From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.8 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI, SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id BC385C433E0 for ; Wed, 10 Jun 2020 12:26:13 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 6A3AE206F4 for ; Wed, 10 Jun 2020 12:26:13 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=ffwll.ch header.i=@ffwll.ch header.b="Udr1IYqv" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 6A3AE206F4 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=ffwll.ch Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id DEF426B0030; Wed, 10 Jun 2020 08:26:12 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id DC5346B0031; Wed, 10 Jun 2020 08:26:12 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id CB3D46B0032; Wed, 10 Jun 2020 08:26:12 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0080.hostedemail.com [216.40.44.80]) by kanga.kvack.org (Postfix) with ESMTP id B1C3A6B0030 for ; Wed, 10 Jun 2020 08:26:12 -0400 (EDT) Received: from smtpin08.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id 734AC18030345 for ; Wed, 10 Jun 2020 12:26:12 +0000 (UTC) X-FDA: 76913224584.08.scarf67_561087e26dcb Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin08.hostedemail.com (Postfix) with ESMTP id 462641819E764 for ; Wed, 10 Jun 2020 12:26:12 +0000 (UTC) X-HE-Tag: scarf67_561087e26dcb X-Filterd-Recvd-Size: 10777 Received: from mail-oi1-f194.google.com (mail-oi1-f194.google.com [209.85.167.194]) by imf27.hostedemail.com (Postfix) with ESMTP for ; Wed, 10 Jun 2020 12:26:11 +0000 (UTC) Received: by mail-oi1-f194.google.com with SMTP id x202so1828340oix.11 for ; Wed, 10 Jun 2020 05:26:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ffwll.ch; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=yzNpoBVUIzGM0jWy4CzYzFZyv4ZMyRLgTHGzYAF0h/4=; b=Udr1IYqvi6qIHAbHY4mma1jfM4+F8fyym+UpFudEP3iOPClfc79jh7mYuxD9geSyBW wqF0X2roOIO7E1PuOFkp9HcvutoataC22Lucpcih42JnSXmiJ0UJvcRJhs8u1RxWzaGF hNLrk0c4XJr4c/c699xf6oxhxTfydvg3VIfss= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=yzNpoBVUIzGM0jWy4CzYzFZyv4ZMyRLgTHGzYAF0h/4=; b=Hi/zjQfPTO5YsfeMbrl9P4Sf4PkVYvu4nHgmMGtOMgwqQ5zBG86F+37r+dmgMk4vnH B3eU3D5WLQCAKr4PBQIDotCv0RTpcPqZ/RV/lli7Ef81XxwkUZ1G5AKHLqQ70FC7Y0zP Dta9/caspeH/YfjXQoIgeJGpEkZuX550Jikulhb+BT69AKLvsx1hluj+3yvJq2mDn08e gkJaOkoJq4WkmMSpWs2VdYg0iF0cjG+todHQhPK8taC7gMGEF2vbogbZ9OHQCxtzMGz1 RJec1vOofQTb+6vn84HTfxXxcENHSlE6eBAvE5sMcjdYIPmTz9ldY1YIX06cJzfCVAYl biWg== X-Gm-Message-State: AOAM533zttPayVOaNmfir77m034nd21hpJNKqt9RHPLO+KrDva19rPGF 82vYIPR17x/+ggoPiHvZmsOjjvU/kWSbwJ8v5Si89w== X-Google-Smtp-Source: ABdhPJy7HqpB75fD6Jg4sB9zMPwjBriAsngvkdaN1meJQNljLuj1e/WyfJpcpBT3SMXWs6iH6T+oCNJGmM4lYUXZKX4= X-Received: by 2002:aca:4b91:: with SMTP id y139mr2202871oia.128.1591791970590; Wed, 10 Jun 2020 05:26:10 -0700 (PDT) MIME-Version: 1.0 References: <20200604081224.863494-1-daniel.vetter@ffwll.ch> <20200604081224.863494-2-daniel.vetter@ffwll.ch> <15bcdddd-b560-e98b-eaec-62277b5ab4af@shipmail.org> In-Reply-To: <15bcdddd-b560-e98b-eaec-62277b5ab4af@shipmail.org> From: Daniel Vetter Date: Wed, 10 Jun 2020 14:25:59 +0200 Message-ID: Subject: Re: [Intel-gfx] [PATCH 01/18] mm: Track mmu notifiers in fs_reclaim_acquire/release To: =?UTF-8?Q?Thomas_Hellstr=C3=B6m_=28Intel=29?= Cc: DRI Development , linux-rdma , Intel Graphics Development , LKML , amd-gfx list , Linux MM , Jason Gunthorpe , Daniel Vetter , Andrew Morton , =?UTF-8?Q?Christian_K=C3=B6nig?= Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Queue-Id: 462641819E764 X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam05 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Wed, Jun 10, 2020 at 2:01 PM Thomas Hellstr=C3=B6m (Intel) wrote: > > Hi, Daniel, > > Please see below. > > On 6/4/20 10:12 AM, Daniel Vetter wrote: > > fs_reclaim_acquire/release nicely catch recursion issues when > > allocating GFP_KERNEL memory against shrinkers (which gpu drivers tend > > to use to keep the excessive caches in check). For mmu notifier > > recursions we do have lockdep annotations since 23b68395c7c7 > > ("mm/mmu_notifiers: add a lockdep map for invalidate_range_start/end"). > > > > But these only fire if a path actually results in some pte > > invalidation - for most small allocations that's very rarely the case. > > The other trouble is that pte invalidation can happen any time when > > __GFP_RECLAIM is set. Which means only really GFP_ATOMIC is a safe > > choice, GFP_NOIO isn't good enough to avoid potential mmu notifier > > recursion. > > > > I was pondering whether we should just do the general annotation, but > > there's always the risk for false positives. Plus I'm assuming that > > the core fs and io code is a lot better reviewed and tested than > > random mmu notifier code in drivers. Hence why I decide to only > > annotate for that specific case. > > > > Furthermore even if we'd create a lockdep map for direct reclaim, we'd > > still need to explicit pull in the mmu notifier map - there's a lot > > more places that do pte invalidation than just direct reclaim, these > > two contexts arent the same. > > > > Note that the mmu notifiers needing their own independent lockdep map > > is also the reason we can't hold them from fs_reclaim_acquire to > > fs_reclaim_release - it would nest with the acquistion in the pte > > invalidation code, causing a lockdep splat. And we can't remove the > > annotations from pte invalidation and all the other places since > > they're called from many other places than page reclaim. Hence we can > > only do the equivalent of might_lock, but on the raw lockdep map. > > > > With this we can also remove the lockdep priming added in 66204f1d2d1b > > ("mm/mmu_notifiers: prime lockdep") since the new annotations are > > strictly more powerful. > > > > Cc: Andrew Morton > > Cc: Jason Gunthorpe > > Cc: linux-mm@kvack.org > > Cc: linux-rdma@vger.kernel.org > > Cc: Maarten Lankhorst > > Cc: Christian K=C3=B6nig > > Signed-off-by: Daniel Vetter > > --- > > This is part of a gpu lockdep annotation series simply because it > > really helps to catch issues where gpu subsystem locks and primitives > > can deadlock with themselves through allocations and mmu notifiers. > > But aside from that motivation it should be completely free-standing, > > and can land through -mm/-rdma/-hmm or any other tree really whenever. > > -Daniel > > --- > > mm/mmu_notifier.c | 7 ------- > > mm/page_alloc.c | 23 ++++++++++++++--------- > > 2 files changed, 14 insertions(+), 16 deletions(-) > > > > diff --git a/mm/mmu_notifier.c b/mm/mmu_notifier.c > > index 06852b896fa6..5d578b9122f8 100644 > > --- a/mm/mmu_notifier.c > > +++ b/mm/mmu_notifier.c > > @@ -612,13 +612,6 @@ int __mmu_notifier_register(struct mmu_notifier *s= ubscription, > > lockdep_assert_held_write(&mm->mmap_sem); > > BUG_ON(atomic_read(&mm->mm_users) <=3D 0); > > > > - if (IS_ENABLED(CONFIG_LOCKDEP)) { > > - fs_reclaim_acquire(GFP_KERNEL); > > - lock_map_acquire(&__mmu_notifier_invalidate_range_start_m= ap); > > - lock_map_release(&__mmu_notifier_invalidate_range_start_m= ap); > > - fs_reclaim_release(GFP_KERNEL); > > - } > > - > > if (!mm->notifier_subscriptions) { > > /* > > * kmalloc cannot be called under mm_take_all_locks(), bu= t we > > diff --git a/mm/page_alloc.c b/mm/page_alloc.c > > index 13cc653122b7..f8a222db4a53 100644 > > --- a/mm/page_alloc.c > > +++ b/mm/page_alloc.c > > @@ -57,6 +57,7 @@ > > #include > > #include > > #include > > +#include > > #include > > #include > > #include > > @@ -4124,7 +4125,7 @@ should_compact_retry(struct alloc_context *ac, un= signed int order, int alloc_fla > > static struct lockdep_map __fs_reclaim_map =3D > > STATIC_LOCKDEP_MAP_INIT("fs_reclaim", &__fs_reclaim_map); > > > > -static bool __need_fs_reclaim(gfp_t gfp_mask) > > +static bool __need_reclaim(gfp_t gfp_mask) > > { > > gfp_mask =3D current_gfp_context(gfp_mask); > > > > @@ -4136,10 +4137,6 @@ static bool __need_fs_reclaim(gfp_t gfp_mask) > > if (current->flags & PF_MEMALLOC) > > return false; > > > > - /* We're only interested __GFP_FS allocations for now */ > > - if (!(gfp_mask & __GFP_FS)) > > - return false; > > - > > if (gfp_mask & __GFP_NOLOCKDEP) > > return false; > > > > @@ -4158,15 +4155,23 @@ void __fs_reclaim_release(void) > > > > void fs_reclaim_acquire(gfp_t gfp_mask) > > { > > - if (__need_fs_reclaim(gfp_mask)) > > - __fs_reclaim_acquire(); > > + if (__need_reclaim(gfp_mask)) { > > + if (!(gfp_mask & __GFP_FS)) > Hmm. Shouldn't this be "if (gfp_mask & __GFP_FS)" or am I misunderstandin= g? Uh yes :-( I guess what saved me is that I immediately went for the lockdep splat in drivers/gpu. And I guess there's not any obvious inversions for GFP_NOFS/GFP_NOIO, and since I made the mistake consintely the GFP_FS annotation was still consistent, but simply for GFP_NOFS. Oops. Will fix in the next version. > > + __fs_reclaim_acquire(); > > > #ifdef CONFIG_MMU_NOTIFIER? Hm indeed. Will fix too. Thanks for your review. > > > + > > + lock_map_acquire(&__mmu_notifier_invalidate_range_start_m= ap); > > + lock_map_release(&__mmu_notifier_invalidate_range_start_m= ap); > > + > > + } > > } > > EXPORT_SYMBOL_GPL(fs_reclaim_acquire); > > > > void fs_reclaim_release(gfp_t gfp_mask) > > { > > - if (__need_fs_reclaim(gfp_mask)) > > - __fs_reclaim_release(); > > + if (__need_reclaim(gfp_mask)) { > > + if (!(gfp_mask & __GFP_FS)) > Same here? > > + __fs_reclaim_release(); > > + } > > } > > EXPORT_SYMBOL_GPL(fs_reclaim_release); > > #endif > > One suggested test case would perhaps be to call madvise(madv_dontneed) > on a subpart of a transhuge page. That would IIRC trigger a page split > and interesting mmu notifier calls.... The neat thing about the mmu notifier lockdep key is that we take it whether there's notifiers or not - it's called outside of any of these paths. So as long as you have ever hit a hugepage split somewhen since boot, and you've hit your driver's mmu_notifier paths, lockdep will connect the dots. Explicit testcases for all combinations not needed anymore. This patch here just makes sure that the same holds for memory allocations and direct reclaim (which is a lot harder to trigger intentionally in testcases). That was at least the idea, seems to have caught a few things already. -Daniel > > Thanks, > Thomas > > > _______________________________________________ > Intel-gfx mailing list > Intel-gfx@lists.freedesktop.org > https://lists.freedesktop.org/mailman/listinfo/intel-gfx --=20 Daniel Vetter Software Engineer, Intel Corporation http://blog.ffwll.ch