Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp14429872rwb; Mon, 28 Nov 2022 00:22:41 -0800 (PST) X-Google-Smtp-Source: AA0mqf6krqCBlyuvXdX2+hwVA2DpuJ9LaLT5LbQMsPRCyY4YkC/xyxj7a7qAhx+AI0Wo/L1FhddE X-Received: by 2002:a17:906:830d:b0:79e:5ea1:4f83 with SMTP id j13-20020a170906830d00b0079e5ea14f83mr28003544ejx.372.1669623761718; Mon, 28 Nov 2022 00:22:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669623761; cv=none; d=google.com; s=arc-20160816; b=kw7i5Piw/GZv1OZl7zpLPkKbegurrlU5G8W02PvAr2/xZuccau4LFoFE0/jY+slJgV EBguH/c4z+t+9cemJNTDrC1lmpf52vZ54/dSQD45OecjQVFIMb5LX679zybvtC6yz/1P kkpQvBSUekxkN1yh+rms6ubAmLZ2IKots54q8NxEohdiGYD2HczNG97PtWIhzPsp//9d V/Z5U+RaXOq+HUrnv4iX4s9fRuKrmqYjXT/B3U4W9MG2waCUPtmovPdFBeqZaVHyUykS JOc1B5NT4P7r90SflmIFjqisBF/7dLHcc5LWrQHn1YmumM/ZPxxjItZZHv4n5fwvWt9L usxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=fgG22hiPqRuvj8+/LAhZmld9XmKRjkIwL/c3zfOEB2k=; b=NVSm5kO02uJ7U3+SPXE8jHnDkynny8KPLPnhtA7xOa8RErZYzSsXs23k6P7VYF4UX9 sDiWcxVPEE4AvoQ4ad9D6KojHzjg7aF43iDAPmkGvV04xSwEYhCGdZ8T9DaIQ3OjyZbZ SIdGXLxAwtyohjdERdYVvSWoGxo24ZZNNvIIFmGqGLgec2xzv22Xc3dI26gzD/claBUF Ip76HPPPW67CDQW/+hzj97ep8CAT6WO5uDqDfRBmJGWF/B8nghaQzWY6BcFvjzzzZQHt DxtTql0lpKexIPEew7VQmD0SNPrAqu3HAqbn3PrMBVqDg+oVOmLyHgtCkg1BT9mSPAtp vQYw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hd19-20020a170907969300b007addff99f09si9722081ejc.1004.2022.11.28.00.22.21; Mon, 28 Nov 2022 00:22:41 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229952AbiK1H7x (ORCPT + 83 others); Mon, 28 Nov 2022 02:59:53 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55612 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229629AbiK1H7u (ORCPT ); Mon, 28 Nov 2022 02:59:50 -0500 Received: from szxga02-in.huawei.com (szxga02-in.huawei.com [45.249.212.188]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id DE012114E; Sun, 27 Nov 2022 23:59:48 -0800 (PST) Received: from dggpemm500023.china.huawei.com (unknown [172.30.72.55]) by szxga02-in.huawei.com (SkyGuard) with ESMTP id 4NLHt54sZgzRpZ6; Mon, 28 Nov 2022 15:59:09 +0800 (CST) Received: from dggpemm500006.china.huawei.com (7.185.36.236) by dggpemm500023.china.huawei.com (7.185.36.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 28 Nov 2022 15:59:46 +0800 Received: from [10.174.178.55] (10.174.178.55) by dggpemm500006.china.huawei.com (7.185.36.236) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Mon, 28 Nov 2022 15:59:46 +0800 Subject: Re: [PATCH v3] mm: Make vmalloc_dump_obj() call in clean context To: "Zhang, Qiang1" , "paulmck@kernel.org" , "akpm@linux-foundation.org" , "frederic@kernel.org" , "joel@joelfernandes.org" CC: "rcu@vger.kernel.org" , "linux-kernel@vger.kernel.org" References: <20221118003441.3980437-1-qiang1.zhang@intel.com> From: "Leizhen (ThunderTown)" Message-ID: Date: Mon, 28 Nov 2022 15:59:45 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-Originating-IP: [10.174.178.55] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpemm500006.china.huawei.com (7.185.36.236) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.5 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/11/23 7:05, Zhang, Qiang1 wrote: > > Gently ping ???? > > Thanks > Zqiang > >> Currently, the mem_dump_obj() is invoked in call_rcu(), the >> call_rcu() is maybe invoked in non-preemptive code segment, >> for object allocated from vmalloc(), the following scenarios >> may occur: >> >> CPU 0 >> tasks context >> spin_lock(&vmap_area_lock) >> Interrupt context >> call_rcu() >> mem_dump_obj >> vmalloc_dump_obj >> spin_lock(&vmap_area_lock) <--deadlock >> >> and for PREEMPT-RT kernel, the spinlock will convert to sleepable >> lock, so the vmap_area_lock spinlock not allowed to get in non-preemptive >> code segment. therefore, this commit make the vmalloc_dump_obj() call in >> a clean context. >> >> Signed-off-by: Zqiang >> --- >> v1->v2: >> add IS_ENABLED(CONFIG_PREEMPT_RT) check. >> v2->v3: >> change commit message and add some comment. >> >> mm/util.c | 4 +++- >> mm/vmalloc.c | 25 +++++++++++++++++++++++++ >> 2 files changed, 28 insertions(+), 1 deletion(-) >> >> diff --git a/mm/util.c b/mm/util.c >> index 12984e76767e..2b0222a728cc 100644 >> --- a/mm/util.c >> +++ b/mm/util.c >> @@ -1128,7 +1128,9 @@ void mem_dump_obj(void *object) >> return; >> >> if (virt_addr_valid(object)) >> - type = "non-slab/vmalloc memory"; >> + type = "non-slab memory"; >> + else if (is_vmalloc_addr(object)) >> + type = "vmalloc memory"; >> else if (object == NULL) >> type = "NULL pointer"; >> else if (object == ZERO_SIZE_PTR) >> diff --git a/mm/vmalloc.c b/mm/vmalloc.c >> index ccaa461998f3..4351eafbe7ab 100644 >> --- a/mm/vmalloc.c >> +++ b/mm/vmalloc.c >> @@ -4034,6 +4034,31 @@ bool vmalloc_dump_obj(void *object) >> struct vm_struct *vm; >> void *objp = (void *)PAGE_ALIGN((unsigned long)object); >> >> + /* for non-vmalloc addr, return directly */ >> + if (!is_vmalloc_addr(objp)) >> + return false; >> + >> + /** >> + * for non-Preempt-RT kernel, return directly. otherwise not >> + * only needs to determine whether it is in the interrupt context >> + * (in_interrupt())to avoid deadlock, but also to avoid acquire >> + * vmap_area_lock spinlock in disables interrupts or preempts >> + * critical sections, because the vmap_area_lock spinlock convert >> + * to sleepable lock >> + */ >> + if (IS_ENABLED(CONFIG_PREEMPT_RT) && !preemptible()) >> + return false; >> + >> + /** >> + * get here, for Preempt-RT kernel, it means that we are in >> + * preemptible context(preemptible() is true), it also means >> + * that the in_interrupt() will return false. >> + * for non-Preempt-RT kernel, only needs to determine whether >> + * it is in the interrupt context(in_interrupt()) to avoid deadlock >> + */ >> + if (in_interrupt()) >> + return false; We want mem_dump_obj() to work properly in the interrupt context. But with this if statement, it's impossible to work properly. Here's my test case: void *tst_p; void my_irqwork_handler(struct irq_work *work) { void *p = tst_p; printk("enter my_irqwork_handler: CPU=%d, locked=%d\n", smp_processor_id(), tst_is_locked()); mem_dump_obj(p); vfree(p); } static void test_mem_dump(void) { struct irq_work work = IRQ_WORK_INIT_HARD(my_irqwork_handler); tst_p = vmalloc(PAGE_SIZE); if (!tst_p) { printk("vmalloc failed\n"); return; } printk("enter test_mem_dump: CPU=%d\n", smp_processor_id()); //tst_lock(); irq_work_queue(&work); //tst_unlock(); printk("leave test_mem_dump: CPU=%d\n", smp_processor_id()); } Test result: [ 45.212941] enter test_mem_dump: CPU=0 [ 45.213280] enter my_irqwork_handler: CPU=0, locked=0 [ 45.213546] vmalloc memory [ 45.213996] leave test_mem_dump: CPU=0 >> + >> vm = find_vm_area(objp); >> if (!vm) >> return false; >> -- >> 2.25.1 > -- Regards, Zhen Lei