Received: by 2002:a25:f815:0:0:0:0:0 with SMTP id u21csp745077ybd; Wed, 26 Jun 2019 05:27:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqzCl9hvRyGy1Xr5Iyum+1C8YW1WkFvc4tKZgukXuIq3Azfn/dCaIkK5U2OXLIDvtCCc8rgF X-Received: by 2002:a17:902:3103:: with SMTP id w3mr5321565plb.84.1561552076814; Wed, 26 Jun 2019 05:27:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561552076; cv=none; d=google.com; s=arc-20160816; b=qnyIX1aU+jWtfkIDnIAK+qS36x45BUFOP8svn+ImybpdbPO3KzigTcsisvgIRvIQe8 16fD4ZEKP1DJRfEJWCG2b+NonRU5i7EMCH79HaTYoJcFObhlb2HMknq7n3vWEGXWsvEH kUVCy4GKMKxvS75h1GEi2a4qTykZJ09OIpdAgflHRmNEXfq0TwAEOB13ThADInnzJGl+ OTD4+PcMO1W9Nu8uU/EMc7nCrnj+mtkEWNelxKWoGURzb7cWo0BTdvjS75cww2XXDjhe +EyqPFfnOrggZ6R4tIYzfKPYhkPi8a8C9KnvmZHAhyPJexhYx/AhaN2ikrVaZfIquGXC lhkg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=pfDPD3C8EcRHAIk8NzhpGEznyHJnHwtPtc3LK28zix8=; b=Wx0a52k/d5Bw92fHIrFLPxY4fkc4uYGhnTVblILpJqDVldMuD9TtjrpVLCbnWfFsaV FhScybkw0vliO6Jl1yAVlhcZNDAYOkIEq9Gno+ZNz5b6CPwfoj5R7XtGvrEVKi4rbRBK 15+FGVzsxyOWnQ0lBvXz7ys5GB25mqB5N6IUAUT8FNZbGqU9j8Odw3xdEo1RdJ2rmJZT 6lfkqi3K5/XLDpvH70+f1lwKESg8W0rDiNwT6wLQLpoOvgdb0PbvZLV1ZmcrJzsZOSKG gRHg9v7jykQWJo9pgEpyqkyW1ZlJFRXq+CMdTnqaPzcrw0398AcD0iy5JpchSiY0Nd1W LdWQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v16si1888843pjb.91.2019.06.26.05.27.39; Wed, 26 Jun 2019 05:27:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727110AbfFZM0M (ORCPT + 99 others); Wed, 26 Jun 2019 08:26:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:59864 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726104AbfFZM0M (ORCPT ); Wed, 26 Jun 2019 08:26:12 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BCABF204FD; Wed, 26 Jun 2019 12:26:10 +0000 (UTC) Date: Wed, 26 Jun 2019 08:26:09 -0400 From: Steven Rostedt To: Josh Poimboeuf Cc: Linus Torvalds , Chris Wilson , Linux List Kernel Mailing , Thomas Gleixner Subject: Re: NMI hardlock stacktrace deadlock [was Re: Linux 5.2-rc5] Message-ID: <20190626082609.5c8489f0@gandalf.local.home> In-Reply-To: <20190625030345.dwbydi2w67mpp4zq@treble> References: <156094799629.21217.4574572565333265288@skylake-alporthouse-com> <156097197830.664.13418742301997062555@skylake-alporthouse-com> <20190625030345.dwbydi2w67mpp4zq@treble> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 24 Jun 2019 22:03:45 -0500 Josh Poimboeuf wrote: > Looking at the dmesg, panic_on_oops doesn't seem to be enabled: it went > through the rewind_stack_do_exit() path instead of the panic() path. So > the system is apparently not configured to reboot on oops. "Command line: BOOT_IMAGE=/boot/drm_intel root=/dev/sda1 rootwait fsck.repair=yes intel_iommu=igfx_off nmi_watchdog=panic,auto panic=5 softdog.soft_panic=5 drm.debug=0xe log_buf_len=1M 3 ro" > > So I'd say the hang was presumably caused by a lock held by the oopsing > code. So it looks normal to me, other than the original oops. > Looks like its missing "oops=panic", as the documentation says: oops=panic Always panic on oopses. Default is to just kill the process, but there is a small probability of deadlocking the machine. This will also cause panics on machine check exceptions. Useful together with panic=30 to trigger a reboot. -- Steve