Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp4280174ybp; Mon, 7 Oct 2019 06:12:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqzuszJeZ5l9T46XIwKbKO8y5TbGy7KTMuESJQLVG9Njgm/wUyjukxGi4dIux4wW8pigeIAX X-Received: by 2002:a17:906:c73a:: with SMTP id fj26mr3926128ejb.70.1570453928498; Mon, 07 Oct 2019 06:12:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570453928; cv=none; d=google.com; s=arc-20160816; b=JHwcbCYIPLQ2Q6hxU95Y5JHV4su9YKq9w61lBTme0uKhamPRF42CDWGrCcI1E+YMCK vho7SNe6/HprGEd9omwXuKc0C4VNauvsgwUXYjxmvWSdkjw7zgxe1j3c9CFGWjtSfROb rOz4cZCeHvgtz8cyyD+JCnzBw5c97/3+PR9wZqC4yhaM3JvQY1XxvGSJRgg3ckh49MFB XCtOm+P95VrjXGHRWzFRVbUbcmLRfyhsndMsH5Eks9kph3oxV8RJHkSON7zojVbeP2Hl LTZ1js/vpgEulov1ppabkSqDBnIUePyJpujso1b1OQUasXJbaCLE2tTY1pPSs0Fc5Bwp 8alw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :dkim-signature; bh=+s+M60GubuM9arGmnwNneSr3U0t+wI+6sJoXV3Zv6RU=; b=mjtygXAGOBUTWmO+9DytK3DG2Rw7yCjRZS4je+DC1N1Xzol+GzG816516E+It4c6Pg shESjkwj/tIUsneThk7Aq1vZU5Psf0HlwcRvxBvAP568RYzThda6x3M17lT5jdFc7EYU I2HNiPI5jRr+/cMAcKgv3dqFz4xBdbzxQCDbOwwWavachu/ohRINOv8c9/CJTDDsVBTj DiEKsWT8DRAix+3W812rRhWqzATaml9as3diu50lxB5vx3ZzxysFDpqv0IyXJgu5bWRg f36nImoub9Pm3BQACX2yiXtteOGvQ5i+bUVMXRrHj0sMSeDbT/l1FCdIa7FaG8MzRW2H rVcw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@lca.pw header.s=google header.b="p9/p1FMN"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g18si6274444eje.297.2019.10.07.06.11.32; Mon, 07 Oct 2019 06:12:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@lca.pw header.s=google header.b="p9/p1FMN"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728033AbfJGNHG (ORCPT + 99 others); Mon, 7 Oct 2019 09:07:06 -0400 Received: from mail-qt1-f194.google.com ([209.85.160.194]:35995 "EHLO mail-qt1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727324AbfJGNHG (ORCPT ); Mon, 7 Oct 2019 09:07:06 -0400 Received: by mail-qt1-f194.google.com with SMTP id o12so19021297qtf.3 for ; Mon, 07 Oct 2019 06:07:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lca.pw; s=google; h=message-id:subject:from:to:cc:date:in-reply-to:references :mime-version:content-transfer-encoding; bh=+s+M60GubuM9arGmnwNneSr3U0t+wI+6sJoXV3Zv6RU=; b=p9/p1FMNgMiG2rS6Oq8Q5l2X9KfACwjrYJ2skWhF3ADm+ayLu83ZLdZehG+8tCSNCx /9Ttcy5VkIDdIekYelvmRhQZHTY0yc24Sa0jSErJ6HPbpyPG6i8bCjQmC3GuuZS5PV/I B0zdqmq50Yc6yqyYNUHAmzpemTD5S2shYITGAmnp8vg80c1SiZUcZrgriqBex2r7udo8 Mo89lBnB9ASKEN4sa4FN0xm2nYfKM7lMFNMX0PGv/vBCwl4rk1H6C51L2vIEQ8q2HyML YDPVp9no9wzqsAQOLtCmAz2b3+NBA7XaSoMj8gkjIpLfVohpgnwnZTeA9CUpUvNp70D0 l82w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:message-id:subject:from:to:cc:date:in-reply-to :references:mime-version:content-transfer-encoding; bh=+s+M60GubuM9arGmnwNneSr3U0t+wI+6sJoXV3Zv6RU=; b=b+WViCtS0Ov6QSZBL6mEGYwlgK/Q68iBLvySHrSbaQMY2cFuiF1UlORfWwwaqYVWUr toAqUNmomVzBrYqDLo63UQUn6yzb5lALJ6adZTAVuCbDS17sMrcyvFZiQIa+3I2A33i0 pPfOgc1lOxntbGQi9H82tyVpmhx7DFtg+dcVSAcMoK3sE4WrWdFC+QdBUH+CH0QYNS+i 2YxUbBzz6/qwIJ+Kde+EHTk9FMmEbHs+FAUZhw+Om1hFKLgjXmFwjRap2ATsemGhxv0Q pNyEJZF3/YEM3BWi5NoOhV3GQS91lXsBB7hC3NO2CUIOjB65Cnnys3Kyp0jSOv/9HgMB xSOg== X-Gm-Message-State: APjAAAW7LXgnqW68PXfEOiCYE+uAVwsqKmgZOEd0/f/wagFldJVe1RXB +p5vm1VJolYuaI9DOQL++QIgDg== X-Received: by 2002:a0c:946f:: with SMTP id i44mr3499064qvi.133.1570453624603; Mon, 07 Oct 2019 06:07:04 -0700 (PDT) Received: from dhcp-41-57.bos.redhat.com (nat-pool-bos-t.redhat.com. [66.187.233.206]) by smtp.gmail.com with ESMTPSA id q207sm8310045qke.98.2019.10.07.06.07.03 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 07 Oct 2019 06:07:04 -0700 (PDT) Message-ID: <1570453622.5576.288.camel@lca.pw> Subject: Re: [PATCH v2] mm/page_isolation: fix a deadlock with printk() From: Qian Cai To: Michal Hocko Cc: akpm@linux-foundation.org, sergey.senozhatsky.work@gmail.com, pmladek@suse.com, rostedt@goodmis.org, peterz@infradead.org, david@redhat.com, john.ogness@linutronix.de, linux-mm@kvack.org, linux-kernel@vger.kernel.org Date: Mon, 07 Oct 2019 09:07:02 -0400 In-Reply-To: <20191007124356.GJ2381@dhcp22.suse.cz> References: <20191007080742.GD2381@dhcp22.suse.cz> <20191007113710.GH2381@dhcp22.suse.cz> <1570450304.5576.283.camel@lca.pw> <20191007124356.GJ2381@dhcp22.suse.cz> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6 (3.22.6-10.el7) Mime-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2019-10-07 at 14:43 +0200, Michal Hocko wrote: > On Mon 07-10-19 08:11:44, Qian Cai wrote: > > On Mon, 2019-10-07 at 13:37 +0200, Michal Hocko wrote: > > > On Mon 07-10-19 07:04:00, Qian Cai wrote: > > > > > > > > > > > > > On Oct 7, 2019, at 4:07 AM, Michal Hocko wrote: > > > > > > > > > > I do not think that removing the printk is the right long term solution. > > > > > While I do agree that removing the debugging printk __offline_isolated_pages > > > > > does make sense because it is essentially of a very limited use, this > > > > > doesn't really solve the underlying problem. There are likely other > > > > > printks from zone->lock. It would be much more saner to actually > > > > > disallow consoles to allocate any memory while printk is called from an > > > > > atomic context. > > > > > > > > No, there is only a handful of places called printk() from > > > > zone->lock. It is normal that the callers will quietly process > > > > “struct zone” modification in a short section with zone->lock > > > > held. > > > > > > It is extremely error prone to have any zone->lock vs. printk > > > dependency. I do not want to play an endless whack a mole. > > > > > > > No, it is not about “allocate any memory while printk is called from an > > > > atomic context”. It is opposite lock chain from different processors which has the same effect. For example, > > > > > > > > CPU0: CPU1: CPU2: > > > > console_owner > > > > sclp_lock > > > > sclp_lock zone_lock > > > > zone_lock > > > > console_owner > > > > > > Why would sclp_lock ever take a zone->lock (apart from an allocation). > > > So really if sclp_lock is a lock that might be taken from many contexts > > > and generate very subtle lock dependencies then it should better be > > > really careful what it is calling into. > > > > > > In other words you are trying to fix a wrong end of the problem. Fix the > > > console to not allocate or depend on MM by other means. > > > > It looks there are way too many places that could generate those indirect lock > > chains that are hard to eliminate them all. Here is anther example, where it > > has, > > Yeah and I strongly suspect they are consoles which are broken and need > to be fixed rathert