From patchwork Sun Feb 25 15:17:58 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Masami Hiramatsu (Google)" X-Patchwork-Id: 206057 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7300:a81b:b0:108:e6aa:91d0 with SMTP id bq27csp1621218dyb; Sun, 25 Feb 2024 07:19:35 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCVQNyGanrMRvcfCdvnyuK6ofJ2r/WYxZS9N3Wwgnb5RWfqjcTa5Ie3rB+y6QIpc7PEkIxFaP2LZhTfb+MoztGZYYx0pDQ== X-Google-Smtp-Source: AGHT+IHH5VEgG895yntuhC8r/QuN14UltwpJqi5lmNNMPmPzUVG4KWGOTh7P/hHXFWQtENwUORB6 X-Received: by 2002:a17:90a:af85:b0:29a:51e9:a70c with SMTP id w5-20020a17090aaf8500b0029a51e9a70cmr6092686pjq.13.1708874375576; Sun, 25 Feb 2024 07:19:35 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708874375; cv=pass; d=google.com; s=arc-20160816; b=Sy/Fh1wJpz8/6ScRoaIT8GluldhmUul8CvxUHshHgAqRNTjJQfP3GjANol+bOIhEkl ti8Qk3iXO0vpMaTv1Z7lX7KwxAAikUkOm0Bm5g2eIeJia/CFaT11dV7dTNONLNMrLK46 YmqoPgZX5srD3G1/6bgJKbqn93LJAXmKomkk3eirmIb4VGijsffJHJvS4wKHyoausLfP +xK5xPFPaC4IRb9RJI/0bnrJ8Em0/5aGLBFOaYi28SDblCmSj6p8xqXeuCJt5AGuuv3W MERpzTkUB3U6nZoP5zQOppAoW9ymg3lXbuSQZ8mGKzutu3gjEUUrLqKr3K1dqqAkw1zx gXmg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:user-agent:references:in-reply-to :message-id:date:subject:cc:to:from:dkim-signature; bh=GoKuTuktY4fmTQ/r/V34b+qK7JltcK60u1i+qHry0y8=; fh=SIgps5XdV0XNwjZfT2uAI7g3mrspDldK9Qs8qQAfoa4=; b=Qf41aRq4Q0ryrgfGW5Bze9P4RfrL48R5doZtj0o4CCHMTPHtIol7sDMo86WRaOscNH n36XkvPNLCT/ykfTo6ed3VjzpC2oruM7JvqzruJUmPWH7Bj3RANOwa+jkyv0ie/zFHmk AhOSmYrPI9sY48uTYAnAZhzHq80K75WL9GFHun6z1ss2l/0ruuKqTo94PcWF/Wjw453s qdO4j/b//QD6FZNzjNUZgjJOeI0u9hDGz2erQ2lai/rHXh1EtZwY5Eb01F801yaGYkrM 8czxwKTXDQWBO2k76kvgXa9jhsKbsPyN9ES3k/vtJVZxXiVQa7AoAJ1tHpC7FRSTQacF C4JQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=P3Smd3zE; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-80144-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-80144-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id li12-20020a17090b48cc00b0029a9fabe780si2179047pjb.121.2024.02.25.07.19.35 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sun, 25 Feb 2024 07:19:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-80144-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=P3Smd3zE; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-80144-ouuuleilei=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-80144-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 632642815D7 for ; Sun, 25 Feb 2024 15:19:35 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id D5D6D1B800; Sun, 25 Feb 2024 15:18:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="P3Smd3zE" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A42EA1B7FC; Sun, 25 Feb 2024 15:18:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708874284; cv=none; b=SFVRzyL5FuR/wUXmGmdEkZoTz2AXnKeTS9OXNlJ9QADvEuWz+BMKG2VaYE8ufJlX+vnV/UH0wdLnLV4HbC0goHY7Kw0alp+q9dMGaV04D0ine93hn/b6KLocAoQboGdNeibhyjDnsfg+3w2gfOluB2EHgivxlKiAxmR/hhD6m7A= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708874284; c=relaxed/simple; bh=5ZU6O1yZKo2WgktQxSz1C2P+0dzB3kSfvhbv8qkb5cU=; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References: