On Thu 23-07-15 19:11:03, Hidehiro Kawai wrote: > Hi, > > Thanks for the feedback. > > (2015/07/23 17:25), Michal Hocko wrote: > > Hi, > > > > On Wed 22-07-15 11:14:21, Hidehiro Kawai wrote: > >> When an HA cluster software or administrator detects non-response > >> of a host, they issue an NMI to the host to completely stop current > >> works and take a crash dump. If the kernel has already panicked > >> or is capturing a crash dump at that time, further NMI can cause > >> a crash dump failure. > >> > >> To solve this issue, this patch set does two things: > >> > >> - Don't panic on NMI if the kernel has already panicked > >> - Introduce "noextnmi" boot option which masks external NMI at the > >> boot time (supported only for x86) > > > > I am currently debugging the same issue for our customer. Curiously > > enough the issue happens on a Hitachi HW. > > I found these issues by my white-box testing and source code > reading. So, they haven't happened on our customers yet, but > possibly happen. > > > I haven't posted my patch for an upstream review yet because I still > > do not have a feedback but I believe your solution is unnecessarily > > too complex. Unless I am missing something the following should be enough, > > no? > > Your patch solves some cases, but I think it wouldn't cover > all cases where I want to solve. How about the following cases? > > 1) panic -> acquire panic_lock -> unknown NMI on this CPU -> > panic -> failed to acquire panic_lock -> infinite loop > ==> no one processes kdump procedure. Ohh, I wasn't aware of panic_lock, 93e13a360ba3 ("kdump: fix crash_kexec()/smp_send_stop() race in panic()") has been introduced in 3.3 and I was debugging this on 3.0 based kernel. > 2) crash_kexec w/o entering panic -> acquire kexec_mutex -> > unknown NMI on this CPU -> panic -> crash_kexec -> > failed to acquire kexec_mutex -> return to panic -> smp_send_stop > > Even if with your patch, case 2) causes infinite loop of > try_crash_kexec and no one processes kdump procedure. You are right - I have missed this case. -- Michal Hocko SUSE Labs -- To unsubscribe from this list: send the line "unsubscribe linux-doc" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html