Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp229357imu; Tue, 27 Nov 2018 11:29:08 -0800 (PST) X-Google-Smtp-Source: AFSGD/UR3xIm5n9db0C4sTDbxZdIWSJxBdaeHrYmscPUOk0agf33R2qZnBgeDxgkfZI4/GYaaFUJ X-Received: by 2002:a63:5207:: with SMTP id g7mr30710975pgb.253.1543346948286; Tue, 27 Nov 2018 11:29:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543346948; cv=none; d=google.com; s=arc-20160816; b=W3DAfqFOr2FeEsb6KjJaQEA3NONTKgTruMCBku5TG2khYghvN8UD2hkmuk2Zznjd5B KlsRgO80DJ7PLhVZWmqeLrrsb2o8y3rden49V6B51bWsrFmkIjX5iBwh1glTKbc0d7m8 JjdfUABsAQ44SyoKuFKwT8vDXBqThJQXzGDOZ0OaqHkNN8E5mx7Ju2CjIvZGgvFqi56y te2ElxHdkBLX8CMqzO7IFrdAEB/aNZ3nTExLY+JFJ720p2hkpgFMnxpkYRDxDcxgzc2P 17XerWzlytp/AGtleWqUqhcUM+kjCQNu8mM3iiqoLjhrcY+/AovBTcfCmBAiwYKnxUU7 HHzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:subject:user-agent:message-id :references:cc:in-reply-to:from:to:content-transfer-encoding :mime-version; bh=HT3c5wk3x3Wv7bgfJCcGARlom7CRQL0DpGj2egZnRi4=; b=T1XPW0YejpJZeJr5zNFtD1fd6leXtBzPB+32qeC64v90AK1aSwxQEEAD0+4NyGQY47 Tyq1urxE5wpqHD1iXwPlto3b+5GNlr15mnGTwy6v9qYMcj0CkR0GWf+i+kVC6hTF9sa5 2lOk02ZT6v4P9rQa18eD2AZWasfzEZDrZWoExoSuMVjDxM4p9+/LAUC++l/VvtqkMC54 /5Lw5ZGYLneUp37GrnQvXj/+ssB1f7EMH+vTG90kML6H044QhjeYmW0rIZEKDzZ42Ol5 MkPdpTt8H8u3ElJ5lOei88V4/SPdAt5MifcyySaRrMecYEJZPky9L4cPH++VNGajektH QW9A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r81si5349604pfr.164.2018.11.27.11.28.53; Tue, 27 Nov 2018 11:29:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731564AbeK1EdV convert rfc822-to-8bit (ORCPT + 99 others); Tue, 27 Nov 2018 23:33:21 -0500 Received: from mail.fireflyinternet.com ([109.228.58.192]:57218 "EHLO fireflyinternet.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726499AbeK1EdV (ORCPT ); Tue, 27 Nov 2018 23:33:21 -0500 X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=78.156.65.138; Received: from localhost (unverified [78.156.65.138]) by fireflyinternet.com (Firefly Internet (M1)) with ESMTP (TLS) id 14675435-1500050 for multiple; Tue, 27 Nov 2018 17:34:00 +0000 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT To: Daniel Vetter From: Chris Wilson In-Reply-To: Cc: Linux Kernel Mailing List , Michal Hocko , Greg KH , intel-gfx , dri-devel , Linux MM , Jerome Glisse , Mike Rapoport , David Rientjes , Daniel Vetter , Andrew Morton , =?utf-8?q?Christian_K=C3=B6nig?= References: <20181122165106.18238-1-daniel.vetter@ffwll.ch> <20181122165106.18238-4-daniel.vetter@ffwll.ch> <20181127074918.GT4266@phenom.ffwll.local> <154333737908.11623.17864230889834398136@skylake-alporthouse-com> Message-ID: <154334003817.11623.5449603736660799102@skylake-alporthouse-com> User-Agent: alot/0.6 Subject: Re: [Intel-gfx] [PATCH 3/3] mm, notifier: Add a lockdep map for invalidate_range_start Date: Tue, 27 Nov 2018 17:33:58 +0000 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting Daniel Vetter (2018-11-27 17:28:43) > On Tue, Nov 27, 2018 at 5:50 PM Chris Wilson wrote: > > > > Quoting Daniel Vetter (2018-11-27 07:49:18) > > > On Thu, Nov 22, 2018 at 05:51:06PM +0100, Daniel Vetter wrote: > > > > This is a similar idea to the fs_reclaim fake lockdep lock. It's > > > > fairly easy to provoke a specific notifier to be run on a specific > > > > range: Just prep it, and then