Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp223956pxb; Fri, 16 Apr 2021 04:10:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwSEWxq2kLfB3q4RMo/gaaz8FDMZyXmvjEOkut1HT70kSKVEYwfpoGVbMAMV2ssnZqNoIDo X-Received: by 2002:a17:906:1984:: with SMTP id g4mr7655637ejd.525.1618571407124; Fri, 16 Apr 2021 04:10:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618571407; cv=none; d=google.com; s=arc-20160816; b=POvnffxQ6/0/cuPQ7SGf9LnxO3oXxvnCi+AeAoJYeTLCQLS53GmL41YKbP+2wSeBvm 8aL/JEM+gc5Aa/nWycrXbjFwj/uH7gM+r/xwQt00RFT4td7zfcyaNmVKeJYl1e96DCxV HUWk1UskjsGTwK6PDIEswxhMNFR3NpWaexfEKRtGhn0U+WxMfqrCxp0MEMYFCmF+gspD hYnD5Qjd/CpXLuTDFrwACwv43G8A/jrzuX+cvZd9ButN3BQAgWKIenXmD3WYXlNLvtLP bUJfHvdui2TLqR6RX8x+xFqQEuf41Mkpkgy3R8SqwwaCWmNHBhc6vX5hQFYT+sYrxJlz s4Bw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:robot-unsubscribe :robot-id:message-id:mime-version:references:in-reply-to:cc:subject :to:reply-to:sender:from:dkim-signature:dkim-signature:date; bh=4Omz5ck/URBcM76S6VasAW3N7mYXTb4rIsXZtaBctFc=; b=sFmVIDLNuW93tlMm7Ej8bqrBAcqLW9W60VvdxpqlHNC9tYHGujGXPIhof432vmyUQA fThKUsjMjT0NMCdBbdDNHwPKmlDR2dHiPALjZFyrpMbEWDMUsxPkk+aRR5gXv0TU0Eql TM903hy6qqbptcXMLQw3o0hkvd+d+D1UujI4m7pTNx/4pb8nawCwOcl6DHipEucj358b Kk+BywlcVnRpuscfE9/TD5WnKBxEJFXrjEJw1C6R8R+gs1NVrM6pm8L6tBFxSxJg/QWV jlKKhity2w3fW+dZlAq+Fex86Ktj/fAi1us3Mtzb6P5sb2NvjqXCdRY3dkJ7+b9sA1Sl BD9Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=Nwydxrf0; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=LSe5SrfT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dt1si3119984ejc.423.2021.04.16.04.09.43; Fri, 16 Apr 2021 04:10:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=Nwydxrf0; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e header.b=LSe5SrfT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242636AbhDPK5R (ORCPT + 99 others); Fri, 16 Apr 2021 06:57:17 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:56582 "EHLO galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242587AbhDPK5O (ORCPT ); Fri, 16 Apr 2021 06:57:14 -0400 Date: Fri, 16 Apr 2021 10:56:47 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1618570608; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4Omz5ck/URBcM76S6VasAW3N7mYXTb4rIsXZtaBctFc=; b=Nwydxrf0aMz6n4L4DDB8UDrtlO7vKD5s83RTE2Hvfsps039gCOHsIldLpIUhZiGNlrMqoe 1YCfbAZ/RGQZuufYX7qN0QeePUQ3cVqsWPOVmEQSNSgdd3Lpl6gQKqP89RAgVb+l+Kc25b Cn0B2YUxkkUDJ7V2zOO60CfUbTwTyXVgQum6u1uoIlhZUAOCZco4Sarffpoqa5xQwUC0Vk ZsY7BSy4J61mwsSaoNIIWjmE4yLJAmE3G2w2Fl+TjNz364UlFkvc1Qye04tTTyo/8TzyGT bcQYuBfOVog51A5+URZAXHlrMZnIipmzMl43g9scQ+Q2BUZ/tZdmS9vKo8SaJg== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1618570608; h=from:from:sender:sender:reply-to:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=4Omz5ck/URBcM76S6VasAW3N7mYXTb4rIsXZtaBctFc=; b=LSe5SrfTmEuw4xSke9yyOYEXukDCdXdg19PQ/QY8TW5T6tbtYmhzr8oi8yRJcdb6hrjWoE CdjC4AqB67QY+5Ag== From: "tip-bot2 for Georges Aureau" Sender: tip-bot2@linutronix.de Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: x86/platform] x86/platform/uv: Add more to secondary CPU kdump info Cc: Georges Aureau , Mike Travis , Borislav Petkov , Steve Wahl , x86@kernel.org, linux-kernel@vger.kernel.org In-Reply-To: <20210311151028.82678-1-mike.travis@hpe.com> References: <20210311151028.82678-1-mike.travis@hpe.com> MIME-Version: 