All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH 1/1] drm/amdkfd: Don't take process mutex for svm ioctls
@ 2022-01-25 18:04 Philip Yang
  2022-01-25 18:40 ` Felix Kuehling
  2022-01-26  6:26 ` Chen, Guchun
  0 siblings, 2 replies; 3+ messages in thread
From: Philip Yang @ 2022-01-25 18:04 UTC (permalink / raw)
  To: amd-gfx; +Cc: Philip Yang, felix.kuehling

SVM ioctls take proper svms->lock to handle race conditions, don't need
take process mutex to serialize ioctls. This also fixes circular locking
warning:

WARNING: possible circular locking dependency detected

  Possible unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
   lock((work_completion)(&svms->deferred_list_work));
                                lock(&process->mutex);
                     lock((work_completion)(&svms->deferred_list_work));
   lock(&process->mutex);

   *** DEADLOCK ***

Signed-off-by: Philip Yang <Philip.Yang@amd.com>
---
 drivers/gpu/drm/amd/amdkfd/kfd_chardev.c | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c b/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
index 337953af7c2f..70122978bdd0 100644
--- a/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
+++ b/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
@@ -1846,13 +1846,9 @@ static int kfd_ioctl_svm(struct file *filep, struct kfd_process *p, void *data)
 	if (!args->start_addr || !args->size)
 		return -EINVAL;
 
-	mutex_lock(&p->mutex);
-
 	r = svm_ioctl(p, args->op, args->start_addr, args->size, args->nattr,
 		      args->attrs);
 
-	mutex_unlock(&p->mutex);
-
 	return r;
 }
 #else
-- 
2.17.1


^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH 1/1] drm/amdkfd: Don't take process mutex for svm ioctls
  2022-01-25 18:04 [PATCH 1/1] drm/amdkfd: Don't take process mutex for svm ioctls Philip Yang
@ 2022-01-25 18:40 ` Felix Kuehling
  2022-01-26  6:26 ` Chen, Guchun
  1 sibling, 0 replies; 3+ messages in thread
From: Felix Kuehling @ 2022-01-25 18:40 UTC (permalink / raw)
  To: Philip Yang, amd-gfx


Am 2022-01-25 um 13:04 schrieb Philip Yang:
> SVM ioctls take proper svms->lock to handle race conditions, don't need
> take process mutex to serialize ioctls. This also fixes circular locking
> warning:
>
> WARNING: possible circular locking dependency detected
>
>    Possible unsafe locking scenario:
>
>          CPU0                    CPU1
>          ----                    ----
>     lock((work_completion)(&svms->deferred_list_work));
>                                  lock(&process->mutex);
>                       lock((work_completion)(&svms->deferred_list_work));
>     lock(&process->mutex);
>
>     *** DEADLOCK ***
>
> Signed-off-by: Philip Yang <Philip.Yang@amd.com>

Reviewed-by: Felix Kuehling <Felix.Kuehling@amd.com>


> ---
>   drivers/gpu/drm/amd/amdkfd/kfd_chardev.c | 4 ----
>   1 file changed, 4 deletions(-)
>
> diff --git a/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c b/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
> index 337953af7c2f..70122978bdd0 100644
> --- a/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
> +++ b/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
> @@ -1846,13 +1846,9 @@ static int kfd_ioctl_svm(struct file *filep, struct kfd_process *p, void *data)
>   	if (!args->start_addr || !args->size)
>   		return -EINVAL;
>   
> -	mutex_lock(&p->mutex);
> -
>   	r = svm_ioctl(p, args->op, args->start_addr, args->size, args->nattr,
>   		      args->attrs);
>   
> -	mutex_unlock(&p->mutex);
> -
>   	return r;
>   }
>   #else

^ permalink raw reply	[flat|nested] 3+ messages in thread

* RE: [PATCH 1/1] drm/amdkfd: Don't take process mutex for svm ioctls
  2022-01-25 18:04 [PATCH 1/1] drm/amdkfd: Don't take process mutex for svm ioctls Philip Yang
  2022-01-25 18:40 ` Felix Kuehling
@ 2022-01-26  6:26 ` Chen, Guchun
  1 sibling, 0 replies; 3+ messages in thread
From: Chen, Guchun @ 2022-01-26  6:26 UTC (permalink / raw)
  To: Yang, Philip, amd-gfx@lists.freedesktop.org; +Cc: Yang, Philip, Kuehling, Felix

[Public]

To simply code lines, I guess we can drop variable 'r'. And use 'return svm_ioctl(p, args->op.... ' directly.

Regards,
Guchun

-----Original Message-----
From: amd-gfx <amd-gfx-bounces@lists.freedesktop.org> On Behalf Of Philip Yang
Sent: Wednesday, January 26, 2022 2:04 AM
To: amd-gfx@lists.freedesktop.org
Cc: Yang, Philip <Philip.Yang@amd.com>; Kuehling, Felix <Felix.Kuehling@amd.com>
Subject: [PATCH 1/1] drm/amdkfd: Don't take process mutex for svm ioctls

SVM ioctls take proper svms->lock to handle race conditions, don't need take process mutex to serialize ioctls. This also fixes circular locking
warning:

WARNING: possible circular locking dependency detected

  Possible unsafe locking scenario:

        CPU0                    CPU1
        ----                    ----
   lock((work_completion)(&svms->deferred_list_work));
                                lock(&process->mutex);
                     lock((work_completion)(&svms->deferred_list_work));
   lock(&process->mutex);

   *** DEADLOCK ***

Signed-off-by: Philip Yang <Philip.Yang@amd.com>
---
 drivers/gpu/drm/amd/amdkfd/kfd_chardev.c | 4 ----
 1 file changed, 4 deletions(-)

diff --git a/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c b/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
index 337953af7c2f..70122978bdd0 100644
--- a/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
+++ b/drivers/gpu/drm/amd/amdkfd/kfd_chardev.c
@@ -1846,13 +1846,9 @@ static int kfd_ioctl_svm(struct file *filep, struct kfd_process *p, void *data)
 	if (!args->start_addr || !args->size)
 		return -EINVAL;
 
-	mutex_lock(&p->mutex);
-
 	r = svm_ioctl(p, args->op, args->start_addr, args->size, args->nattr,
 		      args->attrs);
 
-	mutex_unlock(&p->mutex);
-
 	return r;
 }
 #else
--
2.17.1

^ permalink raw reply related	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2022-01-26  6:26 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-01-25 18:04 [PATCH 1/1] drm/amdkfd: Don't take process mutex for svm ioctls Philip Yang
2022-01-25 18:40 ` Felix Kuehling
2022-01-26  6:26 ` Chen, Guchun

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.