Received: by 2002:a05:7412:cfc7:b0:fc:a2b0:25d7 with SMTP id by7csp2259279rdb; Wed, 21 Feb 2024 01:55:47 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCValvv1na2mNtqw1mUc2DfKSBfXcqzwDwzuqoLRhlQT90624W/c70CJJ1Gjv90nBkmC+ZUDII46rwx32bhCdG/LGCJluwXsqG28bhsyyw== X-Google-Smtp-Source: AGHT+IEkUh4vP192Jh+EBQ+jDOQZF9Xj45ilbW7X0ybxLsSW54DobDXry9YAk84svSxbdoZPjhU5 X-Received: by 2002:a05:620a:7e4:b0:787:5a6c:7f8f with SMTP id k4-20020a05620a07e400b007875a6c7f8fmr10656746qkk.64.1708509346768; Wed, 21 Feb 2024 01:55:46 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708509346; cv=pass; d=google.com; s=arc-20160816; b=YXMOqiVFfMNhzsm5x1qEILkOXZmKOWVuTHctALR16cPRQoSICS6CPaWiCFpb524ELZ O+pCIaPLnMs0N0u01gm9etQm4fkY79LoyL/InO0tAXGoj+Pn6+gsSBRm2DVZG/URwcXX t+nbfFT2PvGSPOaM9nKewFc+LYjq99yHVA1+E5QR0V6z7mnegYXZtat0uQIkdsWdf+Q7 1NpLeKi8SIs0EW5JqAUN/fCdU9vBYOzN4H/eU5fZ8wXPjR1E4UMEMfUV/5vCHPhAw15L 1MEDC60ArFHF2RZoF+7BfQaaJPUaPktYae1AclsbauU6h6bbwccqMicXVCrPEukm1l89 vA4g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-unsubscribe:list-subscribe:list-id:precedence:references :in-reply-to:message-id:date:subject:cc:to:from; bh=tFQqzo6zZ81U7huU0laQ/pLAiXdtcdRvZvmylVYRjiM=; fh=QMm8m/ZWm+A1EqjKAllYKUqNg+o2tkLujHELlI5tZV0=; b=Y4k+m+vY90dYoRVH/i5RuMSC3bgA22kK3Kz7YBnuGq2bGnv4VTbsTBYc8OwOq0lf1E L/KqR+gogjn4UnHsefT7FlwI6+ylWgCeIdHQOQnkOJc+vWotWYDwwcukAKvMnSO2Us5C 6z0nNaXrPExlhTqctC07DPFUr7V8O1TTgbtlOhb0gbVlbTxsz5az506cqtUQFaY5kLls 24mSlsdRINxmcpPUzDgN2qN7p5kmtMX4+850o+ZjKC2+xk7NyWnzCcRu3ftSQ8IxDan3 IpsxMr9pcykqsW1prn6eDLdepbWDwfIUq0aSGNI2xanzXscAxtkwn5VWtFBCtJw12czd WxRw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=sk.com); spf=pass (google.com: domain of linux-kernel+bounces-74455-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-74455-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id x22-20020a05620a0ed600b007871b8ebbd0si10381853qkm.568.2024.02.21.01.55.46 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 21 Feb 2024 01:55:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-74455-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=sk.com); spf=pass (google.com: domain of linux-kernel+bounces-74455-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-74455-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 75B571C23317 for ; Wed, 21 Feb 2024 09:55:46 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id A9118535C2; Wed, 21 Feb 2024 09:50:07 +0000 (UTC) Received: from invmail4.hynix.com (exvmail4.skhynix.com [166.125.252.92]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9432D3FE2C; Wed, 21 Feb 2024 09:49:59 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=166.125.252.92 