Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp580507ybf; Fri, 28 Feb 2020 03:49:27 -0800 (PST) X-Google-Smtp-Source: APXvYqysf2u8n3njDpoR4usbjAIYygwTvgLkOu7PN1rcp/+U9dcGMDgGGpPzsOw+azfe0ccdfstr X-Received: by 2002:a05:6830:140f:: with SMTP id v15mr2972673otp.218.1582890567585; Fri, 28 Feb 2020 03:49:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582890567; cv=none; d=google.com; s=arc-20160816; b=kij0KhFp0m4QGE3OUJiqnYWTpYaQJ7ON0D4AubFPo9ObYHlir2W9+iyNTbYYK0vxz6 h6Reqr4TW8H8cZ3Ysq4cbFLfYTXxPm70Kd9sGkjGoprm/S6iGtXsCjdGbWFjKlX+t0oF qQr9on+19FBoW+HA1XDqV5cV3abGeOEXrrcUUHu69dlLxBKcx8lb59FB9Iqv7hRcuBqt TLP7c9Rjm5irKVWBJGZrEI2Pk9RpqEY7p83sMASdgAUjGqNSpKLpXCoM2GvtFjfgZjuH FVnaxkZYmsX/Iycw61V4EG7oaOvib9KQx99OPU+KlT5COhsGev08wDvB7Mp9xlXkmpJm jh6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=+41uXHqdjg1SWInSNPkz9jYgTk40AeigmgPw9cIKFsY=; b=MWnFzqW+nIdZTOyW3oXPL1+lv+CpLQ8YwQ5V9q9Qvq1oqlvzSWJ8pCY6g/Yw5UosXh XxToF3gaW+OmPEijg3Hgw12wtqrMdI0slmmjLOjaOSeNflW4lStX3CDAKSpawfgDqaOI waPckWtgtd3wKlpn4rVQWiSNohRm74fRuoILs7kVEfcmyb3/smIFED77ycQU7wJQvCZB 57aUbyrVdHhskqQXZmob0QGAo7fiqa1MvsRL96IKJ5gJWF7WR+yo0MP/19PnDQ+sxScR KmRGrPk9gj9DaTv/gzytHQGh/GybjQIqnMYTXV13fN0gFjDHQnkl8JNoQaQd7LfE0Bu5 wEQw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k20si1506246oiw.273.2020.02.28.03.49.15; Fri, 28 Feb 2020 03:49:27 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726418AbgB1LtF (ORCPT + 99 others); Fri, 28 Feb 2020 06:49:05 -0500 Received: from lhrrgout.huawei.com ([185.176.76.210]:2478 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725536AbgB1LtF (ORCPT ); Fri, 28 Feb 2020 06:49:05 -0500 Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 3EA0F548ADD1CC5E62CD; Fri, 28 Feb 2020 11:49:03 +0000 (GMT) Received: from lhreml724-chm.china.huawei.com (10.201.108.75) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.408.0; Fri, 28 Feb 2020 11:49:02 +0000 Received: from [127.0.0.1] (10.202.226.45) by lhreml724-chm.china.huawei.com (10.201.108.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1713.5; Fri, 28 Feb 2020 11:49:02 +0000 Subject: Re: [PATCH] ipmi: Fix RCU list lockdep debugging warnings To: Amol Grover , Corey Minyard , "Arnd Bergmann" , Greg Kroah-Hartman CC: , , , Joel Fernandes , Madhuparna Bhowmik , "Paul E . Mckenney" References: <20200228081731.18149-1-frextrite@gmail.com> From: John Garry Message-ID: Date: Fri, 28 Feb 2020 11:49:01 +0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.1.2 MIME-Version: 1.0 In-Reply-To: <20200228081731.18149-1-frextrite@gmail.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.202.226.45] X-ClientProxiedBy: lhreml708-chm.china.huawei.com (10.201.108.57) To lhreml724-chm.china.huawei.com (10.201.108.75) X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 28/02/2020 08:17, Amol Grover wrote: > It is completely safe to traverse ipmi_interfaces and > intf->users under SRCU read lock using list_for_each_entry_rcu(). > Tell lockdep about it as well else it will show false-positive > warnings as the one below. > > Fixes the following false-positive warning and others that may follow. > > [ 