Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6855597imu; Mon, 3 Dec 2018 04:04:26 -0800 (PST) X-Google-Smtp-Source: AFSGD/VHhRB4gOOS9c/0sfny3+B3DWAMgjnfEAuS//AKHyjBlsSlhnnksVXsFPt2xCZeMRCSQSo5 X-Received: by 2002:a63:5c41:: with SMTP id n1mr11302528pgm.1.1543838666907; Mon, 03 Dec 2018 04:04:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543838666; cv=none; d=google.com; s=arc-20160816; b=XXuOEwZw+PH2ENItohFdu0XmJwheP9sDm2zYZUXdZdusEzyXzQ77cgzd3fLz7gxmaP QaiUDCynBSF+4dNthXFz9F+uDWSl7dcQcaBAy9/dpKuWIvj0XFiMJoAK1Qv9Lt2KgScw ra6QINOJdca1s4tINeTB5aqIDHC8MJ3HlQ9nNQjsaA7VOh+RLf9EXMLNiftM9yENSIEA rbimDPrtNhyXhqoEHuYhAzVefW2nMcioOY3CLxOX4YxARJ6RsPP4Qq/FIia+vIVpluNZ vvCquf2bna4Ls9DxJilvdjqg+o+VIQbOHJavSRlaxwJU+fxBhlPgyTZJMBH5hRruAs4g sMsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=cfR+T1tlWZRyxrdkNli3C8KVN6vKHkSGzIvgtPxKXqU=; b=CQTOKm7dquGDLNhhb2Dakyo0LTgK1TXtg/c45Ht6F9bMs5sQ1iAhyWTsa2D8H6CRLL kJnSo8mubFEYqJlEZPR8wCWbqyCJMJzF10CJWggQlhbZRPxaA5Qvq4DQv2vf17D8Ch5y 2foT3LvOG0oMuui8HA4ZN2r++soIp7tEqxW0GmH47tYMA2zh/de4hDkoFu/xU8UnjkFT LyE+lEmCUMby118rqSqDyVIOaYgDmGpZZ4Vn4RJ/lgzhca2euvuTuRj6cGvqkHV4pYUj lAvPdZrZaC0FXBHWP5lHf5JRW7V3Qk2rUGpKbuivO4Ctee+S81kDJY5W+dvV+ZpNeGRa IswA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v141si15766128pfc.260.2018.12.03.04.04.06; Mon, 03 Dec 2018 04:04:26 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726413AbeLCMEN (ORCPT + 99 others); Mon, 3 Dec 2018 07:04:13 -0500 Received: from cloudserver094114.home.pl ([79.96.170.134]:59144 "EHLO cloudserver094114.home.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725883AbeLCMEM (ORCPT ); Mon, 3 Dec 2018 07:04:12 -0500 Received: from 79.184.252.87.ipv4.supernova.orange.pl (79.184.252.87) (HELO aspire.rjw.lan) by serwer1319399.home.pl (79.96.170.134) with SMTP (IdeaSmtpServer 0.83.157) id 8a403304dd5b4437; Mon, 3 Dec 2018 13:03:25 +0100 From: "Rafael J. Wysocki" To: Michal Hocko Cc: Ingo Molnar , Linus Torvalds , Linux List Kernel Mailing , "Rafael J. Wysocki" , Chanho Min , Thomas Gleixner , Peter Zijlstra , Oleg Nesterov , Pavel Machek Subject: Re: [PATCH] Revert "exec: make de_thread() freezable (was: Re: Linux 4.20-rc4) Date: Mon, 03 Dec 2018 13:03:16 +0100 Message-ID: <1718869.PGhsHE7EHz@aspire.rjw.lan> In-Reply-To: <20181203083942.GF31738@dhcp22.suse.cz> References: <20181203074700.GA21240@gmail.com> <20181203083942.GF31738@dhcp22.suse.cz> MIME-Version: 1.0 Content-Transfer-Encoding: 7Bit Content-Type: text/plain; charset="us-ascii" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Monday, December 3, 2018 9:39:42 AM CET Michal Hocko wrote: > On Mon 03-12-18 08:47:00, Ingo Molnar wrote: > [...] > > I reviewed the ->cred_guard_mutex code, and the mutex is held across all > > of exec() - and we always did this. > > Yes, this is something that has been pointed out during the review. Oleg > has argued that making this path freezable is really hard and that we > should be changing de_thread to sleep withtou cred_guard_mutex long term > anyway (http://lkml.kernel.org/r/20181114143705.GB13885@redhat.com). > > Failing suspend seems like a real problem while the lockdep one doesn't > really reflect any real deadlock, right? So while the patch is not > perfect it shouldn't make the situation much worse. Lockdep splat is > certainly annoying but is it any worse than a suspend failing? > > Now, I wouldn't mind to revert this because the code is really old and > we haven't seen many bug reports about failing suspend yet. But what is > the actual plan to make this work properly? Use > freezable_schedule_unsafe instead? Freezer code has some > fundamental design issues which are quite hard to get over. I agree and we just need to look deeper into this. I had hoped that this would work since you and Oleg agreed with it, but since it doesn't, let's do a revert for now and get back to this later. Thanks, Rafael