[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200720195939.GU9247@paulmck-ThinkPad-P72>
Date: Mon, 20 Jul 2020 12:59:39 -0700
From: "Paul E. McKenney" <paulmck@...nel.org>
To: Stephen Rothwell <sfr@...b.auug.org.au>
Cc: Randy Dunlap <rdunlap@...radead.org>,
Linux Next Mailing List <linux-next@...r.kernel.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
KVM <kvm@...r.kernel.org>, Paolo Bonzini <pbonzini@...hat.com>,
Madhuparna Bhowmik <madhuparnabhowmik10@...il.com>
Subject: Re: linux-next: Tree for Jul 20 (arch/x86/kvm/)
On Tue, Jul 21, 2020 at 04:43:07AM +1000, Stephen Rothwell wrote:
> Hi Randy,
>
> On Mon, 20 Jul 2020 09:56:08 -0700 Randy Dunlap <rdunlap@...radead.org> wrote:
> >
> > on x86_64:
> >
> > CC [M] arch/x86/kvm/mmu/page_track.o
> > In file included from ../include/linux/pid.h:5:0,
> > from ../include/linux/sched.h:14,
> > from ../include/linux/kvm_host.h:12,
> > from ../arch/x86/kvm/mmu/page_track.c:14:
> > ../arch/x86/kvm/mmu/page_track.c: In function ‘kvm_page_track_write’:
> > ../include/linux/rculist.h:727:30: error: left-hand operand of comma expression has no effect [-Werror=unused-value]
> > for (__list_check_srcu(cond), \
> > ^
> > ../arch/x86/kvm/mmu/page_track.c:232:2: note: in expansion of macro ‘hlist_for_each_entry_srcu’
> > hlist_for_each_entry_srcu(n, &head->track_notifier_list, node,
> > ^~~~~~~~~~~~~~~~~~~~~~~~~
> > ../arch/x86/kvm/mmu/page_track.c: In function ‘kvm_page_track_flush_slot’:
> > ../include/linux/rculist.h:727:30: error: left-hand operand of comma expression has no effect [-Werror=unused-value]
> > for (__list_check_srcu(cond), \
> > ^
> > ../arch/x86/kvm/mmu/page_track.c:258:2: note: in expansion of macro ‘hlist_for_each_entry_srcu’
> > hlist_for_each_entry_srcu(n, &head->track_notifier_list, node,
> > ^~~~~~~~~~~~~~~~~~~~~~~~~
> > cc1: all warnings being treated as errors
>
> Caused by commit
>
> bd4444c47de9 ("rculist : Introduce list/hlist_for_each_entry_srcu() macros")
>
> presumably with CONFIG_PROVE_RCU_LIST not set.
This commit has been obsoleted by the commit shown below, which should
be included in -rcu branch "rcu/next" as of a few hours ago. The commit
below eliminates this error in my local builds.
So as far as I know, this one is not Randy's fault, fun though it might
be to blame him. ;-)
Thanx, Paul
------------------------------------------------------------------------
commit ddd3f0494784e63546816888ba3fbc5aac9d9a54
Author: Madhuparna Bhowmik <madhuparnabhowmik10@...il.com>
Date: Sun Jul 12 18:40:02 2020 +0530
rculist : Introduce list/hlist_for_each_entry_srcu() macros
list/hlist_for_each_entry_rcu() provides an optional cond argument
to specify the lock held in the updater side.
However for SRCU read side, not providing the cond argument results
into false positive as whether srcu_read_lock is held or not is not
checked implicitly. Therefore, on read side the lockdep expression
srcu_read_lock_held(srcu struct) can solve this issue.
However, the function still fails to check the cases where srcu
protected list is traversed with rcu_read_lock() instead of
srcu_read_lock(). Therefore, to remove the false negative,
this patch introduces two new list traversal primitives :
list_for_each_entry_srcu() and hlist_for_each_entry_srcu().
Both of the functions have non-optional cond argument
as it is required for both read and update side, and simply checks
if the cond is true. For regular read side the lockdep expression
srcu_read_lock_head() can be passed as the cond argument to
list/hlist_for_each_entry_srcu().
