Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp465194ybc; Tue, 19 Nov 2019 04:18:51 -0800 (PST) X-Google-Smtp-Source: APXvYqxOFZvpzOe1eZf9/XXLTZU7/XA6J0Wq1VgMg3cPmYZ7gg8bZVkkgrXGmZzH94ZH9Nn8934K X-Received: by 2002:a17:906:e297:: with SMTP id gg23mr35544543ejb.41.1574165931408; Tue, 19 Nov 2019 04:18:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574165931; cv=none; d=google.com; s=arc-20160816; b=HuvzHc0UKuMwWZt7zSoCtPJXbl/nMwy1fBdvOEqLl3KHYKGKDRqeKBn9A7O7Q1Ulw9 g4kvj/x+/ryZkJd50VpY28PaRAyRnSKycQuYXObiQDYtT3bbwbE+8I2E3iq4YDqZfeXR dSMkZNAkIgwL6RoYCOdcztkY5QN78mAEr/LjgNp89L1DIwHTwGb89ZhlLZQUCslfCE51 R9E3tTxy09fPVCu3jybE4bWJazMKRMOOK3PCvPpWMcl8ooT39Pz+hJl4p+61COX1EQA7 Qzu7AGyNww/icmTkCO/BWgt4UJ/RzWx2WcufnfuRFzvjoUEFSB30ssTZTWfg6eM6kMJO nuSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :message-id:subject:cc:to:from:date; bh=Lj9xkyS5Ckhk7kdgXhqOOu6Bpx37GG/2J+E/WWyZoqU=; b=JGUds3KdCnylXTvXufDDPt1NHqY/YAVaCj22jBhMOKzIPpblJG7rzdOIvVaMDQlVIt jcFH5tcdfb2o6H23n8MQFcLPgyfxYdYyR9wsaIvT+Mb/OTXfhNu8sIRcisVftVw9fMzq lKuZD5m1LHZ1QuurDRfgznY5BKyOV8wdJEwZUH+7pEbbkb12BADBM8jes5qWkLSU1US5 DtyIycxAX6lRLiNayeKoMrpF9fGacSDKETzfFh60hvt0IUNxlB0apvyzT5BkxzHtZ/6c 9qYDeV8/0loaH0/8hUq86vS7Wg+4K3uuFnM1TVUtVlGC+9+zmEamVN7kqE3RSkzJ6YQ8 RL4w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t11si13580571eju.106.2019.11.19.04.18.26; Tue, 19 Nov 2019 04:18:51 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727816AbfKSMOe (ORCPT + 99 others); Tue, 19 Nov 2019 07:14:34 -0500 Received: from Galois.linutronix.de ([193.142.43.55]:52124 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727432AbfKSMOe (ORCPT ); Tue, 19 Nov 2019 07:14:34 -0500 Received: from bigeasy by Galois.linutronix.de with local (Exim 4.80) (envelope-from ) id 1iX2Or-0003To-3p; Tue, 19 Nov 2019 13:14:29 +0100 Date: Tue, 19 Nov 2019 13:14:29 +0100 From: Sebastian Andrzej Siewior To: linux-kernel@vger.kernel.org, Joel Fernandes , "Paul E. McKenney" Cc: Peter Zijlstra , Ingo Molnar , Arnaldo Carvalho de Melo , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Thomas Gleixner Subject: [PATCH] perf/core: Add SRCU annotation for pmus list walk Message-ID: <20191119121429.zhcubzdhm672zasg@linutronix.de> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Since commit 28875945ba98d ("rcu: Add support for consolidated-RCU reader checking") there is an additional check to ensure that a RCU related lock is held while the RCU list is iterated. This section holds the SRCU reader lock instead. Add annotation to list_for_each_entry_rcu() that pmus_srcu must be acquired during the list traversal. Signed-off-by: Sebastian Andrzej Siewior --- I see the warning in in v5.4-rc during boot. For some reason I don't see it in tip/master during boot but "perf stat w" triggers it again (among other things). kernel/events/core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/kernel/events/core.c b/kernel/events/core.c index 5224388872069..dbb3b26a55612 100644 --- a/kernel/events/core.c +++ b/kernel/events/core.c @@ -10497,7 +10497,7 @@ static struct pmu *perf_init_event(struct perf_event *event) goto unlock; } - list_for_each_entry_rcu(pmu, &pmus, entry) { + list_for_each_entry_rcu(pmu, &pmus, entry, lockdep_is_held(&pmus_srcu)) { ret = perf_try_init_event(pmu, event); if (!ret) goto unlock; -- 2.24.0