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708509006; cv=none; b=Nxpvi7w6C37hOllc6f/e+43Os5nM4bT2nCbmQyaxFEs1ovfUvV38d67dLWTOVJgtzMbuXPuzkqzUYEXydfPbtHnzzzYby9A+KtEXktI74hHaxhxbegLd5Y4kZiThFOtR2f8qRzLxHe1A+EAy7LRQHy4FqYwj7gXcrAT/E83q9YQ= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708509006; c=relaxed/simple; bh=nifTUInVysx7YljtcW2Qa4mywSC4rocnbBoHNOK15ls=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References; b=B84YeYwuZh6Fe5Lqplm6emXmkhdX9nCJqkKa7kLaTqEGsOhqD5Q6nwb6jrC0nO9KBrQF76xyuoeTF/7rA4rSLxarNjrIkP0Tohl6b4z1CrRzUmCaFoJxbiM6aFEU5P00e+qmbktoj6+MU1FTrT4eiGhndtJ6NxWN7s54WijmVLk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=sk.com; spf=pass smtp.mailfrom=sk.com; arc=none smtp.client-ip=166.125.252.92 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=sk.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=sk.com X-AuditID: a67dfc5b-d85ff70000001748-38-65d5c7393909 From: Byungchul Park To: linux-kernel@vger.kernel.org Cc: kernel_team@skhynix.com, torvalds@linux-foundation.org, damien.lemoal@opensource.wdc.com, linux-ide@vger.kernel.org, adilger.kernel@dilger.ca, linux-ext4@vger.kernel.org, mingo@redhat.com, peterz@infradead.org, will@kernel.org, tglx@linutronix.de, rostedt@goodmis.org, joel@joelfernandes.org, sashal@kernel.org, daniel.vetter@ffwll.ch, duyuyang@gmail.com, johannes.berg@intel.com, tj@kernel.org, tytso@mit.edu, willy@infradead.org, david@fromorbit.com, amir73il@gmail.com, gregkh@linuxfoundation.org, kernel-team@lge.com, linux-mm@kvack.org, akpm@linux-foundation.org, mhocko@kernel.org, minchan@kernel.org, hannes@cmpxchg.org, vdavydov.dev@gmail.com, sj@kernel.org, jglisse@redhat.com, dennis@kernel.org, cl@linux.com, penberg@kernel.org, rientjes@google.com, vbabka@suse.cz, ngupta@vflare.org, linux-block@vger.kernel.org, josef@toxicpanda.com, linux-fsdevel@vger.kernel.org, viro@zeniv.linux.org.uk, jack@suse.cz, jlayton@kernel.org, dan.j.williams@intel.com, hch@infradead.org, djwong@kernel.org, dri-devel@lists.freedesktop.org, rodrigosiqueiramelo@gmail.com, melissa.srw@gmail.com, hamohammed.sa@gmail.com, 42.hyeyoo@gmail.com, chris.p.wilson@intel.com, gwan-gyeong.mun@intel.com, max.byungchul.park@gmail.com, boqun.feng@gmail.com, longman@redhat.com, hdanton@sina.com, her0gyugyu@gmail.com Subject: [PATCH v12 11/27] dept: Distinguish each syscall context from another Date: Wed, 21 Feb 2024 18:49:17 +0900 Message-Id: <20240221094933.36348-12-byungchul@sk.