Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5374263ybp; Tue, 8 Oct 2019 01:41:08 -0700 (PDT) X-Google-Smtp-Source: APXvYqzHlKf8YJ7yekORKG82OvCSTY5PXhtvqPqK13L33KpktiWbJcotRhbleGq7KAD80X9l/T/y X-Received: by 2002:a50:ef02:: with SMTP id m2mr33089617eds.157.1570524068825; Tue, 08 Oct 2019 01:41:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570524068; cv=none; d=google.com; s=arc-20160816; b=pvdbERo7qqfpIDpVeseT923EvmsWAxkBveyBhnTfX8hrmw5WBYYrK2+jzBrP967RDQ OBr7nFxJEzdwapZyHk949GcBUROOn0BdBUPAJKwCTURGkpx78OZH00+LgT+zpkzqIQls U3KkCHgWZTKNtRCkOMdu+FN5yNkPAyfKW6s8tpDM9lFM62VTgZyB2MdgdnACLKC0r4Ft Eqbtdf34uzA/fGvcJy9x7Oryqj+QUN3XbxjXb3UE3Cv/nPupJ6437IpT3lCn/iT73j7s m04+NCzOa46IkgK/cAq8Ia0KLkEKuZUBcWMbkS1DfGSIu5VZNY3NH+MD95FFDG8aeB/Z QtXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=WCLsQX0Oo2C8kujD1nyooEvFM6+mx2UJtO/o4/wGPb0=; b=AVbIObIU4hSTH6YoGGk7pmjz7Vmd+QOOjfSXcn+w5yImzEtkzLz3S6x5fihakiTvor Bo2ehhRIvALpCvUQsSCHDeiH6N+RenahpFbYUzqCxsc/3V2iqN1B8kind+6S/NoRIab8 J0sEFHAFlXutn9W4JUKNAQKswB8W4VlzqOjDY8J8/0daNosqq6HJlvtBjBK7FtGB/Ldk 8yLa+yh0hRH6jvWom4kEzfDpOxAZ+IPmv0wEihXt6bCD5d/AwPH9a48FAY8hxoVz7wKp 2qVamwMhpWTKpOVDJnVlXGkkaknWawhb2omNjTN5Yr4w2Hotl+ah7Chi6KYVhSL9ZBTD OlRw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v20si9561916edq.195.2019.10.08.01.40.45; Tue, 08 Oct 2019 01:41:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729944AbfJHIkf (ORCPT + 99 others); Tue, 8 Oct 2019 04:40:35 -0400 Received: from mx2.suse.de ([195.135.220.15]:40260 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728866AbfJHIkf (ORCPT ); Tue, 8 Oct 2019 04:40:35 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 23F2BAF87; Tue, 8 Oct 2019 08:40:33 +0000 (UTC) Date: Tue, 8 Oct 2019 10:40:31 +0200 From: Michal Hocko To: Qian Cai Cc: Petr Mladek , akpm@linux-foundation.org, sergey.senozhatsky.work@gmail.com, rostedt@goodmis.org, peterz@infradead.org, linux-mm@kvack.org, john.ogness@linutronix.de, david@redhat.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] mm/page_isolation: fix a deadlock with printk() Message-ID: <20191008084031.GC6681@dhcp22.suse.cz> References: <1570228005-24979-1-git-send-email-cai@lca.pw> <20191007143002.l37bt2lzqtnqjqxu@pathway.suse.cz> <1570460350.5576.290.camel@lca.pw> <20191007151237.GP2381@dhcp22.suse.cz> <1570462407.5576.292.camel@lca.pw> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1570462407.5576.292.camel@lca.pw> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 07-10-19 11:33:27, Qian Cai wrote: > On Mon, 2019-10-07 at 17:12 +0200, Michal Hocko wrote: > > On Mon 07-10-19 10:59:10, Qian Cai wrote: > > [...] > > > It is almost impossible to eliminate all the indirect call chains from > > > console_sem/console_owner_lock to zone->lock because it is too normal that > > > something later needs to allocate some memory dynamically, so as long as it > > > directly call printk() with zone->lock held, it will be in trouble. > > > > Do you have any example where the console driver really _has_ to > > allocate. Because I have hard time to believe this is going to work at > > all as the atomic context doesn't allow to do any memory reclaim and > > such an allocation would be too easy to fail so the allocation cannot > > really rely on it. > > I don't know how to explain to you clearly, but let me repeat again one last > time. There is no necessary for console driver directly to allocate considering > this example, > > CPU0: CPU1: CPU2: CPU3: > console_sem->lock zone->lock > pi->lock > pi->lock rq_lock > rq->lock > zone->lock > console_sem->lock > > Here it only need someone held the rq_lock and allocate some memory. Is the scheduler really allocating while holding the rq lock? > There is > also true for port_lock. Since the deadlock could involve a lot of CPUs and a > longer lock chain, it is impossible to predict which one to allocate some memory > while held a lock could end up with the same problematic lock chain. And that is exactly what I've said earlier. Locks used by consoles should really better be tail locks because then they are going to create arbitrary dependency chains. The zone->lock is in no way special here. > > So again, crippling the MM code just because of lockdep false possitives > > or a broken console driver sounds like a wrong way to approach the > > problem. > > > > > [??297.425964] -> #1 (&port_lock_key){-.-.}: > > > [??297.425967]????????__lock_acquire+0x5b3/0xb40 > > > [??297.425967]????????lock_acquire+0x126/0x280 > > > [??297.425968]????????_raw_spin_lock_irqsave+0x3a/0x50 > > > [??297.425969]????????serial8250_console_write+0x3e4/0x450 > > > [??297.425970]????????univ8250_console_write+0x4b/0x60 > > > [??297.425970]????????console_unlock+0x501/0x750 > > > [??297.425971]????????vprintk_emit+0x10d/0x340 > > > [??297.425972]????????vprintk_default+0x1f/0x30 > > > [??297.425972]????????vprintk_func+0x44/0xd4 > > > [??297.425973]????????printk+0x9f/0xc5 > > > [??297.425974]????????register_console+0x39c/0x520 > > > [??297.425975]????????univ8250_console_init+0x23/0x2d > > > [??297.425975]????????console_init+0x338/0x4cd > > > [??297.425976]????????start_kernel+0x534/0x724 > > > [??297.425977]????????x86_64_start_reservations+0x24/0x26 > > > [??297.425977]????????x86_64_start_kernel+0xf4/0xfb > > > [??297.425978]????????secondary_startup_64+0xb6/0xc0 > > > > This is an early init code again so the lockdep sounds like a false > > possitive to me. > > This is just a tip of iceberg to show the lock dependency, Does this tip point to a real deadlock or merely a class of lockdep false dependencies? > console_owner --> port_lock_key > > which could easily happen everywhere with a simple printk(). -- Michal Hocko SUSE Labs