29.772408] ============================= > [ 29.776863] WARNING: suspicious RCU usage > [ 29.780915] 5.6.0-rc3-00001-g907305ae6618-dirty #1755 Not tainted > [ 29.787046] ----------------------------- > [ 29.791100] drivers/char/ipmi/ipmi_msghandler.c:744 RCU-list traversed in > non-reader section!! > > Reported-by: John Garry > Suggested-by: Paul E. McKenney > Signed-off-by: Amol Grover Tested-by: John Garry Thanks, the warnings have gone away with this > --- > drivers/char/ipmi/ipmi_msghandler.c | 18 ++++++++++++------ > 1 file changed, 12 insertions(+), 6 deletions(-) > > diff --git a/drivers/char/ipmi/ipmi_msghandler.c b/drivers/char/ipmi/ipmi_msghandler.c > index cad9563f8f48..d202022c69de 100644 > --- a/drivers/char/ipmi/ipmi_msghandler.c > +++ b/drivers/char/ipmi/ipmi_msghandler.c > @@ -741,7 +741,8 @@ int ipmi_smi_watcher_register(struct ipmi_smi_watcher *watcher) > list_add(&watcher->link, &smi_watchers); > > index = srcu_read_lock(&ipmi_interfaces_srcu); > - list_for_each_entry_rcu(intf, &ipmi_interfaces, link) { > + list_for_each_entry_rcu(intf, &ipmi_interfaces, link, > + srcu_read_lock_held(&ipmi_interfaces_srcu)) { > int intf_num = READ_ONCE(intf->intf_num); > > if (intf_num == -1) > @@ -1188,7 +1189,8 @@ int ipmi_create_user(unsigned int if_num, > return -ENOMEM; > > index = srcu_read_lock(&ipmi_interfaces_srcu); > - list_for_each_entry_rcu(intf, &ipmi_interfaces, link) { > + list_for_each_entry_rcu(intf, &ipmi_interfaces, link, > + srcu_read_lock_held(&ipmi_interfaces_srcu)) { > if (intf->intf_num == if_num) > goto found; > } > @@ -1241,7 +1243,8 @@ int ipmi_get_smi_info(int if_num, struct ipmi_smi_info *data) > struct ipmi_smi *intf; > > index = srcu_read_lock(&ipmi_interfaces_srcu); > - list_for_each_entry_rcu(intf, &ipmi_interfaces, link) { > + list_for_each_entry_rcu(intf, &ipmi_interfaces, link, > + srcu_read_lock_held(&ipmi_interfaces_srcu)) { > if (intf->intf_num == if_num) > goto found; > } > @@ -4098,7 +4101,8 @@ static int handle_read_event_rsp(struct ipmi_smi *intf, > * getting events. > */ > index = srcu_read_lock(&intf->users_srcu); > - list_for_each_entry_rcu(user, &intf->users, link) { > + list_for_each_entry_rcu(user, &intf->users, link, > + srcu_read_lock_held(&intf->users_srcu)) { > if (!user->gets_events) > continue; > > @@ -4453,7 +4457,8 @@ static void handle_new_recv_msgs(struct ipmi_smi *intf) > int index; > > index = srcu_read_lock(&intf->users_srcu); > - list_for_each_entry_rcu(user, &intf->users, link) { > + list_for_each_entry_rcu(user, &intf->users, link, > + srcu_read_lock_held(&intf->users_srcu)) { > if (user->handler->ipmi_watchdog_pretimeout) > user->handler->ipmi_watchdog_pretimeout( > user->handler_data); > @@ -4746,7 +4751,8 @@ static void ipmi_timeout(struct timer_list *unused) > return; > > index = srcu_read_lock(&ipmi_interfaces_srcu); > - list_for_each_entry_rcu(intf, &ipmi_interfaces, link) { > + list_for_each_entry_rcu(intf, &ipmi_interfaces, link, > + srcu_read_lock_held(&ipmi_interfaces_srcu)) { > if (atomic_read(&intf->event_waiters)) { > intf->ticks_to_req_ev--; > if (intf->ticks_to_req_ev == 0) { >