munmap() it. > > > > > > > > A bit harder, but still doable, is to provoke the mmu notifiers for > > > > all the various callchains that might lead to them. But both at the > > > > same time is really hard to reliable hit, especially when you want to > > > > exercise paths like direct reclaim or compaction, where it's not > > > > easy to control what exactly will be unmapped. > > > > > > > > By introducing a lockdep map to tie them all together we allow lockdep > > > > to see a lot more dependencies, without having to actually hit them > > > > in a single challchain while testing. > > > > > > > > Aside: Since I typed this to test i915 mmu notifiers I've only rolled > > > > this out for the invaliate_range_start callback. If there's > > > > interest, we should probably roll this out to all of them. But my > > > > undestanding of core mm is seriously lacking, and I'm not clear on > > > > whether we need a lockdep map for each callback, or whether some can > > > > be shared. > > > > > > > > Cc: Andrew Morton > > > > Cc: David Rientjes > > > > Cc: "Jérôme Glisse" > > > > Cc: Michal Hocko > > > > Cc: "Christian König" > > > > Cc: Greg Kroah-Hartman > > > > Cc: Daniel Vetter > > > > Cc: Mike Rapoport > > > > Cc: linux-mm@kvack.org > > > > Signed-off-by: Daniel Vetter > > > > > > Any comments on this one here? This is really the main ingredient for > > > catching deadlocks in mmu notifier callbacks. The other two patches are > > > more the icing on the cake. > > > > > > Thanks, Daniel > > > > > > > --- > > > > include/linux/mmu_notifier.h | 7 +++++++ > > > > mm/mmu_notifier.c | 7 +++++++ > > > > 2 files changed, 14 insertions(+) > > > > > > > > diff --git a/include/linux/mmu_notifier.h b/include/linux/mmu_notifier.h > > > > index 9893a6432adf..a39ba218dbbe 100644 > > > > --- a/include/linux/mmu_notifier.h > > > > +++ b/include/linux/mmu_notifier.h > > > > @@ -12,6 +12,10 @@ struct mmu_notifier_ops; > > > > > > > > #ifdef CONFIG_MMU_NOTIFIER > > > > > > > > +#ifdef CONFIG_LOCKDEP > > > > +extern struct lockdep_map __mmu_notifier_invalidate_range_start_map; > > > > +#endif > > > > + > > > > /* > > > > * The mmu notifier_mm structure is allocated and installed in > > > > * mm->mmu_notifier_mm inside the mm_take_all_locks() protected > > > > @@ -267,8 +271,11 @@ static inline void mmu_notifier_change_pte(struct mm_struct *mm, > > > > static inline void mmu_notifier_invalidate_range_start(struct mm_struct *mm, > > > > unsigned long start, unsigned long end) > > > > { > > > > + mutex_acquire(&__mmu_notifier_invalidate_range_start_map, 0, 0, > > > > + _RET_IP_); > > > > Would not lock_acquire_shared() be more appropriate, i.e. treat this as > > a rwsem_acquire_read()? > > read lock critical sections can't create any dependencies against any > other read lock critical section of the same lock. Switching this to a > read lock would just render the annotation pointless (if you don't > include at least some write lock critical section somewhere, but I > have no idea where you'd do that). A read lock that you only ever take > for reading essentially doesn't do anything at all. > > So not clear on why you're suggesting this? Just that it's not acting as a mutex, so emulating one looks wrong. -Chris