| .. SPDX-License-Identifier: GPL-2.0 |
| |
| ======================== |
| RCU and lockdep checking |
| ======================== |
| |
| All flavors of RCU have lockdep checking available, so that lockdep is |
| aware of when each task enters and leaves any flavor of RCU read-side |
| critical section. Each flavor of RCU is tracked separately (but note |
| that this is not the case in 2.6.32 and earlier). This allows lockdep's |
| tracking to include RCU state, which can sometimes help when debugging |
| deadlocks and the like. |
| |
| In addition, RCU provides the following primitives that check lockdep's |
| state:: |
| |
| rcu_read_lock_held() for normal RCU. |
| rcu_read_lock_bh_held() for RCU-bh. |
| rcu_read_lock_sched_held() for RCU-sched. |
| rcu_read_lock_any_held() for any of normal RCU, RCU-bh, and RCU-sched. |
| srcu_read_lock_held() for SRCU. |
| rcu_read_lock_trace_held() for RCU Tasks Trace. |
| |
| These functions are conservative, and will therefore return 1 if they |
| aren't certain (for example, if CONFIG_DEBUG_LOCK_ALLOC is not set). |
| This prevents things like WARN_ON(!rcu_read_lock_held()) from giving false |
| positives when lockdep is disabled. |
| |
| In addition, a separate kernel config parameter CONFIG_PROVE_RCU enables |
| checking of rcu_dereference() primitives: |
| |
| rcu_dereference(p): |
| Check for RCU read-side critical section. |
| rcu_dereference_bh(p): |
| Check for RCU-bh read-side critical section. |
| rcu_dereference_sched(p): |
| Check for RCU-sched read-side critical section. |
| srcu_dereference(p, sp): |
| Check for SRCU read-side critical section. |
| rcu_dereference_check(p, c): |
| Use explicit check expression "c" along with |
| rcu_read_lock_held(). This is useful in code that is |
| invoked by both RCU readers and updaters. |
| rcu_dereference_bh_check(p, c): |
| Use explicit check expression "c" along with |
| rcu_read_lock_bh_held(). This is useful in code that |
| is invoked by both RCU-bh readers and updaters. |
| rcu_dereference_sched_check(p, c): |
| Use explicit check expression "c" along with |
| rcu_read_lock_sched_held(). This is useful in code that |
| is invoked by both RCU-sched readers and updaters. |
| srcu_dereference_check(p, c): |
| Use explicit check expression "c" along with |
| srcu_read_lock_held(). This is useful in code that |
| is invoked by both SRCU readers and updaters. |
| rcu_dereference_raw(p): |
| Don't check. (Use sparingly, if at all.) |
| rcu_dereference_raw_check(p): |
| Don't do lockdep at all. (Use sparingly, if at all.) |
| rcu_dereference_protected(p, c): |
| Use explicit check expression "c", and omit all barriers |
| and compiler constraints. This is useful when the data |
| structure cannot change, for example, in code that is |
| invoked only by updaters. |
| rcu_access_pointer(p): |
| Return the value of the pointer and omit all barriers, |
| but retain the compiler constraints that prevent duplicating |
| or coalescing. This is useful when testing the |
| value of the pointer itself, for example, against NULL. |
| |
| The rcu_dereference_check() check expression can be any boolean |
| expression, but would normally include a lockdep expression. For a |
| moderately ornate example, consider the following:: |
| |
| file = rcu_dereference_check(fdt->fd[fd], |
| lockdep_is_held(&files->file_lock) || |
| atomic_read(&files->count) == 1); |
| |
| This expression picks up the pointer "fdt->fd[fd]" in an RCU-safe manner, |
| and, if CONFIG_PROVE_RCU is configured, verifies that this expression |
| is used in: |
| |
| 1. An RCU read-side critical section (implicit), or |
| 2. with files->file_lock held, or |
| 3. on an unshared files_struct. |
| |
| In case (1), the pointer is picked up in an RCU-safe manner for vanilla |
| RCU read-side critical sections, in case (2) the ->file_lock prevents |
| any change from taking place, and finally, in case (3) the current task |
| is the only task accessing the file_struct, again preventing any change |
| from taking place. If the above statement was invoked only from updater |
| code, it could instead be written as follows:: |
| |
| file = rcu_dereference_protected(fdt->fd[fd], |
| lockdep_is_held(&files->file_lock) || |
| atomic_read(&files->count) == 1); |
| |
| This would verify cases #2 and #3 above, and furthermore lockdep would |
| complain even if this was used in an RCU read-side critical section unless |
| one of these two cases held. Because rcu_dereference_protected() omits |
| all barriers and compiler constraints, it generates better code than do |
| the other flavors of rcu_dereference(). On the other hand, it is illegal |
| to use rcu_dereference_protected() if either the RCU-protected pointer |
| or the RCU-protected data that it points to can change concurrently. |
| |
| Like rcu_dereference(), when lockdep is enabled, RCU list and hlist |
| traversal primitives check for being called from within an RCU read-side |
| critical section. However, a lockdep expression can be passed to them |
| as a additional optional argument. With this lockdep expression, these |
| traversal primitives will complain only if the lockdep expression is |
| false and they are called from outside any RCU read-side critical section. |
| |
| For example, the workqueue for_each_pwq() macro is intended to be used |
| either within an RCU read-side critical section or with wq->mutex held. |
| It is thus implemented as follows:: |
| |
| #define for_each_pwq(pwq, wq) |
| list_for_each_entry_rcu((pwq), &(wq)->pwqs, pwqs_node, |
| lock_is_held(&(wq->mutex).dep_map)) |