Received: by 2002:a89:d88:0:b0:1fa:5c73:8e2d with SMTP id eb8csp1877152lqb; Sun, 26 May 2024 23:42:04 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCWG1WzRYJYF1QWQbxQhGUrvWB30OpsHORUUpqncha3zGGrmVRgirDbqKk9tOZBu8nUF6e8HG6YMREjtNSvZ0CTQHBH5pGrY7PiIHQjGDA== X-Google-Smtp-Source: AGHT+IFwq/VzNJgbH//3f15nb813dF8Lq3SXVbvJHUee052DGdQsxgs0FvXLReSGnybhT+rV7xFm X-Received: by 2002:ac8:7f91:0:b0:43e:ec0:c7a0 with SMTP id d75a77b69052e-43fb0f1381bmr107479541cf.62.1716792124540; Sun, 26 May 2024 23:42:04 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1716792124; cv=pass; d=google.com; s=arc-20160816; b=tMjOhoysNk2s4VYi+4+e14XyFNwS+TKTsFbLmm1Hq2bRDRbljSwsTJH712nem0kXV3 JG3FaNFoac5ve8qZvsv0Vn3uOeQGdUl7Zk0M/JMnNDN0E6CTlToD5/QlmjefIWAkDRkV yqU8MjTkoykuzA8hOM+RYwg/ZuZok+ubZL8/wnMB5skvVe3wAa1fxCLAspyrQkU3oVfv PxuMVEZqwMB+Qluqr8qGuMYp2pZHiCbc158yv6Ia9DoxXrvvflflsp02pXZwgheG+q0l illQtaqwGiquS8fPixiUcc0GIPE7Ug4BNhdnBkJ1A6Q70rebMf0n/dL3cGr0LQCQa2N+ zzrQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:dkim-signature:dkim-signature:from; bh=1K8de/y+g8Dnqh1KWpBj2+5OXJyql0b3Ov26lWETiB8=; fh=pKnPKUsir0uEGSsor+4Zc2vgbu+g+ayvUgsdzkuXaoA=; b=OwFzLS+0iZEP/F4N/wsEGlbnsoDvCLGDiSuI3eMGkc89byVJn51v7Hn+YN6DgHdbjH VbpkAifyDUBcNqacC7EJU660EMgNc54fhyMJn2S2GVhzjcAI3nURjF8SP8/u8jcWC7lG 3L5pY0jFdydRgP9DhMBDQkrpd2m7Esz79h5lf8KCTJYrP06os6ZwlV8m27wCYxbqEehc pM+bsCZjQKdduejbc7lba4h+5hLKx5un3Xq1VMy4ysHo2EfOcGcWhDEwhJs+h4XMFMER mWAOckFhWHMdTobXuGRoud7izpwAG3zYrbl/6jMgWUv9KEOqVmRvB0Bjtbc+U0ckIP8c g8jw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=i78GElMR; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e; arc=pass (i=1 spf=pass spfdomain=linutronix.de dkim=pass dkdomain=linutronix.de dmarc=pass fromdomain=linutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-190095-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-190095-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [2604:1380:45d1:ec00::1]) by mx.google.com with ESMTPS id d75a77b69052e-43fb27a5a4asi81428061cf.81.2024.05.26.23.42.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 26 May 2024 23:42:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-190095-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) client-ip=2604:1380:45d1:ec00::1; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=i78GElMR; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e; arc=pass (i=1 spf=pass spfdomain=linutronix.de dkim=pass dkdomain=linutronix.de dmarc=pass fromdomain=linutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-190095-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45d1:ec00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-190095-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 3A1521C20D54 for ; Mon, 27 May 2024 06:42:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6007613BC31; Mon, 27 May 2024 06:38:31 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="i78GElMR"; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="1Ue4W54J" Received: from galois.linutronix.de (Galois.linutronix.de [193.142.43.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id AF1026A347 for ; Mon, 27 May 2024 06:38:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=193.142.43.55 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716791908; cv=none; b=ZA8pXzV34ObXwYE4zQsxxPGewOQdBwMwcWBVON69ORbHiI59zdKyE9PxgLg0ky6Lpoh0yyc5p7ORMGFUonoxq0DjWAMNxJWmaSOi++YmOrXIYPoI3rhsx+dZPLJItcqNyBRz7frLrjN7aNnsGOIl/o1kaZWKDBOmcN9wuXdCBn4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1716791908; c=relaxed/simple; bh=Rd0t6WNNNckIBVkHKjfeD6/vzFKHe00qBLlxBSoqArE=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version; b=gl1G/69Ms+uTuOkyzwW9A0gXuziOQ8DgWzGQV/8p9CzjmvJnZBTw+4/pWojfB6/xpHrhBoH4T8XznsgBKkYqiQKqPni3YWdEIVjiSUIyPrQj3jE0198XvmvQ+jWQ3jjeho7ywiE/41hk6INedo6QAenHX1DQqUfKSurP6PwhU5w= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de; spf=pass