than the problem papered over. > > I do realize how tempting it is to remove all printks from the > zone->lock but do realize that as soon as the allocator starts using any > other locks then we are back to square one and the problem is there > again. We would have to drop _all_ printks from any locked section in > the allocator and I do not think this is viable. > > Really, the only way forward is to make these consoles be more careful > of external dependencies. Even with the new printk() Petr proposed. There is no guarantee it will fix it properly. It looks like just reduce the chance of this kind of deadlocks as it may or may not call wake_up_klogd() in vprintk_emit() depends on timing. zone->lock printk_deferred() vprintk_emit() wake_up_klogd() wake_up_klogd_work_func() console_unlock() which essentially went into the same path, zone_lock -> console_owner_lock What else options it has here? > > I am also wondering, this code is there for a long time (or is there any > recent change?), why are we seeing reports only now? Are those consoles > rarely used or you are simply luck to hit those? Or are those really > representing a deadlock? Maybe the lockdep is just confused? I am not > familiar with the code but console_owner_lock is doing some complex > stuff to hand over the context. As I mentioned in the changelog that almost nobody call printk() with zone->lock held except in memory offline. "The problem is probably there forever, but neither many developers will run memory offline with the lockdep enabled nor admins in the field are lucky enough yet to hit a perfect timing which required to trigger a real deadlock. In addition, there aren't many places that call printk() while zone->lock was held." > > > console_owner -> port_lock > > port_lock -> zone_lock > > > > [  297.425922] -> #3 (&(&zone->lock)->rlock){-.-.}: > > [  297.425925]        __lock_acquire+0x5b3/0xb40 > > [  297.425925]        lock_acquire+0x126/0x280 > > [  297.425926]        _raw_spin_lock+0x2f/0x40 > > [  297.425927]        rmqueue_bulk.constprop.21+0xb6/0x1160 > > [  297.425928]        get_page_from_freelist+0x898/0x22c0 > > [  297.425928]        __alloc_pages_nodemask+0x2f3/0x1cd0 > > [  297.425929]        alloc_pages_current+0x9c/0x110 > > [  297.425930]        allocate_slab+0x4c6/0x19c0 > > [  297.425931]        new_slab+0x46/0x70 > > [  297.425931]        ___slab_alloc+0x58b/0x960 > > [  297.425932]        __slab_alloc+0x43/0x70 > > [  297.425933]        __kmalloc+0x3ad/0x4b0 > > [  297.425933]        __tty_buffer_request_room+0x100/0x250 > > [  297.425934]        tty_insert_flip_string_fixed_flag+0x67/0x110 > > [  297.425935]        pty_write+0xa2/0xf0 > > [  297.425936]        n_tty_write+0x36b/0x7b0 > > [  297.425936]        tty_write+0x284/0x4c0 > > [  297.425937]        __vfs_write+0x50/0xa0 > > [  297.425938]        vfs_write+0x105/0x290 > > [  297.425939]        redirected_tty_write+0x6a/0xc0 > > [  297.425939]        do_iter_write+0x248/0x2a0 > > [  297.425940]        vfs_writev+0x106/0x1e0 > > [  297.425941]        do_writev+0xd4/0x180 > > [  297.425941]        __x64_sys_writev+0x45/0x50 > > [  297.425942]        do_syscall_64+0xcc/0x76c > > [  297.425943]        entry_SYSCALL_64_after_hwframe+0x49/0xbe > >