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20240221094933.36348-1-byungchul@sk.com> References: <20240221094933.36348-1-byungchul@sk.com> X-Brightmail-Tracker: H4sIAAAAAAAAAzWSa0xTZxjH977nnPeUQpdjNXrwEk2RGFHxEtieGbPti/HN5twyLzH6QU7k ZK0WNK2AmCwDKQy5RUygE4iBaroKVbFgVC4GIYAdASlWbgIOUjeJFBagnUi9FIxfnvzy++f/ //QoGHUdt1KhSzwjGxIlvYYoWaU3rGLLV+1P5W0VozuhMG8b+GazWSi7ZSfQfbMKgb02HcN4 6x7o808gmO98zIC5qBtBxegwA7VtIwgabecJPPF8Dm7fFAFnUS6BjKu3CLheBTAMFV/CUOX4 ATouWjA0zf3LgnmcQKk5AwfPSwxz1koerGmRMGYr4SEwuh2cI70cNA5ugstXhgg0NDpZaLs3 huFJXRmBEft7DjraHrHQXZjPwY1JC4FXfisDVt8UDz1N5RiqTcGhrJl3HLTnN2HIunYbg3ug HsGD7L8xOOy9BFp8ExhqHEUMvPmzFcFYgZeHzLw5HkrTCxDkZhaz8PhtOwemoViYf11Gvt1J WyamGGqqSaGN/nKW/mUR6f2SYZ6aHgzytNyRRGtsUfRqwzimFdM+jjoqLxDqmL7E0xyvG9PJ ri6ePvpjnqUetxn/tOqIcle8rNcly4atX8cpta60BnLaGXfW5ZHSUP3eHBSiEIUYsbDjJf7E z7NfoAUmwgaxv3+OWeBlwjqxJv8fLgcpFYzwe6ho+6+TLARLhX3i5QLPIrNCpGgazV0sqIQv xN7/TdzH0bViVXXTog8J+uulE4teLcSKT113mIVRUcgIEWudI/zHQrj40NbPXkSqcvRZJVLr EpMTJJ0+Jlqbmqg7G338VIIDBT/K+mvg6D003b2/GQkKpAlTae+6ZTUnJRtTE5qRqGA0y1Rs SlCp4qXUc7Lh1DFDkl42NqNVClazQrXDnxKvFn6RzsgnZfm0bPiUYkXIyjS068JM9Aze4vmu c3USU20Js5woXVtPW8ts+HXelePVAz3Pjuze/PP68MHZwPWBqO/jArkxBzOdL+oKf4vw7w11 x+67P+tKMq5eZ2/d8+ak91xXw7UVAf3GLyPW9P0YF04ipBJtZOiS4hRnZv/bA95nA+aWHT2T wwl1WYcOL0/va9Z9o2GNWml7FGMwSh8ALK+Gwk0DAAA= X-Brightmail-Tracker: H4sIAAAAAAAAAzWSfUzMcRzHfX/PHaefU/zQsKNFqJjsY5n5ix9TDJuNWf3Gb93NdXKXlI2V O0m5Viahq12x08MhVyZ6WKv1cJrq6nrQKtXy0EQeukhHrsw/n732eu/9/uvD4DIjuZxRqmNE jVpQySkJIQkL0W3a3tgpBlXkyiHjehA4J5IJMD62UND2qBiBpSwRg9H6PdA9OYZg+lUrDlmZ bQjyhvpxKGsYQFBVcJmCjpGF4HCOU2DLTKVAd+8xBfaPLgz6bt3AoNgaCs3p+RjUTL0nIGuU guwsHeY+HzCYMhfRYE7wheGCuzS4hjaDbaCLhLocGwlVvRvgTm4fBZVVNgIayocx6HhhpGDA MkNCc0MTAW0ZBhIefs6n4OOkGQezc5yG9hoTBiV691rS9z8kNBpqMEi6/wQDx+sKBNXJgxhY LV0U1DnHMCi1ZuLw60E9guG0TzRcuT5FQ3ZiGoLUK7cIaP3dSIK+LximfxqpXSF83dg4zutL z/NVkyaCf5nP8c/v9tO8vrqX5k3Wc3xpgT9/r3IU4/O+OUneWnSN4q3fbtB8yicHxn9uaaH5 ptvTBD/iyMIO+hyT7DglqpSxoiZwZ4REYU+opKJtEXH2ESEBVexPQR4Mx27l3iS/RbNMsX5c T88UPste7Gqu1PCOTEESBmevzucKvryiZoPFbBh3J21kjgnWl9MPpc4VpOw2ruuHnvw3uoor LqmZ8x5uX5g9NudlbDDXaX+KpyOJCc0rQl5KdWyUoFQFB2hPK+LVyriAk2eirMj9M+aLroxy NNGxpxaxDJIvkCqeOUQZKcRq46NqEcfgci8pcd6tpKeE+Aui5ky45pxK1NaiFQwhXyrdd1SM kLGRQox4WhSjRc3/FGM8lieg4YPqZU2dRq/ihYYcabQuOb1dpfgSygXGJa6v1dn2GzzDXCFn fa5tehKZ7/mw7oOKMRX6+Z2IG3yQ2D7TrXYNTQQt8RDk9bsvHW8sbGC+V2/ce3TL80KTz+9F 3jLL12b9seDDK4+E7FSGx7xb+2vNn/ab3paSEj/juqSmQ/X2GccBOaFVCJv9cY1W+As8mfyx LwMAAA== X-CFilter-Loop: Reflected Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: It enters kernel mode on each syscall and each syscall handling should be considered independently from the point of view of Dept. Otherwise, Dept may wrongly track dependencies across different syscalls. That might be a real dependency from user mode. However, now that Dept just started to work, conservatively let Dept not track dependencies across different syscalls. Signed-off-by: Byungchul Park --- arch/arm64/kernel/syscall.c | 3 ++ arch/x86/entry/common.c | 4 +++ include/linux/dept.h | 39 ++++++++++++--------- kernel/dependency/dept.c | 67 +++++++++++++++++++------------------ 4 files changed, 64 insertions(+), 49 deletions(-) diff --git a/arch/arm64/kernel/syscall.c b/arch/arm64/kernel/syscall.c index 9a70d9746b66..96c18ad1dbf7 100644 --- a/arch/arm64/kernel/syscall.c +++ b/arch/arm64/kernel/syscall.c @@ -7,6 +7,7 @@ #include #include #include +#include #include #include @@ -100,6 +101,8 @@ static void el0_svc_common(struct pt_regs *regs, int scno, int sc_nr, * (Similarly for HVC and SMC elsewhere.) */ + dept_kernel_enter(); + if (flags & _TIF_MTE_ASYNC_FAULT) { /* * Process the asynchronous tag check fault before the actual diff --git a/arch/x86/entry/common.c b/arch/x86/entry/common.c index 6356060caaf3..445e70937b38 100644 --- a/arch/x86/entry/common.c +++ b/arch/x86/entry/common.c @@ -20,6 +20,7 @@ #include #include #include +#include #ifdef CONFIG_XEN_PV #include @@ -75,6 +76,7 @@ static __always_inline bool do_syscall_x32(struct pt_regs *regs, int nr) /* Returns true to return using SYSRET, or false to use IRET */ __visible noinstr bool do_syscall_64(struct pt_regs *regs, int nr) { + dept_kernel_enter(); add_random_kstack_offset(); nr = syscall_enter_from_user_mode(regs, nr); @@ -262,6 +264,7 @@ __visible noinstr void do_int80_syscall_32(struct pt_regs *regs) { int nr = syscall_32_enter(regs); + dept_kernel_enter(); add_random_kstack_offset(); /* * Subtlety here: if ptrace pokes something larger than 2^31-1 into @@ -283,6 +286,7 @@ static noinstr bool __do_fast_syscall_32(struct pt_regs *regs) int nr = syscall_32_enter(regs); int res; + dept_kernel_enter(); add_random_kstack_offset(); /* * This cannot use syscall_enter_from_user_mode() as it has to diff --git a/include/linux/dept.h b/include/linux/dept.h index c6e2291dd843..4e359f76ac3c 100644 --- a/include/linux/dept.h +++ b/include/linux/dept.h @@ -25,11 +25,16 @@ struct task_struct; #define DEPT_MAX_SUBCLASSES_USR (DEPT_MAX_SUBCLASSES / DEPT_MAX_SUBCLASSES_EVT) #define DEPT_MAX_SUBCLASSES_CACHE 2 -#define DEPT_SIRQ 0 -#define DEPT_HIRQ 1 -#define DEPT_IRQS_NR 2 -#define DEPT_SIRQF (1UL << DEPT_SIRQ) -#define DEPT_HIRQF (1UL << DEPT_HIRQ) +enum { + DEPT_CXT_SIRQ = 0, + DEPT_CXT_HIRQ, + DEPT_CXT_IRQS_NR, + DEPT_CXT_PROCESS = DEPT_CXT_IRQS_NR, + DEPT_CXTS_NR +}; + +#define DEPT_SIRQF (1UL << DEPT_CXT_SIRQ) +#define DEPT_HIRQF (1UL << DEPT_CXT_HIRQ) struct dept_ecxt; struct dept_iecxt { @@ -94,8 +99,8 @@ struct dept_class { /* * for tracking IRQ dependencies */ - struct dept_iecxt iecxt[DEPT_IRQS_NR]; - struct dept_iwait iwait[DEPT_IRQS_NR]; + struct dept_iecxt iecxt[DEPT_CXT_IRQS_NR]; + struct dept_iwait iwait[DEPT_CXT_IRQS_NR]; /* * classified by a map embedded in task_struct, @@ -207,8 +212,8 @@ struct dept_ecxt { /* * where the IRQ-enabled happened */ - unsigned long enirq_ip[DEPT_IRQS_NR]; - struct dept_stack *enirq_stack[DEPT_IRQS_NR]; + unsigned long enirq_ip[DEPT_CXT_IRQS_NR]; + struct dept_stack *enirq_stack[DEPT_CXT_IRQS_NR]; /* * where the event context started @@ -252,8 +257,8 @@ struct dept_wait { /* * where the IRQ wait happened */ - unsigned long irq_ip[DEPT_IRQS_NR]; - struct dept_stack *irq_stack[DEPT_IRQS_NR]; + unsigned long irq_ip[DEPT_CXT_IRQS_NR]; + struct dept_stack *irq_stack[DEPT_CXT_IRQS_NR]; /* * where the wait happened @@ -406,19 +411,19 @@ struct dept_task { int wait_hist_pos; /* - * sequential id to identify each IRQ context + * sequential id to identify each context */ - unsigned int irq_id[DEPT_IRQS_NR]; + unsigned int cxt_id[DEPT_CXTS_NR]; /* * for tracking IRQ-enabled points with cross-event */ - unsigned int wgen_enirq[DEPT_IRQS_NR]; + unsigned int wgen_enirq[DEPT_CXT_IRQS_NR]; /* * for keeping up-to-date IRQ-enabled points */ - unsigned long enirq_ip[DEPT_IRQS_NR]; + unsigned long enirq_ip[DEPT_CXT_IRQS_NR]; /* * for reserving a current stack instance at each operation @@ -465,7 +470,7 @@ struct dept_task { .wait_hist = { { .wait = NULL, } }, \ .ecxt_held_pos = 0, \ .wait_hist_pos = 0, \ - .irq_id = { 0U }, \ + .cxt_id = { 0U }, \ .wgen_enirq = { 0U }, \ .enirq_ip = { 0UL }, \ .stack = NULL, \ @@ -503,6 +508,7 @@ extern void dept_event(struct dept_map *m, unsigned long e_f, unsigned long ip, extern void dept_ecxt_exit(struct dept_map *m, unsigned long e_f, unsigned long ip); extern void dept_sched_enter(void); extern void dept_sched_exit(void); +extern void dept_kernel_enter(void); static inline void dept_ecxt_enter_nokeep(struct dept_map *m) { @@ -552,6 +558,7 @@ struct dept_task { }; #define dept_ecxt_exit(m, e_f, ip) do { } while (0) #define dept_sched_enter() do { } while (0) #define dept_sched_exit() do { } while (0) +#define dept_kernel_enter() do { } while (0) #define dept_ecxt_enter_nokeep(m) do { } while (0) #define dept_key_init(k) do { (void)(k); } while (0) #define dept_key_destroy(k) do { (void)(k); } while (0) diff --git a/kernel/dependency/dept.c b/kernel/dependency/dept.c index 19406093103e..9aba9eb22760 100644 --- a/kernel/dependency/dept.c +++ b/kernel/dependency/dept.c @@ -220,9 +220,9 @@ static struct dept_class *dep_tc(struct dept_dep *d) static const char *irq_str(int irq) { - if (irq == DEPT_SIRQ) + if (irq == DEPT_CXT_SIRQ) return "softirq"; - if (irq == DEPT_HIRQ) + if (irq == DEPT_CXT_HIRQ) return "hardirq"; return "(unknown)"; } @@ -406,7 +406,7 @@ static void initialize_class(struct dept_class *c) { int i; - for (i = 0; i < DEPT_IRQS_NR; i++) { + for (i = 0; i < DEPT_CXT_IRQS_NR; i++) { struct dept_iecxt *ie = &c->iecxt[i]; struct dept_iwait *iw = &c->iwait[i]; @@ -431,7 +431,7 @@ static void initialize_ecxt(struct dept_ecxt *e) { int i; - for (i = 0; i < DEPT_IRQS_NR; i++) { + for (i = 0; i < DEPT_CXT_IRQS_NR; i++) { e->enirq_stack[i] = NULL; e->enirq_ip[i] = 0UL; } @@ -447,7 +447,7 @@ static void initialize_wait(struct dept_wait *w) { int i; - for (i = 0; i < DEPT_IRQS_NR; i++) { + for (i = 0; i < DEPT_CXT_IRQS_NR; i++) { w->irq_stack[i] = NULL; w->irq_ip[i] = 0UL; } @@ -486,7 +486,7 @@ static void destroy_ecxt(struct dept_ecxt *e) { int i; - for (i = 0; i < DEPT_IRQS_NR; i++) + for (i = 0; i < DEPT_CXT_IRQS_NR; i++) if (e->enirq_stack[i]) put_stack(e->enirq_stack[i]); if (e->class) @@ -502,7 +502,7 @@ static void destroy_wait(struct dept_wait *w) { int i; - for (i = 0; i < DEPT_IRQS_NR; i++) + for (i = 0; i < DEPT_CXT_IRQS_NR; i++) if (w->irq_stack[i]) put_stack(w->irq_stack[i]); if (w->class) @@ -651,7 +651,7 @@ static void print_diagram(struct dept_dep *d) const char *tc_n = tc->sched_map ? "" : (tc->name ?: "(unknown)"); irqf = e->enirqf & w->irqf; - for_each_set_bit(irq, &irqf, DEPT_IRQS_NR) { + for_each_set_bit(irq, &irqf, DEPT_CXT_IRQS_NR) { if (!firstline) pr_warn("\nor\n\n"); firstline = false; @@ -684,7 +684,7 @@ static void print_dep(struct dept_dep *d) const char *tc_n = tc->sched_map ? "" : (tc->name ?: "(unknown)"); irqf = e->enirqf & w->irqf; - for_each_set_bit(irq, &irqf, DEPT_IRQS_NR) { + for_each_set_bit(irq, &irqf, DEPT_CXT_IRQS_NR) { pr_warn("%s has been enabled:\n", irq_str(irq)); print_ip_stack(e->enirq_ip[irq], e->enirq_stack[irq]); pr_warn("\n"); @@ -910,7 +910,7 @@ static void bfs(struct dept_class *c, bfs_f *cb, void *in, void **out) */ static unsigned long cur_enirqf(void); -static int cur_irq(void); +static int cur_cxt(void); static unsigned int cur_ctxt_id(void); static struct dept_iecxt *iecxt(struct dept_class *c, int irq) @@ -1458,7 +1458,7 @@ static void add_dep(struct dept_ecxt *e, struct dept_wait *w) if (d) { check_dl_bfs(d); - for (i = 0; i < DEPT_IRQS_NR; i++) { + for (i = 0; i < DEPT_CXT_IRQS_NR; i++) { struct dept_iwait *fiw = iwait(fc, i); struct dept_iecxt *found_ie; struct dept_iwait *found_iw; @@ -1494,7 +1494,7 @@ static void add_wait(struct dept_class *c, unsigned long ip, struct dept_task *dt = dept_task(); struct dept_wait *w; unsigned int wg = 0U; - int irq; + int cxt; int i; if (DEPT_WARN_ON(!valid_class(c))) @@ -1510,9 +1510,9 @@ static void add_wait(struct dept_class *c, unsigned long