MIME-Version:Content-Type; b=YYsZ2r+dUSwDO8CViKWO+EJW7MHhrPElBflLc7JA8rQK/g+5dGjUcfIC05FQtclgmUDVRdgNVtGrfgEAchgAd2GZTx8TUNKLU0UOyvVRaMzXztbrznTKkZGYEqM2EN/bZXvaC1VWQ0JvVm/Xj4KXmzbuBvzzf6vyJw84G532W68= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=P3Smd3zE; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id E93ADC433F1; Sun, 25 Feb 2024 15:18:00 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1708874284; bh=5ZU6O1yZKo2WgktQxSz1C2P+0dzB3kSfvhbv8qkb5cU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=P3Smd3zEvzUnYipzPvMZUKVVbktOK2kiBhXiqldlc2+TNuYRcZgLfv3LtYJ0oLetu /Ehp6CyEzxcj3CYlX/iCzFThmVMyyOU9n2mYnq1cIqTCPUZw08YijD/WP8WPsM5fPj rlXOPL0CY+AP/DbnH7PdotdWwYzUYhP/Rmlx25r+eaBrYLUz+sbFqtwewf8Kiti6J1 x+yN3sDQOfbJH7E8jTuZK7bOQ/jt1FlBaPLJLx6TGC1PsiGeIED9MyxrzmGlUbWT92 ukCwX0tWVYM2Us++bckeON4MM0hEJ9NiwMyPaBF0c8ZZNW3movtQK1C5k/t+ITDK1i 2y/7ugJukzY0Q== From: "Masami Hiramatsu (Google)" To: Alexei Starovoitov , Steven Rostedt , Florent Revest Cc: linux-trace-kernel@vger.kernel.org, LKML , Martin KaFai Lau , bpf , Sven Schnelle , Alexei Starovoitov , Jiri Olsa , Arnaldo Carvalho de Melo , Daniel Borkmann , Alan Maguire , Mark Rutland , Peter Zijlstra , Thomas Gleixner , Guo Ren Subject: [PATCH v8 16/35] function_graph: Move graph depth stored data to shadow stack global var Date: Mon, 26 Feb 2024 00:17:58 +0900 Message-Id: <170887427875.564249.12987947642912987283.stgit@devnote2> X-Mailer: git-send-email 2.34.1 In-Reply-To: <170887410337.564249.6360118840946697039.stgit@devnote2> References: <170887410337.564249.6360118840946697039.stgit@devnote2> User-Agent: StGit/0.19 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791884657028177913 X-GMAIL-MSGID: 1791884657028177913 From: Steven Rostedt (VMware) The use of the task->trace_recursion for the logic used for the function graph depth was a bit of an abuse of that variable. Now that there exists global vars that are per stack for registered graph traces, use that instead. Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Masami Hiramatsu (Google) --- include/linux/trace_recursion.h | 29 ----------------------------- kernel/trace/trace.h | 34 ++++++++++++++++++++++++++++++++-- 2 files changed, 32 insertions(+), 31 deletions(-) diff --git a/include/linux/trace_recursion.h b/include/linux/trace_recursion.h index 2efd5ec46d7f..00e792bf148d 100644 --- a/include/linux/trace_recursion.h +++ b/include/linux/trace_recursion.h @@ -44,25 +44,6 @@ enum { */ TRACE_IRQ_BIT, - /* - * In the very unlikely case that an interrupt came in - * at a start of graph tracing, and we want to trace - * the function in that interrupt, the depth can be greater - * than zero, because of the preempted start of a previous - * trace. In an even more unlikely case, depth could be 2 - * if a softirq interrupted the start of graph tracing, - * followed by an interrupt preempting a start of graph - * tracing in the softirq, and depth can even be 3 - * if an NMI came in at the start of an interrupt function - * that preempted a softirq start of a function that - * preempted