLkCUHCytajGAY7JuQmP3DmfqIX0akeD7tn7hRxHolwFF+ 9QRAP+POYeFkaK+dspDTRXxwPKcKj9cMq3r+eL4XW6urKcO9w+R8G9fXzX38V8Lkgp gxeLq3TlK0org== From: Frederic Weisbecker To: LKML Cc: Frederic Weisbecker , Peter Zijlstra , Phil Auld , Alex Belits , Nicolas Saenz Julienne , Xiongfeng Wang , Neeraj Upadhyay , Thomas Gleixner , Yu Liao , Boqun Feng , "Paul E . McKenney" , Marcelo Tosatti , Paul Gortmaker , Uladzislau Rezki , Joel Fernandes Subject: [PATCH 20/21] context_tracking: Convert state to atomic_t Date: Tue, 3 May 2022 12:00:50 +0200 Message-Id: <20220503100051.2799723-21-frederic@kernel.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220503100051.2799723-1-frederic@kernel.org> References: <20220503100051.2799723-1-frederic@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.7 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Context tracking's state and dynticks counter are going to be merged in a single field so that both updates can happen atomically and at the same time. Prepare for that with converting the state into an atomic_t. Signed-off-by: Frederic Weisbecker Cc: Paul E. McKenney Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: Neeraj Upadhyay Cc: Uladzislau Rezki Cc: Joel Fernandes Cc: Boqun Feng Cc: Nicolas Saenz Julienne Cc: Marcelo Tosatti Cc: Xiongfeng Wang Cc: Yu Liao Cc: Phil Auld Cc: Paul Gortmaker Cc: Alex Belits --- include/linux/context_tracking.h | 18 ++---------- include/linux/context_tracking_state.h | 40 ++++++++++++++++++++++---- kernel/context_tracking.c | 15 ++++++---- 3 files changed, 46 insertions(+), 27 deletions(-) diff --git a/include/linux/context_tracking.h b/include/linux/context_tracking.h index cad8aecb7321..082bf47bbd18 100644 --- a/include/linux/context_tracking.h +++ b/include/linux/context_tracking.h @@ -56,7 +56,7 @@ static inline enum ctx_state exception_enter(void) !context_tracking_enabled()) return 0; - prev_ctx = this_cpu_read(context_tracking.state); + prev_ctx = __ct_state(); if (prev_ctx != CONTEXT_KERNEL) ct_user_exit(prev_ctx); @@ -86,26 +86,14 @@ static __always_inline void context_tracking_guest_exit(void) __ct_user_exit(CONTEXT_GUEST); } -/** - * ct_state() - return the current context tracking state if known - * - * Returns the current cpu's context tracking state if context tracking - * is enabled. If context tracking is disabled, returns - * CONTEXT_DISABLED. This should be used primarily for debugging. - */ -static __always_inline enum ctx_state ct_state(void) -{ - return context_tracking_enabled() ? - this_cpu_read(context_tracking.state) : CONTEXT_DISABLED; -} #else static inline void user_enter(void) { } static inline void user_exit(void) { } static inline void user_enter_irqoff(void) { } static inline void user_exit_irqoff(void) { } -static inline enum ctx_state exception_enter(void) { return 0; } +static inline int exception_enter(void) { return 0; } static inline void exception_exit(enum ctx_state prev_ctx) { } -static inline enum ctx_state ct_state(void) { return CONTEXT_DISABLED; } +static inline int ct_state(void) { return -1; } static __always_inline bool context_tracking_guest_enter(void) { return false; } static inline void context_tracking_guest_exit(void) { } diff --git a/include/linux/context_tracking_state.h b/include/linux/context_tracking_state.h index ded257130987..edd9f8f5b753 100644 --- a/include/linux/context_tracking_state.h +++ b/include/linux/context_tracking_state.h @@ -9,6 +9,13 @@ /* Offset to allow distinguishing irq vs. task-based idle entry/exit. */ #define DYNTICK_IRQ_NONIDLE ((LONG_MAX / 2) + 1) +enum ctx_state { + CONTEXT_DISABLED = -1, /* returned by ct_state() if unknown */ + CONTEXT_KERNEL = 0, + CONTEXT_USER, + CONTEXT_GUEST, +}; + struct context_tracking { #ifdef CONFIG_CONTEXT_TRACKING_USER /* @@ -19,12 +26,7 @@ struct context_tracking { */ bool active; int recursion; - enum ctx_state { - CONTEXT_DISABLED = -1, /* returned by ct_state() if unknown */ - CONTEXT_KERNEL = 0, - CONTEXT_USER, - CONTEXT_GUEST, - } state; + atomic_t state; #endif atomic_t dynticks; /* Even value for idle, else odd. */ long dynticks_nesting; /* Track process nesting level. */ @@ -34,6 +36,11 @@ struct context_tracking { #ifdef CONFIG_CONTEXT_TRACKING DECLARE_PER_CPU(struct context_tracking, context_tracking); +static __always_inline int __ct_state(void) +{ + return atomic_read(this_cpu_ptr(&context_tracking.state)); +} + static __always_inline int ct_dynticks(void) { return atomic_read(this_cpu_ptr(&context_tracking.dynticks)); @@ -92,6 +99,27 @@ static inline bool context_tracking_enabled_this_cpu(void) return context_tracking_enabled() && __this_cpu_read(context_tracking.active); } +/** + * ct_state() - return the current context tracking state if known + * + * Returns the current cpu's context tracking state if context tracking + * is enabled. If context tracking is disabled, returns + * CONTEXT_DISABLED. This should be used primarily for debugging. + */ +static __always_inline int ct_state(void) +{ + int ret; + + if (!context_tracking_enabled()) + return CONTEXT_DISABLED; + + preempt_disable(); + ret = __ct_state(); + preempt_enable(); + + return ret; +} + #else static inline bool context_tracking_enabled(void) { return false; } static inline bool context_tracking_enabled_cpu(int cpu) { return false; } diff --git a/kernel/context_tracking.c b/kernel/context_tracking.c index b906fb55903b..acbe96779e8c 100644 --- a/kernel/context_tracking.c +++ b/kernel/context_tracking.c @@ -328,6 +328,7 @@ static __always_inline void context_tracking_recursion_exit(void) */ void noinstr __ct_user_enter(enum ctx_state state) { + struct context_tracking *ct = this_cpu_ptr(&context_tracking); lockdep_assert_irqs_disabled(); /* Kernel threads aren't supposed to go to userspace */ @@ -336,8 +337,8 @@ void noinstr __ct_user_enter(enum ctx_state state) if (!context_tracking_recursion_enter()) return; - if ( __this_cpu_read(context_tracking.state) != state) { - if (__this_cpu_read(context_tracking.active)) { + if (__ct_state() != state) { + if (ct->active) { /* * At this stage, only low level arch entry code remains and * then we'll run in userspace. We can assume there won't be @@ -378,7 +379,7 @@ void noinstr __ct_user_enter(enum ctx_state state) * OTOH we can spare the calls to vtime and RCU when context_tracking.active * is false because we know that CPU is not tickless. */ - __this_cpu_write(context_tracking.state, state); + atomic_set(&ct->state, state); } context_tracking_recursion_exit(); } @@ -439,11 +440,13 @@ NOKPROBE_SYMBOL(user_enter_callable); */ void noinstr __ct_user_exit(enum ctx_state state) { + struct context_tracking *ct = this_cpu_ptr(&context_tracking); + if (!context_tracking_recursion_enter()) return; - if (__this_cpu_read(context_tracking.state) == state) { - if (__this_cpu_read(context_tracking.active)) { + if (__ct_state() == state) { + if (ct->active) { /* * Exit RCU idle mode while entering the kernel because it can * run a RCU read side critical section anytime. @@ -456,7 +459,7 @@ void noinstr __ct_user_exit(enum ctx_state state) instrumentation_end(); } } - __this_cpu_write(context_tracking.state, CONTEXT_KERNEL); + atomic_set(&ct->state, CONTEXT_KERNEL); } context_tracking_recursion_exit(); } -- 2.25.1