[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZAdgtcbPyQ/8dIDw@alley>
Date: Tue, 7 Mar 2023 17:05:09 +0100
From: Petr Mladek <pmladek@...e.com>
To: John Ogness <john.ogness@...utronix.de>
Cc: Sergey Senozhatsky <senozhatsky@...omium.org>,
Steven Rostedt <rostedt@...dmis.org>,
Thomas Gleixner <tglx@...utronix.de>,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH printk v1 02/18] printk: Add NMI check to
down_trylock_console_sem()
On Thu 2023-03-02 21:02:02, John Ogness wrote:
> The printk path is NMI safe because it only adds content to the
> buffer and then triggers the delayed output via irq_work. If the
> console is flushed or unblanked (on panic) from NMI then it can
> deadlock in down_trylock_console_sem() because the semaphore is not
> NMI safe.
Do you have any particular code path in mind, please?
This does not work in console_flush_on_panic(), see below.
> Avoid try-locking the console from NMI and assume it failed.
>
> Signed-off-by: John Ogness <john.ogness@...utronix.de>
> ---
> kernel/printk/printk.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
> diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c
> index 40c5f4170ac7..84af038292d9 100644
> --- a/kernel/printk/printk.c
> +++ b/kernel/printk/printk.c
> @@ -318,6 +318,10 @@ static int __down_trylock_console_sem(unsigned long ip)
> int lock_failed;
> unsigned long flags;
>
> + /* Semaphores are not NMI-safe. */
> + if (in_nmi())
> + return 1;
console_flush_on_panic() ignores the console_trylock() return value:
void console_flush_on_panic(enum con_flush_mode mode)
{
[...]
/*
* If someone else is holding the console lock, trylock will fail
* and may_schedule may be set. Ignore and proceed to unlock so
* that messages are flushed out. As this can be called from any
* context and we don't want to get preempted while flushing,
* ensure may_schedule is cleared.
*/
console_trylock();
console_may_schedule = 0;
console_unlock();
}
So that this change would cause a non-paired console_unlock().
And console_unlock might still deadlock on the console_sem->lock.
OK, your change makes sense. But we still should try flushing
the messages in console_flush_on_panic() even in NMI.
One solution would be to call console_flush_all() directly in
console_flush_on_panic() without taking console_lock().
It should not be worse than the current code which ignores
the console_trylock() return value.
Note that it mostly works because console_flush_on_panic() is called
when other CPUs are supposed to be stopped.
We only would need to prevent other CPUs from flushing messages
as well if they were still running by chance. But we actually already
do this, see abandon_console_lock_in_panic(). Well, we should
make sure that the abandon_console_lock_in_panic() check is
done before flushing the first message.
All these changes together would prevent deadlock on console_sem->lock.
But the synchronization "guarantees" should stay the same.
> +
> /*
> * Here and in __up_console_sem() we need to be in safe mode,
> * because spindump/WARN/etc from under console ->lock will
Alternative solution would be to make the generic down_trylock() safe
in NMI or in panic(). It might do spin_trylock() when oops_in_progress
is set. I mean to do the same trick and console drivers do with
port->lock.
But I am not sure if other down_trylock() users would be happy with
this change. Yes, it might get solved by introducing down_trylock_panic()
that might be used only in console_flush_on_panic(). But it might
be more hairy than the solution proposed above.
Best Regards,
Petr
Powered by blists - more mailing lists