2010-05-07 17:11:44 -04:00
|
|
|
/*
|
|
|
|
* Detect hard and soft lockups on a system
|
|
|
|
*
|
|
|
|
* started by Don Zickus, Copyright (C) 2010 Red Hat, Inc.
|
|
|
|
*
|
2012-02-09 17:42:22 -05:00
|
|
|
* Note: Most of this code is borrowed heavily from the original softlockup
|
|
|
|
* detector, so thanks to Ingo for the initial implementation.
|
|
|
|
* Some chunks also taken from the old x86-specific nmi watchdog code, thanks
|
2010-05-07 17:11:44 -04:00
|
|
|
* to those contributors as well.
|
|
|
|
*/
|
|
|
|
|
2012-03-23 15:01:55 -07:00
|
|
|
#define pr_fmt(fmt) "NMI watchdog: " fmt
|
|
|
|
|
2010-05-07 17:11:44 -04:00
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/cpu.h>
|
|
|
|
#include <linux/nmi.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/sysctl.h>
|
2012-07-16 10:42:38 +00:00
|
|
|
#include <linux/smpboot.h>
|
2013-02-07 09:47:07 -06:00
|
|
|
#include <linux/sched/rt.h>
|
2015-06-24 16:55:45 -07:00
|
|
|
#include <linux/tick.h>
|
workqueue: implement lockup detector
Workqueue stalls can happen from a variety of usage bugs such as
missing WQ_MEM_RECLAIM flag or concurrency managed work item
indefinitely staying RUNNING. These stalls can be extremely difficult
to hunt down because the usual warning mechanisms can't detect
workqueue stalls and the internal state is pretty opaque.
To alleviate the situation, this patch implements workqueue lockup
detector. It periodically monitors all worker_pools periodically and,
if any pool failed to make forward progress longer than the threshold
duration, triggers warning and dumps workqueue state as follows.
BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 31s!
Showing busy workqueues and worker pools:
workqueue events: flags=0x0
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=17/256
pending: monkey_wrench_fn, e1000_watchdog, cache_reap, vmstat_shepherd, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, cgroup_release_agent
workqueue events_power_efficient: flags=0x80
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=2/256
pending: check_lifetime, neigh_periodic_work
workqueue cgroup_pidlist_destroy: flags=0x0
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/1
pending: cgroup_pidlist_destroy_work_fn
...
The detection mechanism is controller through kernel parameter
workqueue.watchdog_thresh and can be updated at runtime through the
sysfs module parameter file.
v2: Decoupled from softlockup control knobs.
Signed-off-by: Tejun Heo <tj@kernel.org>
Acked-by: Don Zickus <dzickus@redhat.com>
Cc: Ulrich Obergfell <uobergfe@redhat.com>
Cc: Michal Hocko <mhocko@suse.com>
Cc: Chris Mason <clm@fb.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
2015-12-08 11:28:04 -05:00
|
|
|
#include <linux/workqueue.h>
|
2020-02-04 13:44:48 +02:00
|
|
|
#include <linux/exynos-ss.h>
|
2010-05-07 17:11:44 -04:00
|
|
|
|
|
|
|
#include <asm/irq_regs.h>
|
2012-03-10 14:37:28 -05:00
|
|
|
#include <linux/kvm_para.h>
|
2015-09-04 15:45:15 -07:00
|
|
|
#include <linux/kthread.h>
|
2020-02-04 13:44:48 +02:00
|
|
|
#ifdef CONFIG_SEC_DEBUG
|
|
|
|
#include <linux/sec_debug.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <linux/exynos-ss.h>
|
|
|
|
#include <linux/irqflags.h>
|
|
|
|
|
|
|
|
#ifdef CONFIG_SEC_DEBUG
|
|
|
|
static const char * const hl_to_name[] = {
|
|
|
|
"NONE", "TASK STUCK", "IRQ STUCK",
|
|
|
|
"IDLE STUCK", "SMCCALL STUCK", "IRQ STORM",
|
|
|
|
"HRTIMER ERROR", "UNKNOWN STUCK"
|
|
|
|
};
|
|
|
|
|
|
|
|
static const char * const sl_to_name[] = {
|
|
|
|
"NONE", "SOFTIRQ STUCK", "TASK STUCK", "UNKNOWN STUCK"
|
|
|
|
};
|
|
|
|
#endif
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2015-05-18 11:31:50 +02:00
|
|
|
static DEFINE_MUTEX(watchdog_proc_mutex);
|
|
|
|
|
2020-02-04 13:44:48 +02:00
|
|
|
#if defined(CONFIG_HAVE_NMI_WATCHDOG) || defined(CONFIG_HARDLOCKUP_DETECTOR) \
|
|
|
|
|| defined(CONFIG_HARDLOCKUP_DETECTOR_OTHER_CPU)
|
2016-12-14 15:06:21 -08:00
|
|
|
unsigned long __read_mostly watchdog_enabled = SOFT_WATCHDOG_ENABLED|NMI_WATCHDOG_ENABLED;
|
2015-04-14 15:43:55 -07:00
|
|
|
#else
|
