Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp773158ybg; Wed, 10 Jun 2020 13:20:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxmCcgLTEnQFN0iAKCXfnmSO8Q9OY/LaSNTJkHeTttxjbiRFOmHzLHs/cRu8G4+DTK0FeSN X-Received: by 2002:a17:906:7f95:: with SMTP id f21mr4961168ejr.554.1591820449708; Wed, 10 Jun 2020 13:20:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591820449; cv=none; d=google.com; s=arc-20160816; b=CIo7boPHSa5eK3Kl2eBCKoXCP0qAIkSJ+F47ja031o2bn06MKnCjbABNxkhXQTfojs 3UhPvaUzRE3bKjnbadWHeECbssiLDxFQRhsOZRUngg7j8Ek2dLR8jzZStU8ZfuwrnIqX TSQyRBlJnH8xIj6YhB8IlYiBubBcioMrd7Cid1H/HW6QUmlQN1fpX5zCg9yp9gZjIoTY h08bTTLHZjM9k8Bi6TMBx9CI2M3Hg93buyfUT2fGIzjElSN3B/5I30bRTVdTtg+Iu3ky uU6eU8iJpLbKo5GIf68PFPOFRKdXw4CxraCT1XfCxzEJsVaOn6PNdx2lxnYBIHB0lZDu 11jA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=gxGiZ/VHfKf+6Jo1ghbbgRFFU0Zpi0zAhXpkfpvcMXw=; b=CoKL/8GJPLT+670kA9D0cEbNHU7XO3eW9uZaKkhx7Z2NdTgjDaSgQal0/4l09G6JHH XuZ/Lq6zxqXTqhmyodU466PTblOcjYuzK/st4uhmqxpmyZXBmy/aNTraRMKAEpLu2u/L hyajJI33IY9+nc6HgnxKZkv1m3JtzMM6aaw5bGS1V4nGe3HrYn3/uU7wGWRJ6SkqyV6u ar7CEQnpeJgE1mcUt8hCnUxSUm90z+Nls40B4Jx/G1BEtEE7YaKSJwdR2mW3yN59ifKa EPOBVOyD8OnjckWH7MYG1eXK/s7Iq6Z4x8cAstT9+1maXqHMFUn0ZZFRQZ7AV9lhmHXs 7GGw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=QO43K+f+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y2si389334eds.47.2020.06.10.13.20.26; Wed, 10 Jun 2020 13:20:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@ffwll.ch header.s=google header.b=QO43K+f+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730240AbgFJTlK (ORCPT + 99 others); Wed, 10 Jun 2020 15:41:10 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55426 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728122AbgFJTlJ (ORCPT ); Wed, 10 Jun 2020 15:41:09 -0400 Received: from mail-wm1-x343.google.com (mail-wm1-x343.google.com [IPv6:2a00:1450:4864:20::343]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 74F0FC03E96F for ; Wed, 10 Jun 2020 12:41:09 -0700 (PDT) Received: by mail-wm1-x343.google.com with SMTP id l17so2939117wmj.0 for ; Wed, 10 Jun 2020 12:41:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=gxGiZ/VHfKf+6Jo1ghbbgRFFU0Zpi0zAhXpkfpvcMXw=; b=QO43K+f+PF/xLiTpv5fDsVtVSydeT7uPLF+Enxz5VFclJnaOck+rXYyRTUj445JJoQ iY+mTtt4R940gyiSI9j99dCM9ig3G8TLgGy9L/b9UxDNKcMsNLWt1U1TTSV5dEL6MpeU DJtYNjXJdn5mo7Ineqcws0gBkdQPEIswb0e00= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=gxGiZ/VHfKf+6Jo1ghbbgRFFU0Zpi0zAhXpkfpvcMXw=; b=Y5TWNbs+d6BuUzi4zTwOrvEpGIFldF1SUJZD0LFIuzNyy9iThT1O5b3xPcN2evg021 ZKlud2ru/b0IJNE5v/CY9Z1tv1Ff+mLFreYPIxTpYidj+5s5tB3w3sP6P3rNywwuQkI4 v0no8tRtwm6kiHRcCLuIj63uHp05A6YWQKZ69vU5cAmDO8ZFsIDXM0b8vOAekEXJPHqF 0ZuVM5gxVrSgEFYgjtl7A+s3Od4uARWfLYdOhxv/GWehK+6I1tF5WpD+7KmW8yaQFZcr 1b+6c7+kXrohYAgJxKkZ/yzQGFrMqP24syWiLbinIKtXUzLGzEklgwyq6IIKnsvD79xv FEag== X-Gm-Message-State: AOAM530LZ7Ig1pryYyW2qgWlNgcINTIB9GI2X6UunN3Uk6Y9hfP8Q3/R LnWdTzThoYBwUCvz1AkwQUpvG5gVDyc= X-Received: by 2002:a1c:a403:: with SMTP id n3mr4536352wme.2.1591818067664; Wed, 10 Jun 2020 12:41:07 -0700 (PDT) Received: from phenom.ffwll.local ([2a02:168:57f4:0:efd0:b9e5:5ae6:c2fa]) by smtp.gmail.com with ESMTPSA id 138sm963623wma.23.2020.06.10.12.41.