From: Daniel Vetter <daniel@ffwll.ch>
To: Petr Mladek <pmladek@suse.com>
Cc: Intel Graphics Development <intel-gfx@lists.freedesktop.org>,
Daniel Vetter <daniel.vetter@intel.com>,
Peter Zijlstra <peterz@infradead.org>,
Ingo Molnar <mingo@redhat.com>, Will Deacon <will.deacon@arm.com>,
Sergey Senozhatsky <sergey.senozhatsky@gmail.com>,
Steven Rostedt <rostedt@goodmis.org>,
John Ogness <john.ogness@linutronix.de>,
linux-kernel@vger.kernel.org
Subject: Re: [Intel-gfx] [PATCH] RFC: console: hack up console_lock more v2
Date: Wed, 8 May 2019 10:17:12 +0200 [thread overview]
Message-ID: <20190508081712.GQ17751@phenom.ffwll.local> (raw)
In-Reply-To: <20190506112448.rng2oefmp2c262dq@pathway.suse.cz>
On Mon, May 06, 2019 at 01:24:48PM +0200, Petr Mladek wrote:
> On Mon 2019-05-06 11:38:13, Daniel Vetter wrote:
> > On Mon, May 06, 2019 at 10:26:28AM +0200, Petr Mladek wrote:
> > > On Mon 2019-05-06 10:16:14, Petr Mladek wrote:
> > > > On Mon 2019-05-06 09:45:53, Daniel Vetter wrote:
> > > > > console_trylock, called from within printk, can be called from pretty
> > > > > much anywhere. Including try_to_wake_up. Note that this isn't common,
> > > > > usually the box is in pretty bad shape at that point already. But it
> > > > > really doesn't help when then lockdep jumps in and spams the logs,
> > > > > potentially obscuring the real backtrace we're really interested in.
> > > > > One case I've seen (slightly simplified backtrace):
> > > > >
> > > > > Call Trace:
> > > > > <IRQ>
> > > > > console_trylock+0xe/0x60
> > > > > vprintk_emit+0xf1/0x320
> > > > > printk+0x4d/0x69
> > > > > __warn_printk+0x46/0x90
> > > > > native_smp_send_reschedule+0x2f/0x40
> > > > > check_preempt_curr+0x81/0xa0
> > > > > ttwu_do_wakeup+0x14/0x220
> > > > > try_to_wake_up+0x218/0x5f0
> > > >
> > > > try_to_wake_up() takes p->pi_lock. It could deadlock because it
> > > > can get called recursively from printk_safe_up().
> > > >
> > > > And there are more locks taken from try_to_wake_up(), for example,
> > > > __task_rq_lock() taken from ttwu_remote().
> > > >
> > > > IMHO, the most reliable solution would be do call the entire
> > > > up_console_sem() from printk deferred context. We could assign
> > > > few bytes for this context in the per-CPU printk_deferred
> > > > variable.
> > >
> > > Ah, I was too fast and did the same mistake. This won't help because
> > > it would still call try_to_wake_up() recursively.
> >
> > Uh :-/
> >
> > > We need to call all printk's that can be called under locks
> > > taken in try_to_wake_up() path in printk deferred context.
> > > Unfortunately it is whack a mole approach.
> >
> > Hm since it's whack-a-mole anyway, what about converting the WARN_ON into
> > a prinkt_deferred, like all the other scheduler related code? Feels a
> > notch more consistent to me than leaking the printk_context into areas it
> > wasn't really meant built for. Scheduler code already fully subscribed to
> > the whack-a-mole approach after all.
>
> I am not sure how exactly you mean the conversion.
>
> Anyway, we do not want to use printk_deferred() treewide. It reduces
> the chance that the messages reach consoles. Scheduler is an
> exception because of the possible deadlocks.
>
> A solution would be to define WARN_ON_DEFERRED() that would
> call normal WARN_ON() in printk deferred context and
> use in scheduler.
Sent it out, and then Sergey pointed out printk_safe_enter/exit (which I
guess is what you meant, and which I missed), but we're doing this already
around the up() call in __up_console_sem.
So I think these further recursions you're pointed out are already handled
correctly, and all we need to do is to break the loop involving
semaphore.lock of the console_lock semaphore only. Which I think this
patch here achieves.
Thoughts? Or are we again missing something here?
Thanks, Daniel
--
Daniel Vetter
Software Engineer, Intel Corporation
http://blog.ffwll.ch
next prev parent reply other threads:[~2019-05-08 8:17 UTC|newest]
Thread overview: 20+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-05-02 14:16 [PATCH] RFC: console: hack up console_trylock more Daniel Vetter
2019-05-02 15:15 ` ✗ Fi.CI.CHECKPATCH: warning for " Patchwork
2019-05-02 15:50 ` ✓ Fi.CI.BAT: success " Patchwork
2019-05-02 20:16 ` ✓ Fi.CI.IGT: " Patchwork
2019-05-03 15:14 ` [PATCH] " Petr Mladek
2019-05-06 7:11 ` Daniel Vetter
2019-05-06 7:48 ` Petr Mladek
2019-05-06 8:40 ` Daniel Vetter
2019-05-06 7:45 ` [PATCH] RFC: console: hack up console_lock more v2 Daniel Vetter
2019-05-06 8:16 ` Petr Mladek
2019-05-06 8:26 ` Petr Mladek
2019-05-06 9:38 ` Daniel Vetter
2019-05-06 11:24 ` Petr Mladek
2019-05-08 8:17 ` Daniel Vetter [this message]
2019-05-09 15:08 ` [Intel-gfx] " Petr Mladek
2019-05-06 8:20 ` Petr Mladek
2019-05-09 10:32 ` [Intel-gfx] " Chris Wilson
2019-05-09 13:05 ` Peter Zijlstra
2019-05-06 8:08 ` ✗ Fi.CI.CHECKPATCH: warning for RFC: console: hack up console_trylock more (rev2) Patchwork
2019-05-06 8:30 ` ✗ Fi.CI.BAT: failure " Patchwork
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190508081712.GQ17751@phenom.ffwll.local \
--to=daniel@ffwll.ch \
--cc=daniel.vetter@intel.com \
--cc=intel-gfx@lists.freedesktop.org \
--cc=john.ogness@linutronix.de \
--cc=linux-kernel@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=peterz@infradead.org \
--cc=pmladek@suse.com \
--cc=rostedt@goodmis.org \
--cc=sergey.senozhatsky@gmail.com \
--cc=will.deacon@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox