From: Aaron Lu <aaron.lu@linux.alibaba.com>
To: Andrey Ryabinin <aryabinin@virtuozzo.com>
Cc: Andrew Morton <akpm@linux-foundation.org>,
Tetsuo Handa <penguin-kernel@i-love.sakura.ne.jp>,
Yang Shi <shy828301@gmail.com>,
Jiufei Xue <jiufei.xue@linux.alibaba.com>,
Linux MM <linux-mm@kvack.org>,
joseph.qi@linux.alibaba.com,
Linus Torvalds <torvalds@linux-foundation.org>
Subject: Re: [PATCH] mm: fix sleeping function warning in alloc_swap_info
Date: Thu, 7 Mar 2019 23:24:47 +0800 [thread overview]
Message-ID: <20190307152446.GA37687@h07e11201.sqa.eu95> (raw)
In-Reply-To: <647c164c-6726-13d8-bffc-be366fba0004@virtuozzo.com>
On Thu, Mar 07, 2019 at 05:47:13PM +0300, Andrey Ryabinin wrote:
>
>
> On 3/7/19 5:43 PM, Aaron Lu wrote:
> > On Tue, Jan 29, 2019 at 05:01:50PM -0800, Andrew Morton wrote:
> >> On Wed, 30 Jan 2019 09:42:06 +0900 Tetsuo Handa <penguin-kernel@i-love.sakura.ne.jp> wrote:
> >>
> >>>>>
> >>>>> If we want to allow vfree() to sleep, at least we need to test with
> >>>>> kvmalloc() == vmalloc() (i.e. force kvmalloc()/kvfree() users to use
> >>>>> vmalloc()/vfree() path). For now, reverting the
> >>>>> "Context: Either preemptible task context or not-NMI interrupt." change
> >>>>> will be needed for stable kernels.
> >>>>
> >>>> So, the comment for vfree "May sleep if called *not* from interrupt
> >>>> context." is wrong?
> >>>
> >>> Commit bf22e37a641327e3 ("mm: add vfree_atomic()") says
> >>>
> >>> We are going to use sleeping lock for freeing vmap. However some
> >>> vfree() users want to free memory from atomic (but not from interrupt)
> >>> context. For this we add vfree_atomic() - deferred variation of vfree()
> >>> which can be used in any atomic context (except NMIs).
> >>>
> >>> and commit 52414d3302577bb6 ("kvfree(): fix misleading comment") made
> >>>
> >>> - * Context: Any context except NMI.
> >>> + * Context: Either preemptible task context or not-NMI interrupt.
> >>>
> >>> change. But I think that we converted kmalloc() to kvmalloc() without checking
> >>> context of kvfree() callers. Therefore, I think that kvfree() needs to use
> >>> vfree_atomic() rather than just saying "vfree() might sleep if called not in
> >>> interrupt context."...
> >>
> >> Whereabouts in the vfree() path can the kernel sleep?
> >
> > (Sorry for the late reply.)
> >
> > Adding Andrey Ryabinin, author of commit 52414d3302577bb6
> > ("kvfree(): fix misleading comment"), maybe Andrey remembers
> > where vfree() can sleep.
> >
> > In the meantime, does "cond_resched_lock(&vmap_area_lock);" in
> > __purge_vmap_area_lazy() count as a sleep point?
>
> Yes, this is the place (the only one) where vfree() can sleep.
OK, thanks for the quick confirm.
So what about this: use __vfree_deferred() when:
- in_interrupt(), because we can't use mutex_trylock() as pointed out
by Tetsuo;
- in_atomic(), because cond_resched_lock();
- irqs_disabled(), as smp_call_function_many() will deadlock.
An untested diff to show the idea(not sure if warn is needed):
diff --git a/mm/vmalloc.c b/mm/vmalloc.c
index e86ba6e74b50..28d200f054b0 100644
--- a/mm/vmalloc.c
+++ b/mm/vmalloc.c
@@ -1578,7 +1578,7 @@ void vfree_atomic(const void *addr)
static void __vfree(const void *addr)
{
- if (unlikely(in_interrupt()))
+ if (unlikely(in_interrupt() || in_atomic() || irqs_disabled()))
__vfree_deferred(addr);
else
__vunmap(addr, 1);
@@ -1606,8 +1606,6 @@ void vfree(const void *addr)
kmemleak_free(addr);
- might_sleep_if(!in_interrupt());
-
if (!addr)
return;
next prev parent reply other threads:[~2019-03-07 15:24 UTC|newest]
Thread overview: 21+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-01-29 7:21 [PATCH] mm: fix sleeping function warning in alloc_swap_info Jiufei Xue
2019-01-29 8:53 ` Aaron Lu
2019-01-29 10:43 ` Joseph Qi
2019-01-29 11:19 ` Aaron Lu
2019-01-29 11:43 ` Tetsuo Handa
2019-01-29 19:13 ` Andrew Morton
2019-01-29 21:12 ` Tetsuo Handa
2019-01-29 21:51 ` Yang Shi
2019-01-30 0:42 ` Tetsuo Handa
2019-01-30 1:01 ` Andrew Morton
2019-01-30 1:11 ` Linus Torvalds
2019-01-30 1:23 ` Linus Torvalds
2019-01-30 2:54 ` Tetsuo Handa
2019-01-30 17:18 ` Linus Torvalds
2019-01-30 22:13 ` Andrew Morton
2019-03-07 14:43 ` Aaron Lu
2019-03-07 14:47 ` Andrey Ryabinin
2019-03-07 15:24 ` Aaron Lu [this message]
2019-03-07 16:33 ` Andrey Ryabinin
2019-03-08 2:41 ` Aaron Lu
2019-03-11 1:43 ` Jiufei Xue
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190307152446.GA37687@h07e11201.sqa.eu95 \
--to=aaron.lu@linux.alibaba.com \
--cc=akpm@linux-foundation.org \
--cc=aryabinin@virtuozzo.com \
--cc=jiufei.xue@linux.alibaba.com \
--cc=joseph.qi@linux.alibaba.com \
--cc=linux-mm@kvack.org \
--cc=penguin-kernel@i-love.sakura.ne.jp \
--cc=shy828301@gmail.com \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).