Commit b1dbb679 authored by Linus Torvalds's avatar Linus Torvalds

Merge branch 'ipi-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/linux-2.6-tip

* 'ipi-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/linux-2.6-tip:
  s390: remove arch specific smp_send_stop()
  panic: clean up kernel/panic.c
  panic, smp: provide smp_send_stop() wrapper on UP too
  panic: decrease oops_in_progress only after having done the panic
  generic-ipi: eliminate WARN_ON()s during oops/panic
  generic-ipi: cleanups
  generic-ipi: remove CSD_FLAG_WAIT
  generic-ipi: remove kmalloc()
  generic IPI: simplify barriers and locking
parents 492f59f5 70f45440
...@@ -92,12 +92,6 @@ extern void arch_send_call_function_ipi(cpumask_t mask); ...@@ -92,12 +92,6 @@ extern void arch_send_call_function_ipi(cpumask_t mask);
#endif #endif
#ifndef CONFIG_SMP #ifndef CONFIG_SMP
static inline void smp_send_stop(void)
{
/* Disable all interrupts/machine checks */
__load_psw_mask(psw_kernel_bits & ~PSW_MASK_MCHECK);
}
#define hard_smp_processor_id() 0 #define hard_smp_processor_id() 0
#define smp_cpu_not_running(cpu) 1 #define smp_cpu_not_running(cpu) 1
#endif #endif
......
...@@ -64,7 +64,7 @@ static int raise_blk_irq(int cpu, struct request *rq) ...@@ -64,7 +64,7 @@ static int raise_blk_irq(int cpu, struct request *rq)
data->info = rq; data->info = rq;
data->flags = 0; data->flags = 0;
__smp_call_function_single(cpu, data); __smp_call_function_single(cpu, data, 0);
return 0; return 0;
} }
......
...@@ -38,7 +38,7 @@ int smp_call_function_single(int cpuid, void (*func) (void *info), void *info, ...@@ -38,7 +38,7 @@ int smp_call_function_single(int cpuid, void (*func) (void *info), void *info,
/* /*
* main cross-CPU interfaces, handles INIT, TLB flush, STOP, etc. * main cross-CPU interfaces, handles INIT, TLB flush, STOP, etc.
* (defined in asm header): * (defined in asm header):
*/ */
/* /*
* stops all CPUs but the current one: * stops all CPUs but the current one:
...@@ -82,7 +82,8 @@ smp_call_function_mask(cpumask_t mask, void(*func)(void *info), void *info, ...@@ -82,7 +82,8 @@ smp_call_function_mask(cpumask_t mask, void(*func)(void *info), void *info,
return 0; return 0;
} }
void __smp_call_function_single(int cpuid, struct call_single_data *data); void __smp_call_function_single(int cpuid, struct call_single_data *data,
int wait);
/* /*
* Generic and arch helpers * Generic and arch helpers
...@@ -121,6 +122,8 @@ extern unsigned int setup_max_cpus; ...@@ -121,6 +122,8 @@ extern unsigned int setup_max_cpus;
#else /* !SMP */ #else /* !SMP */
static inline void smp_send_stop(void) { }
/* /*
* These macros fold the SMP functionality into a single CPU system * These macros fold the SMP functionality into a single CPU system
*/ */
......
...@@ -8,19 +8,19 @@ ...@@ -8,19 +8,19 @@
* This function is used through-out the kernel (including mm and fs) * This function is used through-out the kernel (including mm and fs)
* to indicate a major problem. * to indicate a major problem.
*/ */
#include <linux/debug_locks.h>
#include <linux/interrupt.h>
#include <linux/kallsyms.h>
#include <linux/notifier.h>
#include <linux/module.h> #include <linux/module.h>
#include <linux/sched.h> #include <linux/random.h>
#include <linux/delay.h>
#include <linux/reboot.h> #include <linux/reboot.h>
#include <linux/notifier.h> #include <linux/delay.h>
#include <linux/init.h> #include <linux/kexec.h>
#include <linux/sched.h>
#include <linux/sysrq.h> #include <linux/sysrq.h>
#include <linux/interrupt.h> #include <linux/init.h>
#include <linux/nmi.h> #include <linux/nmi.h>
#include <linux/kexec.h>
#include <linux/debug_locks.h>
#include <linux/random.h>
#include <linux/kallsyms.h>
#include <linux/dmi.h> #include <linux/dmi.h>
int panic_on_oops; int panic_on_oops;
...@@ -52,19 +52,15 @@ EXPORT_SYMBOL(panic_blink); ...@@ -52,19 +52,15 @@ EXPORT_SYMBOL(panic_blink);
* *
* This function never returns. * This function never returns.
*/ */
NORET_TYPE void panic(const char * fmt, ...) NORET_TYPE void panic(const char * fmt, ...)