2016-12-14 15:06:21 -08:00
|
|
|
unsigned long __read_mostly watchdog_enabled = SOFT_WATCHDOG_ENABLED;
|
2015-04-14 15:43:55 -07:00
|
|
|
#endif
|
|
|
|
int __read_mostly nmi_watchdog_enabled;
|
|
|
|
int __read_mostly soft_watchdog_enabled;
|
|
|
|
int __read_mostly watchdog_user_enabled;
|
2011-05-22 22:10:23 -07:00
|
|
|
int __read_mostly watchdog_thresh = 10;
|
2015-04-14 15:43:55 -07:00
|
|
|
|
2014-06-23 13:22:05 -07:00
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
int __read_mostly sysctl_softlockup_all_cpu_backtrace;
|
2015-11-05 18:44:41 -08:00
|
|
|
int __read_mostly sysctl_hardlockup_all_cpu_backtrace;
|
2014-06-23 13:22:05 -07:00
|
|
|
#endif
|
2015-06-24 16:55:45 -07:00
|
|
|
static struct cpumask watchdog_cpumask __read_mostly;
|
|
|
|
unsigned long *watchdog_cpumask_bits = cpumask_bits(&watchdog_cpumask);
|
|
|
|
|
|
|
|
/* Helper for online, unparked cpus. */
|
|
|
|
#define for_each_watchdog_cpu(cpu) \
|
|
|
|
for_each_cpu_and((cpu), cpu_online_mask, &watchdog_cpumask)
|
2014-06-23 13:22:05 -07:00
|
|
|
|
2017-01-24 15:17:53 -08:00
|
|
|
atomic_t watchdog_park_in_progress = ATOMIC_INIT(0);
|
|
|
|
|
2015-09-04 15:45:28 -07:00
|
|
|
/*
|
|
|
|
* The 'watchdog_running' variable is set to 1 when the watchdog threads
|
|
|
|
* are registered/started and is set to 0 when the watchdog threads are
|
|
|
|
* unregistered/stopped, so it is an indicator whether the threads exist.
|
|
|
|
*/
|
2013-05-19 20:45:15 +02:00
|
|
|
static int __read_mostly watchdog_running;
|
2015-09-04 15:45:28 -07:00
|
|
|
/*
|
|
|
|
* If a subsystem has a need to deactivate the watchdog temporarily, it
|
|
|
|
* can use the suspend/resume interface to achieve this. The content of
|
|
|
|
* the 'watchdog_suspended' variable reflects this state. Existing threads
|
|
|
|
* are parked/unparked by the lockup_detector_{suspend|resume} functions
|
|
|
|
* (see comment blocks pertaining to those functions for further details).
|
|
|
|
*
|
|
|
|
* 'watchdog_suspended' also prevents threads from being registered/started
|
|
|
|
* or unregistered/stopped via parameters in /proc/sys/kernel, so the state
|
|
|
|
* of 'watchdog_running' cannot change while the watchdog is deactivated
|
|
|
|
* temporarily (see related code in 'proc' handlers).
|
|
|
|
*/
|
|
|
|
static int __read_mostly watchdog_suspended;
|
|
|
|
|
2012-12-17 15:59:50 -08:00
|
|
|
static u64 __read_mostly sample_period;
|
2020-02-04 13:44:48 +02:00
|
|
|
static unsigned long __read_mostly hardlockup_thresh;
|
2010-05-07 17:11:44 -04:00
|
|
|
|
|
|
|
static DEFINE_PER_CPU(unsigned long, watchdog_touch_ts);
|
2020-02-04 13:44:48 +02:00
|
|
|
static DEFINE_PER_CPU(unsigned long, hardlockup_touch_ts);
|
2010-05-07 17:11:44 -04:00
|
|
|
static DEFINE_PER_CPU(struct task_struct *, softlockup_watchdog);
|
|
|
|
static DEFINE_PER_CPU(struct hrtimer, watchdog_hrtimer);
|
|
|
|
static DEFINE_PER_CPU(bool, softlockup_touch_sync);
|
|
|
|
static DEFINE_PER_CPU(bool, soft_watchdog_warn);
|
2012-07-16 10:42:38 +00:00
|
|
|
static DEFINE_PER_CPU(unsigned long, hrtimer_interrupts);
|
|
|
|
static DEFINE_PER_CPU(unsigned long, soft_lockup_hrtimer_cnt);
|
2014-10-09 15:25:17 -07:00
|
|
|
static DEFINE_PER_CPU(struct task_struct *, softlockup_task_ptr_saved);
|
2010-05-07 17:11:44 -04:00
|
|
|
static DEFINE_PER_CPU(unsigned long, hrtimer_interrupts_saved);
|
2020-02-04 13:44:48 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_SEC_DEBUG
|
|
|
|
static DEFINE_PER_CPU(struct softlockup_info, percpu_sl_info);
|
|
|
|
static void check_softlockup_type(void);
|
|
|
|
#ifdef CONFIG_HARDLOCKUP_DETECTOR_OTHER_CPU
|
|
|
|
static DEFINE_PER_CPU(struct hardlockup_info, percpu_hl_info);
|
|
|
|
static void check_hardlockup_type(unsigned int cpu);
|
|
|
|
#endif
|
|
|
|
#endif
|
|
|
|
|
2014-06-23 13:22:05 -07:00
|
|
|
static unsigned long soft_lockup_nmi_warn;
|
2010-05-07 17:11:44 -04:00
|
|
|
|
|
|
|
unsigned int __read_mostly softlockup_panic =
|
|
|
|
CONFIG_BOOTPARAM_SOFTLOCKUP_PANIC_VALUE;
|
|
|
|
|
|
|
|
static int __init softlockup_panic_setup(char *str)
|
|
|
|
{
|
|
|
|
softlockup_panic = simple_strtoul(str, NULL, 0);
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("softlockup_panic=", softlockup_panic_setup);
|
|
|
|
|
|
|
|
static int __init nowatchdog_setup(char *str)
|
|
|
|
{
|
2015-04-14 15:44:13 -07:00
|
|
|
watchdog_enabled = 0;
|
2010-05-07 17:11:44 -04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("nowatchdog", nowatchdog_setup);
|
|
|
|
|
|
|
|
static int __init nosoftlockup_setup(char *str)
|
|
|
|
{
|
2015-04-14 15:44:13 -07:00
|
|
|
watchdog_enabled &= ~SOFT_WATCHDOG_ENABLED;
|
2010-05-07 17:11:44 -04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("nosoftlockup", nosoftlockup_setup);
|
2015-04-14 15:44:13 -07:00
|
|
|
|
2014-06-23 13:22:05 -07:00
|
|
|
#ifdef CONFIG_SMP
|
|
|
|
static int __init softlockup_all_cpu_backtrace_setup(char *str)
|
|
|
|
{
|
|
|
|
sysctl_softlockup_all_cpu_backtrace =
|
|
|
|
!!simple_strtol(str, NULL, 0);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("softlockup_all_cpu_backtrace=", softlockup_all_cpu_backtrace_setup);
|
2015-11-05 18:44:41 -08:00
|
|
|
static int __init hardlockup_all_cpu_backtrace_setup(char *str)
|
|
|
|
{
|
|
|
|
sysctl_hardlockup_all_cpu_backtrace =
|
|
|
|
!!simple_strtol(str, NULL, 0);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("hardlockup_all_cpu_backtrace=", hardlockup_all_cpu_backtrace_setup);
|
2014-06-23 13:22:05 -07:00
|
|
|
#endif
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2011-05-22 22:10:23 -07:00
|
|
|
/*
|
|
|
|
* Hard-lockup warnings should be triggered after just a few seconds. Soft-
|
|
|
|
* lockups can have false positives under extreme conditions. So we generally
|
|
|
|
* want a higher threshold for soft lockups than for hard lockups. So we couple
|
|
|
|
* the thresholds with a factor: we make the soft threshold twice the amount of
|
|
|
|
* time the hard threshold is.
|
|
|
|
*/
|
2011-05-24 05:43:18 +02:00
|
|
|
static int get_softlockup_thresh(void)
|
2011-05-22 22:10:23 -07:00
|
|
|
{
|
|
|
|
return watchdog_thresh * 2;
|
|
|
|
}
|
2010-05-07 17:11:44 -04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Returns seconds, approximately. We don't need nanosecond
|
|
|
|
* resolution, and we don't need to waste time with a big divide when
|
|
|
|
* 2^30ns == 1.074s.
|
|
|
|
*/
|
2012-12-27 11:49:44 +09:00
|
|
|
static unsigned long get_timestamp(void)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
2015-02-12 15:01:24 -08:00
|
|
|
return running_clock() >> 30LL; /* 2^30 ~= 10^9 */
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
|
|
|
|
2012-12-17 15:59:50 -08:00
|
|
|
static void set_sample_period(void)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
|
|
|
/*
|
2011-05-22 22:10:22 -07:00
|
|
|
* convert watchdog_thresh from seconds to ns
|
2012-02-09 17:42:22 -05:00
|
|
|
* the divide by 5 is to give hrtimer several chances (two
|
|
|
|
* or three with the current relation between the soft
|
|
|
|
* and hard thresholds) to increment before the
|
|
|
|
* hardlockup detector generates a warning
|
2010-05-07 17:11:44 -04:00
|
|
|
*/
|
2012-12-17 15:59:50 -08:00
|
|
|
sample_period = get_softlockup_thresh() * ((u64)NSEC_PER_SEC / 5);
|
2020-02-04 13:44:48 +02:00
|
|
|
hardlockup_thresh = sample_period * 3 / NSEC_PER_SEC;
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Commands for resetting the watchdog */
|
|
|
|
static void __touch_watchdog(void)
|
|
|
|
{
|
2012-12-27 11:49:44 +09:00
|
|
|
__this_cpu_write(watchdog_touch_ts, get_timestamp());
|
2020-02-04 13:44:48 +02:00
|
|
|
__this_cpu_write(hardlockup_touch_ts, get_timestamp());
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
|
|
|
|
2015-12-08 11:28:04 -05:00
|
|
|
/**
|
|
|
|
* touch_softlockup_watchdog_sched - touch watchdog on scheduler stalls
|
|
|
|
*
|
|
|
|
* Call when the scheduler may have stalled for legitimate reasons
|
|
|
|
* preventing the watchdog task from executing - e.g. the scheduler
|
|
|
|
* entering idle state. This should only be used for scheduler events.
|
|
|
|
* Use touch_softlockup_watchdog() for everything else.
