Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp317741yba; Thu, 16 May 2019 01:02:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqwX7UuVJRb/B+vBK2A6O3ARe166t8U2Fmbu95i0ncEbiSQAWIjToCsh4daB7ApAWoyGADfj X-Received: by 2002:a17:902:9348:: with SMTP id g8mr6318479plp.174.1557993749135; Thu, 16 May 2019 01:02:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557993749; cv=none; d=google.com; s=arc-20160816; b=eTwrPMcEV/yzCVP7S1ERNz7P/ERu1cFJaueW4fQIndMfoo0FwHHTVnW5XS/hPkf9E7 ymA012dB8C06XfRNJaNgzJxf2FZMEEERFYxaCFVTaNXpPBylqXh1Ja04syT5xV8jG0y6 9GXcW/c0c/8udEnOeBpCf7ZmYbMmhTsFd5fSe4SVJLiJWhWqOdTpS96vakkD8S7AvetG rvmCfQgeUjqRAUABW7NWbGHe1a0UxavlOzyspq/Rh0f8Trf+9iiurq4ptMwTMIYhSXe/ FaPRXtT5Dq6UPI5ID5xQ53vLvZC9OdFBpT2sl8dKFCxX3li2nrMnLJFVN3VgX7obrGMk aIqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=kosXq0ZF1VWySbXOAJ231nmlCL06j4Wt318Yl0WkM/E=; b=KOHAjpuBQOcKO1w0oL4kAVQGOzcMMT+Mt5uo8Uqk2wtxS4rFhNcql/oiEzkDnfmktf l+XHva0flzMnv9azoy+9md1TT85adkXNl2CpfilTow/qtoVJLZX49Saw8dKoLgq5CoXj oIndjvpb9K9dwpW7wZ/V5ZZmu682TWCXDbBM5l18UFcIb9slSjAhIJvXIEjpw6bvE6aL Datp+IzHpRmuyyrENFgsWoDNbaIA0PZObs30+RfCkOHIEMl0HWq0ez9f4o/ESQMPKwPn cSxCbBZWHtCUcHPZC+IfGvJO6RS4J4aWpqVOLoMCf0ILL5vjOdOkUgqUCvZ2+V5GuSdr aE5Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=W2dWsZbe; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j18si4237765pgm.561.2019.05.16.01.02.13; Thu, 16 May 2019 01:02:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=W2dWsZbe; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726916AbfEPIAr (ORCPT + 99 others); Thu, 16 May 2019 04:00:47 -0400 Received: from mail-pg1-f194.google.com ([209.85.215.194]:34988 "EHLO mail-pg1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726899AbfEPIAq (ORCPT ); Thu, 16 May 2019 04:00:46 -0400 Received: by mail-pg1-f194.google.com with SMTP id h1so1173203pgs.2 for ; Thu, 16 May 2019 01:00:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=kosXq0ZF1VWySbXOAJ231nmlCL06j4Wt318Yl0WkM/E=; b=W2dWsZbey+2oYCPspmthpWmnMB5GVFP7X1LrhXDhDd7rKSYfxSlLq0LLWAcmizIP95 Olgt0LEC0IoyK9eM9daVAC95lwmU6zYNvf0UEz7njHQAVtdrNg92pO+525wy48R1TGc/ TyVoErfD2TuVKbZ4wNoLd2UzHUOHIyUUzf4B1fowITWUG3GS/CQl4eZ2UjajaArSpsgZ d5MxUs3i0GBH5WK1YrecAzQ3Ezv8TmqU8rfhUiRLahG765umNdRY1gjsaUceFOTyplPy 7O6FJ5oWDb/OCZ/S8hA4biCcDRSy25ygQK4YP7At70y2Vd7bndAdKM8u750vjRnZKgPk 86dw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=kosXq0ZF1VWySbXOAJ231nmlCL06j4Wt318Yl0WkM/E=; b=OWowpk2Brinsk1gtpbT2qf4rPY6FgO5F2IQsjBZ8G05+/GcGRz/Y0EslO+8U7C9hvx Jb9KwdSxMNS8WaLCWYK29JS/DpIaa3TSEH5hACx38m3aTBKZUxn3GX/vqWQb/1YMYviz ZEjez2T4AKQfuFvDURn0gY6o4LMwIR7+DTXlIlhIdUlTM+1t/gfBoE5BSMRspD0ol+Jh 88VpzXx04Jq75CfYnnWV4lJ8NHPviiIdTCedeEWeq9mpLVgXtueC4rSxpM8xcVs1/3Rw 2KIeinU63/HWWlav7iK0wAP0oCyEnTgmPStxn38NlieW3g9CJlPcJXKEaw/QNq7VFG95 dOLA== X-Gm-Message-State: APjAAAXExR4B4wZfBw5chq8NEhtHj6627o9P6PiDDgEMSRWU1e5jNpjB P6rkZgI8iS1l3tGORrAAaro= X-Received: by 2002:a63:8a4a:: with SMTP id y71mr48922072pgd.270.1557993645798; Thu, 16 May 2019 01:00:45 -0700 (PDT) Received: from localhost.localdomain ([203.100.54.194]) by smtp.gmail.com with ESMTPSA id p7sm2051471pgb.92.2019.05.16.01.00.42 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 16 May 2019 01:00:45 -0700 (PDT) From: Yuyang Du To: peterz@infradead.org, will.deacon@arm.com, mingo@kernel.org Cc: bvanassche@acm.org, ming.lei@redhat.com, frederic@kernel.org, tglx@linutronix.de, boqun.feng@gmail.com, paulmck@linux.ibm.com, linux-kernel@vger.kernel.org, Yuyang Du Subject: [PATCH v2 06/17] locking/lockdep: Adjust BFS algorithm to support multiple matches Date: Thu, 16 May 2019 16:00:04 +0800 Message-Id: <20190516080015.16033-7-duyuyang@gmail.com> X-Mailer: git-send-email 2.20.1 (Apple Git-117) In-Reply-To: <20190516080015.16033-1-duyuyang@gmail.com> References: <20190516080015.16033-1-duyuyang@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With read locks, circle is not sufficient condition for a deadlock. As a result, we need to continue the search after a match but the match is not wanted. __bfs() is adjusted to that end. The basic idea is to enqueue a node's children before matching the node. No functional change. Signed-off-by: Yuyang