{ {
long i;
static char buf[1024]; static char buf[1024];
va_list args; va_list args;
#if defined(CONFIG_S390) long i;
unsigned long caller = (unsigned long) __builtin_return_address(0);
#endif
/* /*
* It's possible to come here directly from a panic-assertion and not * It's possible to come here directly from a panic-assertion and
* have preempt disabled. Some functions called from here want * not have preempt disabled. Some functions called from here want
* preempt to be disabled. No point enabling it later though... * preempt to be disabled. No point enabling it later though...
*/ */
preempt_disable(); preempt_disable();
...@@ -77,7 +73,6 @@ NORET_TYPE void panic(const char * fmt, ...) ...@@ -77,7 +73,6 @@ NORET_TYPE void panic(const char * fmt, ...)
#ifdef CONFIG_DEBUG_BUGVERBOSE #ifdef CONFIG_DEBUG_BUGVERBOSE
dump_stack(); dump_stack();
#endif #endif
bust_spinlocks(0);
/* /*
* If we have crashed and we have a crash kernel loaded let it handle * If we have crashed and we have a crash kernel loaded let it handle
...@@ -86,14 +81,12 @@ NORET_TYPE void panic(const char * fmt, ...) ...@@ -86,14 +81,12 @@ NORET_TYPE void panic(const char * fmt, ...)
*/ */
crash_kexec(NULL); crash_kexec(NULL);
#ifdef CONFIG_SMP
/* /*
* Note smp_send_stop is the usual smp shutdown function, which * Note smp_send_stop is the usual smp shutdown function, which
* unfortunately means it may not be hardened to work in a panic * unfortunately means it may not be hardened to work in a panic
* situation. * situation.
*/ */
smp_send_stop(); smp_send_stop();
#endif
atomic_notifier_call_chain(&panic_notifier_list, 0, buf); atomic_notifier_call_chain(&panic_notifier_list, 0, buf);
...@@ -102,19 +95,21 @@ NORET_TYPE void panic(const char * fmt, ...) ...@@ -102,19 +95,21 @@ NORET_TYPE void panic(const char * fmt, ...)
if (panic_timeout > 0) { if (panic_timeout > 0) {
/* /*
* Delay timeout seconds before rebooting the machine. * Delay timeout seconds before rebooting the machine.
* We can't use the "normal" timers since we just panicked.. * We can't use the "normal" timers since we just panicked.
*/ */
printk(KERN_EMERG "Rebooting in %d seconds..",panic_timeout); printk(KERN_EMERG "Rebooting in %d seconds..", panic_timeout);
for (i = 0; i < panic_timeout*1000; ) { for (i = 0; i < panic_timeout*1000; ) {
touch_nmi_watchdog(); touch_nmi_watchdog();
i += panic_blink(i); i += panic_blink(i);
mdelay(1); mdelay(1);
i++; i++;
} }
/* This will not be a clean reboot, with everything /*
* shutting down. But if there is a chance of * This will not be a clean reboot, with everything
* rebooting the system it will be rebooted. * shutting down. But if there is a chance of
* rebooting the system it will be rebooted.
*/ */
emergency_restart(); emergency_restart();
} }
...@@ -127,38 +122,44 @@ NORET_TYPE void panic(const char * fmt, ...) ...@@ -127,38 +122,44 @@ NORET_TYPE void panic(const char * fmt, ...)
} }
#endif #endif
#if defined(CONFIG_S390) #if defined(CONFIG_S390)
disabled_wait(caller); {
unsigned long caller;
caller = (unsigned long)__builtin_return_address(0);
disabled_wait(caller);
}
#endif #endif
local_irq_enable(); local_irq_enable();
for (i = 0;;) { for (i = 0; ; ) {
touch_softlockup_watchdog(); touch_softlockup_watchdog();
i += panic_blink(i); i += panic_blink(i);
mdelay(1); mdelay(1);
i++; i++;
} }
bust_spinlocks(0);
} }
EXPORT_SYMBOL(panic); EXPORT_SYMBOL(panic);
struct tnt { struct tnt {
u8 bit; u8 bit;
char true; char true;
char false; char false;
}; };
static const struct tnt tnts[] = { static const struct tnt tnts[] = {
{ TAINT_PROPRIETARY_MODULE, 'P', 'G' }, { TAINT_PROPRIETARY_MODULE, 'P', 'G' },
{ TAINT_FORCED_MODULE, 'F', ' ' }, { TAINT_FORCED_MODULE, 'F', ' ' },
{ TAINT_UNSAFE_SMP, 'S', ' ' }, { TAINT_UNSAFE_SMP, 'S', ' ' },
{ TAINT_FORCED_RMMOD, 'R', ' ' }, { TAINT_FORCED_RMMOD, 'R', ' ' },
{ TAINT_MACHINE_CHECK, 'M', ' ' }, { TAINT_MACHINE_CHECK, 'M', ' ' },
{ TAINT_BAD_PAGE, 'B', ' ' }, { TAINT_BAD_PAGE, 'B', ' ' },
