Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp1480288pxb; Wed, 2 Feb 2022 06:02:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJy6AJsi9h9hHNzAnbU2RmTUSgeHSnvAKz0fhoZt10bJbE4ytRp99nwYay6PaslOSOaLEREA X-Received: by 2002:a63:d952:: with SMTP id e18mr9026592pgj.290.1643810554080; Wed, 02 Feb 2022 06:02:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643810554; cv=none; d=google.com; s=arc-20160816; b=hFfAsDXJPiy7Fp+2tbQ9eDB0of55Z5k6Fa3KsyMPVZOxnVyCH8LghRL0wr64Wv2Nk9 vdLNVjXBt1dAVRi9oCgf088TtihbsVYVOf8zEE90YieCN7ryQJkBEL/sho4pkzcFYHMP h3g4PKtrEUKC6K+q0pf5Jp0UgknZmC6BhL3nFl3sQEnCPtlDPKTBz8868jLTIpt37WCq TqYoHqPplil0u2lXwXjK4H0EAw2dvG79E1cxAd+nYRE0kkzD1xqGyKHuc19YlU7nzsV9 lhLI8v6QRz3HMK2954J7uq835xEvkBtjqYac5oPE/mdJAuzpI3aiyfkIA1MrUs8fa6/u UAkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=EuDNjPJawgy9D+r4jnnOrp6Ldz6J1fdOgUQgLaNhBWY=; b=CC2jlarObYHSoFhPGFlpO4OkcUaRbNyeaXmXp07dLYTmw21Z8XuiExWH1JOtnqjtvA ankkdliD3dGmnlDas8FDVwIGnQ+wnja1fvb0/WsnRAcUkuEHr36rf6ah7Dqkzx1YGW/2 u3Wi4hS59Wg7gav23QtLtejfZGfM4BMZWJT6tL2mojvE7rzl7VSvt5xpBHsL7Z+QEOWA 5kdaLJZhUxVjdz6PYa83uQHHyc4U5bQxLwrch1l/gMSZYAFY+dl6OFfoJY1oW/eZnfGw lwm44R1C8p8JZ7wamqvJrP3JZC1bTy3U6abW9Vl3vy04/ou/8kV962VMOfme+SdEczO4 1NMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=jRvFkIVH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c8si22481447pgq.661.2022.02.02.06.02.21; Wed, 02 Feb 2022 06:02:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=jRvFkIVH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242985AbiBAXtj (ORCPT + 99 others); Tue, 1 Feb 2022 18:49:39 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42254 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230300AbiBAXti (ORCPT ); Tue, 1 Feb 2022 18:49:38 -0500 Received: from mail-lf1-x135.google.com (mail-lf1-x135.google.com [IPv6:2a00:1450:4864:20::135]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5B555C06173B for ; Tue, 1 Feb 2022 15:49:38 -0800 (PST) Received: by mail-lf1-x135.google.com with SMTP id k13so4827854lfg.9 for ; Tue, 01 Feb 2022 15:49:38 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=EuDNjPJawgy9D+r4jnnOrp6Ldz6J1fdOgUQgLaNhBWY=; b=jRvFkIVHvY2LFgD7nF7fURn/TddgGOCPcQeLKp7Zysw9Cui01wUuN1lgu3KnFNhs3D TzPFm4kKsf9oXuHh6ItE3znYAqw4MFB0622YgZmhR8pJl1BUjWz/RBjXmLIVaIahfeQP qbPgo6TPj3a6tQLVVHsdWcSLz/k6sILtUi1mdgK+89RURf9kwA+14PsZSSQK2Pyw7LrH d+ZOLio1k89+tlN3oGOtwA9xxPLsGGGt9LwxyaeDcCEfW5YA0LIVStdtsxYVlvoO2GBP L+WH6JFAJDOiv310Dm2+zkiBbgO+rozy8tZaB3JQa3BXG63VmvtMHm6F6AovBUXbkFI2 3JRg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=EuDNjPJawgy9D+r4jnnOrp6Ldz6J1fdOgUQgLaNhBWY=; b=FCjhwkdYWL2sxLbTu7SmcPSfRMGUVF7bY9LKrx59bHR6cSqtAfMQO9AXG9YfgqbXhS kGk4EhP+Ktfq7NNYCXr3CJnELIEqtZBjjxhdqFFIjKhmmgDE4HZqF5E3VLRzzsl73yAz S1p3Afzw+m3UD3MZ/hPrmNrTpHe3gqNjeEHddOaB87vDFCynyVqWTTSbOzJHA/vMg2jd Ue6igRBdwVuS1NtJAlLpJFFfJZz+jd1Rjur6uVXvKiLKE7DER1cN1lRF1S2ywh9O/u7n lxklvwWr28NE3TOnFW1ZlMRsQDWbOg7gAg7xQQiMPV9VJBW+yiNZPIhgtltUOqJjzaG9 7/iQ== X-Gm-Message-State: AOAM531Sa6ml7eXF+zWbYXVot8KwyzjCs9VbBlZHhWYAYGrmHGxNQrml m7RdNuCGUhUOUAY74/FfROCRWGB3Xt2b58N3zsXcOg== X-Received: by 2002:a05:6512:33ce:: with SMTP id d14mr21772638lfg.264.1643759376434; Tue, 01 Feb 2022 15:49:36 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Shakeel Butt Date: Tue, 1 Feb 2022 15:49:24 -0800 Message-ID: Subject: Re: [PATCH RESEND] mm: memcg: synchronize objcg lists with a dedicated spinlock To: Roman Gushchin Cc: Andrew Morton , Linux MM , LKML , Alexander Egorenkov , Waiman Long , Tejun Heo , Johannes Weiner , Jeremy Linton , Cgroups Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Feb 1, 2022 at 2:33 PM Roman Gushchin wrote: > > Alexander reported a circular lock dependency revealed by the mmap1 > ltp test: > LOCKDEP_CIRCULAR (suite: ltp, case: mtest06 (mmap1)) > WARNING: possible circular locking dependency detected > 5.17.0-20220113.rc0.git0.f2211f194038.300.fc35.s390x+debug #1 Not tainted > ------------------------------------------------------ > mmap1/202299 is trying to acquire lock: > 00000001892c0188 (css_set_lock){..-.}-{2:2}, at: obj_cgroup_release+0x4a/0xe0 > but task is already holding lock: > 00000000ca3b3818 (&sighand->siglock){-.-.}-{2:2}, at: force_sig_info_to_task+0x38/0x180 > which lock already depends on the new lock. > the existing dependency chain (in reverse order) is: > -> #1 (&sighand->siglock){-.-.}-{2:2}: > __lock_acquire+0x604/0xbd8 > lock_acquire.part.0+0xe2/0x238 > lock_acquire+0xb0/0x200 > _raw_spin_lock_irqsave+0x6a/0xd8 > __lock_task_sighand+0x90/0x190 > cgroup_freeze_task+0x2e/0x90 > cgroup_migrate_execute+0x11c/0x608 > cgroup_update_dfl_csses+0x246/0x270 > cgroup_subtree_control_write+0x238/0x518 > kernfs_fop_write_iter+0x13e/0x1e0 > new_sync_write+0x100/0x190 > vfs_write+0x22c/0x2d8 > ksys_write+0x6c/0xf8 > __do_syscall+0x1da/0x208 > system_call+0x82/0xb0 > -> #0 (css_set_lock){..-.}-{2:2}: > check_prev_add+0xe0/0xed8 > validate_chain+0x736/0xb20 > __lock_acquire+0x604/0xbd8 > lock_acquire.part.0+0xe2/0x238 > lock_acquire+0xb0/0x200 > _raw_spin_lock_irqsave+0x6a/0xd8 > obj_cgroup_release+0x4a/0xe0 > percpu_ref_put_many.constprop.0+0x150/0x168 > drain_obj_stock+0x94/0xe8 > refill_obj_stock+0x94/0x278 > obj_cgroup_charge+0x164/0x1d8 > kmem_cache_alloc+0xac/0x528 > __sigqueue_alloc+0x150/0x308 > __send_signal+0x260/0x550 > send_signal+0x7e/0x348 > force_sig_info_to_task+0x104/0x180 > force_sig_fault+0x48/0x58 > __do_pgm_check+0x120/0x1f0 > pgm_check_handler+0x11e/0x180 > other info that might help us debug this: > Possible unsafe locking scenario: > CPU0 CPU1 > ---- ---- > lock(&sighand->siglock); > lock(css_set_lock); > lock(&sighand->siglock); > lock(css_set_lock); > *** DEADLOCK *** > 2 locks held by mmap1/202299: > #0: 00000000ca3b3818 (&sighand->siglock){-.