2020-04-22 01:04:04 +08:00
|
|
|
.. SPDX-License-Identifier: GPL-2.0
|
|
|
|
|
|
|
|
========================
|
2010-02-23 09:04:57 +08:00
|
|
|
RCU and lockdep checking
|
2020-04-22 01:04:04 +08:00
|
|
|
========================
|
2010-02-23 09:04:57 +08:00
|
|
|
|
|
|
|
All flavors of RCU have lockdep checking available, so that lockdep is
|
|
|
|
aware of when each task enters and leaves any flavor of RCU read-side
|
|
|
|
critical section. Each flavor of RCU is tracked separately (but note
|
|
|
|
that this is not the case in 2.6.32 and earlier). This allows lockdep's
|
|
|
|
tracking to include RCU state, which can sometimes help when debugging
|
|
|
|
deadlocks and the like.
|
|
|
|
|
|
|
|
In addition, RCU provides the following primitives that check lockdep's
|
2020-04-22 01:04:04 +08:00
|
|
|
state::
|
2010-02-23 09:04:57 +08:00
|
|
|
|
|
|
|
rcu_read_lock_held() for normal RCU.
|
|
|
|
rcu_read_lock_bh_held() for RCU-bh.
|
|
|
|
rcu_read_lock_sched_held() for RCU-sched.
|
2022-10-18 23:33:59 +08:00
|
|
|
rcu_read_lock_any_held() for any of normal RCU, RCU-bh, and RCU-sched.
|
2010-02-23 09:04:57 +08:00
|
|
|
srcu_read_lock_held() for SRCU.
|
2022-10-18 23:33:59 +08:00
|
|
|
rcu_read_lock_trace_held() for RCU Tasks Trace.
|
2010-02-23 09:04:57 +08:00
|
|
|
|
|
|
|
These functions are conservative, and will therefore return 1 if they
|
|
|
|
aren't certain (for example, if CONFIG_DEBUG_LOCK_ALLOC is not set).
|
|
|
|
This prevents things like WARN_ON(!rcu_read_lock_held()) from giving false
|
|
|
|
positives when lockdep is disabled.
|
|
|
|
|
|
|
|
In addition, a separate kernel config parameter CONFIG_PROVE_RCU enables
|
|
|
|
checking of rcu_dereference() primitives:
|
|
|
|
|
|
|
|
rcu_dereference(p):
|
|
|
|
Check for RCU read-side critical section.
|
|
|
|
rcu_dereference_bh(p):
|
|
|
|
Check for RCU-bh read-side critical section.
|
|
|
|
rcu_dereference_sched(p):
|
|
|
|
Check for RCU-sched read-side critical section.
|
|
|
|
srcu_dereference(p, sp):
|
|
|
|
Check for SRCU read-side critical section.
|
|
|
|
rcu_dereference_check(p, c):
|
2011-07-09 00:07:35 +08:00
|
|
|
Use explicit check expression "c" along with
|
|
|
|
rcu_read_lock_held(). This is useful in code that is
|
|
|
|
invoked by both RCU readers and updaters.
|
|
|
|
rcu_dereference_bh_check(p, c):
|
|
|
|
Use explicit check expression "c" along with
|
|
|
|
rcu_read_lock_bh_held(). This is useful in code that
|
|
|
|
is invoked by both RCU-bh readers and updaters.
|
|
|
|
rcu_dereference_sched_check(p, c):
|
|
|
|
Use explicit check expression "c" along with
|
|
|
|
rcu_read_lock_sched_held(). This is useful in code that
|
|
|
|
is invoked by both RCU-sched readers and updaters.
|
|
|
|
srcu_dereference_check(p, c):
|
|
|
|
Use explicit check expression "c" along with
|
2020-08-18 07:32:07 +08:00
|
|
|
srcu_read_lock_held(). This is useful in code that
|
2011-07-09 00:07:35 +08:00
|
|
|
is invoked by both SRCU readers and updaters.
|
|
|
|
rcu_dereference_raw(p):
|
2010-02-23 09:04:57 +08:00
|
|
|
Don't check. (Use sparingly, if at all.)
|
2022-10-18 23:33:59 +08:00
|
|
|
rcu_dereference_raw_check(p):
|
|
|
|
Don't do lockdep at all. (Use sparingly, if at all.)
