lockdep.txt 3.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091
  1. RCU and lockdep checking
  2. All flavors of RCU have lockdep checking available, so that lockdep is
  3. aware of when each task enters and leaves any flavor of RCU read-side
  4. critical section. Each flavor of RCU is tracked separately (but note
  5. that this is not the case in 2.6.32 and earlier). This allows lockdep's
  6. tracking to include RCU state, which can sometimes help when debugging
  7. deadlocks and the like.
  8. In addition, RCU provides the following primitives that check lockdep's
  9. state:
  10. rcu_read_lock_held() for normal RCU.
  11. rcu_read_lock_bh_held() for RCU-bh.
  12. rcu_read_lock_sched_held() for RCU-sched.
  13. srcu_read_lock_held() for SRCU.
  14. These functions are conservative, and will therefore return 1 if they
  15. aren't certain (for example, if CONFIG_DEBUG_LOCK_ALLOC is not set).
  16. This prevents things like WARN_ON(!rcu_read_lock_held()) from giving false
  17. positives when lockdep is disabled.
  18. In addition, a separate kernel config parameter CONFIG_PROVE_RCU enables
  19. checking of rcu_dereference() primitives:
  20. rcu_dereference(p):
  21. Check for RCU read-side critical section.
  22. rcu_dereference_bh(p):
  23. Check for RCU-bh read-side critical section.
  24. rcu_dereference_sched(p):
  25. Check for RCU-sched read-side critical section.
  26. srcu_dereference(p, sp):
  27. Check for SRCU read-side critical section.
  28. rcu_dereference_check(p, c):
  29. Use explicit check expression "c". This is useful in
  30. code that is invoked by both readers and updaters.
  31. rcu_dereference_raw(p)
  32. Don't check. (Use sparingly, if at all.)
  33. rcu_dereference_protected(p, c):
  34. Use explicit check expression "c", and omit all barriers
  35. and compiler constraints. This is useful when the data
  36. structure cannot change, for example, in code that is
  37. invoked only by updaters.
  38. rcu_access_pointer(p):
  39. Return the value of the pointer and omit all barriers,
  40. but retain the compiler constraints that prevent duplicating
  41. or coalescsing. This is useful when when testing the
  42. value of the pointer itself, for example, against NULL.
  43. The rcu_dereference_check() check expression can be any boolean
  44. expression, but would normally include one of the rcu_read_lock_held()
  45. family of functions and a lockdep expression. However, any boolean
  46. expression can be used. For a moderately ornate example, consider
  47. the following:
  48. file = rcu_dereference_check(fdt->fd[fd],
  49. rcu_read_lock_held() ||
  50. lockdep_is_held(&files->file_lock) ||
  51. atomic_read(&files->count) == 1);
  52. This expression picks up the pointer "fdt->fd[fd]" in an RCU-safe manner,
  53. and, if CONFIG_PROVE_RCU is configured, verifies that this expression
  54. is used in:
  55. 1. An RCU read-side critical section, or
  56. 2. with files->file_lock held, or
  57. 3. on an unshared files_struct.
  58. In case (1), the pointer is picked up in an RCU-safe manner for vanilla
  59. RCU read-side critical sections, in case (2) the ->file_lock prevents
  60. any change from taking place, and finally, in case (3) the current task
  61. is the only task accessing the file_struct, again preventing any change
  62. from taking place. If the above statement was invoked only from updater
  63. code, it could instead be written as follows:
  64. file = rcu_dereference_protected(fdt->fd[fd],
  65. lockdep_is_held(&files->file_lock) ||
  66. atomic_read(&files->count) == 1);
  67. This would verify cases #2 and #3 above, and furthermore lockdep would
  68. complain if this was used in an RCU read-side critical section unless one
  69. of these two cases held. Because rcu_dereference_protected() omits all
  70. barriers and compiler constraints, it generates better code than do the
  71. other flavors of rcu_dereference(). On the other hand, it is illegal
  72. to use rcu_dereference_protected() if either the RCU-protected pointer
  73. or the RCU-protected data that it points to can change concurrently.
  74. There are currently only "universal" versions of the rcu_assign_pointer()
  75. and RCU list-/tree-traversal primitives, which do not (yet) check for
  76. being in an RCU read-side critical section. In the future, separate
  77. versions of these primitives might be created.