Re: [PATCH 2/8] blk-mq: protect completion path with RCU

From: Jens Axboe
Date: Mon Jan 08 2018 - 15:16:01 EST


On 1/8/18 12:57 PM, Holger HoffstÃtte wrote:
> On 01/08/18 20:15, Tejun Heo wrote:
>> Currently, blk-mq protects only the issue path with RCU. This patch
>> puts the completion path under the same RCU protection. This will be
>> used to synchronize issue/completion against timeout by later patches,
>> which will also add the comments.
>>
>> Signed-off-by: Tejun Heo <tj@xxxxxxxxxx>
>> ---
>> block/blk-mq.c | 5 +++++
>> 1 file changed, 5 insertions(+)
>>
>> diff --git a/block/blk-mq.c b/block/blk-mq.c
>> index ddc9261..6741c3e 100644
>> --- a/block/blk-mq.c
>> +++ b/block/blk-mq.c
>> @@ -584,11 +584,16 @@ static void hctx_lock(struct blk_mq_hw_ctx *hctx, int *srcu_idx)
>> void blk_mq_complete_request(struct request *rq)
>> {
>> struct request_queue *q = rq->q;
>> + struct blk_mq_hw_ctx *hctx = blk_mq_map_queue(q, rq->mq_ctx->cpu);
>> + int srcu_idx;
>>
>> if (unlikely(blk_should_fake_timeout(q)))
>> return;
>> +
>> + hctx_lock(hctx, &srcu_idx);
>> if (!blk_mark_rq_complete(rq))
>> __blk_mq_complete_request(rq);
>> + hctx_unlock(hctx, srcu_idx);
>> }
>> EXPORT_SYMBOL(blk_mq_complete_request);
>
> So I've had v3 running fine with 4.14++ and when I first tried Jens'
> additional helpers on top, I got a bunch of warnings which I didn't
> investigate further at the time. Now they are back since the helpers
> moved into patch #1 and #2 correctly says:
>
> ..
> block/blk-mq.c: In function âblk_mq_complete_requestâ:
> ./include/linux/srcu.h:175:2: warning: âsrcu_idxâ may be used uninitialized in this function [-Wmaybe-uninitialized]
> __srcu_read_unlock(sp, idx);
> ^~~~~~~~~~~~~~~~~~~~~~~~~~~
> block/blk-mq.c:587:6: note: âsrcu_idxâ was declared here
> int srcu_idx;
> ^~~~~~~~
> ..etc.
>
> This is with gcc 7.2.0.
>
> I understand that this is a somewhat-false positive since the lock always
> precedes the unlock & writes to the value, but can we properly initialize
> or annotate this?

It's not a somewhat false positive, it's a false positive. I haven't seen
that bogus warning with the compiler I'm running:

gcc (Ubuntu 7.2.0-1ubuntu1~16.04) 7.2.0

and

gcc (GCC) 7.2.0

Neither of them throw the warning.

--
Jens Axboe