|
|
|
|
*/
|
|
|
|
void touch_softlockup_watchdog_sched(void)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
2014-04-18 15:07:12 -07:00
|
|
|
/*
|
|
|
|
* Preemption can be enabled. It doesn't matter which CPU's timestamp
|
|
|
|
* gets zeroed here, so use the raw_ operation.
|
|
|
|
*/
|
|
|
|
raw_cpu_write(watchdog_touch_ts, 0);
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
2015-12-08 11:28:04 -05:00
|
|
|
|
|
|
|
void touch_softlockup_watchdog(void)
|
|
|
|
{
|
|
|
|
touch_softlockup_watchdog_sched();
|
workqueue: implement lockup detector
Workqueue stalls can happen from a variety of usage bugs such as
missing WQ_MEM_RECLAIM flag or concurrency managed work item
indefinitely staying RUNNING. These stalls can be extremely difficult
to hunt down because the usual warning mechanisms can't detect
workqueue stalls and the internal state is pretty opaque.
To alleviate the situation, this patch implements workqueue lockup
detector. It periodically monitors all worker_pools periodically and,
if any pool failed to make forward progress longer than the threshold
duration, triggers warning and dumps workqueue state as follows.
BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 31s!
Showing busy workqueues and worker pools:
workqueue events: flags=0x0
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=17/256
pending: monkey_wrench_fn, e1000_watchdog, cache_reap, vmstat_shepherd, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, cgroup_release_agent
workqueue events_power_efficient: flags=0x80
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=2/256
pending: check_lifetime, neigh_periodic_work
workqueue cgroup_pidlist_destroy: flags=0x0
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/1
pending: cgroup_pidlist_destroy_work_fn
...
The detection mechanism is controller through kernel parameter
workqueue.watchdog_thresh and can be updated at runtime through the
sysfs module parameter file.
v2: Decoupled from softlockup control knobs.
Signed-off-by: Tejun Heo <tj@kernel.org>
Acked-by: Don Zickus <dzickus@redhat.com>
Cc: Ulrich Obergfell <uobergfe@redhat.com>
Cc: Michal Hocko <mhocko@suse.com>
Cc: Chris Mason <clm@fb.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
2015-12-08 11:28:04 -05:00
|
|
|
wq_watchdog_touch(raw_smp_processor_id());
|
2015-12-08 11:28:04 -05:00
|
|
|
}
|
2010-05-13 08:53:33 +02:00
|
|
|
EXPORT_SYMBOL(touch_softlockup_watchdog);
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2010-05-07 17:11:45 -04:00
|
|
|
void touch_all_softlockup_watchdogs(void)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* this is done lockless
|
|
|
|
* do we care if a 0 races with a timestamp?
|
|
|
|
* all it means is the softlock check starts one cycle later
|
|
|
|
*/
|
2015-06-24 16:55:45 -07:00
|
|
|
for_each_watchdog_cpu(cpu)
|
2010-05-07 17:11:44 -04:00
|
|
|
per_cpu(watchdog_touch_ts, cpu) = 0;
|
workqueue: implement lockup detector
Workqueue stalls can happen from a variety of usage bugs such as
missing WQ_MEM_RECLAIM flag or concurrency managed work item
indefinitely staying RUNNING. These stalls can be extremely difficult
to hunt down because the usual warning mechanisms can't detect
workqueue stalls and the internal state is pretty opaque.
To alleviate the situation, this patch implements workqueue lockup
detector. It periodically monitors all worker_pools periodically and,
if any pool failed to make forward progress longer than the threshold
duration, triggers warning and dumps workqueue state as follows.
BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 31s!
Showing busy workqueues and worker pools:
workqueue events: flags=0x0
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=17/256
pending: monkey_wrench_fn, e1000_watchdog, cache_reap, vmstat_shepherd, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, release_one_tty, cgroup_release_agent
workqueue events_power_efficient: flags=0x80
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=2/256
pending: check_lifetime, neigh_periodic_work
workqueue cgroup_pidlist_destroy: flags=0x0
pwq 0: cpus=0 node=0 flags=0x0 nice=0 active=1/1
pending: cgroup_pidlist_destroy_work_fn
...
The detection mechanism is controller through kernel parameter
workqueue.watchdog_thresh and can be updated at runtime through the
sysfs module parameter file.
v2: Decoupled from softlockup control knobs.
