[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <5C4C569E8A4B9B42A84A977CF070A35B2DAC909D43@USINDEVS01.corp.hds.com>
Date: Mon, 20 Feb 2012 10:20:34 -0500
From: Seiji Aguchi <seiji.aguchi@....com>
To: Don Zickus <dzickus@...hat.com>, "x86@...nel.org" <x86@...nel.org>
CC: LKML <linux-kernel@...r.kernel.org>,
"vgoyal@...hat.com" <vgoyal@...hat.com>,
"ebiederm@...ssion.com" <ebiederm@...ssion.com>,
kexec-list <kexec@...ts.infradead.org>
Subject: RE: [PATCH] x86, kdump, ioapic: Fix kdump race with migrating irq
> -void disable_IO_APIC(void)
> +void disable_IO_APIC(int force)
> {
> /*
>+ * Use force to bust the io_apic spinlock
>+ *
>+ * There is a case where kdump can race with irq
>+ * migration such that kdump will inject an NMI
>+ * while another cpu holds the ioapic_lock to
>+ * migrate the irq. This would cause a deadlock.
>+ *
>+ * Because kdump stops all the cpus, we can safely
>+ * bust the spinlock as we are just clearing the
>+ * io apic anyway.
>+ */
>+ if (force && spin_is_locked(&ioapic_lock))
>+ /* only one cpu should be running now */
>+ spin_lock_init(&ioapic_lock);
>+
>+ /*
Hmm...
This patch solves the kdump race, but it may make us confuse when we analyze vmcore,
Because it clears value of ioapic_lock without notice.
It kernel panic is related to IO_APIC, they will check value of ioapic_lock.
So, it is better if we can restore the value of ioapic_lock after calling disable_IO_APIC(),
IOW, my idea is following.
- Backup value of ioapic_lock
- Bust ioapic_lock
- Call disable_IO_APIC()
- Restore value of ioapic_lock
But, as you are discussing with Eric, we don't need to worry about this if we can completely remove disable_IO_APIC().
Seiji
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists