Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp4573770pxv; Tue, 6 Jul 2021 04:24:17 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyUQ5CI8i2An3dulna/SQsdxQQaeobTHTyfDgSId0HKBALkZHFrBWppwzgDyH9wRrtavB49 X-Received: by 2002:a92:2a0a:: with SMTP id r10mr14094392ile.274.1625570656995; Tue, 06 Jul 2021 04:24:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625570656; cv=none; d=google.com; s=arc-20160816; b=YTvzX/WlyxCpF8XqA1dXo6vr1mRU/6chMnulVIkjDQTKr10StpHthInqBGDUwa0QFV dILHdsoLkbb1Ezap9rBzquXi1FeUGlhh3Q4Z9BxU4mJI6PG9VyumGUFO1m4cRaU6Uqqc hG9oHyOjLVgrhv1ZmCeOW4wFf8nMBuxLYtHrhPq/hITKoVlUr2MzbHAibwuqi0/wy4e0 JpF5y/Ls7DxMH2U9wQ+ceNE1a1FNLNla2Txg+orSxzetcdbpsYg7itBaFVQXS0wqFNSa wamOQ1SMGElWVKf+QYoXWCIFZ0/nzgol5XNSLtAP7YgvN6qFBWIuA/AZb5ZUXj7/yw8p oL9w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=I88X3cFTvYQtSXpr35vCozyYt7VrdSzgSWuWlNV43Qo=; b=ZLqczmY8SWZbZapAcJ2U+XN/3AYeNpQkSeSThVx6I8HSBlagbq9v5yzxKzxELvcuL8 g3zP1gR81bBqoClgcVK6fqI2zeSZKYSTsFEU6X+eUBXsDugR2wpWvYevc3Y3uImeNjqb +muIJ8Om79pW4jml0c4jNO6qXfQ/C7hDaTjJvEDzJF8MM6ox+bJF14sIkxizOquRMj4Y RofyCiKf9SI5EZN7cM2ruaHPrn5ku9OnGET579PmLvmb46nk1x7Dq69FV9rtzFU8no2h +LyI3IUj+3eJbjl16e3C1yOSQNWUhXVjesAQc3CEI0T94NM/09PT7TO1jTyLwQr87lTQ Ci9A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="TrMS/g4P"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w17si15498196ilj.116.2021.07.06.04.24.05; Tue, 06 Jul 2021 04:24:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="TrMS/g4P"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233641AbhGFL0N (ORCPT + 99 others); Tue, 6 Jul 2021 07:26:13 -0400 Received: from mail.kernel.org ([198.145.29.99]:55612 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232660AbhGFLTV (ORCPT ); Tue, 6 Jul 2021 07:19:21 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id B530C61C22; Tue, 6 Jul 2021 11:16:41 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1625570202; bh=5hdQiQgIGl2h1rfs7pC2I3xAN88flXZ49BtiQOTcssA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=TrMS/g4PJHlyCaCEwOfcZCbXo++qIbj9/BaJjeeOgXmKW1UDxC2LNWfn81Y7XpZSU rqwZ+AvNRFy/A6keUknl9yhZvHZrWzXISjdLYBdZq99h+Ihp59Kc+vsPwmKaF90Tzs 0GHJP3Agvvhwd2JYIJF426uprXTGx2ItT3WjWpz/wSRku6KP/nnZ0uBkw6Zbj8WphS 1Dxv2MQ9WxSSrgN3A0nJTqQ3ZQdMBu0NDxGkPV40Z41SOrxqeLtcKzFjOdfRCt1J12 iAMwr9lGg1d9EvdsHry/SSG8+TsJlSVHGPqgKK7QcFzZESe7waKmrLtsR9zD/lYyDV H5PwiEKCG0Jng== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Amber Lin , Felix Kuehling , Alex Deucher , Sasha Levin , amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org Subject: [PATCH AUTOSEL 5.13 114/189] drm/amdkfd: Fix circular lock in nocpsch path Date: Tue, 6 Jul 2021 07:12:54 -0400 Message-Id: <20210706111409.2058071-114-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210706111409.2058071-1-sashal@kernel.org> References: <20210706111409.2058071-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Amber Lin [ Upstream commit a7b2451d31cfa2e8aeccf3b35612ce33f02371fc ] Calling free_mqd inside of destroy_queue_nocpsch_locked can cause a circular lock. destroy_queue_nocpsch_locked is called under a DQM lock, which is taken in MMU notifiers, potentially in FS reclaim context. Taking another lock, which is BO reservation lock from free_mqd, while causing an FS reclaim inside the DQM lock creates a problematic circular lock dependency. Therefore move free_mqd out of destroy_queue_nocpsch_locked and call it after unlocking DQM. Signed-off-by: Amber Lin Reviewed-by: Felix Kuehling Signed-off-by: Alex Deucher Signed-off-by: Sasha Levin --- .../drm/amd/amdkfd/kfd_device_queue_manager.c | 18 +++++++++++++----- 1 file changed, 13 insertions(+), 5 deletions(-) diff --git a/drivers/gpu/drm/amd/amdkfd/kfd_device_queue_manager.c b/drivers/gpu/drm/amd/amdkfd/kfd_device_queue_manager.c index ccc9d108caff..e9b3e2e32bf8 100644 --- a/drivers/gpu/drm/amd/amdkfd/kfd_device_queue_manager.c +++ b/drivers/gpu/drm/amd/amdkfd/kfd_device_queue_manager.c @@ -486,9 +486,6 @@ static int destroy_queue_nocpsch_locked(struct device_queue_manager *dqm, if (retval == -ETIME) qpd->reset_wavefronts = true; - - mqd_mgr->free_mqd(mqd_mgr, q->mqd, q->mqd_mem_obj); - list_del(&q->list); if (list_empty(&qpd->queues_list)) { if (qpd->reset_wavefronts) { @@ -523,6 +520,8 @@ static int destroy_queue_nocpsch(struct device_queue_manager *dqm, int retval; uint64_t sdma_val = 0; struct kfd_process_device *pdd = qpd_to_pdd(qpd); + struct mqd_manager *mqd_mgr = + dqm->mqd_mgrs[get_mqd_type_from_queue_type(q->properties.type)]; /* Get the SDMA queue stats */ if ((q->properties.type == KFD_QUEUE_TYPE_SDMA) || @@ -540,6 +539,8 @@ static int destroy_queue_nocpsch(struct device_queue_manager *dqm, pdd->sdma_past_activity_counter += sdma_val; dqm_unlock(dqm); + mqd_mgr->free_mqd(mqd_mgr, q->mqd, q->mqd_mem_obj); + return retval; } @@ -1629,7 +1630,7 @@ static bool set_cache_memory_policy(struct device_queue_manager *dqm, static int process_termination_nocpsch(struct device_queue_manager *dqm, struct qcm_process_device *qpd) { - struct queue *q, *next; + struct queue *q; struct device_process_node *cur, *next_dpn; int retval = 0; bool found = false; @@ -1637,12 +1638,19 @@ static int process_termination_nocpsch(struct device_queue_manager *dqm, dqm_lock(dqm); /* Clear all user mode queues */ - list_for_each_entry_safe(q, next, &qpd->queues_list, list) { + while (!list_empty(&qpd->queues_list)) { + struct mqd_manager *mqd_mgr; int ret; + q = list_first_entry(&qpd->queues_list, struct queue, list); + mqd_mgr = dqm->mqd_mgrs[get_mqd_type_from_queue_type( + q->properties.type)]; ret = destroy_queue_nocpsch_locked(dqm, qpd, q); if (ret) retval = ret; + dqm_unlock(dqm); + mqd_mgr->free_mqd(mqd_mgr, q->mqd, q->mqd_mem_obj); + dqm_lock(dqm); } /* Unregister process */ -- 2.30.2