Signed-off-by: Tejun Heo <tj@kernel.org>
Acked-by: Don Zickus <dzickus@redhat.com>
Cc: Ulrich Obergfell <uobergfe@redhat.com>
Cc: Michal Hocko <mhocko@suse.com>
Cc: Chris Mason <clm@fb.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
2015-12-08 11:28:04 -05:00
|
|
|
wq_watchdog_touch(-1);
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void touch_softlockup_watchdog_sync(void)
|
|
|
|
{
|
2014-08-17 12:30:34 -05:00
|
|
|
__this_cpu_write(softlockup_touch_sync, true);
|
|
|
|
__this_cpu_write(watchdog_touch_ts, 0);
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
|
|
|
|
2020-02-04 13:44:48 +02:00
|
|
|
#ifdef CONFIG_HARDLOCKUP_DETECTOR_OTHER_CPU
|
|
|
|
static void watchdog_check_hardlockup_other_cpu(void);
|
|
|
|
#else
|
|
|
|
static inline void watchdog_check_hardlockup_other_cpu(void) { return; }
|
|
|
|
#endif
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2010-05-17 18:06:04 -04:00
|
|
|
static int is_softlockup(unsigned long touch_ts)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
2012-12-27 11:49:44 +09:00
|
|
|
unsigned long now = get_timestamp();
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2015-11-05 18:44:56 -08:00
|
|
|
if ((watchdog_enabled & SOFT_WATCHDOG_ENABLED) && watchdog_thresh){
|
2015-04-14 15:44:13 -07:00
|
|
|
/* Warn about unreasonable delays. */
|
|
|
|
if (time_after(now, touch_ts + get_softlockup_thresh()))
|
|
|
|
return now - touch_ts;
|
|
|
|
}
|
2010-05-07 17:11:44 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2020-02-04 13:44:48 +02:00
|
|
|
/* watchdog detector functions */
|
|
|
|
bool is_hardlockup(void)
|
|
|
|
{
|
|
|
|
unsigned long hrint = __this_cpu_read(hrtimer_interrupts);
|
|
|
|
|
|
|
|
if (__this_cpu_read(hrtimer_interrupts_saved) == hrint)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
__this_cpu_write(hrtimer_interrupts_saved, hrint);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2010-05-07 17:11:44 -04:00
|
|
|
static void watchdog_interrupt_count(void)
|
|
|
|
{
|
2010-12-08 16:22:55 +01:00
|
|
|
__this_cpu_inc(hrtimer_interrupts);
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
2012-07-16 10:42:38 +00:00
|
|
|
|
2020-02-04 13:44:48 +02:00
|
|
|
#ifdef CONFIG_HARDLOCKUP_DETECTOR_OTHER_CPU
|
|
|
|
static int watchdog_nmi_enable(unsigned int cpu);
|
|
|
|
static void watchdog_nmi_disable(unsigned int cpu);
|
|
|
|
#else
|
2016-12-14 15:06:24 -08:00
|
|
|
/*
|
|
|
|
* These two functions are mostly architecture specific
|
|
|
|
* defining them as weak here.
|
|
|
|
*/
|
|
|
|
int __weak watchdog_nmi_enable(unsigned int cpu)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
void __weak watchdog_nmi_disable(unsigned int cpu)
|
|
|
|
{
|
|
|
|
}
|
2020-02-04 13:44:48 +02:00
|
|
|
#endif
|
2015-11-05 18:44:30 -08:00
|
|
|
static int watchdog_enable_all_cpus(void);
|
|
|
|
static void watchdog_disable_all_cpus(void);
|
|
|
|
|
2010-05-07 17:11:44 -04:00
|
|
|
/* watchdog kicker functions */
|
|
|
|
static enum hrtimer_restart watchdog_timer_fn(struct hrtimer *hrtimer)
|
|
|
|
{
|
2010-12-08 16:22:55 +01:00
|
|
|
unsigned long touch_ts = __this_cpu_read(watchdog_touch_ts);
|
2010-05-07 17:11:44 -04:00
|
|
|
struct pt_regs *regs = get_irq_regs();
|
|
|
|
int duration;
|
2014-06-23 13:22:05 -07:00
|
|
|
int softlockup_all_cpu_backtrace = sysctl_softlockup_all_cpu_backtrace;
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2020-02-04 13:44:48 +02:00
|
|
|
/* try to enable log_kevent of exynos-snapshot if log_kevent was off because of rcu stall */
|
|
|
|
exynos_ss_try_enable("log_kevent", NSEC_PER_SEC * 15);
|
2017-01-24 15:17:53 -08:00
|
|
|
if (atomic_read(&watchdog_park_in_progress) != 0)
|
|
|
|
return HRTIMER_NORESTART;
|
|
|
|
|
2010-05-07 17:11:44 -04:00
|
|
|
/* kick the hardlockup detector */
|
|
|
|
watchdog_interrupt_count();
|
|
|
|
|
2020-02-04 13:44:48 +02:00
|
|
|
/* test for hardlockups on the next cpu */
|
|
|
|
watchdog_check_hardlockup_other_cpu();
|
|
|
|
|
2010-05-07 17:11:44 -04:00
|
|
|
/* kick the softlockup detector */
|
2010-12-08 16:22:55 +01:00
|
|
|
wake_up_process(__this_cpu_read(softlockup_watchdog));
|
2010-05-07 17:11:44 -04:00
|
|
|
|
|
|
|
/* .. and repeat */
|
2012-12-17 15:59:50 -08:00
|
|
|
hrtimer_forward_now(hrtimer, ns_to_ktime(sample_period));
|
2010-05-07 17:11:44 -04:00
|
|
|
|
|
|
|
if (touch_ts == 0) {
|
2010-12-08 16:22:55 +01:00
|
|
|
if (unlikely(__this_cpu_read(softlockup_touch_sync))) {
|
2010-05-07 17:11:44 -04:00
|
|
|
/*
|
|
|
|
* If the time stamp was touched atomically
|
|
|
|
* make sure the scheduler tick is up to date.
|
|
|
|
*/
|
2010-12-08 16:22:55 +01:00
|
|
|
__this_cpu_write(softlockup_touch_sync, false);
|
2010-05-07 17:11:44 -04:00
|
|
|
sched_clock_tick();
|
|
|
|
}
|
2012-03-10 14:37:28 -05:00
|
|
|
|
|
|
|
/* Clear the guest paused flag on watchdog reset */
|
|
|
|
kvm_check_and_clear_guest_paused();
|
2010-05-07 17:11:44 -04:00
|
|
|
__touch_watchdog();
|
|
|
|
return HRTIMER_RESTART;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* check for a softlockup
|
|
|
|
* This is done by making sure a high priority task is
|
|
|
|
* being scheduled. The task touches the watchdog to
|
|
|
|
* indicate it is getting cpu time. If it hasn't then
|
|
|
|
* this is a good indication some task is hogging the cpu
|
|
|
|
*/
|
2010-05-17 18:06:04 -04:00
|
|
|
duration = is_softlockup(touch_ts);
|
2010-05-07 17:11:44 -04:00
|
|
|
if (unlikely(duration)) {
|
2012-03-10 14:37:28 -05:00
|
|
|
/*
|
|
|
|
* If a virtual machine is stopped by the host it can look to
|
|
|
|
* the watchdog like a soft lockup, check to see if the host
|
|
|
|
* stopped the vm before we issue the warning
|
|
|
|
*/
|
|
|
|
if (kvm_check_and_clear_guest_paused())
|
|
|
|
return HRTIMER_RESTART;
|
|
|
|
|
2010-05-07 17:11:44 -04:00
|
|
|
/* only warn once */
|
2014-10-09 15:25:17 -07:00
|
|
|
if (__this_cpu_read(soft_watchdog_warn) == true) {
|
|
|
|
/*
|
|
|
|
* When multiple processes are causing softlockups the
|
|
|
|
* softlockup detector only warns on the first one
|
|
|
|
* because the code relies on a full quiet cycle to
|
|
|
|
* re-arm. The second process prevents the quiet cycle
|
|
|
|
* and never gets reported. Use task pointers to detect
|
|
|
|
* this.
|
|
|
|
*/
|
|
|
|
if (__this_cpu_read(softlockup_task_ptr_saved) !=
|
|
|
|
current) {
|
|
|
|
__this_cpu_write(soft_watchdog_warn, false);
|
|
|
|
__touch_watchdog();
|
|
|
|
}
|
2010-05-07 17:11:44 -04:00
|
|
|
return HRTIMER_RESTART;
|
2014-10-09 15:25:17 -07:00
|
|
|
}
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2014-06-23 13:22:05 -07:00
|
|
|
if (softlockup_all_cpu_backtrace) {
|
|
|
|
/* Prevent multiple soft-lockup reports if one cpu is already
|
|
|
|
* engaged in dumping cpu back traces
|
|
|
|
*/
|
|
|
|
if (test_and_set_bit(0, &soft_lockup_nmi_warn)) {
|
|
|
|
/* Someone else will report us. Let's give up */
|
|
|
|
__this_cpu_write(soft_watchdog_warn, true);
|
|
|
|
return HRTIMER_RESTART;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-02-04 13:44:48 +02:00
|
|
|
pr_auto(ASL1, "BUG: soft lockup - CPU#%d stuck for %us! [%s:%d]\n",
|
2010-05-17 18:06:04 -04:00
|
|
|
smp_processor_id(), duration,
|
2010-05-07 17:11:44 -04:00
|
|
|
current->comm, task_pid_nr(current));
|
2020-02-04 13:44:48 +02:00
|
|
|
#ifdef CONFIG_SEC_DEBUG
|
|
|
|
check_softlockup_type();
|
|
|
|
#endif
|
2014-10-09 15:25:17 -07:00
|
|
|
__this_cpu_write(softlockup_task_ptr_saved, current);
|
2010-05-07 17:11:44 -04:00
|
|
|
print_modules();
|
|
|
|
print_irqtrace_events(current);
|
|
|
|
if (regs)
|
|
|
|
show_regs(regs);
|
|
|
|
else
|
|
|
|
dump_stack();
|
|
|
|
|
2014-06-23 13:22:05 -07:00
|
|
|
if (softlockup_all_cpu_backtrace) {
|
|
|
|
/* Avoid generating two back traces for current
|
|
|
|
* given that one is already made above
|
|
|
|
*/
|
|
|
|
trigger_allbutself_cpu_backtrace();
|
|
|
|
|
|
|
|
clear_bit(0, &soft_lockup_nmi_warn);
|
|
|
|
/* Barrier to sync with other cpus */
|
|
|
|
smp_mb__after_atomic();
|
|
|
|
}
|
|
|
|
|
2014-08-08 14:22:31 -07:00
|
|
|
add_taint(TAINT_SOFTLOCKUP, LOCKDEP_STILL_OK);
|
2020-02-04 13:44:48 +02:00
|
|
|
if (softlockup_panic) {
|
|
|
|
#ifdef CONFIG_SEC_DEBUG_EXTRA_INFO
|
|
|
|
if (regs) {
|
|
|
|
sec_debug_set_extra_info_fault(WATCHDOG_FAULT, (unsigned long)regs->pc, regs);
|
|
|
|
sec_debug_set_extra_info_backtrace(regs);
|
|
|
|
sec_debug_set_extra_info_backtrace_cpu(regs, smp_processor_id());
|
|
|
|
}
|
|
|
|
#endif
|
2010-05-07 17:11:44 -04:00
