Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp228260imu; Tue, 27 Nov 2018 11:28:05 -0800 (PST) X-Google-Smtp-Source: AJdET5fw0z9wM9kmW/rjVyiuGYhMV1QqhEgyhG/52bKt0ZbfuKgm2xphioRALy2T21r7CVmJAO36 X-Received: by 2002:a62:9712:: with SMTP id n18-v6mr34034028pfe.69.1543346885371; Tue, 27 Nov 2018 11:28:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543346885; cv=none; d=google.com; s=arc-20160816; b=pbJCFqxN7iVJAlNre0MzGszYdQVP8RUo6n8pUgsXrldV0dhw8//X/QUyXhTqJCf/C0 4LjqM0AjIF1V9UdTkn1NYPnp2Ivq3v3rm742UT3DlDb20exmrcTGg6Xb+izSdnQw+rgI DNxBNyQ5Nuh0AP0nl+bAUlS9VL3XDa2kLJhCGhr+bwnXa7J3w4emXOq9sRCaOsSapJQy HkLgLWdaZh+cm2+Wyd6IzkX8z8M6iQZlHG5FJWzJ/29yQ67tdsiNFBb91DEvOm/gaq0J Hcmmnob5THE66+pEZPmHrjW3ZJI4EH6ZsIxVc3E4E3x96psO0IljrkJb5N3Lc8gR9z0o o5kA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=R54rcm9i1O3/vapsG6b7Bk69Dxa8PcW9ozp5iuX3CeU=; b=Rj9bEkIsh//RfXIThJcjxi2Ye9IxXhVDxjnumYemXnhZ+ubaYTDKBZof7RgXD2TAmb QvUqW+wdeQ52fGQS9Itgzdh2EcdrRH38Yv44yfnCFU/DkKpBthTh91XY+RiGVU8NYgHD XxCLzhrX5ZKDq2tIEYDkXkgIt9ZopL/1AxqdqfFOYrxt+SDvB4NV5WhBq+SSkSazpKJP 1hOO/Il+ZSXbABFSy0/pe08OWsEyxgEDxPLonuM8AlPRP+Jsutrafo3gpgaizpjs1Civ 70xQWnrHO0AivxGcL/hv1XCzmdEug2HfFVq4zLgFqq86bZAjgxbkgcDu3JoMwwBO2C/i jqmA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=KlfhoZWM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t9si4662504plz.427.2018.11.27.11.27.50; Tue, 27 Nov 2018 11:28:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=KlfhoZWM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731654AbeK1E1c (ORCPT + 99 others); Tue, 27 Nov 2018 23:27:32 -0500 Received: from mail-it1-f196.google.com ([209.85.166.196]:37757 "EHLO mail-it1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731510AbeK1E1c (ORCPT ); Tue, 27 Nov 2018 23:27:32 -0500 Received: by mail-it1-f196.google.com with SMTP id b5so35240774iti.2 for ; Tue, 27 Nov 2018 09:28:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=R54rcm9i1O3/vapsG6b7Bk69Dxa8PcW9ozp5iuX3CeU=; b=KlfhoZWMVerQd5UONN5UQZQZ6MiJ0nmxIOl8FI/eKEgHNSEyR6pljjpr92ey//qKd1 1ZRhGkJERzVjerFEI+2AZpBCd7fwZQunhjch73OGTEF0PLCaC1iN3KJlgycZS5AnokBd yufTuAX1LLUiwfw72DqjYMZtIuD+8GhgUZaFk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=R54rcm9i1O3/vapsG6b7Bk69Dxa8PcW9ozp5iuX3CeU=; b=Sv/LwMCTqceHUhg424QiC01QakzOUS7TtH3zEHSFR8St63X7NSVu9/8Fkraz9mfjlX g6BIQcK3ZaoOtqxq4s+G04A4eJH95cra7oPUFVy4obruMBh9uUuX0smoad100qTzBlkt j0u3gBxD8dDVSaCP1pCfw5T0sWhVW8M3b5UzCIY+Au+oLHVDihmwQc4gqIWjsjLsrRDA 9RjlIe1ZK2GRdP8zsWJy48Kc59ZNI+K3KLcaDnWZDv7ok+eLrhFvmNBFFDZRepJWiXK4 cUEilZqUsg4raX458LiaYupHd0/tV5bbFlMj3ZtZSqpd4v9xvGjAJtEuTUPnk869BsWy l4RQ== X-Gm-Message-State: AA+aEWbFTb8PFyKlRxYnLuiNWQ5wQQS6CWkBvR7B6197sRuGNZfLYe7N 9EFfbzPFpU23nKGrbm+NcL5sfvGZseHCeQ7sR+PYMG/Y X-Received: by 2002:a05:660c:344:: with SMTP id b4mr7146805itl.51.1543339735054; Tue, 27 Nov 2018 09:28:55 -0800 (PST) MIME-Version: 1.0 References: <20181122165106.18238-1-daniel.vetter@ffwll.ch> <20181122165106.18238-4-daniel.vetter@ffwll.ch> <20181127074918.GT4266@phenom.ffwll.local> <154333737908.11623.17864230889834398136@skylake-alporthouse-com> In-Reply-To: <154333737908.11623.17864230889834398136@skylake-alporthouse-com> From: Daniel Vetter Date: Tue, 27 Nov 2018 18:28:43 +0100 Message-ID: Subject: Re: [Intel-gfx] [PATCH 3/3] mm, notifier: Add a lockdep map for invalidate_range_start To: Chris Wilson Cc: Linux Kernel Mailing List , Michal Hocko , Greg KH , intel-gfx , dri-devel , Linux MM , Jerome Glisse , Mike Rapoport , David Rientjes , Daniel Vetter , Andrew Morton , =?UTF-8?Q?Christian_K=C3=B6nig?= Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 27, 2018 at 5:50 PM Chris Wilson wro= te: > > Quoting Daniel Vetter (2018-11-27 07:49:18) > > On Thu, Nov 22, 2018 at 05:51:06PM +0100, Daniel Vetter wrote: > > > This is a similar idea to the fs_reclaim fake lockdep lock. It's > > > fairly easy to provoke a specific notifier to be run on a specific > > > range: Just prep it, and then munmap() it. > > > > > > A bit harder, but still doable, is to provoke the mmu notifiers for > > > all the various callchains that might lead to them. But both at the > > > same time is really hard to reliable hit, especially when you want to > > > exercise paths like direct reclaim or compaction, where it's not > > > easy to control what exactly will be unmapped. > > > > > > By introducing a lockdep map to tie them all together we allow lockde= p > > > to see a lot more dependencies, without having to actually hit them > > > in a single challchain while testing. > > > > > > Aside: Since I typed this to test i915 mmu notifiers I've only rolled > > > this out for the invaliate_range_start callback. If there's > > > interest, we should probably roll this out to all of them. But my > > > undestanding of core mm is seriously lacking, and I'm not clear on > > > whether we need a lockdep map for each callback, or whether some can > > > be shared. > > > > > > Cc: Andrew Morton > > > Cc: David Rientjes > > > Cc: "J=C3=A9r=C3=B4me Glisse" > > > Cc: Michal Hocko > > > Cc: "Christian K=C3=B6nig" > > > Cc: Greg Kroah-Hartman > > > Cc: Daniel Vetter > > > Cc: Mike Rapoport > > > Cc: linux-mm@kvack.org > > > Signed-off-by: Daniel Vetter > > > > Any comments on this one here? This is really the main ingredient for > > catching deadlocks in mmu notifier callbacks. The other two patches are > > more the icing on the cake. > > > > Thanks, Daniel > > > > > --- > > > include/linux/mmu_notifier.h | 7 +++++++ > > > mm/mmu_notifier.c | 7 +++++++ > > > 2 files changed, 14 insertions(+) > > > > > > diff --git a/include/linux/mmu_notifier.h b/include/linux/mmu_notifie= r.h > > > index 9893a6432adf..a39ba218dbbe 100644 > > > --- a/include/linux/mmu_notifier.h > > > +++ b/include/linux/mmu_notifier.h > > > @@ -12,6 +12,10 @@ struct mmu_notifier_ops; > > > > > > #ifdef CONFIG_MMU_NOTIFIER > > > > > > +#ifdef CONFIG_LOCKDEP > > > +extern struct lockdep_map __mmu_notifier_invalidate_range_start_map; > > > +#endif > > > + > > > /* > > > * The mmu notifier_mm structure is allocated and installed in > > > * mm->mmu_notifier_mm inside the mm_take_all_locks() protected > > > @@ -267,8 +271,11 @@ static inline void mmu_notifier_change_pte(struc= t mm_struct *mm, > > > static inline void mmu_notifier_invalidate_range_start(struct mm_str= uct *mm, > > > unsigned long start, unsigned long en= d) > > > { > > > + mutex_acquire(&__mmu_notifier_invalidate_range_start_map, 0, 0, > > > + _RET_IP_); > > Would not lock_acquire_shared() be more appropriate, i.e. treat this as > a rwsem_acquire_read()? read lock critical sections can't create any dependencies against any other read lock critical section of the same lock. Switching this to a read lock would just render the annotation pointless (if you don't include at least some write lock critical section somewhere, but I have no idea where you'd do that). A read lock that you only ever take for reading essentially doesn't do anything at all. So not clear on why you're suggesting this? It's the exact same idea like fs_reclaim of intserting a fake lock to tie all possible callchains to a given functions together with all possible callchains from that function. Of course this is only valid if all NxM combinations could happen in theory. For fs_reclaim that's true because direct reclaim can pick anything it wants to shrink/evict. For mmu notifier that's true as long as we assume any mmu notifier can be in use by any process, which only depends upon sufficiently contrived/evil userspace. I guess I could use lock_map_acquire/release() wrappers for this like fs_reclaim, would be a bit more clear. -Daniel --=20 Daniel Vetter Software Engineer, Intel Corporation +41 (0) 79 365 57 48 - http://blog.ffwll.ch