Re: [PATCH v2] watchdog: Add a sysctl to disable soft lockup detector
On Wed, Dec 04, 2013 at 05:55:56PM -0800, Ben Zhang wrote: > Currently, the soft lockup detector and hard lockup detector > can be enabled or disabled together via the flag variable > watchdog_user_enabled. There isn't a way to disable only the > soft lockup detector while keeping the hard lockup detector > running. > > The hard lockup detector sometimes does not work on a x86 > machine with multiple cpus when softlockup_panic is set to 0. > For example: > 1. Hard lockup occurs on cpu0 ("cli" followed by a infinite loop). > 2. Soft lockup occurs on cpu1 shortly after because cpu1 tries to > send a function to cpu0 via smp_call_function_single(). > 3. watchdog_timer_fn() detects the soft lockup on cpu1 and > dumps the stack. dump_stack() eventually calls touch_nmi_watchdog() > which sets watchdog_nmi_touch=true for all cpus and sets > watchdog_touch_ts=0 for cpu1. > 4. NMI fires on cpu0. watchdog_overflow_callback() sees > watchdog_nmi_touch=true, so it does not do anything except setting > watchdog_nmi_touch=false. > 5. watchdog_timer_fn() is called again on cpu1, it sees > watchdog_touch_ts=0, so reloads it with the current tick. Thus, > is_softlockup() returns false, and soft_watchdog_warn is set to false. > 6. Before NMI can fire on cpu0 again with watchdog_nmi_touch=false, > watchdog_timer_fn() reports the soft lockup on cpu1 again > and we go back to #3. Yup. This is because touch_nmi_watchdog touches _all_ the cpus instead of its own. I tried to fix this 3 years ago, but Andrew wanted me to fix something else in the panic code first as a trade for his ack in changing the semantics of touch_nmi_watchdog. ;-p I doubt this patch still applies but the concept is pretty simple, touch only the local cpu not all of them. Should be pretty easy to port. Not entirely sure if this would be accepted by folks, but I think it would address your fundamental problem. Cheers, Don ---8< From: Don Zickus Date: Thu, 4 Nov 2010 20:53:03 -0400 Subject: [PATCH v3] watchdog: touch_nmi_watchdog should only touch local cpu not every one I ran into a scenario where while one cpu was stuck and should have panic'd because of the NMI watchdog, it didn't. The reason was another cpu was spewing stack dumps on to the console. Upon investigation, I noticed that when writing to the console and also when dumping the stack, the watchdog is touched. This causes all the cpus to reset their NMI watchdog flags and the 'stuck' cpu just spins forever. This change causes the semantics of touch_nmi_watchdog to be changed slightly. Previously, I accidentally changed the semantics and we noticed there was a codepath in which touch_nmi_watchdog could be touched from a preemtible area. That caused a BUG() to happen when CONFIG_DEBUG_PREEMPT was enabled. I believe it was the acpi code. My attempt here re-introduces the change to have the touch_nmi_watchdog() code only touch the local cpu instead of all of the cpus. But instead of using __get_cpu_var(), I use the __raw_get_cpu_var() version. This avoids the preemption problem. However my reasoning wasn't because I was trying to be lazy. Instead I rationalized it as, well if preemption is enabled then interrupts should be enabled to and the NMI watchdog will have no reason to trigger. So it won't matter if the wrong cpu is touched because the percpu interrupt counters the NMI watchdog uses should still be incrementing. V3: Really remove touch_all_nmi_watchdogs() V2: Remove touch_all_nmi_watchdogs() Signed-off-by: Don Zickus --- kernel/watchdog.c | 17 + 1 files changed, 9 insertions(+), 8 deletions(-) diff --git a/kernel/watchdog.c b/kernel/watchdog.c index dc8e168..09fddd7 100644 --- a/kernel/watchdog.c +++ b/kernel/watchdog.c @@ -141,14 +141,15 @@ void touch_all_softlockup_watchdogs(void) #ifdef CONFIG_HARDLOCKUP_DETECTOR void touch_nmi_watchdog(void) { - if (watchdog_enabled) { - unsigned cpu; + /* +* Using __raw here because some code paths have +* preemption enabled. If preemption is enabled +* then interrupts should be enabled too, in which +* case we shouldn't have to worry about the watchdog +* going off. +*/ + __raw_get_cpu_var(watchdog_nmi_touch) = true; - for_each_present_cpu(cpu) { - if (per_cpu(watchdog_nmi_touch, cpu) != true) - per_cpu(watchdog_nmi_touch, cpu) = true; - } - } touch_softlockup_watchdog(); } EXPORT_SYMBOL(touch_nmi_watchdog); -- 1.7.2.3 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