{ TAINT_USER, 'U', ' ' }, { TAINT_USER, 'U', ' ' },
{ TAINT_DIE, 'D', ' ' }, { TAINT_DIE, 'D', ' ' },
{ TAINT_OVERRIDDEN_ACPI_TABLE, 'A', ' ' }, { TAINT_OVERRIDDEN_ACPI_TABLE, 'A', ' ' },
{ TAINT_WARN, 'W', ' ' }, { TAINT_WARN, 'W', ' ' },
{ TAINT_CRAP, 'C', ' ' }, { TAINT_CRAP, 'C', ' ' },
}; };
/** /**
...@@ -195,7 +196,8 @@ const char *print_tainted(void) ...@@ -195,7 +196,8 @@ const char *print_tainted(void)
*s = 0; *s = 0;
} else } else
snprintf(buf, sizeof(buf), "Not tainted"); snprintf(buf, sizeof(buf), "Not tainted");
return(buf);
return buf;
} }
int test_taint(unsigned flag) int test_taint(unsigned flag)
...@@ -211,7 +213,8 @@ unsigned long get_taint(void) ...@@ -211,7 +213,8 @@ unsigned long get_taint(void)
void add_taint(unsigned flag) void add_taint(unsigned flag)
{ {
debug_locks = 0; /* can't trust the integrity of the kernel anymore */ /* can't trust the integrity of the kernel anymore: */
debug_locks = 0;
set_bit(flag, &tainted_mask); set_bit(flag, &tainted_mask);
} }
EXPORT_SYMBOL(add_taint); EXPORT_SYMBOL(add_taint);
...@@ -266,8 +269,8 @@ static void do_oops_enter_exit(void) ...@@ -266,8 +269,8 @@ static void do_oops_enter_exit(void)
} }
/* /*
* Return true if the calling CPU is allowed to print oops-related info. This * Return true if the calling CPU is allowed to print oops-related info.
* is a bit racy.. * This is a bit racy..
*/ */
int oops_may_print(void) int oops_may_print(void)
{ {
...@@ -276,20 +279,22 @@ int oops_may_print(void) ...@@ -276,20 +279,22 @@ int oops_may_print(void)
/* /*
* Called when the architecture enters its oops handler, before it prints * Called when the architecture enters its oops handler, before it prints
* anything. If this is the first CPU to oops, and it's oopsing the first time * anything. If this is the first CPU to oops, and it's oopsing the first
* then let it proceed. * time then let it proceed.
* *
* This is all enabled by the pause_on_oops kernel boot option. We do all this * This is all enabled by the pause_on_oops kernel boot option. We do all
* to ensure that oopses don't scroll off the screen. It has the side-effect * this to ensure that oopses don't scroll off the screen. It has the
* of preventing later-oopsing CPUs from mucking up the display, too. * side-effect of preventing later-oopsing CPUs from mucking up the display,
* too.
* *
* It turns out that the CPU which is allowed to print ends up pausing for the * It turns out that the CPU which is allowed to print ends up pausing for
* right duration, whereas all the other CPUs pause for twice as long: once in * the right duration, whereas all the other CPUs pause for twice as long:
* oops_enter(), once in oops_exit(). * once in oops_enter(), once in oops_exit().
*/ */
void oops_enter(void) void oops_enter(void)
{ {
debug_locks_off(); /* can't trust the integrity of the kernel anymore */ /* can't trust the integrity of the kernel anymore: */
debug_locks_off();
do_oops_enter_exit(); do_oops_enter_exit();
} }
......
...@@ -1110,7 +1110,7 @@ static void hrtick_start(struct rq *rq, u64 delay) ...@@ -1110,7 +1110,7 @@ static void hrtick_start(struct rq *rq, u64 delay)
if (rq == this_rq()) { if (rq == this_rq()) {
hrtimer_restart(timer); hrtimer_restart(timer);
} else if (!rq->hrtick_csd_pending) { } else if (!rq->hrtick_csd_pending) {
__smp_call_function_single(cpu_of(rq), &rq->hrtick_csd); __smp_call_function_single(cpu_of(rq), &rq->hrtick_csd, 0);
rq->hrtick_csd_pending = 1; rq->hrtick_csd_pending = 1;
} }
} }
......
This diff is collapsed.
...@@ -496,7 +496,7 @@ static int __try_remote_softirq(struct call_single_data *cp, int cpu, int softir ...@@ -496,7 +496,7 @@ static int __try_remote_softirq(struct call_single_data *cp, int cpu, int softir
cp->flags = 0; cp->flags = 0;
cp->priv = softirq; cp->priv = softirq;
__smp_call_function_single(cpu, cp); __smp_call_function_single(cpu, cp, 0);
return 0; return 0;
} }
return 1; return 1;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment