nmi_backtrace.c 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162
  1. /*
  2. * NMI backtrace support
  3. *
  4. * Gratuitously copied from arch/x86/kernel/apic/hw_nmi.c by Russell King,
  5. * with the following header:
  6. *
  7. * HW NMI watchdog support
  8. *
  9. * started by Don Zickus, Copyright (C) 2010 Red Hat, Inc.
  10. *
  11. * Arch specific calls to support NMI watchdog
  12. *
  13. * Bits copied from original nmi.c file
  14. */
  15. #include <linux/cpumask.h>
  16. #include <linux/delay.h>
  17. #include <linux/kprobes.h>
  18. #include <linux/nmi.h>
  19. #include <linux/seq_buf.h>
  20. #ifdef arch_trigger_all_cpu_backtrace
  21. /* For reliability, we're prepared to waste bits here. */
  22. static DECLARE_BITMAP(backtrace_mask, NR_CPUS) __read_mostly;
  23. static cpumask_t printtrace_mask;
  24. #define NMI_BUF_SIZE 4096
  25. struct nmi_seq_buf {
  26. unsigned char buffer[NMI_BUF_SIZE];
  27. struct seq_buf seq;
  28. };
  29. /* Safe printing in NMI context */
  30. static DEFINE_PER_CPU(struct nmi_seq_buf, nmi_print_seq);
  31. /* "in progress" flag of arch_trigger_all_cpu_backtrace */
  32. static unsigned long backtrace_flag;
  33. static void print_seq_line(struct nmi_seq_buf *s, int start, int end)
  34. {
  35. const char *buf = s->buffer + start;
  36. printk("%.*s", (end - start) + 1, buf);
  37. }
  38. void nmi_trigger_all_cpu_backtrace(bool include_self,
  39. void (*raise)(cpumask_t *mask))
  40. {
  41. struct nmi_seq_buf *s;
  42. int i, cpu, this_cpu = get_cpu();
  43. if (test_and_set_bit(0, &backtrace_flag)) {
  44. /*
  45. * If there is already a trigger_all_cpu_backtrace() in progress
  46. * (backtrace_flag == 1), don't output double cpu dump infos.
  47. */
  48. put_cpu();
  49. return;
  50. }
  51. cpumask_copy(to_cpumask(backtrace_mask), cpu_online_mask);
  52. if (!include_self)
  53. cpumask_clear_cpu(this_cpu, to_cpumask(backtrace_mask));
  54. cpumask_copy(&printtrace_mask, to_cpumask(backtrace_mask));
  55. /*
  56. * Set up per_cpu seq_buf buffers that the NMIs running on the other
  57. * CPUs will write to.
  58. */
  59. for_each_cpu(cpu, to_cpumask(backtrace_mask)) {
  60. s = &per_cpu(nmi_print_seq, cpu);
  61. seq_buf_init(&s->seq, s->buffer, NMI_BUF_SIZE);
  62. }
  63. if (!cpumask_empty(to_cpumask(backtrace_mask))) {
  64. pr_info("Sending NMI to %s CPUs:\n",
  65. (include_self ? "all" : "other"));
  66. raise(to_cpumask(backtrace_mask));
  67. }
  68. /* Wait for up to 10 seconds for all CPUs to do the backtrace */
  69. for (i = 0; i < 10 * 1000; i++) {
  70. if (cpumask_empty(to_cpumask(backtrace_mask)))
  71. break;
  72. mdelay(1);
  73. touch_softlockup_watchdog();
  74. }
  75. /*
  76. * Now that all the NMIs have triggered, we can dump out their
  77. * back traces safely to the console.
  78. */
  79. for_each_cpu(cpu, &printtrace_mask) {
  80. int len, last_i = 0;
  81. s = &per_cpu(nmi_print_seq, cpu);
  82. len = seq_buf_used(&s->seq);
  83. if (!len)
  84. continue;
  85. /* Print line by line. */
  86. for (i = 0; i < len; i++) {
  87. if (s->buffer[i] == '\n') {
  88. print_seq_line(s, last_i, i);
  89. last_i = i + 1;
  90. }
  91. }
  92. /* Check if there was a partial line. */
  93. if (last_i < len) {
  94. print_seq_line(s, last_i, len - 1);
  95. pr_cont("\n");
  96. }
  97. }
  98. clear_bit(0, &backtrace_flag);
  99. smp_mb__after_atomic();
  100. put_cpu();
  101. }
  102. /*
  103. * It is not safe to call printk() directly from NMI handlers.
  104. * It may be fine if the NMI detected a lock up and we have no choice
  105. * but to do so, but doing a NMI on all other CPUs to get a back trace
  106. * can be done with a sysrq-l. We don't want that to lock up, which
  107. * can happen if the NMI interrupts a printk in progress.
  108. *
  109. * Instead, we redirect the vprintk() to this nmi_vprintk() that writes
  110. * the content into a per cpu seq_buf buffer. Then when the NMIs are
  111. * all done, we can safely dump the contents of the seq_buf to a printk()
  112. * from a non NMI context.
  113. */
  114. static int nmi_vprintk(const char *fmt, va_list args)
  115. {
  116. struct nmi_seq_buf *s = this_cpu_ptr(&nmi_print_seq);
  117. unsigned int len = seq_buf_used(&s->seq);
  118. seq_buf_vprintf(&s->seq, fmt, args);
  119. return seq_buf_used(&s->seq) - len;
  120. }
  121. bool nmi_cpu_backtrace(struct pt_regs *regs)
  122. {
  123. int cpu = smp_processor_id();
  124. if (cpumask_test_cpu(cpu, to_cpumask(backtrace_mask))) {
  125. printk_func_t printk_func_save = this_cpu_read(printk_func);
  126. /* Replace printk to write into the NMI seq */
  127. this_cpu_write(printk_func, nmi_vprintk);
  128. pr_warn("NMI backtrace for cpu %d\n", cpu);
  129. show_regs(regs);
  130. this_cpu_write(printk_func, printk_func_save);
  131. cpumask_clear_cpu(cpu, to_cpumask(backtrace_mask));
  132. return true;
  133. }
  134. return false;
  135. }
  136. NOKPROBE_SYMBOL(nmi_cpu_backtrace);
  137. #endif