Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp49010imu; Tue, 27 Nov 2018 08:53:41 -0800 (PST) X-Google-Smtp-Source: AFSGD/U7yDBzjpiSnbZZLK1Y+YGOEpySHdVmdigHsweqNrgStqbEBfdLpFUoCVG5pBPi4Io9VFr6 X-Received: by 2002:a17:902:292b:: with SMTP id g40mr33672889plb.82.1543337621550; Tue, 27 Nov 2018 08:53:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543337621; cv=none; d=google.com; s=arc-20160816; b=kZKmjDlw32HJ1/Tg3MOeeDzkuPXf5KvGJlkrCINEYOegHtpkt9r5/1F7e+CjrioC1O RoqgIuBe87Qz/yMB/SzvvCYSYlKwEQsn1pdNORgH41t3g9WzzRqEB9CnK9AfHkLhXRHD 7pP7hOQK7ZzRVLLNI9URc6VE/R9z0p8WxCJbuCY7nsR6bepYNPXMG95jcAG0OV0By8Ka gTY+dFqXx3U9DP2u1UxW/AXLYc4nBujBvdih92IEvuxICUekYAgPYmL9hNudeI/pFBiO 7py596SNorIYBQNGcOlpjruvCkqUVNIkwlX6FkYTgQ+yTezQnLYD6XBgxArJ8JADxnog F/EA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:subject:user-agent:message-id :references:cc:in-reply-to:from:to:content-transfer-encoding :mime-version; bh=q0+UW057iAdIY3iW7RWLgL8OWnvPm+rMfpgCzCCcHrk=; b=lizm9RrfEIXfGVNKHGtUY86vDQmoDY/kQWbYS/WDMWhQXiwP0nKCdQsbIk3V9YnhiG M14aLlW5pXBjQyMeEqLfZYIbDsKFCfE9QGY9ze+RWjci/n5fl5b7CbNqy7O6UNTbxLPr 05U4s4GxZYdiILWbTP+I/z1W0rte5hD4TfIVgreTjJsCKa1/3KAxmsU8zawqBxZjYPZ5 q1m9t8+cHnM1ozEfjNIDTzhi8TDA3Xau3uwajEBI/5DP3vUoIgWYEedd9OqI2/PbRahx 5YqNDEambAJJ5uJ3ATX02K5A/PpqVOWSZEGOt5ZhpXE7wCrllqlubKZOM4I6TvKyPUk2 suNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e13si4245979pgh.251.2018.11.27.08.53.11; Tue, 27 Nov 2018 08:53:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731442AbeK1DtE convert rfc822-to-8bit (ORCPT + 99 others); Tue, 27 Nov 2018 22:49:04 -0500 Received: from mail.fireflyinternet.com ([109.228.58.192]:56154 "EHLO fireflyinternet.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726492AbeK1DtD (ORCPT ); Tue, 27 Nov 2018 22:49:03 -0500 X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=78.156.65.138; Received: from localhost (unverified [78.156.65.138]) by fireflyinternet.com (Firefly Internet (M1)) with ESMTP (TLS) id 14674739-1500050 for multiple; Tue, 27 Nov 2018 16:49:41 +0000 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT To: Daniel Vetter , LKML From: Chris Wilson In-Reply-To: <20181127074918.GT4266@phenom.ffwll.local> Cc: Michal Hocko , Greg Kroah-Hartman , Daniel Vetter , Intel Graphics Development , DRI Development , Linux MM , =?utf-8?b?SsOpcsO0bWUgR2xpc3Nl?= , Mike Rapoport , David Rientjes , Daniel Vetter , Andrew Morton , =?utf-8?q?Christian_K=C3=B6nig?= References: <20181122165106.18238-1-daniel.vetter@ffwll.ch> <20181122165106.18238-4-daniel.vetter@ffwll.ch> <20181127074918.GT4266@phenom.ffwll.local> Message-ID: <154333737908.11623.17864230889834398136@skylake-alporthouse-com> User-Agent: alot/0.6 Subject: Re: [Intel-gfx] [PATCH 3/3] mm, notifier: Add a lockdep map for invalidate_range_start Date: Tue, 27 Nov 2018 16:49:39 +0000 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting Daniel Vetter (2018-11-27 07:49:18) > On Thu, Nov 22, 2018 at 05:51:06PM +0100, Daniel Vetter wrote: > > This is a similar idea to the fs_reclaim fake lockdep lock. It's > > fairly easy to provoke a specific notifier to be run on a specific > > range: Just prep it, and then munmap() it. > > > > A bit harder, but still doable, is to provoke the mmu notifiers for > > all the various callchains that might lead to them. But both at the > > same time is really hard to reliable hit, especially when you want to > > exercise paths like direct reclaim or compaction, where it's not > > easy to control what exactly will be unmapped. > > > > By introducing a lockdep map to tie them all together we allow lockdep > > to see a lot more dependencies, without having to actually hit them > > in a single challchain while testing. > > > > Aside: Since I typed this to test i915 mmu notifiers I've only rolled > > this out for the invaliate_range_start callback. If there's > > interest, we should probably roll this out to all of them. But my > > undestanding of core mm is seriously lacking, and I'm not clear on > > whether we need a lockdep map for each callback, or whether some can > > be shared. > > > > Cc: Andrew Morton > > Cc: David Rientjes > > Cc: "Jérôme Glisse" > > Cc: Michal Hocko > > Cc: "Christian König" > > Cc: Greg Kroah-Hartman > > Cc: Daniel Vetter > > Cc: Mike Rapoport > > Cc: linux-mm@kvack.org > > Signed-off-by: Daniel Vetter > > Any comments on this one here? This is really the main ingredient for > catching deadlocks in mmu notifier callbacks. The other two patches are > more the icing on the cake. > > Thanks, Daniel > > > --- > > include/linux/mmu_notifier.h | 7 +++++++ > > mm/mmu_notifier.c | 7 +++++++ > > 2 files changed, 14 insertions(+) > > > > diff --git a/include/linux/mmu_notifier.h b/include/linux/mmu_notifier.h > > index 9893a6432adf..a39ba218dbbe 100644 > > --- a/include/linux/mmu_notifier.h > > +++ b/include/linux/mmu_notifier.h > > @@ -12,6 +12,10 @@ struct mmu_notifier_ops; > > > > #ifdef CONFIG_MMU_NOTIFIER > > > > +#ifdef CONFIG_LOCKDEP > > +extern struct lockdep_map __mmu_notifier_invalidate_range_start_map; > > +#endif > > + > > /* > > * The mmu notifier_mm structure is allocated and installed in > > * mm->mmu_notifier_mm inside the mm_take_all_locks() protected > > @@ -267,8 +271,11 @@ static inline void mmu_notifier_change_pte(struct mm_struct *mm, > > static inline void mmu_notifier_invalidate_range_start(struct mm_struct *mm, > > unsigned long start, unsigned long end) > > { > > + mutex_acquire(&__mmu_notifier_invalidate_range_start_map, 0, 0, > > + _RET_IP_); Would not lock_acquire_shared() be more appropriate, i.e. treat this as a rwsem_acquire_read()? -Chris