Received: by 10.213.65.68 with SMTP id h4csp1122207imn; Wed, 14 Mar 2018 10:12:29 -0700 (PDT) X-Google-Smtp-Source: AG47ELsXARIfEu7/I/IooKvhH6NjIF9hpkpAqdBkoO/aEk7Y58F5EdgPPAMhZrhEdFj4NBQPVhLh X-Received: by 10.99.95.78 with SMTP id t75mr1946671pgb.330.1521047549043; Wed, 14 Mar 2018 10:12:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521047549; cv=none; d=google.com; s=arc-20160816; b=FefjE8MWpBR2vZYC/MvvA4MuHjCplKLogWnr/Wenu+bjKI5Q/Hf5sZUk8l7u5EOVUx 8rBc1iVNeM0ekO29cB3dLRfseguWp8gLDrInNKsEUTHyYSN1pruegVb7fv2f9oWk0cJ6 L/tMruMXZONYKx0uPlhVyXKqfZ74RapMI8Yr+BIgM6Rgxif/Qlbb03GbJv76mSEAHR53 iMWwJJbe/YSkh2GyrRmdl8n7ho8R/RKPkpP1GCykqGZNeTYaMa8CNCkOEeuRjZuf0a7N S/fGDZU4vcvCHl+4OgYgFopc8j6KaE1tmB+mc3Lf1bHZDEU0/Sra4IHALZAY7dUG4jXo 1Z0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date :arc-authentication-results; bh=EtIDSnWl9uD09zzOx1+g9m+Zv1PoSmVzuc0WnKyaQfM=; b=LotJdkgYZxGyZEDqBKHpEGjHfL3FGGBegane4p1jushQHj/7szGBAe5ncVewWQF1O+ gM/7800MAoW3lbmu/1FIeZWkrxXq0ShI+P9TvxCLvjFStWnXHgDvny5j41f/WzJtzUz6 PNusdR4xVfY3BpdXKwkh4EnDxw6U2RbOUCtmLt8bWChpaUZCkp5LVtX5DxXSa32hsW22 SSm7FbWyOTbUBcf96CyIlfzKom4gRcXysq1UYouSWXX6gaO+e1XjGj3JmE0eaZOeBD0q nSl91xUK0/WLiMaJo7evQ61vgDvfRY0CSuTo3go7FYt90OVvliYdc4up6EEKgMgFdIiz SV1Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3-v6si2249018plx.463.2018.03.14.10.12.14; Wed, 14 Mar 2018 10:12:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751517AbeCNRLK (ORCPT + 99 others); Wed, 14 Mar 2018 13:11:10 -0400 Received: from Galois.linutronix.de ([146.0.238.70]:51804 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751000AbeCNRLJ (ORCPT ); Wed, 14 Mar 2018 13:11:09 -0400 Received: from hsi-kbw-5-158-153-52.hsi19.kabel-badenwuerttemberg.de ([5.158.153.52] helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1ew9vf-0006Aa-7r; Wed, 14 Mar 2018 18:11:07 +0100 Date: Wed, 14 Mar 2018 18:11:06 +0100 (CET) From: Thomas Gleixner To: Mark Rutland cc: Marc Zyngier , linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, Jason Cooper , Grzegorz Jaszczyk Subject: Re: [PATCH 0/3] irqchip: GIC kexec/kdump improvement and workarounds In-Reply-To: <20180314165708.daoui66waxvicciq@lakrids.cambridge.arm.com> Message-ID: References: <20180313172103.24281-1-marc.zyngier@arm.com> <20180313175156.gmncij4rnqcdl5ie@lakrids.cambridge.arm.com> <72c7a6d2-a4c4-26b2-2982-c1d1ffb39b81@arm.com> <20180314165708.daoui66waxvicciq@lakrids.cambridge.arm.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 14 Mar 2018, Mark Rutland wrote: > On Tue, Mar 13, 2018 at 06:35:07PM +0000, Marc Zyngier wrote: > > On 13/03/18 17:51, Mark Rutland wrote: > > > On Tue, Mar 13, 2018 at 05:21:00PM +0000, Marc Zyngier wrote: > > >> As kexec and kdump are getting used a bit more intensively, I've been > > >> made aware of a number of shortcomings. > > >> > > >> The main gripe is from folks trying to launch a kdump kernel from > > >> within an interrupt handler. If using EOImode==1, things work as > > >> expected. If using EOImode==0 (such as in a guest), the secondary > > >> kernel hangs as the previous interrupt hasn't been EOI'd, and the > > >> active priority is still set. The first two patches are addressing > > >> this situation for both GICv2 and GICv3 by reseting the APRs to their > > >> default value. > > > > > > As a more general thing, if irqchip drivers have state that needs to be > > > reset in their init code, can we live all this irqchip reset to the > > > crashdump kernel, and kill machine_kexec_mask_interrupts() entirely? > > > > We could, once we know for sure that all the potential irqchips have > > been fixed. Or we could just remove it immediately, and see what breaks. > > I would be very tempted to do the latter. Makes sense. Do we have any indicator that tells us that a particular irq chip is missing something in the init code or do we have to rely on crash reports? Thanks, tglx