Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp933513ybp; Wed, 9 Oct 2019 06:31:18 -0700 (PDT) X-Google-Smtp-Source: APXvYqxJvpvscy20hAfAhhw/82EAUEunZzlMO7uxeVyetWOilZ6F4CsQ7ABl6yZeJV66oY9AdUCG X-Received: by 2002:a17:906:4545:: with SMTP id s5mr2712982ejq.223.1570627878030; Wed, 09 Oct 2019 06:31:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1570627878; cv=none; d=google.com; s=arc-20160816; b=CLZ+PLh5P6HqNQgdpt8IGua0Su6SFrQB5UoBK6dMpyOGudD+u7p4bljQUpHdc/wuke f2wLny4bkXxQiVd44kLa6FHgGAqp65b7VQSop2S97ulcNK5z7UjQ48h2xQNkTJIiaMFJ soUQ2tkjElSbPXDDM42doTX8I4aiQnAvLJYDO+XSBdoPZrDGzeF6zO9xHHlqIxf4hiqT QtnGryOh0DzHIQH03/qBPtamkmdLAIKQfy3HyTsMFFVD6n+FLXFAMlLtwONy9UNr89IH ynM1fmaDFxqT5eAWNsqhcPLyCVqkBCqXfbHXTC69sdV9d04IaRugFoh1N/zI8ejasJW7 rLqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=UMfn4N+8dFaqMrbSRtG6Wnq3hynzp8foLsDxch0U2Bg=; b=NIMgTjldFHMHB1X1D3ZD86mRQqc8bktiXKITsgnVAtMwF8gQ/gTHKCDNvjCdQpatrH RzUoFJUvQX7TeRneqwfbiFvEhXaO2eFmZIpgCA7wG0eM2Zjx8a40ZaoYkKMU/Q62Bbf2 jxgQz3EaLweW55/IrT4wo2bNCRu2uwaFRFJaf/hvegkBB1J/JY74QZgix3+Vu1JQ7ZhT 8dBvB6v8o5J9J17473NeAba7bT4jMkh963pGH80HQK90d9RiM/+OPDc24gy7jp/nKw9d p5VLHPtCmsNSTlgs9hBUS+r5du/Eo09y6Hx5ygTpDBpKvA3Lz8mBehMDp2j42EYKZG3D xDHw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c1si1240378edq.250.2019.10.09.06.30.54; Wed, 09 Oct 2019 06:31:18 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731521AbfJIN1u (ORCPT + 99 others); Wed, 9 Oct 2019 09:27:50 -0400 Received: from mx2.suse.de ([195.135.220.15]:47664 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1731152AbfJIN1s (ORCPT ); Wed, 9 Oct 2019 09:27:48 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2CFDCAC6E; Wed, 9 Oct 2019 13:27:47 +0000 (UTC) Date: Wed, 9 Oct 2019 15:27:46 +0200 From: Michal Hocko To: Qian Cai Cc: Petr Mladek , Christian Borntraeger , Heiko Carstens , sergey.senozhatsky.work@gmail.com, rostedt@goodmis.org, peterz@infradead.org, linux-mm@kvack.org, john.ogness@linutronix.de, akpm@linux-foundation.org, Vasily Gorbik , Peter Oberparleiter , david@redhat.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] mm/page_isolation: fix a deadlock with printk() Message-ID: <20191009132746.GA6681@dhcp22.suse.cz> References: <20191008074357.f33f6pbs4cw5majk@pathway.suse.cz> <20191008082752.GB6681@dhcp22.suse.cz> <1570550917.5576.303.camel@lca.pw> <20191008183525.GQ6681@dhcp22.suse.cz> <1570561573.5576.307.camel@lca.pw> <20191008191728.GS6681@dhcp22.suse.cz> <1570563324.5576.309.camel@lca.pw> <20191009114903.aa6j6sa56z2cssom@pathway.suse.cz> <1570626402.5937.1.camel@lca.pw> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1570626402.5937.1.camel@lca.pw> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 09-10-19 09:06:42, Qian Cai wrote: [...] > https://lore.kernel.org/linux-mm/1570460350.5576.290.camel@lca.pw/ > > [??297.425964] -> #1 (&port_lock_key){-.-.}: > [??297.425967]????????__lock_acquire+0x5b3/0xb40 > [??297.425967]????????lock_acquire+0x126/0x280 > [??297.425968]????????_raw_spin_lock_irqsave+0x3a/0x50 > [??297.425969]????????serial8250_console_write+0x3e4/0x450 > [??297.425970]????????univ8250_console_write+0x4b/0x60 > [??297.425970]????????console_unlock+0x501/0x750 > [??297.425971]????????vprintk_emit+0x10d/0x340 > [??297.425972]????????vprintk_default+0x1f/0x30 > [??297.425972]????????vprintk_func+0x44/0xd4 > [??297.425973]????????printk+0x9f/0xc5 > [??297.425974]????????register_console+0x39c/0x520 > [??297.425975]????????univ8250_console_init+0x23/0x2d > [??297.425975]????????console_init+0x338/0x4cd > [??297.425976]????????start_kernel+0x534/0x724 > [??297.425977]????????x86_64_start_reservations+0x24/0x26 > [??297.425977]????????x86_64_start_kernel+0xf4/0xfb > [??297.425978]????????secondary_startup_64+0xb6/0xc0 > > where?the report again show the early boot call trace for the locking > dependency, > > console_owner --> port_lock_key > > but that dependency clearly not only happen in the early boot. Can you provide an example of the runtime dependency without any early boot artifacts? Because this discussion really doens't make much sense without a clear example of a _real_ lockdep report that is not a false possitive. All of them so far have been concluded to be false possitive AFAIU. -- Michal Hocko SUSE Labs