Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp4216055ybi; Tue, 18 Jun 2019 14:02:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqxi7ICjY0lQ5o/hOIgWtxM/XW4UCFBLAmxD1e8tDH+/8rh8TUqpeoYDNszG2rWJlp0P9ic3 X-Received: by 2002:a17:902:5c2:: with SMTP id f60mr115065535plf.61.1560891772184; Tue, 18 Jun 2019 14:02:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560891772; cv=none; d=google.com; s=arc-20160816; b=o1fmqoKq4PCR2UpHFol7Qkdf435OXF6rTMKnCpx4N3K77r5sn1e/RyumafLG7+HaWy +mnhZbEBE7XipMa1Q/LK9vFLzH0iVx7E+l5REXDsyLPQC/wsyILdpU7S1uLYTHccnjAs 1PaT4+nUfNTa7267dJhZ1XIWXHWciagfKqTwUu7Sk+LnNxcKTEGRFPeVEezZAjzJm3TF xBswQNp1ZTpUxwpTG5dVaudIoJ9AbDfM9xaorgZ3kCUNZZwpZWoPelza8eUU3rgdjKM3 zlrn+jayC4P4BJuoN+wfGpcKErAKvTKX3byrnEH3joh249/MWkXBaDJYy/zdUFILSmAo 0yWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:date:subject:user-agent:message-id :references:cc:in-reply-to:from:to:content-transfer-encoding :mime-version; bh=CMxBY454j+mVufKGFUgzZtVBFUpU65WrymS9l/P3OMo=; b=KYjX8rnykNP2JrGBqZterqtSAyVo6zlo2ALMLQRGOLACa8meK8UnnZq2nWAmmDSpae SRHC0/PhE+4gwLvR0VrgN2neLKgK99DAsDdmJkKt6IZVOeaZgFYKXm52UfM3UGgZWGfK rum3SADGRkM9puyJWLV9tPzbYLUsd5XStjtIyyxtc4EYgN1CaUVKi7Dvi8ySRYTjQ/ZO G4HQaEeJW8qTMJ29sgahhPUx3490OAutpZRWwGX9pwaTnzbtoDgO9woJcp8ZreMaH3U1 4OjjMAMMpLs4KOlfV3P3v9FP4NxXc+5bkCbW6Y9OOtFcU5OSzxTnUY7gA6cQfhJAuVMS zHOQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v22si14584619pfe.275.2019.06.18.14.02.35; Tue, 18 Jun 2019 14:02:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730510AbfFRVCb convert rfc822-to-8bit (ORCPT + 99 others); Tue, 18 Jun 2019 17:02:31 -0400 Received: from mail.fireflyinternet.com ([109.228.58.192]:52039 "EHLO fireflyinternet.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730102AbfFRVCb (ORCPT ); Tue, 18 Jun 2019 17:02:31 -0400 X-Default-Received-SPF: pass (skip=forwardok (res=PASS)) x-ip-name=78.156.65.138; Received: from localhost (unverified [78.156.65.138]) by fireflyinternet.com (Firefly Internet (M1)) with ESMTP (TLS) id 16945877-1500050 for multiple; Tue, 18 Jun 2019 22:02:17 +0100 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8BIT To: Lu Baolu , dwmw2@infradead.org, joro@8bytes.org From: Chris Wilson In-Reply-To: <20190521073016.27525-1-baolu.lu@linux.intel.com> Cc: ashok.raj@intel.com, jacob.jun.pan@linux.intel.com, Kevin Tian , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Dave Jiang References: <20190521073016.27525-1-baolu.lu@linux.intel.com> Message-ID: <156089173816.31375.3686352361646791464@skylake-alporthouse-com> User-Agent: alot/0.6 Subject: Re: [PATCH 1/2] iommu/vt-d: Fix lock inversion between iommu->lock and device_domain_lock Date: Tue, 18 Jun 2019 22:02:18 +0100 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Quoting Lu Baolu (2019-05-21 08:30:15) > From: Dave Jiang > > Lockdep debug reported lock inversion related with the iommu code > caused by dmar_insert_one_dev_info() grabbing the iommu->lock and > the device_domain_lock out of order versus the code path in > iommu_flush_dev_iotlb(). Expanding the scope of the iommu->lock and > reversing the order of lock acquisition fixes the issue. Which of course violates the property that device_domain_lock is the outer lock... <4>[ 1.252997] ====================================================== <4>[ 1.252999] WARNING: possible circular locking dependency detected <4>[ 1.253002] 5.2.0-rc5-CI-CI_DRM_6299+ #1 Not tainted <4>[ 1.253004] ------------------------------------------------------ <4>[ 1.253006] swapper/0/1 is trying to acquire lock: <4>[ 1.253009] 0000000091462475 (&(&iommu->lock)->rlock){+.