From: Eric Dumazet <dada1@cosmosbay.com>
To: David Miller <davem@davemloft.net>
Cc: netdev@vger.kernel.org
Subject: Re: [IPV4] ROUTE: Avoid sparse warnings
Date: Tue, 08 Jan 2008 08:53:10 +0100 [thread overview]
Message-ID: <47832BE6.5070906@cosmosbay.com> (raw)
In-Reply-To: <20080107.225417.119463845.davem@davemloft.net>
David Miller a écrit :
> From: Eric Dumazet <dada1@cosmosbay.com>
> Date: Mon, 7 Jan 2008 12:01:17 +0100
>
>> CHECK net/ipv4/route.c
>> net/ipv4/route.c:298:2: warning: context imbalance in 'rt_cache_get_first' - wrong count at exit
>> net/ipv4/route.c:307:3: warning: context imbalance in 'rt_cache_get_next' - unexpected unlock
>> net/ipv4/route.c:346:3: warning: context imbalance in 'rt_cache_seq_stop' - unexpected unlock
>>
>> Signed-off-by: Eric Dumazet <dada1@cosmosbay.com>
>>
>> diff --git a/net/ipv4/route.c b/net/ipv4/route.c
>> index 10915bb..fec0571 100644
>> --- a/net/ipv4/route.c
>> +++ b/net/ipv4/route.c
>> @@ -289,11 +289,11 @@ static struct rtable *rt_cache_get_first(struct seq_file *seq)
>> struct rt_cache_iter_state *st = seq->private;
>>
>> for (st->bucket = rt_hash_mask; st->bucket >= 0; --st->bucket) {
>> - rcu_read_lock_bh();
>> r = rt_hash_table[st->bucket].chain;
>> if (r)
>> break;
>> rcu_read_unlock_bh();
>> + rcu_read_lock_bh();
>> }
>> return r;
>> }
>
> Like for Herbert, this patch leaves a bad taste in my mouth.
>
> I don't understand, is it the case that sparse doesn't like
> that rt_cache_get_first() returns with rcu_read_lock_bh()
> held? That's kind of rediculious.
Not exactly.
It warns us because rt_cache_get_first() can returns with RCU_BH *acquired* or
not. I find this warning very usefull. In rt_cache_get_first() this warning
is a false alarm.
>
> Furthermore, these:
>
> rcu_read_unlock_bh()
> rcu_read_lock_bh()
>
> sequences are at best funny looking. For other lock types we would
> look at this and ask "Does this even accomplish anything reliably?"
Well, original code exactly does the same thing.
>
> The answer here is that it wants the preempt_enable() to run to get
> any potential kernel preemptions executed. It also allows any
> pending software interrupts to run.
>
> So this does something reliably only because rcu_read_unlock_bh() has
> specific and explicit side effects.
>
I will post a patch to introduce a helper function, so that this is clearly
documented and not relying on side effects. Actual implementation has latency
problems on empty hash tables if CONFIG_PREEMPT=n
> I don't know, to me it just looks awful :-) I better understood the
> original code.
>
> We can continue splitting hairs over this but I'll hold off on this
> patch for now. :)
Fair enough
Thanks
next prev parent reply other threads:[~2008-01-08 7:53 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-01-07 11:01 [IPV4] ROUTE: Avoid sparse warnings Eric Dumazet
2008-01-07 12:11 ` Herbert Xu
2008-01-07 13:56 ` Eric Dumazet
2008-01-07 20:38 ` Herbert Xu
2008-01-07 20:46 ` Eric Dumazet
2008-01-07 20:48 ` Herbert Xu
2008-01-08 6:54 ` David Miller
2008-01-08 7:53 ` Eric Dumazet [this message]
2008-01-08 9:34 ` David Miller
2008-01-08 12:59 ` Jarek Poplawski
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=47832BE6.5070906@cosmosbay.com \
--to=dada1@cosmosbay.com \
--cc=davem@davemloft.net \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).