Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp118527ybi; Tue, 18 Jun 2019 18:47:05 -0700 (PDT) X-Google-Smtp-Source: APXvYqzTlPH2uUpmAZmqgxSxeBlFFbVxZHhBGwv/WIOUMLwyB5pGRepzLHEzRxlswN5wzPj2XxPP X-Received: by 2002:a17:902:a411:: with SMTP id p17mr57909747plq.104.1560908825634; Tue, 18 Jun 2019 18:47:05 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560908825; cv=none; d=google.com; s=arc-20160816; b=Gom0GnQ1g3cY6Kyem5zRgp64YN8hryLHIhpLnNjtsHggCtSbJyRlM9EgGCxw/nBqTd jd/K2uVOgbhpFpx+kLrW80dA8gowy7k/BPHMBYtGm/aSYjJXGajIIBqE46+LbQJE5NDg MYnoPpLn0toczEqlk/JK/i9wXARSP1Sou+nOs/glt+GwW5mghvx8s+u96jkCH5hnM+W2 SA+gqREW7/w9suuSK/x+9u6269lCCO4FSRlZEQB4JsnMaEf/RLYn/p13Vacpg+IMi/Hz pOrkaRzQOFdEcD9QUaqbP/HZjGa7iQyg/2yBJ8aips5wqV9ci9cvmJL06OxLgPbumSlZ xEOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:cc; bh=BrHiUY7K/QTYz5PDZSN49AQOjZ2dAgtC57Bb24p7hjE=; b=z2R54RFfkR5mDkHlIwOfQqFsrhLhaf5L8Hq+SFlKMlZMDow4utSQGQzMEL/g/FqM5L ta2VvGGwdEjmsLlKyWtTDTOUXO7o7CKLHe+nhAG6Qd+KB20c9mQCHfJTRS05Qls+vWqk 3pg2uWVTlsRzG3k7lYdAMufHbtp6YREo0IDZq+TWe8cn+nKHuya5mHhJ3ZuU4oUYJOxn RItpqYAWPYZU8KcM23LUDgrFvwESLTSIEd9zkhK/Bd3Egxj49r3Qg/N87h3qqbFH1hTb Wtc6ujH23KklbYHEiG1xnEyLy3AcUPIS7nWHvK0xESeGR1ZiDtlb6TJpfHgqm6Twe9Gq 6PIg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x123si15096822pfx.157.2019.06.18.18.46.50; Tue, 18 Jun 2019 18:47:05 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729554AbfFSBqk (ORCPT + 99 others); Tue, 18 Jun 2019 21:46:40 -0400 Received: from mga02.intel.com ([134.134.136.20]:10318 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726037AbfFSBqj (ORCPT ); Tue, 18 Jun 2019 21:46:39 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Jun 2019 18:46:39 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.63,391,1557212400"; d="scan'208";a="311211594" Received: from allen-box.sh.intel.com (HELO [10.239.159.136]) ([10.239.159.136]) by orsmga004.jf.intel.com with ESMTP; 18 Jun 2019 18:46:37 -0700 Cc: baolu.lu@linux.intel.com, ashok.raj@intel.com, jacob.jun.pan@linux.intel.com, Kevin Tian , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Dave Jiang Subject: Re: [PATCH 1/2] iommu/vt-d: Fix lock inversion between iommu->lock and device_domain_lock To: Chris Wilson , dwmw2@infradead.org, joro@8bytes.org References: <20190521073016.27525-1-baolu.lu@linux.intel.com> <156089173816.31375.3686352361646791464@skylake-alporthouse-com> From: Lu Baolu Message-ID: Date: Wed, 19 Jun 2019 09:39:20 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: <156089173816.31375.3686352361646791464@skylake-alporthouse-com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Chris, On 6/19/19 5:02 AM, Chris Wilson wrote: > Quoting Lu Baolu (2019-05-21 08:30:15) >> From: Dave Jiang >> >> Lockdep debug reported lock inversion related with the iommu code >> caused by dmar_insert_one_dev_info() grabbing the iommu->lock and >> the device_domain_lock out of order versus the code path in >> iommu_flush_dev_iotlb(). Expanding the scope of the iommu->lock and >> reversing the order of lock acquisition fixes the issue. > > Which of course violates the property that device_domain_lock is the > outer lock... Agreed. I also realized that this might be an incorrect fix. I am looking into it and will submit a new fix later. Best regards, Lu Baolu > > <4>[ 1.252997] ====================================================== > <4>[ 1.252999] WARNING: possible circular locking dependency detected > <4>[ 1.253002] 5.2.0-rc5-CI-CI_DRM_6299+ #1 Not tainted > <4>[ 1.253004] ------------------------------------------------------ > <4>[ 1.253006] swapper/0/1 is trying to acquire lock: > <4>[ 1.253009] 0000000091462475 (&(&iommu->lock)->rlock){+.