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 10 Jun 2020 12:41:06 -0700 (PDT) From: Daniel Vetter To: Intel Graphics Development Cc: DRI Development , LKML , amd-gfx@lists.freedesktop.org, Daniel Vetter , =?UTF-8?q?Thomas=20Hellstr=C3=B6m?= , Andrew Morton , Jason Gunthorpe , linux-mm@kvack.org, linux-rdma@vger.kernel.org, Maarten Lankhorst , =?UTF-8?q?Christian=20K=C3=B6nig?= , Daniel Vetter Subject: [PATCH] mm: Track mmu notifiers in fs_reclaim_acquire/release Date: Wed, 10 Jun 2020 21:41:01 +0200 Message-Id: <20200610194101.1668038-1-daniel.vetter@ffwll.ch> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200604081224.863494-2-daniel.vetter@ffwll.ch> References: <20200604081224.863494-2-daniel.vetter@ffwll.ch> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org fs_reclaim_acquire/release nicely catch recursion issues when allocating GFP_KERNEL memory against shrinkers (which gpu drivers tend to use to keep the excessive caches in check). For mmu notifier recursions we do have lockdep annotations since 23b68395c7c7 ("mm/mmu_notifiers: add a lockdep map for invalidate_range_start/end"). But these only fire if a path actually results in some pte invalidation - for most small allocations that's very rarely the case. The other trouble is that pte invalidation can happen any time when __GFP_RECLAIM is set. Which means only really GFP_ATOMIC is a safe choice, GFP_NOIO isn't good enough to avoid potential mmu notifier recursion. I was pondering whether we should just do the general annotation, but there's always the risk for false positives. Plus I'm assuming that the core fs and io code is a lot better reviewed and tested than random mmu notifier code in drivers. Hence why I decide to only annotate for that specific case. Furthermore even if we'd create a lockdep map for direct reclaim, we'd still need to explicit pull in the mmu notifier map - there's a lot more places that do pte invalidation than just direct reclaim, these two contexts arent the same. Note that the mmu notifiers needing their own independent lockdep map is also the reason we can't hold them from fs_reclaim_acquire to fs_reclaim_release - it would nest with the acquistion in the pte invalidation code, causing a lockdep splat. And we can't remove the annotations from pte invalidation and all the other places since they're called from many other places than page reclaim. Hence we can only do the equivalent of might_lock, but on the raw lockdep map. With this we can also remove the lockdep priming added in 66204f1d2d1b ("mm/mmu_notifiers: prime lockdep") since the new annotations are strictly more powerful. v2: Review from Thomas Hellstrom: - unbotch the fs_reclaim context check, I accidentally inverted it, but