|
|
|
panic("softlockup: hung tasks");
|
2020-02-04 13:44:48 +02:00
|
|
|
}
|
2010-12-08 16:22:55 +01:00
|
|
|
__this_cpu_write(soft_watchdog_warn, true);
|
2010-05-07 17:11:44 -04:00
|
|
|
} else
|
2010-12-08 16:22:55 +01:00
|
|
|
__this_cpu_write(soft_watchdog_warn, false);
|
2010-05-07 17:11:44 -04:00
|
|
|
|
|
|
|
return HRTIMER_RESTART;
|
|
|
|
}
|
|
|
|
|
2012-07-16 10:42:38 +00:00
|
|
|
static void watchdog_set_prio(unsigned int policy, unsigned int prio)
|
|
|
|
{
|
|
|
|
struct sched_param param = { .sched_priority = prio };
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2012-07-16 10:42:38 +00:00
|
|
|
sched_setscheduler(current, policy, ¶m);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void watchdog_enable(unsigned int cpu)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
2014-08-17 12:30:34 -05:00
|
|
|
struct hrtimer *hrtimer = raw_cpu_ptr(&watchdog_hrtimer);
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2012-12-19 20:51:31 +01:00
|
|
|
/* kick off the timer for the hardlockup detector */
|
|
|
|
hrtimer_init(hrtimer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
|
|
|
|
hrtimer->function = watchdog_timer_fn;
|
|
|
|
|
2012-07-16 10:42:38 +00:00
|
|
|
/* Enable the perf event */
|
|
|
|
watchdog_nmi_enable(cpu);
|
2010-05-07 17:11:44 -04:00
|
|
|
|
|
|
|
/* done here because hrtimer_start can only pin to smp_processor_id() */
|
2012-12-17 15:59:50 -08:00
|
|
|
hrtimer_start(hrtimer, ns_to_ktime(sample_period),
|
2010-05-07 17:11:44 -04:00
|
|
|
HRTIMER_MODE_REL_PINNED);
|
|
|
|
|
2012-07-16 10:42:38 +00:00
|
|
|
/* initialize timestamp */
|
|
|
|
watchdog_set_prio(SCHED_FIFO, MAX_RT_PRIO - 1);
|
|
|
|
__touch_watchdog();
|
|
|
|
}
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2012-07-16 10:42:38 +00:00
|
|
|
static void watchdog_disable(unsigned int cpu)
|
|
|
|
{
|
2014-08-17 12:30:34 -05:00
|
|
|
struct hrtimer *hrtimer = raw_cpu_ptr(&watchdog_hrtimer);
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2012-07-16 10:42:38 +00:00
|
|
|
watchdog_set_prio(SCHED_NORMAL, 0);
|
|
|
|
hrtimer_cancel(hrtimer);
|
|
|
|
/* disable the perf event */
|
|
|
|
watchdog_nmi_disable(cpu);
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
|
|
|
|
2013-06-06 15:42:53 +02:00
|
|
|
static void watchdog_cleanup(unsigned int cpu, bool online)
|
|
|
|
{
|
|
|
|
watchdog_disable(cpu);
|
|
|
|
}
|
|
|
|
|
2012-07-16 10:42:38 +00:00
|
|
|
static int watchdog_should_run(unsigned int cpu)
|
|
|
|
{
|
|
|
|
return __this_cpu_read(hrtimer_interrupts) !=
|
|
|
|
__this_cpu_read(soft_lockup_hrtimer_cnt);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The watchdog thread function - touches the timestamp.
|
|
|
|
*
|
2012-12-17 15:59:50 -08:00
|
|
|
* It only runs once every sample_period seconds (4 seconds by
|
2012-07-16 10:42:38 +00:00
|
|
|
* default) to reset the softlockup timestamp. If this gets delayed
|
|
|
|
* for more than 2*watchdog_thresh seconds then the debug-printout
|
|
|
|
* triggers in watchdog_timer_fn().
|
|
|
|
*/
|
|
|
|
static void watchdog(unsigned int cpu)
|
|
|
|
{
|
|
|
|
__this_cpu_write(soft_lockup_hrtimer_cnt,
|
|
|
|
__this_cpu_read(hrtimer_interrupts));
|
|
|
|
__touch_watchdog();
|
2015-04-14 15:44:10 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* watchdog_nmi_enable() clears the NMI_WATCHDOG_ENABLED bit in the
|
|
|
|
* failure path. Check for failures that can occur asynchronously -
|
|
|
|
* for example, when CPUs are on-lined - and shut down the hardware
|
|
|
|
* perf event on each CPU accordingly.
|
|
|
|
*
|
|
|
|
* The only non-obvious place this bit can be cleared is through
|
|
|
|
* watchdog_nmi_enable(), so a pr_info() is placed there. Placing a
|
|
|
|
* pr_info here would be too noisy as it would result in a message
|
|
|
|
* every few seconds if the hardlockup was disabled but the softlockup
|
|
|
|
* enabled.