[PATCH v2] watchdog: Add a sysctl to disable soft lockup detector
Currently, the soft lockup detector and hard lockup detector can be enabled or disabled together via the flag variable watchdog_user_enabled. There isn't a way to disable only the soft lockup detector while keeping the hard lockup detector running. The hard lockup detector sometimes does not work on a x86 machine with multiple cpus when softlockup_panic is set to 0. For example: 1. Hard lockup occurs on cpu0 ("cli" followed by a infinite loop). 2. Soft lockup occurs on cpu1 shortly after because cpu1 tries to send a function to cpu0 via smp_call_function_single(). 3. watchdog_timer_fn() detects the soft lockup on cpu1 and dumps the stack. dump_stack() eventually calls touch_nmi_watchdog() which sets watchdog_nmi_touch=true for all cpus and sets watchdog_touch_ts=0 for cpu1. 4. NMI fires on cpu0. watchdog_overflow_callback() sees watchdog_nmi_touch=true, so it does not do anything except setting watchdog_nmi_touch=false. 5. watchdog_timer_fn() is called again on cpu1, it sees watchdog_touch_ts=0, so reloads it with the current tick. Thus, is_softlockup() returns false, and soft_watchdog_warn is set to false. 6. Before NMI can fire on cpu0 again with watchdog_nmi_touch=false, watchdog_timer_fn() reports the soft lockup on cpu1 again and we go back to #3. The machine stays locked up and the log shows repeated reports of soft lockup on cpu1. Therefore, we need a way to disable the soft lockup check so that the hard lockup detector can reboot the machine. * Existing boot options for the watchdog: nmi_watchdog=panic/nopanic/0 softlockup_panic=0/1 nowatchdog nosoftlockup * Variables modified by the boot options: int watchdog_user_enabled; unsigned int softlockup_panic; unsigned int hardlockup_panic; * Existing sysctls at /proc/sys/kernel/... for the watchdog: nmi_watchdog=0/1 watchdog=0/1 softlockup_panic=0/1 watchdog_thresh=0~60 * Variables modified by the sysctls: int watchdog_user_enabled; unsigned int softlockup_panic; int watchdog_thresh; This patch adds a new boot option softlockup_detector_enable and a sysctl at /proc/sys/kernel/softlockup_detector_enable to allow disabling only the soft lockup detector. softlockup_detector_enable=1: This is the default. The soft lockup detector is enabled. When a soft lockup is detected, a warning message with debug info is printed. The kernel may be configured to panics in this case via the sysctl kernel.softlockup_panic. softlockup_detector_enable=0: The soft lockup detector is disabled. Warning message is not printed on soft lockup. The kernel does not panic on soft lockup regardless of the value of kernel.softlockup_panic. Note kernel.softlockup_detector_enable does not affect the hard lockup detector. Signed-off-by: Ben Zhang --- Documentation/kernel-parameters.txt | 11 +++ Documentation/sysctl/kernel.txt | 20 include/linux/sched.h | 3 ++- kernel/sysctl.c | 9 + kernel/watchdog.c | 15 +++ 5 files changed, 57 insertions(+), 1 deletion(-) diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt index 50680a5..5678ac3 100644 --- a/Documentation/kernel-parameters.txt +++ b/Documentation/kernel-parameters.txt @@ -2980,6 +2980,17 @@ bytes respectively. Such letter suffixes can also be entirely omitted. 1: Fast pin select (default) 2: ATC IRMode + softlockup_detector_enable= + [KNL] Should the soft-lockup detector be enabled. If + the soft-lockup detector is disabled, no warning + message is printed on soft lockup, and the kernel does + not panic on soft lockup regardless of the value of + softlockup_panic. softlockup_detector_enable does not + affect the hard lockup detector. + If this parameter is not present, the soft-lockup + detector is enabled by default. + Format: + softlockup_panic= [KNL] Should the soft-lockup detector generate panics. Format: diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index 26b7ee4..209212e 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt @@ -70,6 +70,7 @@ show up in /proc/sys/kernel: - shmall - shmmax [ sysv ipc ] - shmmni +- softlockup_detector_enable - stop-a [ SPARC only ] - sysrq ==> Documentation/sysrq.txt - tainted @@ -718,6 +719,25 @@ without users and with a dead originative process will be destroyed. == +softlockup_detector_enable: + +Should the soft-lockup detector be enabled. + +softlockup_detector_enable=1: +This is the default. The soft lockup detector
[PATCH v2] watchdog: Add a sysctl to disable soft lockup detector