+.}, at: domain_context_mapping_one+0xa0/0x4f0 > <4>[ 1.253015] > but task is already holding lock: > <4>[ 1.253017] 0000000069266737 (device_domain_lock){....}, at: domain_context_mapping_one+0x88/0x4f0 > <4>[ 1.253021] > which lock already depends on the new lock. > > <4>[ 1.253024] > the existing dependency chain (in reverse order) is: > <4>[ 1.253027] > -> #1 (device_domain_lock){....}: > <4>[ 1.253031] _raw_spin_lock_irqsave+0x33/0x50 > <4>[ 1.253034] dmar_insert_one_dev_info+0xb8/0x520 > <4>[ 1.253036] set_domain_for_dev+0x66/0xf0 > <4>[ 1.253039] iommu_prepare_identity_map+0x48/0x95 > <4>[ 1.253042] intel_iommu_init+0xfd8/0x138d > <4>[ 1.253045] pci_iommu_init+0x11/0x3a > <4>[ 1.253048] do_one_initcall+0x58/0x300 > <4>[ 1.253051] kernel_init_freeable+0x2c0/0x359 > <4>[ 1.253054] kernel_init+0x5/0x100 > <4>[ 1.253056] ret_from_fork+0x3a/0x50 > <4>[ 1.253058] > -> #0 (&(&iommu->lock)->rlock){+.+.}: > <4>[ 1.253062] lock_acquire+0xa6/0x1c0 > <4>[ 1.253064] _raw_spin_lock+0x2a/0x40 > <4>[ 1.253067] domain_context_mapping_one+0xa0/0x4f0 > <4>[ 1.253070] pci_for_each_dma_alias+0x2b/0x160 > <4>[ 1.253072] dmar_insert_one_dev_info+0x44e/0x520 > <4>[ 1.253075] set_domain_for_dev+0x66/0xf0 > <4>[ 1.253077] iommu_prepare_identity_map+0x48/0x95 > <4>[ 1.253080] intel_iommu_init+0xfd8/0x138d > <4>[ 1.253082] pci_iommu_init+0x11/0x3a > <4>[ 1.253084] do_one_initcall+0x58/0x300 > <4>[ 1.253086] kernel_init_freeable+0x2c0/0x359 > <4>[ 1.253089] kernel_init+0x5/0x100 > <4>[ 1.253091] ret_from_fork+0x3a/0x50 > <4>[ 1.253093] > other info that might help us debug this: > > <4>[ 1.253095] Possible unsafe locking scenario: > > <4>[ 1.253095] CPU0 CPU1 > <4>[ 1.253095] ---- ---- > <4>[ 1.253095] lock(device_domain_lock); > <4>[ 1.253095] lock(&(&iommu->lock)->rlock); > <4>[ 1.253095] lock(device_domain_lock); > <4>[ 1.253095] lock(&(&iommu->lock)->rlock); > <4>[ 1.253095] > *** DEADLOCK *** > > <4>[ 1.253095] 2 locks held by swapper/0/1: > <4>[ 1.253095] #0: 0000000076465a1e (dmar_global_lock){++++}, at: intel_iommu_init+0x1d3/0x138d > <4>[ 1.253095] #1: 0000000069266737 (device_domain_lock){....}, at: domain_context_mapping_one+0x88/0x4f0 > <4>[ 1.253095] > stack backtrace: > <4>[ 1.253095] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.2.0-rc5-CI-CI_DRM_6299+ #1 > <4>[ 1.253095] Hardware name: /NUC5i7RYB, BIOS RYBDWi35.86A.0362.2017.0118.0940 01/18/2017 > <4>[ 1.253095] Call Trace: > <4>[ 1.253095] dump_stack+0x67/0x9b > <4>[ 1.253095] print_circular_bug+0x1c8/0x2b0 > <4>[ 1.253095] __lock_acquire+0x1ce9/0x24c0 > <4>[ 1.253095] ? lock_acquire+0xa6/0x1c0 > <4>[ 1.253095] lock_acquire+0xa6/0x1c0 > <4>[ 1.253095] ? domain_context_mapping_one+0xa0/0x4f0 > <4>[ 1.253095] _raw_spin_lock+0x2a/0x40 > <4>[ 1.253095] ? domain_context_mapping_one+0xa0/0x4f0 > <4>[ 1.253095] domain_context_mapping_one+0xa0/0x4f0 > <4>[ 1.253095] ? domain_context_mapping_one+0x4f0/0x4f0 > <4>[ 1.253095] pci_for_each_dma_alias+0x2b/0x160 > <4>[ 1.253095] dmar_insert_one_dev_info+0x44e/0x520 > <4>[ 1.253095] set_domain_for_dev+0x66/0xf0 > <4>[ 1.253095] iommu_prepare_identity_map+0x48/0x95 > <4>[ 1.253095] intel_iommu_init+0xfd8/0x138d > <4>[ 1.253095] ? set_debug_rodata+0xc/0xc > <4>[ 1.253095] ? set_debug_rodata+0xc/0xc > <4>[ 1.253095] ? e820__memblock_setup+0x5b/0x5b > <4>[ 1.253095] ? pci_iommu_init+0x11/0x3a > <4>[ 1.253095] ? set_debug_rodata+0xc/0xc > <4>[ 1.253095] pci_iommu_init+0x11/0x3a > <4>[ 1.253095] do_one_initcall+0x58/0x300 > <4>[ 1.253095] kernel_init_freeable+0x2c0/0x359 > <4>[ 1.253095] ? rest_init+0x250/0x250 > <4>[ 1.253095] kernel_init+0x5/0x100 > <4>[ 1.253095] ret_from_fork+0x3a/0x50 >