Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2763852imm; Fri, 24 Aug 2018 05:05:07 -0700 (PDT) X-Google-Smtp-Source: ANB0VdYIE8a7udsc++bOF/y1jVHoFdjBljDpZeCfyCaPX1smCdl0P+SPojCNsavoyclOrZmTLpHw X-Received: by 2002:a63:495f:: with SMTP id y31-v6mr1464412pgk.32.1535112307739; Fri, 24 Aug 2018 05:05:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535112307; cv=none; d=google.com; s=arc-20160816; b=PWGsIaIDumCTLV7sPOAzhqxktbux+bEsfJZEY69No63PMI/DuXwFkC9aSxaBEISDjG u05z29kwmY/5KzQ4S4a24OLKz7t8/sZ/ndTe9nDr6IQLmxbkO4zGsF43DSwu9ubejYVu S9nPcYTWhmqp9IBjrDrHDHkjFUkynJvl7AWwEiIdzYsftwrvyyfjUuQ0gVNE5NkNFw9o 2QoAPkw7oFVZmzD35b9CULPGKJmx6NrrU8c2bZr6VuF6oq5IwHV3/8Ko5kojng8D41vf zqwJvGpK2DoYnYoc2HUYG5H8Q+YJ/nka9QiKMovHh4v7uH+S1w5HvU/XF65mhLg1hUsh usKw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=ev3Ttn4kp5AAro9zAVD3Y0MEmWrENpEiijbdiXsxa3M=; b=pRFTZXCahYRKYWpL5IKoOfKlx6pnX6AhyuMZqbGvn86JOvsB772DlLote/1EEYO8WZ FvRGg3dVX1Wjx1bFRPO5t5/3BkAsD9jtaoM2IwdF0+d0sJ9qmVlmAH1RrB5wb8qdsApJ sDdTDaF1CAOs6zaA5342XB/VWLsfLXfO4PJcgcMbx/W2AHLNMcxe9rLA3WI9GBn2MhxZ 6sLZch6rtQmtTRLTMzh5Zk2ba2BRzmhokYBTGWMqWvAfqVa/iVHscAfbwAPxs3zXlJ6y YpuhsxzM3ha84gwuvhgKkdl9K3U7W6uLnUvIa5RlurNsEyWMwp4132bHxg/y11a/rhdc txsg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r6-v6si6363013pgm.647.2018.08.24.05.04.51; Fri, 24 Aug 2018 05:05:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727665AbeHXPiG (ORCPT + 99 others); Fri, 24 Aug 2018 11:38:06 -0400 Received: from mx2.suse.de ([195.135.220.15]:38404 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726513AbeHXPiF (ORCPT ); Fri, 24 Aug 2018 11:38:05 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 776F8AD65; Fri, 24 Aug 2018 12:03:42 +0000 (UTC) Date: Fri, 24 Aug 2018 14:03:39 +0200 From: Michal Hocko To: christian.koenig@amd.com Cc: kvm@vger.kernel.org, Radim =?utf-8?B?S3LEjW3DocWZ?= , Tetsuo Handa , Joonas Lahtinen , Sudeep Dutt , dri-devel@lists.freedesktop.org, linux-mm@kvack.org, Andrea Arcangeli , "David (ChunMing) Zhou" , Dimitri Sivanich , Jason Gunthorpe , linux-rdma@vger.kernel.org, amd-gfx@lists.freedesktop.org, David Airlie , Doug Ledford , David Rientjes , xen-devel@lists.xenproject.org, intel-gfx@lists.freedesktop.org, Jani Nikula , Leon Romanovsky , =?iso-8859-1?B?Suly9G1l?= Glisse , Rodrigo Vivi , Boris Ostrovsky , Juergen Gross , Mike Marciniszyn , Dennis Dalessandro , LKML , Ashutosh Dixit , Alex Deucher , Paolo Bonzini , Andrew Morton , Felix Kuehling Subject: Re: [PATCH] mm, oom: distinguish blockable mode for mmu notifiers Message-ID: <20180824120339.GL29735@dhcp22.suse.cz> References: <20180716115058.5559-1-mhocko@kernel.org> <8cbfb09f-0c5a-8d43-1f5e-f3ff7612e289@I-love.SAKURA.ne.jp> <20180824113248.GH29735@dhcp22.suse.cz> <20180824115226.GK29735@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 24-08-18 13:57:52, Christian K?nig wrote: > Am 24.08.2018 um 13:52 schrieb Michal Hocko: > > On Fri 24-08-18 13:43:16, Christian K?nig wrote: [...] > > > That won't work like this there might be multiple > > > invalidate_range_start()/invalidate_range_end() pairs open at the same time. > > > E.g. the lock might be taken recursively and that is illegal for a > > > rw_semaphore. > > I am not sure I follow. Are you saying that one invalidate_range might > > trigger another one from the same path? > > No, but what can happen is: > > invalidate_range_start(A,B); > invalidate_range_start(C,D); > ... > invalidate_range_end(C,D); > invalidate_range_end(A,B); > > Grabbing the read lock twice would be illegal in this case. I am sorry but I still do not follow. What is the context the two are called from? Can you give me an example. I simply do not see it in the code, mostly because I am not familiar with it. -- Michal Hocko SUSE Labs