Currently, the soft lockup detector and hard lockup detector can be enabled or disabled together via the flag variable watchdog_user_enabled. There isn't a way to disable only the soft lockup detector while keeping the hard lockup detector running. The hard lockup detector sometimes does not work on a x86 machine with multiple cpus when softlockup_panic is set to 0. For example: 1. Hard lockup occurs on cpu0 (cli followed by a infinite loop). 2. Soft lockup occurs on cpu1 shortly after because cpu1 tries to send a function to cpu0 via smp_call_function_single(). 3. watchdog_timer_fn() detects the soft lockup on cpu1 and dumps the stack. dump_stack() eventually calls touch_nmi_watchdog() which sets watchdog_nmi_touch=true for all cpus and sets watchdog_touch_ts=0 for cpu1. 4. NMI fires on cpu0. watchdog_overflow_callback() sees watchdog_nmi_touch=true, so it does not do anything except setting watchdog_nmi_touch=false. 5. watchdog_timer_fn() is called again on cpu1, it sees watchdog_touch_ts=0, so reloads it with the current tick. Thus, is_softlockup() returns false, and soft_watchdog_warn is set to false. 6. Before NMI can fire on cpu0 again with watchdog_nmi_touch=false, watchdog_timer_fn() reports the soft lockup on cpu1 again and we go back to #3. The machine stays locked up and the log shows repeated reports of soft lockup on cpu1. Therefore, we need a way to disable the soft lockup check so that the hard lockup detector can reboot the machine. * Existing boot options for the watchdog: nmi_watchdog=panic/nopanic/0 softlockup_panic=0/1 nowatchdog nosoftlockup * Variables modified by the boot options: int watchdog_user_enabled; unsigned int softlockup_panic; unsigned int hardlockup_panic; * Existing sysctls at /proc/sys/kernel/... for the watchdog: nmi_watchdog=0/1 watchdog=0/1 softlockup_panic=0/1 watchdog_thresh=0~60 * Variables modified by the sysctls: int watchdog_user_enabled; unsigned int softlockup_panic; int watchdog_thresh; This patch adds a new boot option softlockup_detector_enable and a sysctl at /proc/sys/kernel/softlockup_detector_enable to allow disabling only the soft lockup detector. softlockup_detector_enable=1: This is the default. The soft lockup detector is enabled. When a soft lockup is detected, a warning message with debug info is printed. The kernel may be configured to panics in this case via the sysctl kernel.softlockup_panic. softlockup_detector_enable=0: The soft lockup detector is disabled. Warning message is not printed on soft lockup. The kernel does not panic on soft lockup regardless of the value of kernel.softlockup_panic. Note kernel.softlockup_detector_enable does not affect the hard lockup detector. Signed-off-by: Ben Zhang be...@chromium.org --- Documentation/kernel-parameters.txt | 11 +++ Documentation/sysctl/kernel.txt | 20 include/linux/sched.h | 3 ++- kernel/sysctl.c | 9 + kernel/watchdog.c | 15 +++ 5 files changed, 57 insertions(+), 1 deletion(-) diff --git a/Documentation/kernel-parameters.txt b/Documentation/kernel-parameters.txt index 50680a5..5678ac3 100644 --- a/Documentation/kernel-parameters.txt +++ b/Documentation/kernel-parameters.txt @@ -2980,6 +2980,17 @@ bytes respectively. Such letter suffixes can also be entirely omitted. 1: Fast pin select (default) 2: ATC IRMode + softlockup_detector_enable= + [KNL] Should the soft-lockup detector be enabled. If + the soft-lockup detector is disabled, no warning + message is printed on soft lockup, and the kernel does + not panic on soft lockup regardless of the value of + softlockup_panic. softlockup_detector_enable does not + affect the hard lockup detector. + If this parameter is not present, the soft-lockup + detector is enabled by default. + Format: integer + softlockup_panic= [KNL] Should the soft-lockup detector generate panics. Format: integer diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index 26b7ee4..209212e 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt @@ -70,6 +70,7 @@ show up in /proc/sys/kernel: - shmall - shmmax [ sysv ipc ] - shmmni +- softlockup_detector_enable - stop-a [ SPARC only ] - sysrq == Documentation/sysrq.txt - tainted @@ -718,6 +719,25 @@ without users and with a dead originative process will be destroyed. == +softlockup_detector_enable: + +Should the soft-lockup detector be enabled. + +softlockup_detector_enable=1: +This is the
Re: [PATCH v2] watchdog: Add a sysctl to disable soft lockup detector
