• L
    rcu: Warn on allegedly impossible rcu_read_unlock_special() from irq · 79a62f95
    Lai Jiangshan 提交于
    After commit #10f39bb1 (rcu: protect __rcu_read_unlock() against
    scheduler-using irq handlers), it is no longer possible to enter
    the main body of rcu_read_lock_special() from an NMI, interrupt, or
    softirq handler.  In theory, this implies that the check for "in_irq()
    || in_serving_softirq()" must always fail, so that in theory this check
    could be removed entirely.
    
    In practice, this commit wraps this condition with a WARN_ON_ONCE().
    If this warning never triggers, then the condition will be removed
    entirely.
    
    [ paulmck: And one way of triggering the WARN_ON() is if a scheduling
      clock interrupt occurs in an RCU read-side critical section, setting
      RCU_READ_UNLOCK_NEED_QS, which is handled by rcu_read_unlock_special().
      Updated this commit to return if only that bit was set. ]
    Signed-off-by: NLai Jiangshan <laijs@cn.fujitsu.com>
    Signed-off-by: NPaul E. McKenney <paulmck@linux.vnet.ibm.com>
    79a62f95
tree_plugin.h 83.3 KB