|
2010-04-10 06:39:12 +08:00
|
|
|
rcu_dereference_protected(p, c):
|
|
|
|
Use explicit check expression "c", and omit all barriers
|
|
|
|
and compiler constraints. This is useful when the data
|
|
|
|
structure cannot change, for example, in code that is
|
|
|
|
invoked only by updaters.
|
|
|
|
rcu_access_pointer(p):
|
|
|
|
Return the value of the pointer and omit all barriers,
|
|
|
|
but retain the compiler constraints that prevent duplicating
|
2023-01-30 07:10:49 +08:00
|
|
|
or coalescing. This is useful when testing the
|
2010-04-10 06:39:12 +08:00
|
|
|
value of the pointer itself, for example, against NULL.
|
2010-02-23 09:04:57 +08:00
|
|
|
|
|
|
|
The rcu_dereference_check() check expression can be any boolean
|
2022-11-05 01:53:25 +08:00
|
|
|
expression, but would normally include a lockdep expression. For a
|
|
|
|
moderately ornate example, consider the following::
|
2010-02-23 09:04:57 +08:00
|
|
|
|
|
|
|
file = rcu_dereference_check(fdt->fd[fd],
|
|
|
|
lockdep_is_held(&files->file_lock) ||
|
|
|
|
atomic_read(&files->count) == 1);
|
|
|
|
|
|
|
|
This expression picks up the pointer "fdt->fd[fd]" in an RCU-safe manner,
|
|
|
|
and, if CONFIG_PROVE_RCU is configured, verifies that this expression
|
|
|
|
is used in:
|
|
|
|
|
2011-07-08 23:48:24 +08:00
|
|
|
1. An RCU read-side critical section (implicit), or
|
2010-02-23 09:04:57 +08:00
|
|
|
2. with files->file_lock held, or
|
|
|
|
3. on an unshared files_struct.
|
|
|
|
|
|
|
|
In case (1), the pointer is picked up in an RCU-safe manner for vanilla
|
|
|
|
RCU read-side critical sections, in case (2) the ->file_lock prevents
|
|
|
|
any change from taking place, and finally, in case (3) the current task
|
|
|
|
is the only task accessing the file_struct, again preventing any change
|
2010-04-10 06:39:12 +08:00
|
|
|
from taking place. If the above statement was invoked only from updater
|
2020-04-22 01:04:04 +08:00
|
|
|
code, it could instead be written as follows::
|
2010-04-10 06:39:12 +08:00
|
|
|
|
|
|
|
file = rcu_dereference_protected(fdt->fd[fd],
|
|
|
|
lockdep_is_held(&files->file_lock) ||
|
|
|
|
atomic_read(&files->count) == 1);
|
|
|
|
|
|
|
|
This would verify cases #2 and #3 above, and furthermore lockdep would
|
2022-11-05 01:53:25 +08:00
|
|
|
complain even if this was used in an RCU read-side critical section unless
|
|
|
|
one of these two cases held. Because rcu_dereference_protected() omits
|
|
|
|
all barriers and compiler constraints, it generates better code than do
|
|
|
|
the other flavors of rcu_dereference(). On the other hand, it is illegal
|
2010-04-10 06:39:12 +08:00
|
|
|
to use rcu_dereference_protected() if either the RCU-protected pointer
|
|
|
|
or the RCU-protected data that it points to can change concurrently.
|
2010-02-23 09:04:57 +08:00
|
|
|
|
2019-08-12 06:11:10 +08:00
|
|
|
Like rcu_dereference(), when lockdep is enabled, RCU list and hlist
|
|
|
|
traversal primitives check for being called from within an RCU read-side
|
|
|
|
critical section. However, a lockdep expression can be passed to them
|
|
|
|
as a additional optional argument. With this lockdep expression, these
|
|
|
|
traversal primitives will complain only if the lockdep expression is
|
|
|
|
false and they are called from outside any RCU read-side critical section.
|
|
|
|
|
|
|
|
For example, the workqueue for_each_pwq() macro is intended to be used
|
|
|
|
either within an RCU read-side critical section or with wq->mutex held.
|
2020-04-22 01:04:04 +08:00
|
|
|
It is thus implemented as follows::
|
2019-08-12 06:11:10 +08:00
|
|
|
|
|
|
|
#define for_each_pwq(pwq, wq)
|
|
|
|
list_for_each_entry_rcu((pwq), &(wq)->pwqs, pwqs_node,
|
|
|
|
lock_is_held(&(wq->mutex).dep_map))
|