Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4181215ybp; Mon, 7 Oct 2019 04:39:54 -0700 (PDT) X-Google-Smtp-Source: APXvYqziWBUwQHhsU6l5pxsq3MQx85xCtftGM30+kAB8vyCQ/PEtqusAvme3JERyFNglkBCs/oFB X-Received: by 2002:a17:906:5109:: with SMTP id w9mr23222557ejk.282.1570448394565; Mon, 07 Oct 2019 04:39:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570448394; cv=none; d=google.com; s=arc-20160816; b=S4g1qxlenoZek/oiJse0gRqx7jEYmOvbLX1wCYmrAuBKHHyiFjR2DQqf40zY2wONAx PXmKcBM9xqQQC8ZKfyu3bAaNihSQyWpydy+z2b9X5VqWhlHvVw1wf8kXUxvZLpDUr4Mi zXPWoGuKYmdfH+gT8bRvyc5XPckr8/bW3n3jHMlrN+Gc/vojNt0HHW8zTnU4rBG8BkFP UIUI5sw/JZrcVVeYRFlCWoFLIoDvJFDSpzsD+R86h8RL/fwHl5DnTwU/PUikCY6DJbGS uPIlnZMP8Ib0dfSoax8GdWJ4Amr/HAo+yeEB5LU4ibQF/gVfwoXZ56GADxFoX3viXw9H HwaA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=YL8vSGWdAts7uSwcEhX0ZxbLUTfHjgtYXdsmjGsBg70=; b=to1wEylamRUA9Oeq/Fccm3nKGF+vQB2Byyzu4ypeZWLp+0THiFwzYXF8y8GwJ5M6GU KNFBPdsCf822OX8Qni9Lz+x8JwTIWPa6twcLVurhFCTs3XokUr7KDk6U0QixGFfz2w56 JMo5G7EkpesObYBJCCFGQr+IozbLFvV0OFQGiWBfE2YT9M43byGTWftN9t22wpz8TTKO +OYoZ+fwJNOIiN+AsX5YMO+F7Icd8g4O2k5r+eO6gYWFvns9p12lC/3jJpnAGEhvgNRp Q22vSBcl1tb5WUPuC7jEqtvhIaz0WOm9g/hfIY4oMDoEzLkIm6AQ5+iCxK1aD03l/xOQ dVZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x30si8177299edi.351.2019.10.07.04.39.30; Mon, 07 Oct 2019 04:39:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727522AbfJGLhM (ORCPT + 99 others); Mon, 7 Oct 2019 07:37:12 -0400 Received: from mx2.suse.de ([195.135.220.15]:48546 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727394AbfJGLhM (ORCPT ); Mon, 7 Oct 2019 07:37:12 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id E6C7FAE65; Mon, 7 Oct 2019 11:37:10 +0000 (UTC) Date: Mon, 7 Oct 2019 13:37:10 +0200 From: Michal Hocko To: Qian Cai Cc: akpm@linux-foundation.org, sergey.senozhatsky.work@gmail.com, pmladek@suse.com, rostedt@goodmis.org, peterz@infradead.org, david@redhat.com, john.ogness@linutronix.de, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] mm/page_isolation: fix a deadlock with printk() Message-ID: <20191007113710.GH2381@dhcp22.suse.cz> References: <20191007080742.GD2381@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 07-10-19 07:04:00, Qian Cai wrote: > > > > On Oct 7, 2019, at 4:07 AM, Michal Hocko wrote: > > > > I do not think that removing the printk is the right long term solution. > > While I do agree that removing the debugging printk __offline_isolated_pages > > does make sense because it is essentially of a very limited use, this > > doesn't really solve the underlying problem. There are likely other > > printks from zone->lock. It would be much more saner to actually > > disallow consoles to allocate any memory while printk is called from an > > atomic context. > > No, there is only a handful of places called printk() from > zone->lock. It is normal that the callers will quietly process > “struct zone” modification in a short section with zone->lock > held. It is extremely error prone to have any zone->lock vs. printk dependency. I do not want to play an endless whack a mole. > No, it is not about “allocate any memory while printk is called from an > atomic context”. It is opposite lock chain from different processors which has the same effect. For example, > > CPU0: CPU1: CPU2: > console_owner > sclp_lock > sclp_lock zone_lock > zone_lock > console_owner Why would sclp_lock ever take a zone->lock (apart from an allocation). So really if sclp_lock is a lock that might be taken from many contexts and generate very subtle lock dependencies then it should better be really careful what it is calling into. In other words you are trying to fix a wrong end of the problem. Fix the console to not allocate or depend on MM by other means. -- Michal Hocko SUSE Labs