On Wed, Dec 04, 2013 at 05:55:56PM -0800, Ben Zhang wrote: Currently, the soft lockup detector and hard lockup detector can be enabled or disabled together via the flag variable watchdog_user_enabled. There isn't a way to disable only the soft lockup detector while keeping the hard lockup detector running. The hard lockup detector sometimes does not work on a x86 machine with multiple cpus when softlockup_panic is set to 0. For example: 1. Hard lockup occurs on cpu0 (cli followed by a infinite loop). 2. Soft lockup occurs on cpu1 shortly after because cpu1 tries to send a function to cpu0 via smp_call_function_single(). 3. watchdog_timer_fn() detects the soft lockup on cpu1 and dumps the stack. dump_stack() eventually calls touch_nmi_watchdog() which sets watchdog_nmi_touch=true for all cpus and sets watchdog_touch_ts=0 for cpu1. 4. NMI fires on cpu0. watchdog_overflow_callback() sees watchdog_nmi_touch=true, so it does not do anything except setting watchdog_nmi_touch=false. 5. watchdog_timer_fn() is called again on cpu1, it sees watchdog_touch_ts=0, so reloads it with the current tick. Thus, is_softlockup() returns false, and soft_watchdog_warn is set to false. 6. Before NMI can fire on cpu0 again with watchdog_nmi_touch=false, watchdog_timer_fn() reports the soft lockup on cpu1 again and we go back to #3. Yup. This is because touch_nmi_watchdog touches _all_ the cpus instead of its own. I tried to fix this 3 years ago, but Andrew wanted me to fix something else in the panic code first as a trade for his ack in changing the semantics of touch_nmi_watchdog. ;-p I doubt this patch still applies but the concept is pretty simple, touch only the local cpu not all of them. Should be pretty easy to port. Not entirely sure if this would be accepted by folks, but I think it would address your fundamental problem. Cheers, Don ---8 From: Don Zickus dzic...@redhat.com Date: Thu, 4 Nov 2010 20:53:03 -0400 Subject: [PATCH v3] watchdog: touch_nmi_watchdog should only touch local cpu not every one I ran into a scenario where while one cpu was stuck and should have panic'd because of the NMI watchdog, it didn't. The reason was another cpu was spewing stack dumps on to the console. Upon investigation, I noticed that when writing to the console and also when dumping the stack, the watchdog is touched. This causes all the cpus to reset their NMI watchdog flags and the 'stuck' cpu just spins forever. This change causes the semantics of touch_nmi_watchdog to be changed slightly. Previously, I accidentally changed the semantics and we noticed there was a codepath in which touch_nmi_watchdog could be touched from a preemtible area. That caused a BUG() to happen when CONFIG_DEBUG_PREEMPT was enabled. I believe it was the acpi code. My attempt here re-introduces the change to have the touch_nmi_watchdog() code only touch the local cpu instead of all of the cpus. But instead of using __get_cpu_var(), I use the __raw_get_cpu_var() version. This avoids the preemption problem. However my reasoning wasn't because I was trying to be lazy. Instead I rationalized it as, well if preemption is enabled then interrupts should be enabled to and the NMI watchdog will have no reason to trigger. So it won't matter if the wrong cpu is touched because the percpu interrupt counters the NMI watchdog uses should still be incrementing. V3: Really remove touch_all_nmi_watchdogs() V2: Remove touch_all_nmi_watchdogs() Signed-off-by: Don Zickus dzic...@redhat.com --- kernel/watchdog.c | 17 + 1 files changed, 9 insertions(+), 8 deletions(-) diff --git a/kernel/watchdog.c b/kernel/watchdog.c index dc8e168..09fddd7 100644 --- a/kernel/watchdog.c +++ b/kernel/watchdog.c @@ -141,14 +141,15 @@ void touch_all_softlockup_watchdogs(void) #ifdef CONFIG_HARDLOCKUP_DETECTOR void touch_nmi_watchdog(void) { - if (watchdog_enabled) { - unsigned cpu; + /* +* Using __raw here because some code paths have +* preemption enabled. If preemption is enabled +* then interrupts should be enabled too, in which +* case we shouldn't have to worry about the watchdog +* going off. +*/ + __raw_get_cpu_var(watchdog_nmi_touch) = true; - for_each_present_cpu(cpu) { - if (per_cpu(watchdog_nmi_touch, cpu) != true) - per_cpu(watchdog_nmi_touch, cpu) = true; - } - } touch_softlockup_watchdog(); } EXPORT_SYMBOL(touch_nmi_watchdog); -- 1.7.2.3 -- To unsubscribe from this list: send the line unsubscribe linux-kernel in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/