smtp.mailfrom=linutronix.de; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=i78GElMR; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=1Ue4W54J; arc=none smtp.client-ip=193.142.43.55 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linutronix.de From: John Ogness DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1716791905; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=1K8de/y+g8Dnqh1KWpBj2+5OXJyql0b3Ov26lWETiB8=; b=i78GElMRqal8B/krWZI7qtrfYERKYX5kbXYLMuGNadiKytQ6BFRxLii+u/ppQxC96ejVrL To8uh5iYbi3iOq6JgpW5n3FCSOmqml80tmpTTKmev87i8vCAxTCj9YDiUYcQMXVFu/7KVM RI9+Pwz9oqRJD864nA+5lnUAufqkbQtaCKEazJu5WNAgC85f1husG+OndCnfUyUrBWBn42 npAK4hcxXtkXH+BFf9XQqV91YpcCaSPcIwciA5neYsQMk+UIhUpiZ3o0jVfiFG7p+mqBIH EUmYi4YRdVjvgy/UmnzxaNjlRBH5HIVhU5fqJWfTQObBQBXdITPtSO7x8CTTAA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1716791905; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=1K8de/y+g8Dnqh1KWpBj2+5OXJyql0b3Ov26lWETiB8=; b=1Ue4W54JWCzZD4Cyy+i508KQtWOk/KRzTr2CeHrSDvmUo83fTftg9LmyLbCTLvNXckt5ob TEbCSg7GPa+tWmDw== To: Petr Mladek Cc: Sergey Senozhatsky , Steven Rostedt , Thomas Gleixner , linux-kernel@vger.kernel.org Subject: [PATCH printk v6 23/30] printk: Avoid console_lock dance if no legacy or boot consoles Date: Mon, 27 May 2024 08:43:42 +0206 Message-Id: <20240527063749.391035-24-john.ogness@linutronix.de> In-Reply-To: <20240527063749.391035-1-john.ogness@linutronix.de> References: <20240527063749.391035-1-john.ogness@linutronix.de> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Currently the console lock is used to attempt legacy-type printing even if there are no legacy or boot consoles registered. If no such consoles are registered, the console lock does not need to be taken. Add tracking of legacy console registration and use it with boot console tracking to avoid unnecessary code paths, i.e. do not use the console lock if there are no boot consoles and no legacy consoles. Signed-off-by: John Ogness Reviewed-by: Petr Mladek --- kernel/printk/printk.c | 78 ++++++++++++++++++++++++++++++++++-------- 1 file changed, 63 insertions(+), 15 deletions(-) diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c index 9a7532cff8d2..f00192df84f0 100644 --- a/kernel/printk/printk.c +++ b/kernel/printk/printk.c @@ -463,6 +463,13 @@ static int console_msg_format = MSG_FORMAT_DEFAULT; /* syslog_lock protects syslog_* variables and write access to clear_seq. */ static DEFINE_MUTEX(syslog_lock); +/* + * Specifies if a legacy console is registered. If legacy consoles are + * present, it is necessary to perform the console lock/unlock dance + * whenever console flushing should occur. + */ +static bool have_legacy_console; + /* * Specifies if a boot console is registered. If boot consoles are present, * nbcon consoles cannot print simultaneously and must be synchronized by @@ -471,6 +478,14 @@ static DEFINE_MUTEX(syslog_lock); */ static bool have_boot_console; +/* + * Specifies if the console lock/unlock dance is needed for console + * printing. If @have_boot_console is true, the nbcon consoles will + * be printed serially along with the legacy consoles because nbcon + * consoles cannot print simultaneously with boot consoles. + */ +#define printing_via_unlock (have_legacy_console || have_boot_console) + #ifdef CONFIG_PRINTK DECLARE_WAIT_QUEUE_HEAD(log_wait); /* All 3 protected by @syslog_lock. */ @@ -2339,7 +2354,7 @@ asmlinkage int vprintk_emit(int facility, int level, printed_len = vprintk_store(facility, level, dev_info, fmt, args); /* If called from the scheduler, we can not call up(). */ - if (!in_sched) { + if (!in_sched && printing_via_unlock) { /* * The caller may be holding system-critical or * timing-sensitive locks. Disable preemption during @@ -2648,7 +2663,7 @@ void resume_console(void) */ static int console_cpu_notify(unsigned