Received: by 10.213.65.68 with SMTP id h4csp355840imn; Fri, 6 Apr 2018 01:05:14 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/SxHvmEwrMGZYQG0HrzxUoHlKrXovBI6K8kwbq8rUKpF0Ll+WWZE2NJam7h1BXvoZk31n+ X-Received: by 2002:a17:902:274a:: with SMTP id j10-v6mr25657046plg.28.1523001914015; Fri, 06 Apr 2018 01:05:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523001913; cv=none; d=google.com; s=arc-20160816; b=G4JABe4+lC/SIpnoTb9r+/eSyxJylHA0h94Y1HlbSYtOIXvmNPD5hVCGBt3HGMSDw5 NsxGnM0NYn5pIDDggQ/qCx+hXUgmT51yOzEXE6jJ2LkstEWQ8RI6YDF4oI0qF582v2dm efbSADNnd3o1oEcYylQ+7xGrRJEL8T+L033Krb/2LLPkuJzV/Bj8P/xpPZ1aCgQV48MR zFsdp8DJpUx1+NeINnmltyMp64alqKHjflQVBr0P5ese5TK7In/bSZ4toQXS9vq/egwP 3WvFfblkBdbMyrmmu+G4Ogk5lxX1MQBYosihpqt0cPRcyK+AQXq/KsvQFgk/Zr0kcLjN hIDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=6Jr3FCzBzU53HDoLAlPymQmIZZ+nWY99W/Jug7kOs2E=; b=kK6lmleWJwEjjOWUODrWkRoyDDD6Qgfi9YxnA3YQGNJkrTP3wZpPsaTGatxawXWsWC AyYJIgSgvNMrmMosJJZeUHAFHDTxKt7OUipbXHh7MUBSLuPWVsWH4Wpa+7hHKou70lQU MU8u2IvMULEdRjS4dCEJkiFaPJubM9c+rqlzQrZ9nfU5bmqEcLyxgY4Tv+V2J/vCd6Nq HlUtLSZBlK+ZKqmOOpKoKgAsNr+WMS5+E88zv9wdB0qKfAiH7gA2RVB/mPVz9EKIgzQr pv3MtA85YG9ugSV2HNwxMUEVa7OlDLoUdQqxcfVJwyPE/cLFj9bWTI3BM4AGmq7AImvB JYZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Xjx7C6Wa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m20-v6si7807639pli.164.2018.04.06.01.04.59; Fri, 06 Apr 2018 01:05:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Xjx7C6Wa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751981AbeDFIDr (ORCPT + 99 others); Fri, 6 Apr 2018 04:03:47 -0400 Received: from mail-pf0-f194.google.com ([209.85.192.194]:43519 "EHLO mail-pf0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751344AbeDFIDn (ORCPT ); Fri, 6 Apr 2018 04:03:43 -0400 Received: by mail-pf0-f194.google.com with SMTP id j2so205736pff.10 for ; Fri, 06 Apr 2018 01:03:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=6Jr3FCzBzU53HDoLAlPymQmIZZ+nWY99W/Jug7kOs2E=; b=Xjx7C6Waz6zn2A7Yy5kIpoiux4BEDKrG60aEgwtFcrWUIdpMW4M3CtJOASDSzsVUBC 8olxkdrTVo/XFLUSAa/4pKrnvrHdCvr5dAxUsVo6XFfjaxd4e0PtaIqapnQJ++SjYg6V 5ATzPmUjf0lpvYJYoA2bJ4szGz732Z9Jphldk9LeNizlRMksVKK9Kvss1Je0ewewfMQI aFWwaghFafD+TcvvCW26/9X1TRuNoBCxC0LwT2mT+SqEEGLjToeEY0BP1fOpRq8vRRNp hHpAnpXk6Q/Ullu6vbm7nz1aIJ7I75EnqUIEryXx8rl25ZhFugTJ80ayDw3jKXlf6ekp gNVg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=6Jr3FCzBzU53HDoLAlPymQmIZZ+nWY99W/Jug7kOs2E=; b=cS73PiLC7zNUonKFUS4t5e9xo3Rwqym5tyhK418FYiGkWK/AZkWEA5a4k2r1uiL5Xp cfscNMZzGpOgBJytiRj7OFXLSd6P5KVWlhPAhMZcJQ8WwzqWn0j2av9/6osubsUEWRLw 5oLbEc4ZwMvvU+iE4daM/s1aweog3Ldyf3zKjpSeehoLRegRHIy+x2wqtAxDqkwxzDse kEFzGrcEpw7NGJzcZVp3zVieeHyZ3DgnpMGbHdZo5BhWsIVQxCDdPQJtjUpbpyzLmN5r 5e6zfMZzAjo6k0AkVteES2aw0MMCwpFlMkZdNLerWAviFJA2F8Vfr396wrsV94Gv9I94 b+YA== X-Gm-Message-State: AElRT7Eug4eWLsXJps3MemqvwSJj3uKjZ3HqetA/5+HZDjkArG+2jFVV QE+9O3aINtSz0aHoD6rcnGz24Q== X-Received: by 10.98.196.83 with SMTP id y80mr19823974pff.117.1523001822467; Fri, 06 Apr 2018 01:03:42 -0700 (PDT) Received: from gthelen.svl.corp.google.com ([2620:15c:2cb:201:7fd0:97b4:747b:9bf1]) by smtp.gmail.com with ESMTPSA id g10sm2260925pgr.69.2018.04.06.01.03.41 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 06 Apr 2018 01:03:41 -0700 (PDT) From: Greg Thelen To: Wang Long , Michal Hocko , Andrew Morton , Johannes Weiner , Tejun Heo Cc: npiggin@gmail.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Greg Thelen Subject: [PATCH] writeback: safer lock nesting Date: Fri, 6 Apr 2018 01:03:24 -0700 Message-Id: <20180406080324.160306-1-gthelen@google.com> X-Mailer: git-send-email 2.17.0.484.g0c8726318c-goog In-Reply-To: <2cb713cd-0b9b-594c-31db-b4582f8ba822@meituan.com> References: <2cb713cd-0b9b-594c-31db-b4582f8ba822@meituan.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org lock_page_memcg()/unlock_page_memcg() use spin_lock_irqsave/restore() if the page's memcg is undergoing move accounting, which occurs when a process leaves its memcg for a new one that has memory.move_charge_at_immigrate set. unlocked_inode_to_wb_begin,end() use spin_lock_irq/spin_unlock_irq() if the given inode is switching writeback domains. Swithces occur when enough writes are issued from a new domain. This existing pattern is thus suspicious: lock_page_memcg(page); unlocked_inode_to_wb_begin(inode, &locked); ... unlocked_inode_to_wb_end(inode, locked); unlock_page_memcg(page); If both inode switch and process memcg migration are both in-flight then unlocked_inode_to_wb_end() will unconditionally enable interrupts while still holding the lock_page_memcg() irq spinlock. This suggests the possibility of deadlock if an interrupt occurs before unlock_page_memcg(). truncate __cancel_dirty_page lock_page_memcg unlocked_inode_to_wb_begin unlocked_inode_to_wb_end end_page_writeback test_clear_page_writeback lock_page_memcg unlock_page_memcg Due to configuration limitations this deadlock is not currently possible because we don't mix cgroup writeback (a cgroupv2 feature) and memory.move_charge_at_immigrate (a cgroupv1 feature). If the kernel is hacked to always claim inode switching and memcg moving_account, then this script triggers lockup in less than a minute: cd /mnt/cgroup/memory mkdir a b echo 1 > a/memory.move_charge_at_immigrate echo 1 > b/memory.move_charge_at_immigrate ( echo $BASHPID > a/cgroup.procs while true; do dd if=/dev/zero of=/mnt/big bs=1M count=256 done ) & while true; do sync done & sleep 1h & SLEEP=$! while true; do echo $SLEEP > a/cgroup.procs echo $SLEEP > b/cgroup.procs done Given the deadlock is not currently possible, it's debatable if there's any reason to modify the kernel. I suggest we should to prevent future surprises. Reported-by: Wang Long Signed-off-by: Greg Thelen --- fs/fs-writeback.c | 5 +++-- include/linux/backing-dev.h | 18 ++++++++++++------ mm/page-writeback.c | 15 +++++++++------ 3 files changed, 24 insertions(+), 14 deletions(-) diff --git a/fs/fs-writeback.c b/fs/fs-writeback.c index d4d04fee568a..d51bae5a53e2 100644 --- a/fs/fs-writeback.c +++ b/fs/fs-writeback.c @@ -746,10 +746,11 @@ int inode_congested(struct inode *inode, int cong_bits) if (inode && inode_to_wb_is_valid(inode)) { struct bdi_writeback *wb; bool locked, congested; + unsigned long flags; - wb = unlocked_inode_to_wb_begin(inode, &locked); + wb = unlocked_inode_to_wb_begin(inode, &locked, &flags); congested = wb_congested(wb, cong_bits); - unlocked_inode_to_wb_end(inode, locked); + unlocked_inode_to_wb_end(inode, locked, flags); return congested; } diff --git a/include/linux/backing-dev.h b/include/linux/backing-dev.h index 3e4ce54d84ab..6c74b64d6f56 100644 --- a/include/linux/backing-dev.h +++ b/include/linux/backing-dev.h @@ -347,6 +347,7 @@ static inline struct bdi_writeback *inode_to_wb(const struct inode *inode) * unlocked_inode_to_wb_begin - begin unlocked inode wb access transaction * @inode: target inode * @lockedp: temp bool output param, to be passed to the end function + * @flags: saved irq flags, to be passed to the end function * * The caller wants to access the wb associated with @inode but isn't * holding inode->i_lock, mapping->tree_lock or wb->list_lock. This @@ -359,7 +360,8 @@ static inline struct bdi_writeback *inode_to_wb(const struct inode *inode) * disabled on return. */ static inline struct bdi_writeback * -unlocked_inode_to_wb_begin(struct inode *inode, bool *lockedp) +unlocked_inode_to_wb_begin(struct inode *inode, bool *lockedp, + unsigned long *flags) { rcu_read_lock(); @@ -370,7 +372,7 @@ unlocked_inode_to_wb_begin(struct inode *inode, bool *lockedp) *lockedp = smp_load_acquire(&inode->i_state) & I_WB_SWITCH; if (unlikely(*lockedp)) - spin_lock_irq(&inode->i_mapping->tree_lock); + spin_lock_irqsave(&inode->i_mapping->tree_lock, *flags); /* * Protected by either !I_WB_SWITCH + rcu_read_lock() or tree_lock. @@ -383,11 +385,13 @@ unlocked_inode_to_wb_begin(struct inode *inode, bool *lockedp) * unlocked_inode_to_wb_end - end inode wb access transaction * @inode: target inode * @locked: *@lockedp from unlocked_inode_to_wb_begin() + * @flags: *@flags from unlocked_inode_to_wb_begin() */ -static inline void unlocked_inode_to_wb_end(struct inode *inode, bool locked) +static inline void unlocked_inode_to_wb_end(struct inode *inode, bool locked, + unsigned long flags) { if (unlikely(locked)) - spin_unlock_irq(&inode->i_mapping->tree_lock); + spin_unlock_irqrestore(&inode->i_mapping->tree_lock, flags); rcu_read_unlock(); } @@ -434,12 +438,14 @@ static inline struct bdi_writeback *inode_to_wb(struct inode *inode) } static inline struct bdi_writeback * -unlocked_inode_to_wb_begin(struct inode *inode, bool *lockedp) +unlocked_inode_to_wb_begin(struct inode *inode, bool *lockedp, + unsigned long *flags) { return inode_to_wb(inode); } -static inline void unlocked_inode_to_wb_end(struct inode *inode, bool locked) +static inline void unlocked_inode_to_wb_end(struct inode *inode, bool locked, + unsigned long flags) { } diff --git a/mm/page-writeback.c b/mm/page-writeback.c index 586f31261c83..ca786528c74d 100644 --- a/mm/page-writeback.c +++ b/mm/page-writeback.c @@ -2501,13 +2501,14 @@ void account_page_redirty(struct page *page) if (mapping && mapping_cap_account_dirty(mapping)) { struct inode *inode = mapping->host; struct bdi_writeback *wb; + unsigned long flags; bool locked; - wb = unlocked_inode_to_wb_begin(inode, &locked); + wb = unlocked_inode_to_wb_begin(inode, &locked, &flags); current->nr_dirtied--; dec_node_page_state(page, NR_DIRTIED); dec_wb_stat(wb, WB_DIRTIED); - unlocked_inode_to_wb_end(inode, locked); + unlocked_inode_to_wb_end(inode, locked, flags); } } EXPORT_SYMBOL(account_page_redirty); @@ -2613,15 +2614,16 @@ void __cancel_dirty_page(struct page *page) if (mapping_cap_account_dirty(mapping)) { struct inode *inode = mapping->host; struct bdi_writeback *wb; + unsigned long flags; bool locked; lock_page_memcg(page); - wb = unlocked_inode_to_wb_begin(inode, &locked); + wb = unlocked_inode_to_wb_begin(inode, &locked, &flags); if (TestClearPageDirty(page)) account_page_cleaned(page, mapping, wb); - unlocked_inode_to_wb_end(inode, locked); + unlocked_inode_to_wb_end(inode, locked, flags); unlock_page_memcg(page); } else { ClearPageDirty(page); @@ -2653,6 +2655,7 @@ int clear_page_dirty_for_io(struct page *page) if (mapping && mapping_cap_account_dirty(mapping)) { struct inode *inode = mapping->host; struct bdi_writeback *wb; + unsigned long flags; bool locked; /* @@ -2690,14 +2693,14 @@ int clear_page_dirty_for_io(struct page *page) * always locked coming in here, so we get the desired * exclusion. */ - wb = unlocked_inode_to_wb_begin(inode, &locked); + wb = unlocked_inode_to_wb_begin(inode, &locked, &flags); if (TestClearPageDirty(page)) { dec_lruvec_page_state(page, NR_FILE_DIRTY); dec_zone_page_state(page, NR_ZONE_WRITE_PENDING); dec_wb_stat(wb, WB_RECLAIMABLE); ret = 1; } - unlocked_inode_to_wb_end(inode, locked); + unlocked_inode_to_wb_end(inode, locked, flags); return ret; } return TestClearPageDirty(page); -- 2.17.0.484.g0c8726318c-goog