Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp7777773rwl; Tue, 10 Jan 2023 05:24:17 -0800 (PST) X-Google-Smtp-Source: AMrXdXvZR/Dc+fhVNZRtaOpyLSfavyQUnW3jKGooDB4XOutVSOPOfm6HYvK3CBaTQfaIQE52Mler X-Received: by 2002:aa7:d51a:0:b0:479:6c4f:40df with SMTP id y26-20020aa7d51a000000b004796c4f40dfmr61122311edq.18.1673357057365; Tue, 10 Jan 2023 05:24:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673357057; cv=none; d=google.com; s=arc-20160816; b=VMdj4RZ7YZjxXGsWQW9pkX51T4/E0+MDmDryuqJUWLmTOcZ60+S4PFncZXZR0LtjkT Bvz1Cd0RbKKwf+DRpRTa405P94XbbqZeTrPWcBz3Ama0i+0WJ5rL5m2IhZh6zNsvuOCx ewxXq+BIWtAIIHh5ONii5pVf893Op2dRl4WKgABT43eJUkFMfZUBf69q4e+cBWT02s8M OByCc70KZMJHRm6LrGup54u4ng4mE+NfyXN0rGUB1bBCBMXgx5T3XJxE+oZydLidcYUY t8o6AYQobXEugQIiargrUQ52ek99wO/Muzsna9Dg+f0yBtYC1G3jX+L52M6nOfLFoYsV t1vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=DiejJlDIHtZZWzCf+Dygk4bAaim7kdGfVBh1/zOmhyk=; b=oEWcXUKMIiugVwAnOGY/zTaEsfcl2BaO/afCufaaGp3kESOXFMuhwmWR3BDJpVG+PD DrQW4B1UCwHFCETcYlnLH4h3t9v6NYJwEvpAPoxbZ1SlItpocGO5AdZdNbJiQxkpOgI1 HsPhqiBFpS/pIKA6JsmLz2uXnJGN6nnOhYdkDKuRa1o3oUkbk2jrBa67qgYPlgcoKThA 0L0s6XZz5Dqhd+pzLYpLhU6u5zWCqAEZFo23rAudmwzT08VvbLPde+kMcuS+6L/LqGak 6Hq7Qbwrox87ngRin4naLafDsqQrYxizK446Pb24YR8M+ItTpzHnYR7DosBUZBZVAv3G GyFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id dp16-20020a170906c15000b0085b4d436b4csi401222ejc.998.2023.01.10.05.24.04; Tue, 10 Jan 2023 05:24:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238500AbjAJMuX (ORCPT + 53 others); Tue, 10 Jan 2023 07:50:23 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57238 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238429AbjAJMuR (ORCPT ); Tue, 10 Jan 2023 07:50:17 -0500 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B49635004F for ; Tue, 10 Jan 2023 04:50:15 -0800 (PST) Received: from kwepemi500024.china.huawei.com (unknown [172.30.72.53]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4NrrBZ67B1zqV2V; Tue, 10 Jan 2023 20:45:26 +0800 (CST) Received: from [10.174.179.163] (10.174.179.163) by kwepemi500024.china.huawei.com (7.221.188.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.34; Tue, 10 Jan 2023 20:50:11 +0800 Message-ID: <0736f30a-294e-b8e0-f085-37b03e4f7efe@huawei.com> Date: Tue, 10 Jan 2023 20:50:10 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.1.2 Subject: Re: [PATCH -v2] x86/boot/compressed: Register dummy NMI handler in EFI boot loader, to avoid kdump crashes Content-Language: en-US To: Ingo Molnar , Borislav Petkov CC: , , , , , , , , , , , , Tony Luck References: <20230110102745.2514694-1-zengheng4@huawei.com> From: Zeng Heng In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.179.163] X-ClientProxiedBy: dggems701-chm.china.huawei.com (10.3.19.178) To kwepemi500024.china.huawei.com (7.221.188.100) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2023/1/10 20:34, Ingo Molnar wrote: > * Borislav Petkov wrote: > >>> mce_panic -> panic -> __crash_kexec() >>> >>> Yes? >>> >>> If so, then we should make sure we have *exited* #MC context before calling >>> panic() and not have to add hacks like this one of adding an empty NMI handler. >>> >>> But I'm only speculating as it is hard to make sense of all this text. >> IOW, does this help? >> >> --- >> diff --git a/arch/x86/kernel/cpu/mce/core.c b/arch/x86/kernel/cpu/mce/core.c >> index 7832a69d170e..55437d8a4fad 100644 >> --- a/arch/x86/kernel/cpu/mce/core.c >> +++ b/arch/x86/kernel/cpu/mce/core.c >> @@ -287,6 +287,7 @@ static noinstr void mce_panic(const char *msg, struct mce *final, char *exp) >> if (panic_timeout == 0) >> panic_timeout = mca_cfg.panic_timeout; >> panic(msg); >> + mce_wrmsrl(MSR_IA32_MCG_STATUS, 0); I'm willing to test any patch provided, but the panic() is never return and the mce_wrmsrl() would be never called. Am I wrong? B.R., Zeng Heng > So your suggestion was to exit MC context 'before' the panic() call - but > the patch calls it 'after' - was that intentional? > > Thanks, > > Ingo