-.}-{2:2}, at: force_sig_info_to_task+0x38/0x180 > #1: 00000001892ad560 (rcu_read_lock){....}-{1:2}, at: percpu_ref_put_many.constprop.0+0x0/0x168 > stack backtrace: > CPU: 15 PID: 202299 Comm: mmap1 Not tainted 5.17.0-20220113.rc0.git0.f2211f194038.300.fc35.s390x+debug #1 > Hardware name: IBM 3906 M04 704 (LPAR) > Call Trace: > [<00000001888aacfe>] dump_stack_lvl+0x76/0x98 > [<0000000187c6d7be>] check_noncircular+0x136/0x158 > [<0000000187c6e888>] check_prev_add+0xe0/0xed8 > [<0000000187c6fdb6>] validate_chain+0x736/0xb20 > [<0000000187c71e54>] __lock_acquire+0x604/0xbd8 > [<0000000187c7301a>] lock_acquire.part.0+0xe2/0x238 > [<0000000187c73220>] lock_acquire+0xb0/0x200 > [<00000001888bf9aa>] _raw_spin_lock_irqsave+0x6a/0xd8 > [<0000000187ef6862>] obj_cgroup_release+0x4a/0xe0 > [<0000000187ef6498>] percpu_ref_put_many.constprop.0+0x150/0x168 > [<0000000187ef9674>] drain_obj_stock+0x94/0xe8 > [<0000000187efa464>] refill_obj_stock+0x94/0x278 > [<0000000187eff55c>] obj_cgroup_charge+0x164/0x1d8 > [<0000000187ed8aa4>] kmem_cache_alloc+0xac/0x528 > [<0000000187bf2eb8>] __sigqueue_alloc+0x150/0x308 > [<0000000187bf4210>] __send_signal+0x260/0x550 > [<0000000187bf5f06>] send_signal+0x7e/0x348 > [<0000000187bf7274>] force_sig_info_to_task+0x104/0x180 > [<0000000187bf7758>] force_sig_fault+0x48/0x58 > [<00000001888ae160>] __do_pgm_check+0x120/0x1f0 > [<00000001888c0cde>] pgm_check_handler+0x11e/0x180 > INFO: lockdep is turned off. > > In this example a slab allocation from __send_signal() caused a > refilling and draining of a percpu objcg stock, resulted in a > releasing of another non-related objcg. Objcg release path requires > taking the css_set_lock, which is used to synchronize objcg lists. > > This can create a circular dependency with the sighandler lock, > which is taken with the locked css_set_lock by the freezer code > (to freeze a task). > > In general it seems that using css_set_lock to synchronize objcg lists > makes any slab allocations and deallocation with the locked > css_set_lock and any intervened locks risky. > > To fix the problem and make the code more robust let's stop using > css_set_lock to synchronize objcg lists and use a new dedicated > spinlock instead. > > Fixes: bf4f059954dc ("mm: memcg/slab: obj_cgroup API") > Signed-off-by: Roman Gushchin > Reported-by: Alexander Egorenkov > Tested-by: Alexander Egorenkov > Reviewed-by: Waiman Long > Cc: Tejun Heo > Cc: Johannes Weiner > Cc: Shakeel Butt > Cc: Jeremy Linton > Cc: cgroups@vger.kernel.org Reviewed-by: Shakeel Butt