From: Andrey Ryabinin <aryabinin@virtuozzo.com>
To: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>, linux-mm@kvack.org
Cc: willy@infradead.org, hch@lst.de, jszhang@marvell.com,
joelaf@google.com, chris@chris-wilson.co.uk, joaodias@google.com,
tglx@linutronix.de, hpa@zytor.com, mingo@elte.hu
Subject: Re: [PATCH] mm: Remove pointless might_sleep() in remove_vm_area().
Date: Fri, 24 Mar 2017 18:05:45 +0300 [thread overview]
Message-ID: <fe511b26-f2e5-0a0e-09cc-303d38d2ad05@virtuozzo.com> (raw)
In-Reply-To: <201703242140.CHJ64587.LFSFQOJOOMtFHV@I-love.SAKURA.ne.jp>
On 03/24/2017 03:40 PM, Tetsuo Handa wrote:
> Andrey Ryabinin wrote:
>> On 03/24/2017 01:53 PM, Tetsuo Handa wrote:
>>> Commit 5803ed292e63a1bf ("mm: mark all calls into the vmalloc subsystem
>>> as potentially sleeping") added might_sleep() to remove_vm_area() from
>>> vfree(), and is causing
>>>
>>> [ 2.616064] BUG: sleeping function called from invalid context at mm/vmalloc.c:1480
>>> [ 2.616125] in_atomic(): 1, irqs_disabled(): 0, pid: 341, name: plymouthd
>>> [ 2.616156] 2 locks held by plymouthd/341:
>>> [ 2.616158] #0: (drm_global_mutex){+.+.+.}, at: [<ffffffffc01c274b>] drm_release+0x3b/0x3b0 [drm]
>>> [ 2.616256] #1: (&(&tfile->lock)->rlock){+.+...}, at: [<ffffffffc0173038>] ttm_object_file_release+0x28/0x90 [ttm]
>>> [ 2.616270] CPU: 2 PID: 341 Comm: plymouthd Not tainted 4.11.0-0.rc3.git0.1.kmallocwd.fc25.x86_64+debug #1
>>> [ 2.616271] Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 07/02/2015
>>> [ 2.616273] Call Trace:
>>> [ 2.616281] dump_stack+0x86/0xc3
>>> [ 2.616285] ___might_sleep+0x17d/0x250
>>> [ 2.616289] __might_sleep+0x4a/0x80
>>> [ 2.616293] remove_vm_area+0x22/0x90
>>> [ 2.616296] __vunmap+0x2e/0x110
>>> [ 2.616299] vfree+0x42/0x90
>>> [ 2.616304] kvfree+0x2c/0x40
>>> [ 2.616312] drm_ht_remove+0x1a/0x30 [drm]
>>> [ 2.616317] ttm_object_file_release+0x50/0x90 [ttm]
>>> [ 2.616324] vmw_postclose+0x47/0x60 [vmwgfx]
>>> [ 2.616331] drm_release+0x290/0x3b0 [drm]
>>> [ 2.616338] __fput+0xf8/0x210
>>> [ 2.616342] ____fput+0xe/0x10
>>> [ 2.616345] task_work_run+0x85/0xc0
>>> [ 2.616351] exit_to_usermode_loop+0xb4/0xc0
>>> [ 2.616355] do_syscall_64+0x185/0x1f0
>>> [ 2.616359] entry_SYSCALL64_slow_path+0x25/0x25
>>>
>>> warning.
>>>
>>> But commit f9e09977671b618a ("mm: turn vmap_purge_lock into a mutex") did
>>> not make vfree() potentially sleeping because try_purge_vmap_area_lazy()
>>> is still using mutex_trylock(). Thus, this is a false positive warning.
>>>
>>
>> Commit f9e09977671b618a did not made vfree() sleeping.
>> Commit 763b218ddfa "mm: add preempt points into __purge_vmap_area_lazy()"
>> did this, thus it's not a false positive.
>>
>>
>>> ___might_sleep() via cond_resched_lock() in __purge_vmap_area_lazy() from
>>> try_purge_vmap_area_lazy() from free_vmap_area_noflush() from
>>> free_unmap_vmap_area() from remove_vm_area() which might trigger same
>>> false positive warning is remaining. But so far we haven't heard about
>>> warning from that path.
>>
>> And why that would be a false positive?
>>
>
> #define cond_resched_lock(lock) ({ \
> ___might_sleep(__FILE__, __LINE__, PREEMPT_LOCK_OFFSET);\
> __cond_resched_lock(lock); \
> })
>
> cond_resched_lock() calls ___might_sleep() even when
> __cond_resched_lock() will not call preempt_schedule_common()
> because should_resched() returns false due to preemption counter
> being already elevated by holding &(&tfile->lock)->rlock spinlock.
That is true only for preemptible kernel. On non-preempt kernel should_resched()
might return true under spin_lock.
Just fix the drm code. There is zero point in releasing memory under spinlock.
> If should_resched() is known to return false, calling
> ___might_sleep() from cond_resched_lock() is a false positive.
>
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2017-03-24 15:04 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-03-24 10:53 Tetsuo Handa
2017-03-24 12:22 ` Andrey Ryabinin
2017-03-24 12:40 ` Tetsuo Handa
2017-03-24 15:05 ` Andrey Ryabinin [this message]
2017-03-24 16:17 ` Matthew Wilcox
2017-03-27 13:26 ` Andrey Ryabinin
2017-03-27 14:06 ` Matthew Wilcox
2017-03-27 14:10 ` Thomas Hellstrom
2017-03-27 14:29 ` Tetsuo Handa
2017-03-27 15:02 ` Andrey Ryabinin
2017-03-28 10:07 ` Tetsuo Handa
2017-03-24 22:47 ` Tetsuo Handa
2017-03-27 10:16 ` Tetsuo Handa
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=fe511b26-f2e5-0a0e-09cc-303d38d2ad05@virtuozzo.com \
--to=aryabinin@virtuozzo.com \
--cc=chris@chris-wilson.co.uk \
--cc=hch@lst.de \
--cc=hpa@zytor.com \
--cc=joaodias@google.com \
--cc=joelaf@google.com \
--cc=jszhang@marvell.com \
--cc=linux-mm@kvack.org \
--cc=mingo@elte.hu \
--cc=penguin-kernel@I-love.SAKURA.ne.jp \
--cc=tglx@linutronix.de \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox