Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp187995iob; Mon, 2 May 2022 16:39:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx2SXcnQyTn8h38kEXyHHTCd60B0+R3tH/jZKwLza7Vb+nGqtyZwpe134NSywpS2UWxndVh X-Received: by 2002:a17:90a:d3d1:b0:1bb:fdc5:182 with SMTP id d17-20020a17090ad3d100b001bbfdc50182mr1751613pjw.206.1651534798375; Mon, 02 May 2022 16:39:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651534798; cv=none; d=google.com; s=arc-20160816; b=cWSpF2UwS+xFMwnqyPNflGgRktC5r2JMEy2oez35LLkB0VJ+3BDAAyxr2RumjxNOH7 JIFwC84miHbD+kA0dUDy6feEg2URwXyOYmhBGO3NG9QtL4Y1dquSAX8Zh1nWGRPh3e9i qAHW51gf1xBQ3/RlxI/3JMgepTRdCsdyN3k2FasrmSBKPeWPwzvkzThPf7UtISC9sd8c m625cwXt4t9pdWQMaxGqKsNlgaCXwIw0sBUolMCnrrKgp6hPgrioo+U4aPxwEmAR+Lni RufKLQbhUcR+q7h80i81CSEkDfDE8UeMnNzDW43Yqd7aMTBHvYsVUEaBttaA8TGzCSzV kwxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:references :in-reply-to:subject:cc:to:dkim-signature:dkim-signature:from; bh=Qg1MCgJs2GcRC2WuVMspd/xJnQOLWy76IzXScV+vSNk=; b=PtHRJzPoTdR6d4/YUU23LxP0ne4cf8SHc3El8qy8Q0YXFyut5MM2oQ9nAgGykb4lHq YfXK6wtYrBEHD4UDmFu5p1ck5Rdwmf/5wS0HXd8AyNB0Zqz5jI1lP+rxoBmcnBal5rds Lw1eq4NSpIGTVWqgDTWRTKA/uQMaArog3iJPywYkNKRZYM9PgFr01Xszc4O9AzotFImU +IeM0O2s5nFIHcB6wqaD2o2VxdY2Yx5do+I9qVQDvl6jXztuQH70wDut/QY6KGHIP/p7 eV7qpjrEgc5iZsaIjKKZPhdk5Kh0lqukDtojXXWSKSV4BuJ/vySVtUGq0R9zuxfubzOU 2NIw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=IqVNzG6j; dkim=neutral (no key) header.i=@linutronix.de; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id u5-20020a17090a4bc500b001d1c84b8ea2si460129pjl.156.2022.05.02.16.39.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 02 May 2022 16:39:58 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=IqVNzG6j; dkim=neutral (no key) header.i=@linutronix.de; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 41E9D3298A; Mon, 2 May 2022 16:39:54 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346906AbiD3QDa (ORCPT + 99 others); Sat, 30 Apr 2022 12:03:30 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34072 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237621AbiD3QD3 (ORCPT ); Sat, 30 Apr 2022 12:03:29 -0400 Received: from galois.linutronix.de (Galois.linutronix.de [IPv6:2a0a:51c0:0:12e:550::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BE96C1E0 for ; Sat, 30 Apr 2022 09:00:04 -0700 (PDT) From: John Ogness DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1651334402; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Qg1MCgJs2GcRC2WuVMspd/xJnQOLWy76IzXScV+vSNk=; b=IqVNzG6jeHs2vRnqXL9KedXJ5Nneq6PU2Es22DQIRToeG6DxaGNtLE3alDyeUYg1NNXbOG tZ5XcIkOHripIzsDCl40gvjVoeCYFnsv3kIVTij3HVhFSbNAgA/OHxPOKwZ7QiSfsMRYY/ AKhmpUiowRf81wz2OqN2Nn8wIhdctPHZNGBoxbkYoAwaA9/I/AluFXejieBz+3KlM4g/Z2 iKRS2FZRwUrkL3wils42n513HmsViL/r2SDCbL7F2dBAwdVytWoLh/B69hWiiNosVfG2Qh qJJWhS3AfrCTqxEasuJKpNEnLt4tU06cLpUriIUxCouOwCQS9hu0CqIV3Q1SGA== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1651334402; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Qg1MCgJs2GcRC2WuVMspd/xJnQOLWy76IzXScV+vSNk=; b=lMdtoPUqqUTWycR9kLDoc1fYvtjsVvRXJ59N0pmRiF9K6BpLaSHO3eFzBjunfsjoOtlmtm 8nTsnQ0RomQDUrCQ== To: Marek Szyprowski , Petr Mladek Cc: Sergey Senozhatsky , Steven Rostedt , Thomas Gleixner , linux-kernel@vger.kernel.org, Greg Kroah-Hartman , linux-amlogic@lists.infradead.org Subject: Re: [PATCH printk v5 1/1] printk: extend console_lock for per-console locking In-Reply-To: <51dfc4a0-f6cf-092f-109f-a04eeb240655@samsung.com> References: <20220421212250.565456-1-john.ogness@linutronix.de> <20220421212250.565456-15-john.ogness@linutronix.de> <878rrs6ft7.fsf@jogness.linutronix.de> <2a82eae7-a256-f70c-fd82-4e510750906e@samsung.com> <87fslyv6y3.fsf@jogness.linutronix.de> <51dfc4a0-f6cf-092f-109f-a04eeb240655@samsung.com> Date: Sat, 30 Apr 2022 18:06:01 +0206 Message-ID: <87k0b6blz2.fsf@jogness.linutronix.de> MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-1.5 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, INVALID_DATE_TZ_ABSURD,MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022-04-29, Marek Szyprowski wrote: > The same issue happens if I boot with init=/bin/bash Very interesting. Since you are seeing all the output up until you try doing something, I guess receiving UART data is triggering the issue. > I found something really interesting. When lockup happens, I'm still > able to log via ssh and trigger any magic sysrq action via > /proc/sysrq-trigger. If you boot the system and directly login via ssh (without sending any data via serial), can you trigger printk output on the UART? For example, with: echo hello > /dev/kmsg (You might need to increase your loglevel to see it.) > It turned out that the UART console is somehow blocked, but it > receives and buffers all the input. For example after issuing "echo > >/proc/sysrq-trigger" from the ssh console, the UART console has been > updated and I see the magic sysrq banner and then all the commands I > blindly typed in the UART console! However this doesn't unblock the > console. sysrq falls back to direct printing. This would imply that the kthread printer is somehow unable to print. > Here is the output of 't' magic sys request: > > https://pastebin.com/fjbRuy4f It looks like the call trace for the printing kthread (pr/ttyAML0) is corrupt. Could you post your kernel config? John