Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2347488imj; Mon, 18 Feb 2019 04:33:12 -0800 (PST) X-Google-Smtp-Source: AHgI3Ib7pVS3mZOgyw80rVY4WjLjpcJY8C6356TdQNAwpmErWnVT5Aft3MBfCaIDjFkyhe2swwQG X-Received: by 2002:a62:2a4b:: with SMTP id q72mr23826277pfq.61.1550493191895; Mon, 18 Feb 2019 04:33:11 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550493191; cv=none; d=google.com; s=arc-20160816; b=haJSey4JtOZgFWl/FALv2g0g6EsVnr9vfT+ULn0qcw8fDQM4hgRFKT7KP+GLVBPUpW 4p8RvyDIVDODQyVafWQl6TzLa7VM48V+jxxkXi/+/Tz8ekFfAaOHd1IHWddX7x9JVwTo K6o8Ts7K0CAMu59ACFiAW+pnwTHXU709bjZfhtGe4cMd/fltn31Pj1mo0aS6PIfr/I11 Vx6jHpZqtVdOvfHKcXhAD95dPqDeiHpG21kYLKB6SaQhzO9jSwafXGGS7WkrJ5p5hPvL msKWh35pXIQkINOtBehaDHUcDVOIQpltjy3A/I9DLkCxFHjBwNXQQwjXnBS8ZopgQ33E QnRw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=LQ+UvbLB+vfee9l/YtlEkKVjf02jpZ4rlyOzcR5A6Vw=; b=JeCi65Cu/HvxnABkQVYIMSF0gGk2OUeqyh0ogBwHZZPxYhksrwD6oyiuzE7KXiUAS5 QYkXMCiZ7mhaoTQksCL9dllWnA/4SiKef9+kO1Nc3Q50ri2uzFRsmRhstsuC5Hnz/oiB owQmc5/bUjLPTiTJ3d7gIOqRTZnBAfFtnxL2H15kN0fHRlQa7QpuQt7QoHDhCy7KQrjw SWWdoKZvYKYioonnuzlNxJLDqAlwVjt8oEsGEjzrpSFLnyZ8OhQVKm0rpwQNa21v8iSM hdX78itpjRKKTKIi2SEfLHu08wE3m6vjHVADDh28DlefROq2oix+Gt7ul2qq8n2dkKF2 V8VA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w123si13340921pfb.172.2019.02.18.04.32.56; Mon, 18 Feb 2019 04:33:11 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730731AbfBRMKU (ORCPT + 99 others); Mon, 18 Feb 2019 07:10:20 -0500 Received: from szxga06-in.huawei.com ([45.249.212.32]:59270 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730631AbfBRMKU (ORCPT ); Mon, 18 Feb 2019 07:10:20 -0500 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 5F67B3F4A3668C11CFFE for ; Mon, 18 Feb 2019 20:10:17 +0800 (CST) Received: from [127.0.0.1] (10.57.71.8) by DGGEMS403-HUB.china.huawei.com (10.3.19.203) with Microsoft SMTP Server id 14.3.408.0; Mon, 18 Feb 2019 20:10:09 +0800 Subject: Re: possible deadlock in console_unlock To: Sergey Senozhatsky CC: Sergey Senozhatsky , , References: <20190216072127.GA1945@tigerII.localdomain> <20190216073856.GA9979@tigerII.localdomain> <71b097a7-03c5-8a65-76fa-24312b452b51@huawei.com> <20190218054649.GA26686@jagdpanzerIV> From: Yao HongBo Message-ID: Date: Mon, 18 Feb 2019 20:09:41 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.0 MIME-Version: 1.0 In-Reply-To: <20190218054649.GA26686@jagdpanzerIV> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.57.71.8] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/18/2019 1:46 PM, Sergey Senozhatsky wrote: > Hi, > > On (02/16/19 15:59), Yao HongBo wrote: >>> GFP_NOWARN is probably the best option for now. Yes, it, maybe, >>> will not work for fault-injection cases; but printk_safe approach >>> is harder to push for, especially given that printk_safe maybe will >>> not even exist in the future. >> >> I have tried GFP_NOWARN, but the problem still exists. >> Only print_safe contexts for tty locks can solve the problem. >> My test scenario is falt-injection. > > Oh, I see. Yes, fault-injection is special. > > I suspect that this patch series can be helpful then > https://lore.kernel.org/lkml/20181016050428.17966-1-sergey.senozhatsky@gmail.com/T/#u ok, i'll try it. Thanks. > but first we need to figure out if printk_safe will > stay in the kernel (this will take some time). > > -ss > >