Commit 11e13696 authored by Nicholas Mc Guire's avatar Nicholas Mc Guire Committed by Ingo Molnar

sched/completions/Documentation: Add recommendation for dynamic and ONSTACK completions

To prevent dynamic completion objects from being de-allocated while still
in use, add a recommendation to embed them in long lived data structures.

Also add a note for the on-stack case that emphasizes the dangers of
the limited scope, and recommends dynamic allocation if scope limitations
are not clearly understood.

[ mingo: Minor touch-ups of the text, expanded it a bit to make the
         warnings Nicholas added more prominent. ]
Signed-off-by: default avatarNicholas Mc Guire <hofrat@osadl.org>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: john.garry@huawei.com
Link: http://lkml.kernel.org/r/1539697539-24055-1-git-send-email-hofrat@osadl.orgSigned-off-by: default avatarIngo Molnar <mingo@kernel.org>
parent 0c373344
...@@ -70,8 +70,18 @@ Good, intuitive naming (as always) helps code readability. Naming a completion ...@@ -70,8 +70,18 @@ Good, intuitive naming (as always) helps code readability. Naming a completion
Initializing completions: Initializing completions:
------------------------- -------------------------
Initialization of dynamically allocated completion objects, often embedded in Dynamically allocated completion objects should preferably be embedded in data
other structures, is done via a call to init_completion(): structures that are assured to be alive for the life-time of the function/driver,
to prevent races with asynchronous complete() calls from occurring.
Particular care should be taken when using the _timeout() or _killable()/_interruptible()
variants of wait_for_completion(), as it must be assured that memory de-allocation
does not happen until all related activities (complete() or reinit_completion())
have taken place, even if these wait functions return prematurely due to a timeout
or a signal triggering.
Initializing of dynamically allocated completion objects is done via a call to
init_completion():
init_completion(&dynamic_object->done); init_completion(&dynamic_object->done);
...@@ -99,16 +109,32 @@ Note that in this case the completion is boot time (or module load time) ...@@ -99,16 +109,32 @@ Note that in this case the completion is boot time (or module load time)
initialized to 'not done' and doesn't require an init_completion() call. initialized to 'not done' and doesn't require an init_completion() call.
When a completion is declared as a local variable within a function, When a completion is declared as a local variable within a function,
then the initialization should always use: then the initialization should always use DECLARE_COMPLETION_ONSTACK()
explicitly, not just to make lockdep happy, but also to make it clear
that limited scope had been considered and is intentional:
DECLARE_COMPLETION_ONSTACK(setup_done) DECLARE_COMPLETION_ONSTACK(setup_done)
A simple DECLARE_COMPLETION() on the stack makes lockdep unhappy.
Note that when using completion objects as local variables you must be Note that when using completion objects as local variables you must be
aware of the short life time of the function stack: the function must acutely aware of the short life time of the function stack: the function
not return to a calling context until all activities (such as waiting must not return to a calling context until all activities (such as waiting
threads) have ceased and the completion is ... completely unused. threads) have ceased and the completion object is completely unused.
To emphasise this again: in particular when using some of the waiting API variants
with more complex outcomes, such as the timeout or signalling (_timeout(),
_killable() and _interruptible()) variants, the wait might complete
prematurely while the object might still be in use by another thread - and a return
from the wait_on_completion*() caller function will deallocate the function
stack and cause subtle data corruption if a complete() is done in some
other thread. Simple testing might not trigger these kinds of races.
If unsure, use dynamically allocated completion objects, preferably embedded
in some other long lived object that has a boringly long life time which
exceeds the life time of any helper threads using the completion object,
or has a lock or other synchronization mechanism to make sure complete()
is not called on a freed object.
A naive DECLARE_COMPLETION() on the stack triggers a lockdep warning.
Waiting for completions: Waiting for completions:
------------------------ ------------------------
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment