Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp3062968imj; Mon, 18 Feb 2019 18:53:14 -0800 (PST) X-Google-Smtp-Source: AHgI3Ia2IFktvMEctMkKD+46yLu07rh+XOTemnuxtF5tOrS9BrUds7Tp7wxYUt/2TZJ46voYtIf1 X-Received: by 2002:a65:5142:: with SMTP id g2mr3224980pgq.149.1550544794755; Mon, 18 Feb 2019 18:53:14 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550544794; cv=none; d=google.com; s=arc-20160816; b=HkAiVMU6xcDd0rY+tz491m1/hp1OB78l7Mkpod+d/q9xNTav5vQ+Yvp6GE0eGS37Ee L1GlkDdX85RtkVkqr8gIvPXE2R0DXfzBE+2Ef7h9mUUYT/mu/YOx9tTnilxPVvnG02Ts eWn3IGuYffIGihUDu6yuHRkEIBH0muahUr4VnoImPtYDek4zi9pY6z/TiHkMsqPGSlcW 35yc8aR9sVy0FR9ISr0ikpnwGXPMC5pdmhipLpl4nDpgtlkpdbGUeBXIp4rVtQkc92pT cTju+E87NY0j55/g1TaxGdSX/RbUrDt5hxeUPy4uF8Osslb2PyPfaI4FQ6YCM9uwTNY1 1/Jw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=2K4R5dJPDuENQCZF2jOR9wxnJii2kZfl/PIqdXAT0yE=; b=bTJg/MLxY9oRXt8JxjLRuk8jOw3meQomes+lh7PWteHe4yIWp42c1mVFUWnU7KnO6y I+gmvl1UG74m5bjDV/w4IFIj73oA40otDKnmsyFehy/+ma5pstSTiY4jGIKN5D4JcvMv tOzleUiv2bHpc3NTdwepAm+Sq73Lx1ioNmBBfpedAr31/4Y1A1jW0tFP5g9DgUEX3yH+ QVmgnNeOTzf98B3fliqzQVyePIwqDacw4iY+V9yMAOy3ddSLIs3R2qYfUZEtSSt315TE 9fA5sb5U3gC9dr3m7k4qxL1bS9+aR2VopHtXEfGHbNVSEHURzPG44Y0aJlPDKECzQ/e7 kcfw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h191si11513981pgc.302.2019.02.18.18.53.00; Mon, 18 Feb 2019 18:53:14 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726610AbfBSCty (ORCPT + 99 others); Mon, 18 Feb 2019 21:49:54 -0500 Received: from szxga07-in.huawei.com ([45.249.212.35]:48798 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725941AbfBSCtx (ORCPT ); Mon, 18 Feb 2019 21:49:53 -0500 Received: from DGGEMS409-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id 2353679DB71B2FDBEBE3 for ; Tue, 19 Feb 2019 10:49:51 +0800 (CST) Received: from [127.0.0.1] (10.57.71.8) by DGGEMS409-HUB.china.huawei.com (10.3.19.209) with Microsoft SMTP Server id 14.3.408.0; Tue, 19 Feb 2019 10:49:08 +0800 Subject: Re: possible deadlock in console_unlock To: Sergey Senozhatsky CC: Sergey Senozhatsky , , References: <20190216072127.GA1945@tigerII.localdomain> <20190216073856.GA9979@tigerII.localdomain> <71b097a7-03c5-8a65-76fa-24312b452b51@huawei.com> <20190218054649.GA26686@jagdpanzerIV> <3fece106-baed-92f6-1389-62b8f2c4578b@huawei.com> <20190219013254.GA20023@jagdpanzerIV> From: Yao HongBo Message-ID: Date: Tue, 19 Feb 2019 10:48:36 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.0 MIME-Version: 1.0 In-Reply-To: <20190219013254.GA20023@jagdpanzerIV> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.57.71.8] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/19/2019 9:32 AM, Sergey Senozhatsky wrote: > On (02/18/19 22:07), Yao HongBo wrote: >>>> I have tried GFP_NOWARN, but the problem still exists. >>>> Only print_safe contexts for tty locks can solve the problem. >>>> My test scenario is falt-injection. >>> >>> Oh, I see. Yes, fault-injection is special. >>> >>> I suspect that this patch series can be helpful then >>> https://lore.kernel.org/lkml/20181016050428.17966-1-sergey.senozhatsky@gmail.com/T/#u >> >> hi, sergey. > > Hello, > >> I merged this patch series on linux-4.19.18, but it didn't work for the fault-injection cases. > > Thanks! > >> The failure seems to be the same as before. > > OK... So tty_port lock must switch to printk_safe, after all... > I had it in one of the previous versions of the patchset which you > have tested, but people were strictly against new locking rules > in TTY, so I dropped that part. Need to think what we can do here. > > BTW, > we are now looking at a completely new printk implementation; which > would not use printk_safe at all: > https://lore.kernel.org/lkml/20190212143003.48446-1-john.ogness@linutronix.de/T/#u Ok, i understand it. Anyway, thank you for your help. Best regards, Hongbo. > -ss > >