Suggested-by: Paolo Bonzini <pbonzini@...hat.com>
Tested-by: Suraj Upadhyay <usuraj35@...il.com>
Tested-by: Naresh Kamboju <naresh.kamboju@...aro.org>
[ paulmck: Add "true" per kbuild test robot feedback. ]
Signed-off-by: Madhuparna Bhowmik <madhuparnabhowmik10@...il.com>
Signed-off-by: Paul E. McKenney <paulmck@...nel.org>
diff --git a/include/linux/rculist.h b/include/linux/rculist.h
index 7a6fc99..f8633d3 100644
--- a/include/linux/rculist.h
+++ b/include/linux/rculist.h
@@ -63,9 +63,17 @@ static inline void INIT_LIST_HEAD_RCU(struct list_head *list)
RCU_LOCKDEP_WARN(!(cond) && !rcu_read_lock_any_held(), \
"RCU-list traversed in non-reader section!"); \
})
+
+#define __list_check_srcu(cond) \
+ ({ \
+ RCU_LOCKDEP_WARN(!(cond), \
+ "RCU-list traversed without holding the required lock!");\
+ })
#else
#define __list_check_rcu(dummy, cond, extra...) \
({ check_arg_count_one(extra); })
+
+#define __list_check_srcu(cond) ({ })
#endif
/*
@@ -386,6 +394,25 @@ static inline void list_splice_tail_init_rcu(struct list_head *list,
pos = list_entry_rcu(pos->member.next, typeof(*pos), member))
/**
+ * list_for_each_entry_srcu - iterate over rcu list of given type
+ * @pos: the type * to use as a loop cursor.
+ * @head: the head for your list.
+ * @member: the name of the list_head within the struct.
+ * @cond: lockdep expression for the lock required to traverse the list.
+ *
+ * This list-traversal primitive may safely run concurrently with
+ * the _rcu list-mutation primitives such as list_add_rcu()
+ * as long as the traversal is guarded by srcu_read_lock().
+ * The lockdep expression srcu_read_lock_held() can be passed as the
+ * cond argument from read side.
+ */
+#define list_for_each_entry_srcu(pos, head, member, cond) \
+ for (__list_check_srcu(cond), \
+ pos = list_entry_rcu((head)->next, typeof(*pos), member); \
+ &pos->member != (head); \
+ pos = list_entry_rcu(pos->member.next, typeof(*pos), member))
+
+/**
* list_entry_lockless - get the struct for this entry
* @ptr: the &struct list_head pointer.
* @type: the type of the struct this is embedded in.
@@ -684,6 +711,27 @@ static inline void hlist_add_behind_rcu(struct hlist_node *n,
&(pos)->member)), typeof(*(pos)), member))
/**
+ * hlist_for_each_entry_srcu - iterate over rcu list of given type
+ * @pos: the type * to use as a loop cursor.
+ * @head: the head for your list.
+ * @member: the name of the hlist_node within the struct.
+ * @cond: lockdep expression for the lock required to traverse the list.
+ *
+ * This list-traversal primitive may safely run concurrently with
+ * the _rcu list-mutation primitives such as hlist_add_head_rcu()
+ * as long as the traversal is guarded by srcu_read_lock().
+ * The lockdep expression srcu_read_lock_held() can be passed as the
+ * cond argument from read side.
+ */
+#define hlist_for_each_entry_srcu(pos, head, member, cond) \
+ for (__list_check_srcu(cond), \
+ pos = hlist_entry_safe(rcu_dereference_raw(hlist_first_rcu(head)),\
+ typeof(*(pos)), member); \
+ pos; \
+ pos = hlist_entry_safe(rcu_dereference_raw(hlist_next_rcu(\
+ &(pos)->member)), typeof(*(pos)), member))
+
+/**
* hlist_for_each_entry_rcu_notrace - iterate over rcu list of given type (for tracing)
* @pos: the type * to use as a loop cursor.
* @head: the head for your list.
Powered by blists - more mailing lists