1.0 Message-ID: <161857060713.29796.14147227157228896800.tip-bot2@tip-bot2> Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the x86/platform branch of tip: Commit-ID: 0b45143b4b9440579e7fa889708cfc4bc7fdb9a3 Gitweb: https://git.kernel.org/tip/0b45143b4b9440579e7fa889708cfc4bc7fdb9a3 Author: Georges Aureau AuthorDate: Thu, 11 Mar 2021 09:10:28 -06:00 Committer: Borislav Petkov CommitterDate: Fri, 16 Apr 2021 12:51:41 +02:00 x86/platform/uv: Add more to secondary CPU kdump info Add call to run_crash_ipi_callback() to gather more info of what the secondary CPUs were doing to help with failure analysis. Excerpt from Georges: 'It is only changing where crash secondaries will be stalling after having taken care of properly laying down "crash note regs". Please note that "crash note regs" are a key piece of data used by crash dump debuggers to provide a reliable backtrace of running processors.' Secondary change pursuant to a5f526ecb075 ("CodingStyle: Inclusive Terminology"): change master/slave to main/secondary. [ bp: Massage commit message. ] Signed-off-by: Georges Aureau Signed-off-by: Mike Travis Signed-off-by: Borislav Petkov Reviewed-by: Steve Wahl Link: https://lkml.kernel.org/r/20210311151028.82678-1-mike.travis@hpe.com --- arch/x86/platform/uv/uv_nmi.c | 39 ++++++++++++++++++++-------------- 1 file changed, 24 insertions(+), 15 deletions(-) diff --git a/arch/x86/platform/uv/uv_nmi.c b/arch/x86/platform/uv/uv_nmi.c index eafc530..f83810f 100644 --- a/arch/x86/platform/uv/uv_nmi.c +++ b/arch/x86/platform/uv/uv_nmi.c @@ -24,6 +24,7 @@ #include #include #include +#include #include #include #include @@ -834,34 +835,42 @@ static void uv_nmi_touch_watchdogs(void) touch_nmi_watchdog(); } -static atomic_t uv_nmi_kexec_failed; - #if defined(CONFIG_KEXEC_CORE) -static void uv_nmi_kdump(int cpu, int master, struct pt_regs *regs) +static atomic_t uv_nmi_kexec_failed; +static void uv_nmi_kdump(int cpu, int main, struct pt_regs *regs) { + /* Check if kdump kernel loaded for both main and secondary CPUs */ + if (!kexec_crash_image) { + if (main) + pr_err("UV: NMI error: kdump kernel not loaded\n"); + return; + } + /* Call crash to dump system state */ - if (master) { + if (main) { pr_emerg("UV: NMI executing crash_kexec on CPU%d\n", cpu); crash_kexec(regs); - pr_emerg("UV: crash_kexec unexpectedly returned, "); + pr_emerg("UV: crash_kexec unexpectedly returned\n"); atomic_set(&uv_nmi_kexec_failed, 1); - if (!kexec_crash_image) { - pr_cont("crash kernel not loaded\n"); - return; + + } else { /* secondary */ + + /* If kdump kernel fails, secondaries will exit this loop */ + while (atomic_read(&uv_nmi_kexec_failed) == 0) { + + /* Once shootdown cpus starts, they do not return */ + run_crash_ipi_callback(regs); + + mdelay(10); } - pr_cont("kexec busy, stalling cpus while waiting\n"); } - - /* If crash exec fails the slaves should return, otherwise stall */ - while (atomic_read(&uv_nmi_kexec_failed) == 0) - mdelay(10); } #else /* !CONFIG_KEXEC_CORE */ -static inline void uv_nmi_kdump(int cpu, int master, struct pt_regs *regs) +static inline void uv_nmi_kdump(int cpu, int main, struct pt_regs *regs) { - if (master) + if (main) pr_err("UV: NMI kdump: KEXEC not supported in this kernel\n"); atomic_set(&uv_nmi_kexec_failed, 1); }