Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752111AbdHHLRy (ORCPT ); Tue, 8 Aug 2017 07:17:54 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:46728 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751927AbdHHLRx (ORCPT ); Tue, 8 Aug 2017 07:17:53 -0400 Subject: Re: [RFC v5 05/11] mm: fix lock dependency against mapping->i_mmap_rwsem To: Laurent Dufour , paulmck@linux.vnet.ibm.com, peterz@infradead.org, akpm@linux-foundation.org, kirill@shutemov.name, ak@linux.intel.com, mhocko@kernel.org, dave@stgolabs.net, jack@suse.cz, Matthew Wilcox References: <1497635555-25679-1-git-send-email-ldufour@linux.vnet.ibm.com> <1497635555-25679-6-git-send-email-ldufour@linux.vnet.ibm.com> Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, haren@linux.vnet.ibm.com, khandual@linux.vnet.ibm.com, npiggin@gmail.com, bsingharora@gmail.com, Tim Chen From: Anshuman Khandual Date: Tue, 8 Aug 2017 16:47:23 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.5.1 MIME-Version: 1.0 In-Reply-To: <1497635555-25679-6-git-send-email-ldufour@linux.vnet.ibm.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit X-TM-AS-MML: disable x-cbid: 17080811-0044-0000-0000-00000281E041 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17080811-0045-0000-0000-0000071465F2 Message-Id: <564749a2-a729-b927-7707-1cad897c418a@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-08-08_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=2 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1706020000 definitions=main-1708080180 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2524 Lines: 75 On 06/16/2017 11:22 PM, Laurent Dufour wrote: > kworker/32:1/819 is trying to acquire lock: > (&vma->vm_sequence){+.+...}, at: [] > zap_page_range_single+0xd0/0x1a0 > > but task is already holding lock: > (&mapping->i_mmap_rwsem){++++..}, at: [] > unmap_mapping_range+0x7c/0x160 > > which lock already depends on the new lock. > > the existing dependency chain (in reverse order) is: > > -> #2 (&mapping->i_mmap_rwsem){++++..}: > down_write+0x84/0x130 > __vma_adjust+0x1f4/0xa80 > __split_vma.isra.2+0x174/0x290 > do_munmap+0x13c/0x4e0 > vm_munmap+0x64/0xb0 > elf_map+0x11c/0x130 > load_elf_binary+0x6f0/0x15f0 > search_binary_handler+0xe0/0x2a0 > do_execveat_common.isra.14+0x7fc/0xbe0 > call_usermodehelper_exec_async+0x14c/0x1d0 > ret_from_kernel_thread+0x5c/0x68 > > -> #1 (&vma->vm_sequence/1){+.+...}: > __vma_adjust+0x124/0xa80 > __split_vma.isra.2+0x174/0x290 > do_munmap+0x13c/0x4e0 > vm_munmap+0x64/0xb0 > elf_map+0x11c/0x130 > load_elf_binary+0x6f0/0x15f0 > search_binary_handler+0xe0/0x2a0 > do_execveat_common.isra.14+0x7fc/0xbe0 > call_usermodehelper_exec_async+0x14c/0x1d0 > ret_from_kernel_thread+0x5c/0x68 > > -> #0 (&vma->vm_sequence){+.+...}: > lock_acquire+0xf4/0x310 > unmap_page_range+0xcc/0xfa0 > zap_page_range_single+0xd0/0x1a0 > unmap_mapping_range+0x138/0x160 > truncate_pagecache+0x50/0xa0 > put_aio_ring_file+0x48/0xb0 > aio_free_ring+0x40/0x1b0 > free_ioctx+0x38/0xc0 > process_one_work+0x2cc/0x8a0 > worker_thread+0xac/0x580 > kthread+0x164/0x1b0 > ret_from_kernel_thread+0x5c/0x68 > > other info that might help us debug this: > > Chain exists of: > &vma->vm_sequence --> &vma->vm_sequence/1 --> &mapping->i_mmap_rwsem > > Possible unsafe locking scenario: > > CPU0 CPU1 > ---- ---- > lock(&mapping->i_mmap_rwsem); > lock(&vma->vm_sequence/1); > lock(&mapping->i_mmap_rwsem); > lock(&vma->vm_sequence); > > *** DEADLOCK *** > > To fix that we must grab the vm_sequence lock after any mapping one in > __vma_adjust(). > > Signed-off-by: Laurent Dufour Should not this be folded back into the previous patch ? It fixes an issue introduced by the previous one.