normal context!!!! Luckily, it can't be - * greater than 3, so the next two bits are a mask - * of what the depth is when we set TRACE_GRAPH_FL - */ - - TRACE_GRAPH_DEPTH_START_BIT, - TRACE_GRAPH_DEPTH_END_BIT, - /* * To implement set_graph_notrace, if this bit is set, we ignore * function graph tracing of called functions, until the return @@ -78,16 +59,6 @@ enum { #define trace_recursion_clear(bit) do { (current)->trace_recursion &= ~(1<<(bit)); } while (0) #define trace_recursion_test(bit) ((current)->trace_recursion & (1<<(bit))) -#define trace_recursion_depth() \ - (((current)->trace_recursion >> TRACE_GRAPH_DEPTH_START_BIT) & 3) -#define trace_recursion_set_depth(depth) \ - do { \ - current->trace_recursion &= \ - ~(3 << TRACE_GRAPH_DEPTH_START_BIT); \ - current->trace_recursion |= \ - ((depth) & 3) << TRACE_GRAPH_DEPTH_START_BIT; \ - } while (0) - #define TRACE_CONTEXT_BITS 4 #define TRACE_FTRACE_START TRACE_FTRACE_BIT diff --git a/kernel/trace/trace.h b/kernel/trace/trace.h index d5501b1a10a6..d8cdcbb4e5a6 100644 --- a/kernel/trace/trace.h +++ b/kernel/trace/trace.h @@ -899,8 +899,38 @@ extern void free_fgraph_ops(struct trace_array *tr); enum { TRACE_GRAPH_FL = 1, + + /* + * In the very unlikely case that an interrupt came in + * at a start of graph tracing, and we want to trace + * the function in that interrupt, the depth can be greater + * than zero, because of the preempted start of a previous + * trace. In an even more unlikely case, depth could be 2 + * if a softirq interrupted the start of graph tracing, + * followed by an interrupt preempting a start of graph + * tracing in the softirq, and depth can even be 3 + * if an NMI came in at the start of an interrupt function + * that preempted a softirq start of a function that + * preempted normal context!!!! Luckily, it can't be + * greater than 3, so the next two bits are a mask + * of what the depth is when we set TRACE_GRAPH_FL + */ + + TRACE_GRAPH_DEPTH_START_BIT, + TRACE_GRAPH_DEPTH_END_BIT, }; +static inline unsigned long ftrace_graph_depth(unsigned long *task_var) +{ + return (*task_var >> TRACE_GRAPH_DEPTH_START_BIT) & 3; +} + +static inline void ftrace_graph_set_depth(unsigned long *task_var, int depth) +{ + *task_var &= ~(3 << TRACE_GRAPH_DEPTH_START_BIT); + *task_var |= (depth & 3) << TRACE_GRAPH_DEPTH_START_BIT; +} + #ifdef CONFIG_DYNAMIC_FTRACE extern struct ftrace_hash __rcu *ftrace_graph_hash; extern struct ftrace_hash __rcu *ftrace_graph_notrace_hash; @@ -933,7 +963,7 @@ ftrace_graph_addr(unsigned long *task_var, struct ftrace_graph_ent *trace) * when the depth is zero. */ *task_var |= TRACE_GRAPH_FL; - trace_recursion_set_depth(trace->depth); + ftrace_graph_set_depth(task_var, trace->depth); /* * If no irqs are to be traced, but a set_graph_function @@ -958,7 +988,7 @@ ftrace_graph_addr_finish(struct fgraph_ops *gops, struct ftrace_graph_ret *trace unsigned long *task_var = fgraph_get_task_var(gops); if ((*task_var & TRACE_GRAPH_FL) && - trace->depth == trace_recursion_depth()) + trace->depth == ftrace_graph_depth(task_var)) *task_var &= ~TRACE_GRAPH_FL; }