lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 17 Jul 2016 22:54:51 +0100
From:	Chris Wilson <chris@...is-wilson.co.uk>
To:	Davidlohr Bueso <dave@...olabs.net>
Cc:	daniel.vetter@...el.com, jani.nikula@...ux.intel.com,
	intel-gfx@...ts.freedesktop.org, linux-kernel@...r.kernel.org
Subject: Re: [rfc PATCH] drm/i915: Simplify shrinker_lock

On Sun, Jul 17, 2016 at 11:45:44AM -0700, Davidlohr Bueso wrote:
> In addition, we can simplify the overall function wrt (2), by first
> checking if we are the lock owner, then address the trylock and
> deal with (2) if locked/contended by a traditional mutex_lock().
> This should be safe considering that if current is the lock owner,
> then we are guaranteed not to race with the counter->owner updates
> (the counter is updated first which sets the mutex to be visibly locked).

However, that is then subject to an indirect ABBA deadlock, between the
shrinker lock and the struct mutex (or at least that used to be the case
where the kswapd reclaim would be blocked on the mutex and an alloc
blocked on kswapd).

Unravelling the gross locking is an ongoing task, with one of the chief
goals being able to reclaim memory whenever required. It is not pretty
and often fails under pressure.
-Chris

-- 
Chris Wilson, Intel Open Source Technology Centre

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