Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp4058245iog; Tue, 28 Jun 2022 08:11:14 -0700 (PDT) X-Google-Smtp-Source: AGRyM1sOz/0pJHTNEkxsI8KzDVbYS9f66LKrxqWizLi02gqNNoLCJ+fVxSnaxAuntN4ugwUK+7ZT X-Received: by 2002:a17:902:d58d:b0:16a:1aaa:bfad with SMTP id k13-20020a170902d58d00b0016a1aaabfadmr5289986plh.24.1656429074344; Tue, 28 Jun 2022 08:11:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656429074; cv=none; d=google.com; s=arc-20160816; b=0+wQfD1setI5023W11Fl4eDT0yKcpJ5X0DpHWkHUxadb6lavQuZymB03j9vHkDzqgt klGPDdh8UeaNvctBsCLMTrhhfUWN/MxT99ku+gkjTCLmhgVUNSoHR13RaAORd1DiLxsB HmPxQz103yGqBXLf8TrYfhgIt49qL3m39RO+LWQdFs4/WXtjxrje6va7WXmRIwZaslwy zhc9S05vO5/ex+AticAEbZ1CSiEtCDX+KDOMEbVV0o2pLutvX75pm2CraeggA4p3/il2 9iK49+63aPtshW2rL9RJdTVcXaeQSMmt31VIQLwcH1l0xnvimtc/N8OrMEjf8bvRtqhP jjlA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=YTlupDxR0VuIlLuxHDuN5QQVbAsill4fsciLPt4itQQ=; b=EAcLoN+yEfHpQhai4wdg+DPAKrmMzyVnxEAiOsuwM1OMiI65WJwiohjIAFohB/bcAI ApHzJ1ELL6nJ7yV2LoTtSFrbRJIuH2felj8wtwomFWFFGbxbrM6WtP4dI9kzF1uIBspQ ItCjZBGqA99EIePRI7zLOd+ZlJU7xzgjI2VixsX8Q5GD6nECNe2PCMp7k6srwvmgh2Ek chX881njwHiaxgMNH7JVCIGf3aBVY9k5LK44DhgJ2Pq6QurRy3cBZvRzb2JaGtaF0E70 NeucYTOGH68Q5zhCMeUj6AP0c51CpigIaVdDEJRBksHAdoWe8KNL7tTdYD/JH12KVDYe c//w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=CK+v3yJg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z7-20020a63d007000000b0040d27389464si20879500pgf.649.2022.06.28.08.10.58; Tue, 28 Jun 2022 08:11:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=CK+v3yJg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347443AbiF1Oxk (ORCPT + 99 others); Tue, 28 Jun 2022 10:53:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60752 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1347420AbiF1Oxe (ORCPT ); Tue, 28 Jun 2022 10:53:34 -0400 Received: from mail-lf1-x129.google.com (mail-lf1-x129.google.com [IPv6:2a00:1450:4864:20::129]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DF2B8E23 for ; Tue, 28 Jun 2022 07:53:07 -0700 (PDT) Received: by mail-lf1-x129.google.com with SMTP id t24so22765814lfr.4 for ; Tue, 28 Jun 2022 07:53:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=YTlupDxR0VuIlLuxHDuN5QQVbAsill4fsciLPt4itQQ=; b=CK+v3yJgQ6tqQ6GDj03fYUW2dSNd/lPiUr2/BoPpFuw76C7+8vo6ZiXT7YBCj+y0BX I8rPJGnGimDE+jY5GN+SXOoMAXMozLWKwSAHu2kVTE/9KyQ2S0/2Y9u2ZI5GNCLZqf63 ROjWdqrK+0mlaO/QmzEZWTqhfv03RSKOp6ZWWBugRAMKFpvDRfz3wbDAF3Jlt4VLNQiK qyX+0r5YBMz3rdZeuU7U1AZHOdH6V1elOMC1LsqXZnGW4Li7eeVVqQHZ85SQnwuQgsJR 5FNm51BQjf+ru4edKuxfPbmSFpAK9ULRaCqsALBctVOe2vPi8iFXwhQLGbofAg3npGeN kGRw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=YTlupDxR0VuIlLuxHDuN5QQVbAsill4fsciLPt4itQQ=; b=o3XX8kDUIOEbrw75dxcXWkpqn5AXQKXrkzzj6dk5TfJaRi3uYbYtActoOTSlfFusmA 2VFfpXIddl2JejFBTG84oXoxQawhnb7QnYiPGfYI0ERqMQpqs+vt6vOlbbi7hjtl9tdC oqfWJA3wL5+Ve8SZKqwH8egwzunQkiM9A73vrTIzjqig2rpgf1PVmGwOAzhrCt0rmHez 9PxEdcLwfjXMiw/uy0xJeTmvRUNTujDkN2NRk4AieZc20kxI5ncifCPUcO2XeMafYgX0 je/JavALEtqgaJfMRFyZV+z9yfM8MCT9b/hMOKNKUhqNhx9Mkuv58H8egImguFxOhOdG yOgA== X-Gm-Message-State: AJIora9+3B5ufD1yQ46mgYCswRzyeSAiNYC63ZnWrLnlYwXfNI9M1lXn ezgGaYRVdw4ypOmMmL3yV7WgnwOVu1SI9F8t5DO2lw== X-Received: by 2002:a05:6512:39ce:b0:481:31e4:1e06 with SMTP id k14-20020a05651239ce00b0048131e41e06mr2071928lfu.376.1656427985930; Tue, 28 Jun 2022 07:53:05 -0700 (PDT) MIME-Version: 1.0 References: <20220628095833.2579903-1-elver@google.com> <20220628095833.2579903-12-elver@google.com> In-Reply-To: <20220628095833.2579903-12-elver@google.com> From: Dmitry Vyukov Date: Tue, 28 Jun 2022 16:52:54 +0200 Message-ID: Subject: Re: [PATCH v2 11/13] perf/hw_breakpoint: Introduce bp_slots_histogram To: Marco Elver Cc: Peter Zijlstra , Frederic Weisbecker , Ingo Molnar , Thomas Gleixner , Arnaldo Carvalho de Melo , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Michael Ellerman , linuxppc-dev@lists.ozlabs.org, linux-perf-users@vger.kernel.org, x86@kernel.org, linux-sh@vger.kernel.org, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 28 Jun 2022 at 11:59, Marco Elver wrote: > > Factor out the existing `atomic_t count[N]` into its own struct called > 'bp_slots_histogram', to generalize and make its intent clearer in > preparation of reusing elsewhere. The basic idea of bucketing "total > uses of N slots" resembles a histogram, so calling it such seems most > intuitive. > > No functional change. > > Signed-off-by: Marco Elver Reviewed-by: Dmitry Vyukov > --- > v2: > * New patch. > --- > kernel/events/hw_breakpoint.c | 94 +++++++++++++++++++++++------------ > 1 file changed, 62 insertions(+), 32 deletions(-) > > diff --git a/kernel/events/hw_breakpoint.c b/kernel/events/hw_breakpoint.c > index 128ba3429223..18886f115abc 100644 > --- a/kernel/events/hw_breakpoint.c > +++ b/kernel/events/hw_breakpoint.c > @@ -36,19 +36,27 @@ > #include > > /* > - * Constraints data > + * Datastructure to track the total uses of N slots across tasks or CPUs; > + * bp_slots_histogram::count[N] is the number of assigned N+1 breakpoint slots. > */ > -struct bp_cpuinfo { > - /* Number of pinned cpu breakpoints in a cpu */ > - unsigned int cpu_pinned; > - /* tsk_pinned[n] is the number of tasks having n+1 breakpoints */ > +struct bp_slots_histogram { > #ifdef hw_breakpoint_slots > - atomic_t tsk_pinned[hw_breakpoint_slots(0)]; > + atomic_t count[hw_breakpoint_slots(0)]; > #else > - atomic_t *tsk_pinned; > + atomic_t *count; > #endif > }; > > +/* > + * Per-CPU constraints data. > + */ > +struct bp_cpuinfo { > + /* Number of pinned CPU breakpoints in a CPU. */ > + unsigned int cpu_pinned; > + /* Histogram of pinned task breakpoints in a CPU. */ > + struct bp_slots_histogram tsk_pinned; > +}; > + > static DEFINE_PER_CPU(struct bp_cpuinfo, bp_cpuinfo[TYPE_MAX]); > > static struct bp_cpuinfo *get_bp_info(int cpu, enum bp_type_idx type) > @@ -159,6 +167,18 @@ static inline int hw_breakpoint_slots_cached(int type) > return __nr_bp_slots[type]; > } > > +static __init bool > +bp_slots_histogram_alloc(struct bp_slots_histogram *hist, enum bp_type_idx type) > +{ > + hist->count = kcalloc(hw_breakpoint_slots_cached(type), sizeof(*hist->count), GFP_KERNEL); > + return hist->count; > +} > + > +static __init void bp_slots_histogram_free(struct bp_slots_histogram *hist) > +{ > + kfree(hist->count); > +} > + > static __init int init_breakpoint_slots(void) > { > int i, cpu, err_cpu; > @@ -170,8 +190,7 @@ static __init int init_breakpoint_slots(void) > for (i = 0; i < TYPE_MAX; i++) { > struct bp_cpuinfo *info = get_bp_info(cpu, i); > > - info->tsk_pinned = kcalloc(__nr_bp_slots[i], sizeof(atomic_t), GFP_KERNEL); > - if (!info->tsk_pinned) > + if (!bp_slots_histogram_alloc(&info->tsk_pinned, i)) > goto