Skip to content

Conversation

jakub-uC
Copy link
Contributor

@jakub-uC jakub-uC commented Oct 20, 2025

Previously, the bypass() function was called while the shell mutex was still held, preventing the use of shell APIs (e.g. shell_print()) inside the bypass context.

This change unlocks the shell mutex before invoking bypass() and locks it again afterwards, restoring proper shell context handling and preventing potential deadlocks.

Fixes #97722

Signed-off-by: roni1234321

pdgendt
pdgendt previously approved these changes Oct 20, 2025
@jakub-uC jakub-uC force-pushed the jakub/fix-shell-bypass-deadlock branch from 4ebb800 to f9af2f1 Compare October 20, 2025 10:42
Copy link
Contributor

@pdgendt pdgendt left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some leading spaces need to be removed.

Previously, the bypass() function was called while the shell mutex
was still held, preventing the use of shell APIs (e.g. shell_print())
inside the bypass context.

This change unlocks the shell mutex before invoking bypass() and
locks it again afterwards, restoring proper shell context handling
and preventing potential deadlocks.

Issue fixed by: roni1234321

Fixes zephyrproject-rtos#97722

Signed-off-by: Jakub Rzeszutko <[email protected]>
Copy link

@jakub-uC jakub-uC requested a review from nordic-krch October 20, 2025 15:16
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area: Shell Shell subsystem

Projects

None yet

Development

Successfully merging this pull request may close these issues.

shell bypass sample not outputting to serial

3 participants