Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp411938yba; Wed, 24 Apr 2019 03:31:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqxpAU94ekhjqif/eTevyaRtkbl17J/uYYPbEjNfI+fuFeEAyCmo0MEvzxTIDgsrl0UqLoDN X-Received: by 2002:a17:902:141:: with SMTP id 59mr31637762plb.132.1556101890969; Wed, 24 Apr 2019 03:31:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556101890; cv=none; d=google.com; s=arc-20160816; b=b0BatdyS3ro2IZ+jzSltJoOQWtYr9h2u47r7hTf8xLz4oU4w45fo9RPS0bP2HOGZ4u qg+GLy1/IRkrczv6AggEeoR5LL3fZ6TapEvUpyOcDSmH1ZHht/pZt3jJ9YFGvKytS8nr XCIjfGNLiSyD/Mv3RGgIZtzsmtBLGjQleETXKTrWvvdN1748EywrOn06cI7KksX3l11+ +rPztiz7Ze34+Y/6jKQkfeqPUHdJ08WKGIIH4pkpAfMFlcrdg+jVrHBuVF3OZLqH+hnF Rdv+DWmEc02DkO7qDFwzUy2aofnPnypgiAVKknoVhdCk83yFAX7QpvdcSmdhWSOfyhwN 8ASQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=eYDKLY/J3Ojcc0M0ObUE8MpmgNsUQzKLk0bpzbCdRyY=; b=IsgEi6ppDIayNaN27u4YILZMDpaFRsHajbPNo54jaxXgFWEnvZZFmSte5ftBJ1UXrk IIIlMG521YkoimsuGDWU9Z6GTOqzwREhIq15VBKW8CBLwx5ZO7xNh6LzgRVk39ZZLyDN H5hj7/BVqClr+KJMLdeVChYbtv9hLRH3tKZmxiG7BV7mHGpOTFKpjHLd/xgf9+8wGhtW MT2T8CipLBAP5H+afZKfSrp6QotkO/4+lIN5lpqVnPkd/Dpy3V48GSevykLJAhJ6M1EL o+4vzRaAH1IiIpL8U6D1mNEqnVBwQgJRmOBWUpvT010gEjo+uBQssHfxHWPWz2KzN/Pw 8RNw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="KDLjZ//Z"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 2si17834362plf.294.2019.04.24.03.31.14; Wed, 24 Apr 2019 03:31:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="KDLjZ//Z"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728911AbfDXKUh (ORCPT + 99 others); Wed, 24 Apr 2019 06:20:37 -0400 Received: from mail-pg1-f193.google.com ([209.85.215.193]:34615 "EHLO mail-pg1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728879AbfDXKUe (ORCPT ); Wed, 24 Apr 2019 06:20:34 -0400 Received: by mail-pg1-f193.google.com with SMTP id v12so9178828pgq.1 for ; Wed, 24 Apr 2019 03:20:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=eYDKLY/J3Ojcc0M0ObUE8MpmgNsUQzKLk0bpzbCdRyY=; b=KDLjZ//Z7RG4V1HOK5E1RfcFbXhjMYvNiaMzzOsJ+R6FkbksNGhu7KsmJpHHiJEhwB IC0tt+GC5tsv/3awskQjG0KXRDQrpR3PVVpHXZdi+HSzVmxVcbtwzGcTrmNLDT864f0J MILItX++OzBwGrKGWGHbQRjWvDD+A4fi5mll65GJH6R+rcK1NQ2Lbog/xIb9uQ6ilJAo WUPGfC9UIcRPnMtshpoSqKAHh2cchVbGI519T+aL5vMRL7iOLf1pR0FtO89CpKKghsRN njLte3XtBZSn1mkFY9FxPhx0zkM7PS8HSUAxnS/AiSwlIU2m1Q+T13u4turiM9AeDBza XWkg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=eYDKLY/J3Ojcc0M0ObUE8MpmgNsUQzKLk0bpzbCdRyY=; b=tLZ7TL8c7qJGbgcW6SMnCNQIARaRWWtmMK/u39XBdaGLRbybQpbqDPZb/s9O4OAA/G Id+MreS0m95U27pp3yiIyLCeAwuW5WESUaWe9sIiSQKrYNCsswj1dxSaQRnOIzO7kzof kJlzeCX1QkN/BPsWlfIa8RKSUxxmdaJw7HyISy9qp/U8WlZFwgJNm2MXPJ2CGeyTJfHv PEyxBXxgljZ3iAyQPIhejQOMbiN7CVc3AW55a71Wsz4Mhn4WO4Cvg7vD7bHGayY1w0J4 XyZmQmGPCPslDMt9fVXk73ayhCvdp63W+gA6tTWeEt7IowD/SsMF5mHuGMLml6u0S2YT /IKQ== X-Gm-Message-State: APjAAAWIoBGdp1w/ddGueOlUBEZ3+wGtrE3BjgpnZJti77zqbuBASTIk 7XwNoKmGA9eOMblVrsvcZ7E= X-Received: by 2002:a63:ff05:: with SMTP id k5mr17374972pgi.342.1556101234275; Wed, 24 Apr 2019 03:20:34 -0700 (PDT) Received: from localhost.localdomain ([203.100.54.194]) by smtp.gmail.com with ESMTPSA id v19sm25051604pfn.62.2019.04.24.03.20.31 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 24 Apr 2019 03:20:33 -0700 (PDT) From: Yuyang Du To: peterz@infradead.org, will.deacon@arm.com, mingo@kernel.org Cc: bvanassche@acm.org, ming.lei@redhat.com, frederic@kernel.org, tglx@linutronix.de, linux-kernel@vger.kernel.org, Yuyang Du Subject: [PATCH 02/28] locking/lockdep: Add description and explanation in lockdep design doc Date: Wed, 24 Apr 2019 18:19:08 +0800 Message-Id: <20190424101934.51535-3-duyuyang@gmail.com> X-Mailer: git-send-email 2.20.1 (Apple Git-117) In-Reply-To: <20190424101934.51535-1-duyuyang@gmail.com> References: <20190424101934.51535-1-duyuyang@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org More words are added to lockdep design document regarding key concepts, which should help people without lockdep experience read and understand lockdep reports. Signed-off-by: Yuyang Du --- Documentation/locking/lockdep-design.txt | 74 ++++++++++++++++++++++++-------- 1 file changed, 56 insertions(+), 18 deletions(-) diff --git a/Documentation/locking/lockdep-design.txt b/Documentation/locking/lockdep-design.txt index 39fae14..d5062fc 100644 --- a/Documentation/locking/lockdep-design.txt +++ b/Documentation/locking/lockdep-design.txt @@ -15,34 +15,43 @@ tens of thousands of) instantiations. For example a lock in the inode struct is one class, while each inode has its own instantiation of that lock class. -The validator tracks the 'state' of lock-classes, and it tracks -dependencies between different lock-classes. The validator maintains a -rolling proof that the state and the dependencies are correct. - -Unlike an lock instantiation, the lock-class itself never goes away: when -a lock-class is used for the first time after bootup it gets registered, -and all subsequent uses of that lock-class will be attached to this -lock-class. +The validator tracks the 'usage state' of lock-classes, and it tracks +the dependencies between different lock-classes. A dependency can be +understood as lock order, where L1 -> L2 suggests L2 is attempted to be +acquired with L1 held. From lockdep's perspective, the two locks (L1 and +L2) are not necessarily related, but just means that order ever +happened. The validator maintains a continuing effort to prove that the +lock usages and their dependencies are correct or the validator will +shoot a splat if they are incorrect. + +Unlike a lock instance, a lock-class itself never goes away: when a +lock-class's instance is used for the first time after bootup the class gets +registered, and all (subsequent) instances of that lock-class will be mapped +to the lock-class. State ----- -The validator tracks lock-class usage history into 4 * nSTATEs + 1 separate -state bits: +The validator tracks lock-class usage history and divides the usage into +(4 usages * n STATEs + 1) categories: +where the 4 usages can be: - 'ever held in STATE context' - 'ever held as readlock in STATE context' - 'ever held with STATE enabled' - 'ever held as readlock with STATE enabled' -Where STATE can be either one of (kernel/locking/lockdep_states.h) - - hardirq - - softirq +where the n STATEs are coded in kernel/locking/lockdep_states.h and as of +now they include: +- hardirq +- softirq +where the last 1 category is: - 'ever used' [ == !unused ] -When locking rules are violated, these state bits are presented in the -locking error messages, inside curlies. A contrived example: +When locking rules are violated, these usage bits are presented in the +locking error messages, inside curlies, with a total of 2 * n STATEs bits. +A contrived example: modprobe/2287 is trying to acquire lock: (&sio_locks[i].lock){-.-.}, at: [] mutex_lock+0x21/0x24 @@ -51,15 +60,44 @@ locking error messages, inside curlies. A contrived example: (&sio_locks[i].lock){-.-.}, at: [] mutex_lock+0x21/0x24 -The bit position indicates STATE, STATE-read, for each of the states listed -above, and the character displayed in each indicates: +For a given lock, the bit positions from left to right indicate the usage +of the lock and readlock (if exists), for each of the n STATEs listed +above respectively, and the character displayed at each bit position +indicates: '.' acquired while irqs disabled and not in irq context '-' acquired in irq context '+' acquired with irqs enabled '?' acquired in irq context with irqs enabled. -Unused mutexes cannot be part of the cause of an error. +The bits are illustrated with an example: + + (&sio_locks[i].lock){-.-.}, at: [] mutex_lock+0x21/0x24 + |||| + ||| \-> softirq disabled and not in softirq context + || \--> acquired in softirq context + | \---> hardirq disabled and not in hardirq context + \----> acquired in hardirq context + + +For a given STATE, whether the lock is ever acquired in that STATE +context and whether that STATE is enabled yields four possible cases as +shown in the table below. The bit character is able to indicate which +exact case is for the lock as of the reporting time. + + ------------------------------------------- + | | irq enabled | irq disabled | + |-------------------------------------------| + | ever in irq | ? | - | + |-------------------------------------------| + | never in irq | + | . | + ------------------------------------------- + +The character '-' suggests irq is disabled because if otherwise the +charactor '?' would have been shown instead. Similar deduction can be +applied for '+' too. + +Unused locks (e.g., mutexes) cannot be part of the cause of an error. Single-lock state rules: -- 1.8.3.1