+.}, at: domain_context_mapping_one+0xa0/0x4f0 <4>[ 1.253015] but task is already holding lock: <4>[ 1.253017] 0000000069266737 (device_domain_lock){....}, at: domain_context_mapping_one+0x88/0x4f0 <4>[ 1.253021] which lock already depends on the new lock. <4>[ 1.253024] the existing dependency chain (in reverse order) is: <4>[ 1.253027] -> #1 (device_domain_lock){....}: <4>[ 1.253031] _raw_spin_lock_irqsave+0x33/0x50 <4>[ 1.253034] dmar_insert_one_dev_info+0xb8/0x520 <4>[ 1.253036] set_domain_for_dev+0x66/0xf0 <4>[ 1.253039] iommu_prepare_identity_map+0x48/0x95 <4>[ 1.253042] intel_iommu_init+0xfd8/0x138d <4>[ 1.253045] pci_iommu_init+0x11/0x3a <4>[ 1.253048] do_one_initcall+0x58/0x300 <4>[ 1.253051] kernel_init_freeable+0x2c0/0x359 <4>[ 1.253054] kernel_init+0x5/0x100 <4>[ 1.253056] ret_from_fork+0x3a/0x50 <4>[ 1.253058] -> #0 (&(&iommu->lock)->rlock){+.+.}: <4>[ 1.253062] lock_acquire+0xa6/0x1c0 <4>[ 1.253064] _raw_spin_lock+0x2a/0x40 <4>[ 1.253067] domain_context_mapping_one+0xa0/0x4f0 <4>[ 1.253070] pci_for_each_dma_alias+0x2b/0x160 <4>[ 1.253072] dmar_insert_one_dev_info+0x44e/0x520 <4>[ 1.253075] set_domain_for_dev+0x66/0xf0 <4>[ 1.253077] iommu_prepare_identity_map+0x48/0x95 <4>[ 1.253080] intel_iommu_init+0xfd8/0x138d <4>[ 1.253082] pci_iommu_init+0x11/0x3a <4>[ 1.253084] do_one_initcall+0x58/0x300 <4>[ 1.253086] kernel_init_freeable+0x2c0/0x359 <4>[ 1.253089] kernel_init+0x5/0x100 <4>[ 1.253091] ret_from_fork+0x3a/0x50 <4>[ 1.253093] other info that might help us debug this: <4>[ 1.253095] Possible unsafe locking scenario: <4>[ 1.253095] CPU0 CPU1 <4>[ 1.253095] ---- ---- <4>[ 1.253095] lock(device_domain_lock); <4>[ 1.253095] lock(&(&iommu->lock)->rlock); <4>[ 1.253095] lock(device_domain_lock); <4>[ 1.253095] lock(&(&iommu->lock)->rlock); <4>[ 1.253095] *** DEADLOCK *** <4>[ 1.253095] 2 locks held by swapper/0/1: <4>[ 1.253095] #0: 0000000076465a1e (dmar_global_lock){++++}, at: intel_iommu_init+0x1d3/0x138d <4>[ 1.253095] #1: 0000000069266737 (device_domain_lock){....}, at: domain_context_mapping_one+0x88/0x4f0 <4>[ 1.253095] stack backtrace: <4>[ 1.253095] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.2.0-rc5-CI-CI_DRM_6299+ #1 <4>[ 1.253095] Hardware name: /NUC5i7RYB, BIOS RYBDWi35.86A.0362.2017.0118.0940 01/18/2017 <4>[ 1.253095] Call Trace: <4>[ 1.253095] dump_stack+0x67/0x9b <4>[ 1.253095] print_circular_bug+0x1c8/0x2b0 <4>[ 1.253095] __lock_acquire+0x1ce9/0x24c0 <4>[ 1.253095] ? lock_acquire+0xa6/0x1c0 <4>[ 1.253095] lock_acquire+0xa6/0x1c0 <4>[ 1.253095] ? domain_context_mapping_one+0xa0/0x4f0 <4>[ 1.253095] _raw_spin_lock+0x2a/0x40 <4>[ 1.253095] ? domain_context_mapping_one+0xa0/0x4f0 <4>[ 1.253095] domain_context_mapping_one+0xa0/0x4f0 <4>[ 1.253095] ? domain_context_mapping_one+0x4f0/0x4f0 <4>[ 1.253095] pci_for_each_dma_alias+0x2b/0x160 <4>[ 1.253095] dmar_insert_one_dev_info+0x44e/0x520 <4>[ 1.253095] set_domain_for_dev+0x66/0xf0 <4>[ 1.253095] iommu_prepare_identity_map+0x48/0x95 <4>[ 1.253095] intel_iommu_init+0xfd8/0x138d <4>[ 1.253095] ? set_debug_rodata+0xc/0xc <4>[ 1.253095] ? set_debug_rodata+0xc/0xc <4>[ 1.253095] ? e820__memblock_setup+0x5b/0x5b <4>[ 1.253095] ? pci_iommu_init+0x11/0x3a <4>[ 1.253095] ? set_debug_rodata+0xc/0xc <4>[ 1.253095] pci_iommu_init+0x11/0x3a <4>[ 1.253095] do_one_initcall+0x58/0x300 <4>[ 1.253095] kernel_init_freeable+0x2c0/0x359 <4>[ 1.253095] ? rest_init+0x250/0x250 <4>[ 1.253095] kernel_init+0x5/0x100 <4>[ 1.253095] ret_from_fork+0x3a/0x50