forked from mirrors/linux
		
	Yes, it really did out-of-line this.... vmlinux.o: warning: objtool: vmx_vcpu_enter_exit()+0x31: call to context_tracking_guest_enter() leaves .noinstr.text section 000000000019f660 <context_tracking_guest_enter>: 19f660: e8 00 00 00 00 callq 19f665 <context_tracking_guest_enter+0x5> 19f661: R_X86_64_PLT32 __sanitizer_cov_trace_pc-0x4 19f665: 31 c0 xor %eax,%eax 19f667: c3 retq Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Link: https://lore.kernel.org/r/20210624095148.003928226@infradead.org
		
			
				
	
	
		
			121 lines
		
	
	
	
		
			3.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			121 lines
		
	
	
	
		
			3.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* SPDX-License-Identifier: GPL-2.0 */
 | 
						|
#ifndef _LINUX_CONTEXT_TRACKING_H
 | 
						|
#define _LINUX_CONTEXT_TRACKING_H
 | 
						|
 | 
						|
#include <linux/sched.h>
 | 
						|
#include <linux/vtime.h>
 | 
						|
#include <linux/context_tracking_state.h>
 | 
						|
#include <linux/instrumentation.h>
 | 
						|
 | 
						|
#include <asm/ptrace.h>
 | 
						|
 | 
						|
 | 
						|
#ifdef CONFIG_CONTEXT_TRACKING
 | 
						|
extern void context_tracking_cpu_set(int cpu);
 | 
						|
 | 
						|
/* Called with interrupts disabled.  */
 | 
						|
extern void __context_tracking_enter(enum ctx_state state);
 | 
						|
extern void __context_tracking_exit(enum ctx_state state);
 | 
						|
 | 
						|
extern void context_tracking_enter(enum ctx_state state);
 | 
						|
extern void context_tracking_exit(enum ctx_state state);
 | 
						|
extern void context_tracking_user_enter(void);
 | 
						|
extern void context_tracking_user_exit(void);
 | 
						|
 | 
						|
static inline void user_enter(void)
 | 
						|
{
 | 
						|
	if (context_tracking_enabled())
 | 
						|
		context_tracking_enter(CONTEXT_USER);
 | 
						|
 | 
						|
}
 | 
						|
static inline void user_exit(void)
 | 
						|
{
 | 
						|
	if (context_tracking_enabled())
 | 
						|
		context_tracking_exit(CONTEXT_USER);
 | 
						|
}
 | 
						|
 | 
						|
/* Called with interrupts disabled.  */
 | 
						|
static __always_inline void user_enter_irqoff(void)
 | 
						|
{
 | 
						|
	if (context_tracking_enabled())
 | 
						|
		__context_tracking_enter(CONTEXT_USER);
 | 
						|
 | 
						|
}
 | 
						|
static __always_inline void user_exit_irqoff(void)
 | 
						|
{
 | 
						|
	if (context_tracking_enabled())
 | 
						|
		__context_tracking_exit(CONTEXT_USER);
 | 
						|
}
 | 
						|
 | 
						|
static inline enum ctx_state exception_enter(void)
 | 
						|
{
 | 
						|
	enum ctx_state prev_ctx;
 | 
						|
 | 
						|
	if (IS_ENABLED(CONFIG_HAVE_CONTEXT_TRACKING_OFFSTACK) ||
 | 
						|
	    !context_tracking_enabled())
 | 
						|
		return 0;
 | 
						|
 | 
						|
	prev_ctx = this_cpu_read(context_tracking.state);
 | 
						|
	if (prev_ctx != CONTEXT_KERNEL)
 | 
						|
		context_tracking_exit(prev_ctx);
 | 
						|
 | 
						|
	return prev_ctx;
 | 
						|
}
 | 
						|
 | 
						|
static inline void exception_exit(enum ctx_state prev_ctx)
 | 
						|
{
 | 
						|
	if (!IS_ENABLED(CONFIG_HAVE_CONTEXT_TRACKING_OFFSTACK) &&
 | 
						|
	    context_tracking_enabled()) {
 | 
						|
		if (prev_ctx != CONTEXT_KERNEL)
 | 
						|
			context_tracking_enter(prev_ctx);
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
static __always_inline bool context_tracking_guest_enter(void)
 | 
						|
{
 | 
						|
	if (context_tracking_enabled())
 | 
						|
		__context_tracking_enter(CONTEXT_GUEST);
 | 
						|
 | 
						|
	return context_tracking_enabled_this_cpu();
 | 
						|
}
 | 
						|
 | 
						|
static __always_inline void context_tracking_guest_exit(void)
 | 
						|
{
 | 
						|
	if (context_tracking_enabled())
 | 
						|
		__context_tracking_exit(CONTEXT_GUEST);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * ct_state() - return the current context tracking state if known
 | 
						|
 *
 | 
						|
 * Returns the current cpu's context tracking state if context tracking
 | 
						|
 * is enabled.  If context tracking is disabled, returns
 | 
						|
 * CONTEXT_DISABLED.  This should be used primarily for debugging.
 | 
						|
 */
 | 
						|
static __always_inline enum ctx_state ct_state(void)
 | 
						|
{
 | 
						|
	return context_tracking_enabled() ?
 | 
						|
		this_cpu_read(context_tracking.state) : CONTEXT_DISABLED;
 | 
						|
}
 | 
						|
#else
 | 
						|
static inline void user_enter(void) { }
 | 
						|
static inline void user_exit(void) { }
 | 
						|
static inline void user_enter_irqoff(void) { }
 | 
						|
static inline void user_exit_irqoff(void) { }
 | 
						|
static inline enum ctx_state exception_enter(void) { return 0; }
 | 
						|
static inline void exception_exit(enum ctx_state prev_ctx) { }
 | 
						|
static inline enum ctx_state ct_state(void) { return CONTEXT_DISABLED; }
 | 
						|
static __always_inline bool context_tracking_guest_enter(void) { return false; }
 | 
						|
static inline void context_tracking_guest_exit(void) { }
 | 
						|
 | 
						|
#endif /* !CONFIG_CONTEXT_TRACKING */
 | 
						|
 | 
						|
#define CT_WARN_ON(cond) WARN_ON(context_tracking_enabled() && (cond))
 | 
						|
 | 
						|
#ifdef CONFIG_CONTEXT_TRACKING_FORCE
 | 
						|
extern void context_tracking_init(void);
 | 
						|
#else
 | 
						|
static inline void context_tracking_init(void) { }
 | 
						|
#endif /* CONFIG_CONTEXT_TRACKING_FORCE */
 | 
						|
 | 
						|
#endif
 |