Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp745281ybl; Wed, 4 Dec 2019 10:09:33 -0800 (PST) X-Google-Smtp-Source: APXvYqxXARsncEmqCgfHqNMmOPl1hoHH3GeobPhbVGvCM3EccYi2A04nRT7FQm0nZPrM4ogDurob X-Received: by 2002:a9d:6f85:: with SMTP id h5mr3564309otq.19.1575482973522; Wed, 04 Dec 2019 10:09:33 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1575482973; cv=none; d=google.com; s=arc-20160816; b=ERv2hSQMDN0RtqQgV4hoyy75ai1/Mp6Dcq3R4LhwRbR0yzzzv0tYOj6BLpycyfdkeY rZIG3+WaNQ0iOisnhVGbDkrw7RovdHeitAMBe4jshRYWmAcBHazWLP0GcqUnAO+l+dkz sDS4xj8V/TpKESdQ/XvnmPxW7h1ttCGOJ90jXurYo6di2dxoFhs51Re8N6qBM0FD3OpS s1SEIu1hgeYZcQyFrRKGSR4ZsjSez382VgTPiTPtYYKQcKJVpaIDaEUB0O5/YpOeO1ca 9QqGwhgP8GV+6Flvp7m7bfSxd69osYRfrf7EhSH7bpkh46uqDtkDYa/GYRE7wtLilyaz rQeA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ykb18rTV+JCSNmYZxWpyoF7ofGDOO8bkN8kN2gRlBz4=; b=XTRBaE1Jr4Iiqr0De9+JlurVjJk+qOWarBLx8SCGF0PpliVYy7JzRqfGX3SmqhzDI9 WjpWshEoeuDsMZc1YjcAbRXuxJ57Iv0WuUQe4mxeRF4Ahvv9NRPI74AWq7eTscbu8/i/ jRG96jJcc8HHO/OhpO0+G1awfRNUR0jYQbISn+7OtNUcz8TVDQjqmJStj4cdFZzLHqJg 0iRhDSUNsibgC308UyrYKATrh7ZNgHyf+t+9QQ6+2u2OP+x5XGCShxWZmvEuUnXd9dp5 EHLQIOjlOl9rdPYJX1PRQqEk1JiHmO5Q2mefFYwT0J1h7cNaG5drjCElqRStkbNnZxKA r8ng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=euvaVx0u; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o84si3311431oig.204.2019.12.04.10.09.19; Wed, 04 Dec 2019 10:09:33 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=euvaVx0u; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730706AbfLDSHI (ORCPT + 99 others); Wed, 4 Dec 2019 13:07:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:56326 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729039AbfLDSHF (ORCPT ); Wed, 4 Dec 2019 13:07:05 -0500 Received: from localhost (unknown [217.68.49.72]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6388D206DF; Wed, 4 Dec 2019 18:07:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1575482824; bh=WbGhciv/qtk73dVy7tm29B/NrK/nbLd9KuYwwCP2gxM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=euvaVx0ussl4iv/ZGgRkSKvNkJqSrUtodz4jsaUh/NcskhXT5RKr1H1nr0TgG3yj7 e8Bl4bveiv4MsGT7RQXQbfifTJG8u9+a6qqxNvM1UCoU5VUvMrcVL5DWJ9kZpy7I0t qow1dPGOO3E4lWUzfckCdELt1Fy5pzmsypR0fbho= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Borislav Petkov , James Morse , "Rafael J. Wysocki" , Sasha Levin Subject: [PATCH 4.14 150/209] ACPI / APEI: Dont wait to serialise with oops messages when panic()ing Date: Wed, 4 Dec 2019 18:56:02 +0100 Message-Id: <20191204175333.828341942@linuxfoundation.org> X-Mailer: git-send-email 2.24.0 In-Reply-To: <20191204175321.609072813@linuxfoundation.org> References: <20191204175321.609072813@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: James Morse [ Upstream commit 78b0b690f6558ed788dccafa45965325dd11ba89 ] oops_begin() exists to group printk() messages with the oops message printed by die(). To reach this caller we know that platform firmware took this error first, then notified the OS via NMI with a 'panic' severity. Don't wait for another CPU to release the die-lock before panic()ing, our only goal is to print this fatal error and panic(). This code is always called in_nmi(), and since commit 42a0bb3f7138 ("printk/nmi: generic solution for safe printk in NMI"), it has been safe to call printk() from this context. Messages are batched in a per-cpu buffer and printed via irq-work, or a call back from panic(). Link: https://patchwork.kernel.org/patch/10313555/ Acked-by: Borislav Petkov Signed-off-by: James Morse Signed-off-by: Rafael J. Wysocki Signed-off-by: Sasha Levin --- drivers/acpi/apei/ghes.c | 2 -- 1 file changed, 2 deletions(-) diff --git a/drivers/acpi/apei/ghes.c b/drivers/acpi/apei/ghes.c index 5889f6407fea8..9c31c7cd5cb5e 100644 --- a/drivers/acpi/apei/ghes.c +++ b/drivers/acpi/apei/ghes.c @@ -33,7 +33,6 @@ #include #include #include -#include #include #include #include @@ -936,7 +935,6 @@ static int ghes_notify_nmi(unsigned int cmd, struct pt_regs *regs) sev = ghes_severity(ghes->estatus->error_severity); if (sev >= GHES_SEV_PANIC) { - oops_begin(); ghes_print_queued_estatus(); __ghes_panic(ghes); } -- 2.20.1