Received: by 10.192.165.156 with SMTP id m28csp132092imm; Tue, 10 Apr 2018 18:08:06 -0700 (PDT) X-Google-Smtp-Source: AIpwx49aUbBbmQKJ7aUqXABSj05v0E1xCT4a3A79MafmSmNhIhM0fJOoNDaTJ9mNgZ6DY3TMxYZP X-Received: by 10.98.57.143 with SMTP id u15mr2166990pfj.79.1523408886179; Tue, 10 Apr 2018 18:08:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523408886; cv=none; d=google.com; s=arc-20160816; b=FlCEuFgS02DT2wNWLyHgWy/xIkSaUme2yCzgMmpdf5/AFtcPOmamKzQeW65mQlN0/z A0cN1F6ndi74gvkKBt57+CFhmWSxIaDtewCcSy6/A7ynX1n4pvfARi4e8lYwrNyOOC5L IpP9ThNAa4yyRBrU/cjdidRWV231XrEotww43XR64EHWh/PnPce3i5jeHLI5noUiY/gz A1HHKt1yaqnzjWY5UZn9x9bkZ6CZgOPBZVsZA7C75gnR/6iDxzcymr3fFl95GLHAgWTb PqAOV7v2gufKDZd7rn5KgQVRy9ybeMnOVSttuISbsin31Qlp0H6lESztI3H77lpqJm2p 6NqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature:arc-authentication-results; bh=t8BE8RxHhlOW3QFI0bh2oQkMBtsforyYcAXB4VHlKxc=; b=UPQpiJUoa1ptVUN7N/suWDECw+oj4Giyi4q1mupuxpOTeifHdwynBY7wj6J28Y+1WY f4zYZ1Tf11+ml6SV0MqQMubyq39R8szVTIrnIQg46EaHfHv63wKvvTAjehcLRyuqACO+ LPuNnaVZ75Afb5H4HSqIWzPGT4VoQRkuDjoEr01OxsfJB30Pj1Asubbah2EJWDKIOAwP WYJDnFjk6c0C83f7IDGEXURaWC3ASrG71Y9CNQ8cW4OS5uJps2gAR85Beif5Jmyf8J/7 0lHA02JPbE4JcVEaCBhJLISYKaNG3IaUb+BaGbp7MdjwO6pJZZ1yoqV40A8Ro3b83HUq yymA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=l0pbHxhW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m6-v6si3940495pls.642.2018.04.10.18.07.30; Tue, 10 Apr 2018 18:08:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=l0pbHxhW; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752576AbeDKAk0 (ORCPT + 99 others); Tue, 10 Apr 2018 20:40:26 -0400 Received: from mail-yw0-f193.google.com ([209.85.161.193]:43227 "EHLO mail-yw0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752539AbeDKAkZ (ORCPT ); Tue, 10 Apr 2018 20:40:25 -0400 Received: by mail-yw0-f193.google.com with SMTP id i187so35759ywd.10 for ; Tue, 10 Apr 2018 17:40:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=t8BE8RxHhlOW3QFI0bh2oQkMBtsforyYcAXB4VHlKxc=; b=l0pbHxhWrOJP9k5N6uUTXaeLvEvVzif7u3dZDpBPGcB7zroHFzsgF+Z4K/j0T0j8cN vFEuWWOxI+cYn29S/PupOOCj4hvIkhHd4RjB/jAfO10MDVv+mJ/VId6NbmiBQkL8BwXV 3ocbxU1A+UbVXOuMQsdqLhyn5DbFsCS2zw89sxJTfJIdGMFArbwa0Z4L1ULQ/FHcwxhX 92aD+oxJLQAl2lBSUw+ST3nDRH+We+VBIiNMLvxLqBQGhwBoJxMlY7H3R4BQ9idIkXFG ZPViTmLq6Jwq03kWpQzAPDwq4GF5FoI00iw5irboAr4t6Zk7cuXvgH329xpV0iDt0h+8 4Amg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=t8BE8RxHhlOW3QFI0bh2oQkMBtsforyYcAXB4VHlKxc=; b=fBUZoMqoU6MwNN1yZ2D5NdwX8xwX9YIEG9alEKMMFTOmoL1fV9EuHr098lKKuMx1Gm XpTj5fVX8sRE5Z5Tm0eWFG/vpkA7KjZN5GkS1E2elF2rCGlF7hCsnyRRUQeLB8tGGXEE uW9B1wHSdhTLBDukZKo846s597f2Km/Q+ZX7naCgb2Ta03gMRvfgIQxtxoZb5/GEjST0 IVoriv3SmLeLAb7hgehcYPqyrLM/5IEStfrtGZW3bCfMkemhTSeHZl6/KUfLj8izBO1k rTqV2UxxwgcnOGALUrd+BGd1wAHUymjUKUS3EvdfB/wt3mdH5GCdiXQkezhYGcq97Dwm ekXA== X-Gm-Message-State: ALQs6tCatQyZTpHoP93I4ri2iXIOKmXoXyjWdTDw0X7t1qB7sJGc2SLV 1WyCeWnuU/UeN4cjkT4jHmy3d4nxmd6uIABp+ouTQQ== X-Received: by 10.13.197.65 with SMTP id h62mr1378368ywd.464.1523407223929; Tue, 10 Apr 2018 17:40:23 -0700 (PDT) MIME-Version: 1.0 References: <201804080259.VS5U0mKT%fengguang.wu@intel.com> <20180410005908.167976-1-gthelen@google.com> <55efb2c6-04c5-d2bb-738e-8308aa0eaf8f@meituan.com> In-Reply-To: <55efb2c6-04c5-d2bb-738e-8308aa0eaf8f@meituan.com> From: Greg Thelen Date: Wed, 11 Apr 2018 00:40:11 +0000 Message-ID: Subject: Re: [PATCH v3] writeback: safer lock nesting To: Wang Long Cc: Michal Hocko , Andrew Morton , Johannes Weiner , Tejun Heo , npiggin@gmail.com, LKML , Linux MM Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 10, 2018 at 1:15 AM Wang Long wrote: > > lock_page_memcg()/unlock_page_memcg() use spin_lock_irqsave/restore() i= f > > the page's memcg is undergoing move accounting, which occurs when a > > process leaves its memcg for a new one that has > > memory.move_charge_at_immigrate set. > > > > unlocked_inode_to_wb_begin,end() use spin_lock_irq/spin_unlock_irq() if the > > given inode is switching writeback domains. Switches occur when enough > > writes are issued from a new domain. > > > > This existing pattern is thus suspicious: > > lock_page_memcg(page); > > unlocked_inode_to_wb_begin(inode, &locked); > > ... > > unlocked_inode_to_wb_end(inode, locked); > > unlock_page_memcg(page); > > > > If both inode switch and process memcg migration are both in-flight the= n > > unlocked_inode_to_wb_end() will unconditionally enable interrupts while > > still holding the lock_page_memcg() irq spinlock. This suggests the > > possibility of deadlock if an interrupt occurs before > > unlock_page_memcg(). > > > > truncate > > __cancel_dirty_page > > lock_page_memcg > > unlocked_inode_to_wb_begin > > unlocked_inode_to_wb_end > > > > > > end_page_writeback > > test_clear_page_writeback > > lock_page_memcg > > > > unlock_page_memcg > > > > Due to configuration limitations this deadlock is not currently possibl= e > > because we don't mix cgroup writeback (a cgroupv2 feature) and > > memory.move_charge_at_immigrate (a cgroupv1 feature). > > > > If the kernel is hacked to always claim inode switching and memcg > > moving_account, then this script triggers lockup in less than a minute: > > cd /mnt/cgroup/memory > > mkdir a b > > echo 1 > a/memory.move_charge_at_immigrate > > echo 1 > b/memory.move_charge_at_immigrate > > ( > > echo $BASHPID > a/cgroup.procs > > while true; do > > dd if=3D/dev/zero of=3D/mnt/big bs=3D1M count=3D256 > > done > > ) & > > while true; do > > sync > > done & > > sleep 1h & > > SLEEP=3D$! > > while true; do > > echo $SLEEP > a/cgroup.procs > > echo $SLEEP > b/cgroup.procs > > done > > > > Given the deadlock is not currently possible, it's debatable if there's > > any reason to modify the kernel. I suggest we should to prevent future > > surprises. > This deadlock occurs three times in our environment=EF=BC=8C > this deadlock occurs three times in our environment. It is better to cc stable kernel and > backport it. That's interesting. Are you using cgroup v1 or v2? Do you enable memory.move_charge_at_immigrate? I assume you've been using 4.4 stable. I'll look closer at it at a 4.4 stable backport.