Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6679981imu; Mon, 3 Dec 2018 00:42:06 -0800 (PST) X-Google-Smtp-Source: AFSGD/Xu1HsVNa8YxWNL9C43tmLzJRxf0MsKCIpP7aJDv2L+yFzX/hfIlWxRmUzio6p/O7cgfoHT X-Received: by 2002:a65:6094:: with SMTP id t20mr12358006pgu.285.1543826526651; Mon, 03 Dec 2018 00:42:06 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543826526; cv=none; d=google.com; s=arc-20160816; b=MosJw+wiatIpkObSOR4HbqRnarXbGrZtKLmZ+zVBCQqNzVr7v21jhCDrvWxH57Xb+z dz4rzOJ+a4S8jozcNa775hYnT1+sw4wXw9Hl2pe4fsPskXxa+yvxKpzsqKajWenB9SGU s65KK9qrrRiJ8jgl1XGJnMmV5qXHgaCq7s5YJ1tNFWby8XbCGwY4cXRk/aP3OESguva5 5Z5ZBIizBRv8wIBWq8kL7uoC22aQDL3d8KP0tAyv9AC4QQjDmSk7VXQ0KwaaVRAgCjUd SizBYiqRvvjrzVD1RAxsmEHb4V3IORQqUNsbMjSvVymv0u2HmhvWWMzV/4+yi1Q7XGeH zuTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=k/iok7gFq+bX2WrXAQmQukYQ8YEaOt64YGpE2Gm+N1o=; b=cDcyPtsV2mnRTC9DhRy4nANGQqHm9KMHlbJpLRQMUkgME19DTCWekpYO+N4DrElrHx u34NVHLz1yDGy7+Do9rKfkZ8BK1xx6mvi6XeNDLf0sy88QHRpReJhITMUxYHPnBtW3W2 nfKmTIjHoyQIq6pM37ec0uPnFIZqhA9Ydd31TuWCN1KBwpryaZLpRiY/KAtCBe4GMsrj YaYzSAshRJTmFx5b7sbhQcMjCPkaopQhK30Lb2sgNEEMX0TqS4qSkxHyLU3XWsXu12LB JDWtCZdLWLL8t3a8qWpfQ/iOBgRVuvHKrJ5FXa63ry4cVESC63D4dg5HBlJ2/Tva4hbi 8f/A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o31si12529977pgb.273.2018.12.03.00.41.52; Mon, 03 Dec 2018 00:42:06 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726101AbeLCIjt (ORCPT + 99 others); Mon, 3 Dec 2018 03:39:49 -0500 Received: from mx2.suse.de ([195.135.220.15]:52290 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725968AbeLCIjs (ORCPT ); Mon, 3 Dec 2018 03:39:48 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id B5E14AEC6; Mon, 3 Dec 2018 08:39:44 +0000 (UTC) Date: Mon, 3 Dec 2018 09:39:42 +0100 From: Michal Hocko To: Ingo Molnar Cc: Linus Torvalds , Linux List Kernel Mailing , "Rafael J. Wysocki" , Chanho Min , Thomas Gleixner , Peter Zijlstra , Oleg Nesterov , Pavel Machek Subject: Re: [PATCH] Revert "exec: make de_thread() freezable (was: Re: Linux 4.20-rc4) Message-ID: <20181203083942.GF31738@dhcp22.suse.cz> References: <20181203074700.GA21240@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181203074700.GA21240@gmail.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 03-12-18 08:47:00, Ingo Molnar wrote: [...] > I reviewed the ->cred_guard_mutex code, and the mutex is held across all > of exec() - and we always did this. Yes, this is something that has been pointed out during the review. Oleg has argued that making this path freezable is really hard and that we should be changing de_thread to sleep withtou cred_guard_mutex long term anyway (http://lkml.kernel.org/r/20181114143705.GB13885@redhat.com). Failing suspend seems like a real problem while the lockdep one doesn't really reflect any real deadlock, right? So while the patch is not perfect it shouldn't make the situation much worse. Lockdep splat is certainly annoying but is it any worse than a suspend failing? Now, I wouldn't mind to revert this because the code is really old and we haven't seen many bug reports about failing suspend yet. But what is the actual plan to make this work properly? Use freezable_schedule_unsafe instead? Freezer code has some fundamental design issues which are quite hard to get over. -- Michal Hocko SUSE Labs