int cpu) { - if (!cpuhp_tasks_frozen) { + if (!cpuhp_tasks_frozen && printing_via_unlock) { /* If trylock fails, someone else is doing the printing */ if (console_trylock()) console_unlock(); @@ -3189,7 +3204,8 @@ void console_flush_on_panic(enum con_flush_mode mode) nbcon_atomic_flush_pending(); - console_flush_all(false, &next_seq, &handover); + if (printing_via_unlock) + console_flush_all(false, &next_seq, &handover); } /* @@ -3524,6 +3540,7 @@ void register_console(struct console *newcon) if (newcon->flags & CON_NBCON) { nbcon_init(newcon, init_seq); } else { + have_legacy_console = true; newcon->seq = init_seq; } @@ -3600,6 +3617,7 @@ EXPORT_SYMBOL(register_console); static int unregister_console_locked(struct console *console) { bool use_device_lock = (console->flags & CON_NBCON) && console->write_atomic; + bool found_legacy_con = false; bool found_boot_con = false; unsigned long flags; struct console *c; @@ -3667,9 +3685,13 @@ static int unregister_console_locked(struct console *console) for_each_console(c) { if (c->flags & CON_BOOT) found_boot_con = true; + if (!(c->flags & CON_NBCON)) + found_legacy_con = true; } if (!found_boot_con) have_boot_console = found_boot_con; + if (!found_legacy_con) + have_legacy_console = found_legacy_con; return res; } @@ -3830,22 +3852,34 @@ static bool __pr_flush(struct console *con, int timeout_ms, bool reset_on_progre seq = prb_next_reserve_seq(prb); /* Flush the consoles so that records up to @seq are printed. */ - console_lock(); - console_unlock(); + if (printing_via_unlock) { + console_lock(); + console_unlock(); + } for (;;) { unsigned long begin_jiffies; unsigned long slept_jiffies; - - diff = 0; + bool use_console_lock = printing_via_unlock; /* - * Hold the console_lock to guarantee safe access to - * console->seq. Releasing console_lock flushes more - * records in case @seq is still not printed on all - * usable consoles. + * Ensure the compiler does not optimize @use_console_lock to + * be @printing_via_unlock since the latter can change at any + * time. */ - console_lock(); + barrier(); + + diff = 0; + + if (use_console_lock) { + /* + * Hold the console_lock to guarantee safe access to + * console->seq. Releasing console_lock flushes more + * records in case @seq is still not printed on all + * usable consoles. + */ + console_lock(); + } cookie = console_srcu_read_lock(); for_each_console_srcu(c) { @@ -3865,6 +3899,7 @@ static bool __pr_flush(struct console *con, int timeout_ms, bool reset_on_progre if (flags & CON_NBCON) { printk_seq = nbcon_seq_read(c); } else { + WARN_ON_ONCE(!use_console_lock); printk_seq = c->seq; } @@ -3876,7 +3911,8 @@ static bool __pr_flush(struct console *con, int timeout_ms, bool reset_on_progre if (diff != last_diff && reset_on_progress) remaining_jiffies = timeout_jiffies; - console_unlock(); + if (use_console_lock) + console_unlock(); /* Note: @diff is 0 if there are no usable consoles. */ if (diff == 0 || remaining_jiffies == 0) @@ -3946,6 +3982,7 @@ static void __wake_up_klogd(int val) return; preempt_disable(); + /* * Guarantee any new records can be seen by tasks preparing to wait * before this context checks if the wait queue is empty. @@ -3957,11 +3994,22 @@ static void __wake_up_klogd(int val) * * This pairs with devkmsg_read:A and syslog_print:A. */ - if (wq_has_sleeper(&log_wait) || /* LMM(__wake_up_klogd:A) */ - (val & PRINTK_PENDING_OUTPUT)) { + if (!wq_has_sleeper(&log_wait)) /* LMM(__wake_up_klogd:A) */ + val &= ~PRINTK_PENDING_WAKEUP; + + /* + * Simple read is safe. register_console() would flush a newly + * registered legacy console when writing the message about it + * being enabled. + */ + if (!printing_via_unlock) + val &= ~PRINTK_PENDING_OUTPUT; + + if (val) { this_cpu_or(printk_pending, val); irq_work_queue(this_cpu_ptr(&wake_up_klogd_work)); } + preempt_enable(); } -- 2.39.2