it didn't blow up because I inverted it immediately - fix compiling for !CONFIG_MMU_NOTIFIER Cc: Thomas Hellström (Intel) Cc: Andrew Morton Cc: Jason Gunthorpe Cc: linux-mm@kvack.org Cc: linux-rdma@vger.kernel.org Cc: Maarten Lankhorst Cc: Christian König Signed-off-by: Daniel Vetter --- This is part of a gpu lockdep annotation series simply because it really helps to catch issues where gpu subsystem locks and primitives can deadlock with themselves through allocations and mmu notifiers. But aside from that motivation it should be completely free-standing, and can land through -mm/-rdma/-hmm or any other tree really whenever. -Daniel --- mm/mmu_notifier.c | 7 ------- mm/page_alloc.c | 25 ++++++++++++++++--------- 2 files changed, 16 insertions(+), 16 deletions(-) diff --git a/mm/mmu_notifier.c b/mm/mmu_notifier.c index 06852b896fa6..5d578b9122f8 100644 --- a/mm/mmu_notifier.c +++ b/mm/mmu_notifier.c @@ -612,13 +612,6 @@ int __mmu_notifier_register(struct mmu_notifier *subscription, lockdep_assert_held_write(&mm->mmap_sem); BUG_ON(atomic_read(&mm->mm_users) <= 0); - if (IS_ENABLED(CONFIG_LOCKDEP)) { - fs_reclaim_acquire(GFP_KERNEL); - lock_map_acquire(&__mmu_notifier_invalidate_range_start_map); - lock_map_release(&__mmu_notifier_invalidate_range_start_map); - fs_reclaim_release(GFP_KERNEL); - } - if (!mm->notifier_subscriptions) { /* * kmalloc cannot be called under mm_take_all_locks(), but we diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 13cc653122b7..7536faaaa0fd 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -57,6 +57,7 @@ #include #include #include +#include #include #include #include @@ -4124,7 +4125,7 @@ should_compact_retry(struct alloc_context *ac, unsigned int order, int alloc_fla static struct lockdep_map __fs_reclaim_map = STATIC_LOCKDEP_MAP_INIT("fs_reclaim", &__fs_reclaim_map); -static bool __need_fs_reclaim(gfp_t gfp_mask) +static bool __need_reclaim(gfp_t gfp_mask) { gfp_mask = current_gfp_context(gfp_mask); @@ -4136,10 +4137,6 @@ static bool __need_fs_reclaim(gfp_t gfp_mask) if (current->flags & PF_MEMALLOC) return false; - /* We're only interested __GFP_FS allocations for now */ - if (!(gfp_mask & __GFP_FS)) - return false; - if (gfp_mask & __GFP_NOLOCKDEP) return false; @@ -4158,15 +4155,25 @@ void __fs_reclaim_release(void) void fs_reclaim_acquire(gfp_t gfp_mask) { - if (__need_fs_reclaim(gfp_mask)) - __fs_reclaim_acquire(); + if (__need_reclaim(gfp_mask)) { + if (gfp_mask & __GFP_FS) + __fs_reclaim_acquire(); + +#ifdef CONFIG_MMU_NOTIFIER + lock_map_acquire(&__mmu_notifier_invalidate_range_start_map); + lock_map_release(&__mmu_notifier_invalidate_range_start_map); +#endif + + } } EXPORT_SYMBOL_GPL(fs_reclaim_acquire); void fs_reclaim_release(gfp_t gfp_mask) { - if (__need_fs_reclaim(gfp_mask)) - __fs_reclaim_release(); + if (__need_reclaim(gfp_mask)) { + if (gfp_mask & __GFP_FS) + __fs_reclaim_release(); + } } EXPORT_SYMBOL_GPL(fs_reclaim_release); #endif -- 2.26.2