[PATCH] arm64: percpu: Make this_cpu accessors pre-empt safe
Mark Rutland
mark.rutland at arm.com
Thu Mar 19 08:44:36 PDT 2015
Hi Steve,
Thanks for putting this together!
On Thu, Mar 19, 2015 at 02:52:31PM +0000, Steve Capper wrote:
> this_cpu operations were implemented for arm64 in:
> 5284e1b arm64: xchg: Implement cmpxchg_double
> f97fc81 arm64: percpu: Implement this_cpu operations
>
> Unfortunately, it is possible for pre-emption to take place between
> address generation and data access. This can lead to cases where data
> is being manipulated by this_cpu for a different CPU than it was
> called on. Which effectively breaks the spec.
>
> This patch disables pre-emption for the this_cpu operations
> guaranteeing that address generation and data manipulation.
Shouldn't that last sentence end with "occur on the same CPU", or
something like that?
[...]
> +/*
> + * Modules aren't allowed to use preempt_enable_no_resched, and it is
> + * undef'ed. If we are unable to use preempt_enable_no_resched, then
> + * fallback to the standard preempt_enable.
> + */
> +#ifdef preempt_enable_no_resched
> +#define __pcp_preempt_enable() preempt_enable_no_resched()
> +#else
> +#define __pcp_preempt_enable() preempt_enable()
> +#endif /* preempt_enable_no_resched */
I think it would be worth mentioning in the comment why we want to use
preempt_enable_no_resched where possible (e.g. read-modify-cmpxchg
sequences where we want to have as few retries as possible).
Other than those points, the patch looks good to me, feel free to add:
Reviewed-by: Mark Rutland <mark.rutland at arm.com>
It's a shame there don't seem to be any this_cpu_* self-tests; I've
booted a kernel with this applied, but I didn't have anything that
exploded without this, so I'd feel uneasy giving a Tested-by.
Mark.
More information about the linux-arm-kernel
mailing list