ip, w->wait_stack = get_current_stack(); w->sched_sleep = sched_sleep; - irq = cur_irq(); - if (irq < DEPT_IRQS_NR) - add_iwait(c, irq, w); + cxt = cur_cxt(); + if (cxt == DEPT_CXT_HIRQ || cxt == DEPT_CXT_SIRQ) + add_iwait(c, cxt, w); /* * Avoid adding dependency between user aware nested ecxt and @@ -1593,7 +1593,7 @@ static bool add_ecxt(struct dept_map *m, struct dept_class *c, eh->sub_l = sub_l; irqf = cur_enirqf(); - for_each_set_bit(irq, &irqf, DEPT_IRQS_NR) + for_each_set_bit(irq, &irqf, DEPT_CXT_IRQS_NR) add_iecxt(c, irq, e, false); del_ecxt(e); @@ -1745,7 +1745,7 @@ static void do_event(struct dept_map *m, struct dept_class *c, add_dep(eh->ecxt, wh->wait); } - for (i = 0; i < DEPT_IRQS_NR; i++) { + for (i = 0; i < DEPT_CXT_IRQS_NR; i++) { struct dept_ecxt *e; if (before(dt->wgen_enirq[i], wg)) @@ -1787,7 +1787,7 @@ static void disconnect_class(struct dept_class *c) call_rcu(&d->rh, del_dep_rcu); } - for (i = 0; i < DEPT_IRQS_NR; i++) { + for (i = 0; i < DEPT_CXT_IRQS_NR; i++) { stale_iecxt(iecxt(c, i)); stale_iwait(iwait(c, i)); } @@ -1812,27 +1812,21 @@ static unsigned long cur_enirqf(void) return 0UL; } -static int cur_irq(void) +static int cur_cxt(void) { if (lockdep_softirq_context(current)) - return DEPT_SIRQ; + return DEPT_CXT_SIRQ; if (lockdep_hardirq_context()) - return DEPT_HIRQ; - return DEPT_IRQS_NR; + return DEPT_CXT_HIRQ; + return DEPT_CXT_PROCESS; } static unsigned int cur_ctxt_id(void) { struct dept_task *dt = dept_task(); - int irq = cur_irq(); + int cxt = cur_cxt(); - /* - * Normal process context - */ - if (irq == DEPT_IRQS_NR) - return 0U; - - return dt->irq_id[irq] | (1UL << irq); + return dt->cxt_id[cxt] | (1UL << cxt); } static void enirq_transition(int irq) @@ -1893,7 +1887,7 @@ static void dept_enirq(unsigned long ip) flags = dept_enter(); - for_each_set_bit(irq, &irqf, DEPT_IRQS_NR) { + for_each_set_bit(irq, &irqf, DEPT_CXT_IRQS_NR) { dt->enirq_ip[irq] = ip; enirq_transition(irq); } @@ -1939,6 +1933,13 @@ void noinstr dept_hardirqs_off(void) dept_task()->hardirqs_enabled = false; } +void noinstr dept_kernel_enter(void) +{ + struct dept_task *dt = dept_task(); + + dt->cxt_id[DEPT_CXT_PROCESS] += 1UL << DEPT_CXTS_NR; +} + /* * Ensure it's the outmost softirq context. */ @@ -1946,7 +1947,7 @@ void dept_softirq_enter(void) { struct dept_task *dt = dept_task(); - dt->irq_id[DEPT_SIRQ] += 1UL << DEPT_IRQS_NR; + dt->cxt_id[DEPT_CXT_SIRQ] += 1UL << DEPT_CXTS_NR; } /* @@ -1956,7 +1957,7 @@ void noinstr dept_hardirq_enter(void) { struct dept_task *dt = dept_task(); - dt->irq_id[DEPT_HIRQ] += 1UL << DEPT_IRQS_NR; + dt->cxt_id[DEPT_CXT_HIRQ] += 1UL << DEPT_CXTS_NR; } void dept_sched_enter(void) -- 2.17.1