Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8347768imu; Fri, 28 Dec 2018 16:09:33 -0800 (PST) X-Google-Smtp-Source: ALg8bN5F0dSYrAM0YiFjW12rjo8D2LdqB3ug8cgTtUpGpnI6XSmKMFhZWeiSNBUr0pdDHuMpdbg3 X-Received: by 2002:a63:1c61:: with SMTP id c33mr27470752pgm.354.1546042173134; Fri, 28 Dec 2018 16:09:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1546042173; cv=none; d=google.com; s=arc-20160816; b=loT5l2lR15+aJGC+LRDu6qNlxtCw605XWLfKSuv57KKGGiGWDSGoKL5iS/IZlTnaz7 hsXiKRq1wpJ+pObMW4cAz0kvAuvAePlDCLsYwpoEUooMQ9GulJlXh6g6QSO4pMgpY4sD cpvPc3inVtB0xFnBqzT5SKAy7GjMnHMECBuzvMQsNA+qXlKbcO35TeurUhLJ9UeFGc/g KBdqPd0Or0GEbgDukTIjs+Cw6BW1Hc+UbE34fqb4i+HuCeuxx9LfGoqi7bASSitxI73G Pvtd3Js+UhVTLQReKrN6B4vIoji/Mk3n3YEgPfkV4DJSjU4vKrUqCqUVUlCeloIp1t2g Ssxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=0sdKOoQhZFrqTcjx6cP/oPge9HCtQOyos+rjHqRsLKc=; b=JpEGhQj5DOtkKBbSqrAhSSNkpdlrmCNeGL7iuGNt27XepXPi1Vjta7puIlvRO2PTbq HOB6rBI4Cg/1+fRNejmC+lA2DR6KI8R6fU4c/KmXPB0b0vay5Dp3IxpxseBBaQXvsfJP xErF27Gl2aoPeHkwItlxRhxYpOciiD6vs6VaBlVWeac1euqPWsEVORa2LpY4OjA6ZI9C tCZfYpEF2hCpPwcu7H61mHMZxrumYc4zgN9tEFVY5Ucsts6rh4qHh1JLSbYQ+7Y8SNhl AcxKdntPLQtP+y4UTkx3vJkYZFzGSBNtMWRagryHpRl9IyXgqBkg3oc8RY+WqrFPuuzf 9l3w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pJJrjvEr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i39si39484188plb.256.2018.12.28.16.09.17; Fri, 28 Dec 2018 16:09:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pJJrjvEr; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733183AbeL1MSt (ORCPT + 99 others); Fri, 28 Dec 2018 07:18:49 -0500 Received: from mail.kernel.org ([198.145.29.99]:36836 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733017AbeL1MRp (ORCPT ); Fri, 28 Dec 2018 07:17:45 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 277B820675; Fri, 28 Dec 2018 12:17:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1545999464; bh=ShAB/C/RKQjqa7v47RkxZPS2eTI397LlYvnDQoJiBSo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pJJrjvErXLhg2V8m6nwAf95S7znzlx5ekn7V5PRgEgMDqYFXUQtQZ0le6pP2XgBZp 0CUFj2qP4xKfTkEQ2d8He5+elaw4Hgay7MOAh8/X6eBzWoF7a/yv5Tc3ohPgILvvNa Xwx6nJ68H9r0B6pxWAj8THgTy161LnBxG2OnbjRE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Steven Rostedt , Daniel Wang , Peter Zijlstra , Andrew Morton , Linus Torvalds , Alan Cox , Jiri Slaby , Peter Feiner , linux-serial@vger.kernel.org, Sergey Senozhatsky , Sergey Senozhatsky , Petr Mladek Subject: [PATCH 4.9 20/22] panic: avoid deadlocks in re-entrant console drivers Date: Fri, 28 Dec 2018 12:52:57 +0100 Message-Id: <20181228113127.547233295@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20181228113126.144310132@linuxfoundation.org> References: <20181228113126.144310132@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sergey Senozhatsky commit c7c3f05e341a9a2bd1a92993d4f996cfd6e7348e upstream. >From printk()/serial console point of view panic() is special, because it may force CPU to re-enter printk() or/and serial console driver. Therefore, some of serial consoles drivers are re-entrant. E.g. 8250: serial8250_console_write() { if (port->sysrq) locked = 0; else if (oops_in_progress) locked = spin_trylock_irqsave(&port->lock, flags); else spin_lock_irqsave(&port->lock, flags); ... } panic() does set oops_in_progress via bust_spinlocks(1), so in theory we should be able to re-enter serial console driver from panic(): CPU0 uart_console_write() serial8250_console_write() // if (oops_in_progress) // spin_trylock_irqsave() call_console_drivers() console_unlock() console_flush_on_panic() bust_spinlocks(1) // oops_in_progress++ panic() spin_lock_irqsave(&port->lock, flags) // spin_lock_irqsave() serial8250_console_write() call_console_drivers() console_unlock() printk() ... However, this does not happen and we deadlock in serial console on port->lock spinlock. And the problem is that console_flush_on_panic() called after bust_spinlocks(0): void panic(const char *fmt, ...) { bust_spinlocks(1); ... bust_spinlocks(0); console_flush_on_panic(); ... } bust_spinlocks(0) decrements oops_in_progress, so oops_in_progress can go back to zero. Thus even re-entrant console drivers will simply spin on port->lock spinlock. Given that port->lock may already be locked either by a stopped CPU, or by the very same CPU we execute panic() on (for instance, NMI panic() on printing CPU) the system deadlocks and does not reboot. Fix this by removing bust_spinlocks(0), so oops_in_progress is always set in panic() now and, thus, re-entrant console drivers will trylock the port->lock instead of spinning on it forever, when we call them from console_flush_on_panic(). Link: http://lkml.kernel.org/r/20181025101036.6823-1-sergey.senozhatsky@gmail.com Cc: Steven Rostedt Cc: Daniel Wang Cc: Peter Zijlstra Cc: Andrew Morton Cc: Linus Torvalds Cc: Greg Kroah-Hartman Cc: Alan Cox Cc: Jiri Slaby Cc: Peter Feiner Cc: linux-serial@vger.kernel.org Cc: Sergey Senozhatsky Cc: stable@vger.kernel.org Signed-off-by: Sergey Senozhatsky Signed-off-by: Petr Mladek Signed-off-by: Greg Kroah-Hartman --- kernel/panic.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) --- a/kernel/panic.c +++ b/kernel/panic.c @@ -13,6 +13,7 @@ #include #include #include +#include #include #include #include @@ -228,7 +229,10 @@ void panic(const char *fmt, ...) if (_crash_kexec_post_notifiers) __crash_kexec(NULL); - bust_spinlocks(0); +#ifdef CONFIG_VT + unblank_screen(); +#endif + console_unblank(); /* * We may have ended up stopping the CPU holding the lock (in