err; > } > } > @@ -180,7 +199,7 @@ static __init int init_breakpoint_slots(void) > err: > for_each_possible_cpu(err_cpu) { > for (i = 0; i < TYPE_MAX; i++) > - kfree(get_bp_info(err_cpu, i)->tsk_pinned); > + bp_slots_histogram_free(&get_bp_info(err_cpu, i)->tsk_pinned); > if (err_cpu == cpu) > break; > } > @@ -189,6 +208,34 @@ static __init int init_breakpoint_slots(void) > } > #endif > > +static inline void > +bp_slots_histogram_add(struct bp_slots_histogram *hist, int old, int val) > +{ > + const int old_idx = old - 1; > + const int new_idx = old_idx + val; > + > + if (old_idx >= 0) > + atomic_dec(&hist->count[old_idx]); > + if (new_idx >= 0) > + atomic_inc(&hist->count[new_idx]); > +} > + > +static int > +bp_slots_histogram_max(struct bp_slots_histogram *hist, enum bp_type_idx type) > +{ > + for (int i = hw_breakpoint_slots_cached(type) - 1; i >= 0; i--) { > + const int count = atomic_read(&hist->count[i]); > + > + /* Catch unexpected writers; we want a stable snapshot. */ > + ASSERT_EXCLUSIVE_WRITER(hist->count[i]); > + if (count > 0) > + return i + 1; > + WARN(count < 0, "inconsistent breakpoint slots histogram"); > + } > + > + return 0; > +} > + > #ifndef hw_breakpoint_weight > static inline int hw_breakpoint_weight(struct perf_event *bp) > { > @@ -205,13 +252,11 @@ static inline enum bp_type_idx find_slot_idx(u64 bp_type) > } > > /* > - * Report the maximum number of pinned breakpoints a task > - * have in this cpu > + * Return the maximum number of pinned breakpoints a task has in this CPU. > */ > static unsigned int max_task_bp_pinned(int cpu, enum bp_type_idx type) > { > - atomic_t *tsk_pinned = get_bp_info(cpu, type)->tsk_pinned; > - int i; > + struct bp_slots_histogram *tsk_pinned = &get_bp_info(cpu, type)->tsk_pinned; > > /* > * At this point we want to have acquired the bp_cpuinfo_sem as a > @@ -219,14 +264,7 @@ static unsigned int max_task_bp_pinned(int cpu, enum bp_type_idx type) > * toggle_bp_task_slot() to tsk_pinned, and we get a stable snapshot. > */ > lockdep_assert_held_write(&bp_cpuinfo_sem); > - > - for (i = hw_breakpoint_slots_cached(type) - 1; i >= 0; i--) { > - ASSERT_EXCLUSIVE_WRITER(tsk_pinned[i]); /* Catch unexpected writers. */ > - if (atomic_read(&tsk_pinned[i]) > 0) > - return i + 1; > - } > - > - return 0; > + return bp_slots_histogram_max(tsk_pinned, type); > } > > /* > @@ -300,8 +338,7 @@ max_bp_pinned_slots(struct perf_event *bp, enum bp_type_idx type) > static void toggle_bp_task_slot(struct perf_event *bp, int cpu, > enum bp_type_idx type, int weight) > { > - atomic_t *tsk_pinned = get_bp_info(cpu, type)->tsk_pinned; > - int old_idx, new_idx; > + struct bp_slots_histogram *tsk_pinned = &get_bp_info(cpu, type)->tsk_pinned; > > /* > * If bp->hw.target, tsk_pinned is only modified, but not used > @@ -311,14 +348,7 @@ static void toggle_bp_task_slot(struct perf_event *bp, int cpu, > * bp_cpuinfo_sem as a writer to stabilize tsk_pinned's value. > */ > lockdep_assert_held_read(&bp_cpuinfo_sem); > - > - old_idx = task_bp_pinned(cpu, bp, type) - 1; > - new_idx = old_idx + weight; > - > - if (old_idx >= 0) > - atomic_dec(&tsk_pinned[old_idx]); > - if (new_idx >= 0) > - atomic_inc(&tsk_pinned[new_idx]); > + bp_slots_histogram_add(tsk_pinned, task_bp_pinned(cpu, bp, type), weight); > } > > /* > -- > 2.37.0.rc0.161.g10f37bed90-goog >