Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp42625ybk; Tue, 12 May 2020 14:51:01 -0700 (PDT) X-Google-Smtp-Source: APiQypI7eCqQcsc9qW/U/Jfvxit3ymJ/TzNmOj3blKWVjBwhZ1XdfmaRBpXh6j4VnmlULfYl/EBk X-Received: by 2002:aa7:d455:: with SMTP id q21mr19067865edr.235.1589320261359; Tue, 12 May 2020 14:51:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589320261; cv=none; d=google.com; s=arc-20160816; b=hAPSY1ftolN5FOLtaommDIoUZQHGUnLhVlKGWDBwD88tcdscz0ndJO6IqRgh+UD7Ud rBf9qG8OMx9htfLoNgznph0xuTQeleoP/aHnCSn6eWG+X+cu1fCoZZXTXFEJfqVF8ipM evH9By59kgycIFDK5EIFmOUcYkA/RZHUmFCnvCi/8KNUJEDBev5g5UrboqAi6J0vpBRQ x99wjVN/TIWKuBcvT24y73TEVZW7as0EgkrMv10vsUHvlhO6AMuLsAuetCdCStysV6iL rrJ5Yb5RdO5bMrdMA6RsXAGbDrETP5R9mh3VbqP7cHKrmoT3kCoKWU4zQZn31vqrrY5l KJCw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=XgpxXurEcy9zZtLcodFISaUMHDUu4yvx13d5eZk7VhE=; b=fLA8wd4KkkdnzLw6uKgKbBzzyOihKBlZ+UiF0WktFgvVzu6OPSeg/IQzpFvKavU1FF qduC0duphlydYAvrLVdCCJ7StYd3HUiKstHy+h524X4vcWbE5fm4khS+IixedG/S9jv6 SLrM/gPzaGKdy56QAji4QDOfF3QGREiZWLmoY473Yivbj2TT3H89mdhn+a9bfgSAjSuW VWC1zbm7dc6Hbo3886aTifKcZknQ1/4qPpJ7YvOaUsa9FLUpDeJd6NvcotuZBVbCK42g mWyRQynKpeKebSKcZO+GGJjYsrw4IeWFf/G9/jTxyUtQShjFprQ7YHG6mOmGw6QX3Xzq KryA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qQsMGlpx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dn16si9147068edb.488.2020.05.12.14.50.38; Tue, 12 May 2020 14:51:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=qQsMGlpx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731581AbgELVsF (ORCPT + 99 others); Tue, 12 May 2020 17:48:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50012 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1731171AbgELVsF (ORCPT ); Tue, 12 May 2020 17:48:05 -0400 Received: from mail-qt1-x843.google.com (mail-qt1-x843.google.com [IPv6:2607:f8b0:4864:20::843]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ECC32C061A0C for ; Tue, 12 May 2020 14:48:04 -0700 (PDT) Received: by mail-qt1-x843.google.com with SMTP id i68so12514196qtb.5 for ; Tue, 12 May 2020 14:48:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=XgpxXurEcy9zZtLcodFISaUMHDUu4yvx13d5eZk7VhE=; b=qQsMGlpxbjrua6TZPluaYWlJ0vC0Gut7ZDPZk+tR7FRTEV1pu6b36VlouDfqdyGdo5 pgyqfrupoXbujMOF5KCyMqw2EyNFdaol7rULyQS50DzMxXn8JTJRe8bgVPoIa/jyh0lI 5wiOjf3TmDVXGeW34jsFHWYXeccZ2NjASZYNTfNP49fGe/XEdhdSekdIexOQ9RXYV+XW 6KzSGY9InBMx/onm3lpFUTEUIjeT14ACLw0gsg7tc76IMOh+rJnu+KJuBDExFO8LR0wG of2M6PRFbpcLx4rMufuHw5+L+HBoBUcrJk5HmCu6h6dYZAKxn5GEvmYnzeYFDhzYaGUC SOMQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=XgpxXurEcy9zZtLcodFISaUMHDUu4yvx13d5eZk7VhE=; b=HmKVq6qigW9iwnMasoo7uoettgNVLUaSl8UT2VduqQKvw7WpwHRIDvkvJ4U53RQYzM WjvsDuYg5vs/EIcTkAB6D0U1KPTh6p+YBLXk1B1Nl8kkkY//YHsF4czEGseJwk/XbzcW C3YeVrggc7OlBqvTc74WKXL/O+E1G9tig0stES+IT/fY8EWr+n5icYOfsqRYKVR+1t+6 2Co1ljgN8Y6DcH7/mVzX68bzWXNsNbTYlKY6RgpJTs8zEp/O5fW5MYn3AXX0Rb0mRjHZ oWHeRDYyzUf2hbV2g83zzhiSHKtCpvKHUxgyS18vztrsL1YDh8TfxmSh4u2GOqyVWnIC 3dOw== X-Gm-Message-State: AOAM532XDeTdskW2BMbNXgtbnLF7irEJ+xTJ1UBR3NJ/8qeYAcxdIFNI TwLWBaTjp7jp4hcQHGxLj5w= X-Received: by 2002:ac8:7947:: with SMTP id r7mr1467325qtt.180.1589320084128; Tue, 12 May 2020 14:48:04 -0700 (PDT) Received: from LeoBras.aus.stglabs.ibm.com (179-125-143-209.dynamic.desktop.com.br. [179.125.143.209]) by smtp.gmail.com with ESMTPSA id d57sm700550qta.51.2020.05.12.14.47.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 May 2020 14:48:03 -0700 (PDT) From: Leonardo Bras To: Michael Ellerman , Benjamin Herrenschmidt , Paul Mackerras , Thomas Gleixner , Alexios Zavras , Enrico Weigelt , Greg Kroah-Hartman , Leonardo Bras , Christophe Leroy Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 1/1] powerpc/crash: Use NMI context for printk when starting to crash Date: Tue, 12 May 2020 18:45:35 -0300 Message-Id: <20200512214533.93878-1-leobras.c@gmail.com> X-Mailer: git-send-email 2.25.4 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Currently, if printk lock (logbuf_lock) is held by other thread during crash, there is a chance of deadlocking the crash on next printk, and blocking a possibly desired kdump. At the start of default_machine_crash_shutdown, make printk enter NMI context, as it will use per-cpu buffers to store the message, and avoid locking logbuf_lock. Suggested-by: Michael Ellerman Signed-off-by: Leonardo Bras --- Changes since v1: - Added in-code comment explaining the need of context change - Function moved to the start of default_machine_crash_shutdown, to avoid locking any printk on crashing routine. - Title was 'Use NMI context for printk after crashing other CPUs' --- arch/powerpc/kexec/crash.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/powerpc/kexec/crash.c b/arch/powerpc/kexec/crash.c index d488311efab1..c9a889880214 100644 --- a/arch/powerpc/kexec/crash.c +++ b/arch/powerpc/kexec/crash.c @@ -311,6 +311,9 @@ void default_machine_crash_shutdown(struct pt_regs *regs) unsigned int i; int (*old_handler)(struct pt_regs *regs); + /* Avoid hardlocking with irresponsive CPU holding logbuf_lock */ + printk_nmi_enter(); + /* * This function is only called after the system * has panicked or is otherwise in a critical state. -- 2.25.4