Du --- kernel/locking/lockdep.c | 54 +++++++++++++++++++++++++----------------------- 1 file changed, 28 insertions(+), 26 deletions(-) diff --git a/kernel/locking/lockdep.c b/kernel/locking/lockdep.c index f4982ad..54ddf85 100644 --- a/kernel/locking/lockdep.c +++ b/kernel/locking/lockdep.c @@ -1417,7 +1417,7 @@ static int __bfs(struct lock_list *source_entry, void *data, int (*match)(struct lock_list *entry, void *data), struct lock_list **target_entry, - int offset) + int offset, bool init) { struct lock_list *entry; struct lock_list *lock; @@ -1425,19 +1425,11 @@ static int __bfs(struct lock_list *source_entry, struct circular_queue *cq = &lock_cq; int ret = 1; - if (match(source_entry, data)) { - *target_entry = source_entry; - ret = 0; - goto exit; + if (init) { + __cq_init(cq); + __cq_enqueue(cq, source_entry); } - head = get_dep_list(source_entry, offset); - if (list_empty(head)) - goto exit; - - __cq_init(cq); - __cq_enqueue(cq, source_entry); - while ((lock = __cq_dequeue(cq))) { if (!lock->class) { @@ -1449,25 +1441,34 @@ static int __bfs(struct lock_list *source_entry, DEBUG_LOCKS_WARN_ON(!irqs_disabled()); + /* + * Enqueue a node's children before match() so that even + * this node matches but is not wanted, we can continue + * the search. + */ list_for_each_entry_rcu(entry, head, entry) { if (!lock_accessed(entry)) { unsigned int cq_depth; + mark_lock_accessed(entry, lock); - if (match(entry, data)) { - *target_entry = entry; - ret = 0; - goto exit; - } if (__cq_enqueue(cq, entry)) { ret = -1; goto exit; } + cq_depth = __cq_get_elem_count(cq); if (max_bfs_queue_depth < cq_depth) max_bfs_queue_depth = cq_depth; } } + + if (match(lock, data)) { + *target_entry = lock; + ret = 0; + goto exit; + } + } exit: return ret; @@ -1476,10 +1477,10 @@ static int __bfs(struct lock_list *source_entry, static inline int __bfs_forwards(struct lock_list *src_entry, void *data, int (*match)(struct lock_list *entry, void *data), - struct lock_list **target_entry) + struct lock_list **target_entry, bool init) { return __bfs(src_entry, data, match, target_entry, - offsetof(struct lock_class, locks_after)); + offsetof(struct lock_class, locks_after), init); } @@ -1489,7 +1490,7 @@ static inline int __bfs_backwards(struct lock_list *src_entry, struct lock_list **target_entry) { return __bfs(src_entry, data, match, target_entry, - offsetof(struct lock_class, locks_before)); + offsetof(struct lock_class, locks_before), true); } @@ -1662,7 +1663,7 @@ static unsigned long __lockdep_count_forward_deps(struct lock_list *this) unsigned long count = 0; struct lock_list *uninitialized_var(target_entry); - __bfs_forwards(this, (void *)&count, noop_count, &target_entry); + __bfs_forwards(this, (void *)&count, noop_count, &target_entry, true); return count; } @@ -1750,12 +1751,12 @@ static inline void set_lock_type2(struct lock_list *lock, int read) */ static noinline int check_path(struct lock_class *target, struct lock_list *src_entry, - struct lock_list **target_entry) + struct lock_list **target_entry, bool init) { int ret; ret = __bfs_forwards(src_entry, (void *)target, class_equal, - target_entry); + target_entry, init); if (unlikely(ret < 0)) print_bfs_bug(ret); @@ -1783,7 +1784,7 @@ static inline void set_lock_type2(struct lock_list *lock, int read) debug_atomic_inc(nr_cyclic_checks); - ret = check_path(hlock_class(target), &src_entry, &target_entry); + ret = check_path(hlock_class(target), &src_entry, &target_entry, true); if (unlikely(!ret)) { if (!trace->nr_entries) { @@ -1821,7 +1822,7 @@ static inline void set_lock_type2(struct lock_list *lock, int read) debug_atomic_inc(nr_redundant_checks); - ret = check_path(hlock_class(target), &src_entry, &target_entry); + ret = check_path(hlock_class(target), &src_entry, &target_entry, true); if (!ret) { struct lock_list *parent; @@ -1897,7 +1898,8 @@ static inline int usage_match(struct lock_list *entry, void *mask) debug_atomic_inc(nr_find_usage_forwards_checks); - result = __bfs_forwards(root, &usage_mask, usage_match, target_entry); + result = __bfs_forwards(root, &usage_mask, usage_match, + target_entry, true); return result; } -- 1.8.3.1