|
|
|
|
*/
|
|
|
|
if (!(watchdog_enabled & NMI_WATCHDOG_ENABLED))
|
|
|
|
watchdog_nmi_disable(cpu);
|
2012-07-16 10:42:38 +00:00
|
|
|
}
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2013-06-06 15:42:53 +02:00
|
|
|
static struct smp_hotplug_thread watchdog_threads = {
|
|
|
|
.store = &softlockup_watchdog,
|
|
|
|
.thread_should_run = watchdog_should_run,
|
|
|
|
.thread_fn = watchdog,
|
|
|
|
.thread_comm = "watchdog/%u",
|
|
|
|
.setup = watchdog_enable,
|
|
|
|
.cleanup = watchdog_cleanup,
|
|
|
|
.park = watchdog_disable,
|
|
|
|
.unpark = watchdog_enable,
|
|
|
|
};
|
|
|
|
|
2015-09-04 15:45:15 -07:00
|
|
|
/*
|
|
|
|
* park all watchdog threads that are specified in 'watchdog_cpumask'
|
2015-11-05 18:44:39 -08:00
|
|
|
*
|
|
|
|
* This function returns an error if kthread_park() of a watchdog thread
|
|
|
|
* fails. In this situation, the watchdog threads of some CPUs can already
|
|
|
|
* be parked and the watchdog threads of other CPUs can still be runnable.
|
|
|
|
* Callers are expected to handle this special condition as appropriate in
|
|
|
|
* their context.
|
2015-11-05 18:44:53 -08:00
|
|
|
*
|
|
|
|
* This function may only be called in a context that is protected against
|
|
|
|
* races with CPU hotplug - for example, via get_online_cpus().
|
2015-09-04 15:45:15 -07:00
|
|
|
*/
|
|
|
|
static int watchdog_park_threads(void)
|
|
|
|
{
|
|
|
|
int cpu, ret = 0;
|
|
|
|
|
2017-01-24 15:17:53 -08:00
|
|
|
atomic_set(&watchdog_park_in_progress, 1);
|
|
|
|
|
2015-09-04 15:45:15 -07:00
|
|
|
for_each_watchdog_cpu(cpu) {
|
|
|
|
ret = kthread_park(per_cpu(softlockup_watchdog, cpu));
|
|
|
|
if (ret)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-01-24 15:17:53 -08:00
|
|
|
atomic_set(&watchdog_park_in_progress, 0);
|
|
|
|
|
2015-09-04 15:45:15 -07:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* unpark all watchdog threads that are specified in 'watchdog_cpumask'
|
2015-11-05 18:44:53 -08:00
|
|
|
*
|
|
|
|
* This function may only be called in a context that is protected against
|
|
|
|
* races with CPU hotplug - for example, via get_online_cpus().
|
2015-09-04 15:45:15 -07:00
|
|
|
*/
|
|
|
|
static void watchdog_unpark_threads(void)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
|
|
|
|
for_each_watchdog_cpu(cpu)
|
|
|
|
kthread_unpark(per_cpu(softlockup_watchdog, cpu));
|
|
|
|
}
|
|
|
|
|
2015-09-04 15:45:18 -07:00
|
|
|
/*
|
|
|
|
* Suspend the hard and soft lockup detector by parking the watchdog threads.
|
|
|
|
*/
|
2015-09-04 15:45:28 -07:00
|
|
|
int lockup_detector_suspend(void)
|
2015-09-04 15:45:18 -07:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
2015-11-05 18:44:47 -08:00
|
|
|
get_online_cpus();
|
2015-09-04 15:45:18 -07:00
|
|
|
mutex_lock(&watchdog_proc_mutex);
|
|
|
|
/*
|
|
|
|
* Multiple suspend requests can be active in parallel (counted by
|
|
|
|
* the 'watchdog_suspended' variable). If the watchdog threads are
|
|
|
|
* running, the first caller takes care that they will be parked.
|
|
|
|
* The state of 'watchdog_running' cannot change while a suspend
|
2015-09-04 15:45:28 -07:00
|
|
|
* request is active (see related code in 'proc' handlers).
|
2015-09-04 15:45:18 -07:00
|
|
|
*/
|
|
|
|
if (watchdog_running && !watchdog_suspended)
|
|
|
|
ret = watchdog_park_threads();
|
|
|
|
|
|
|
|
if (ret == 0)
|
|
|
|
watchdog_suspended++;
|
2015-11-05 18:44:36 -08:00
|
|
|
else {
|
|
|
|
watchdog_disable_all_cpus();
|
|
|
|
pr_err("Failed to suspend lockup detectors, disabled\n");
|
|
|
|
watchdog_enabled = 0;
|
|
|
|
}
|
2015-09-04 15:45:18 -07:00
|
|
|
|
|
|
|
mutex_unlock(&watchdog_proc_mutex);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Resume the hard and soft lockup detector by unparking the watchdog threads.
|
|
|
|
*/
|
2015-09-04 15:45:28 -07:00
|
|
|
void lockup_detector_resume(void)
|
2015-09-04 15:45:18 -07:00
|
|
|
{
|
|
|
|
mutex_lock(&watchdog_proc_mutex);
|
|
|
|
|
|
|
|
watchdog_suspended--;
|
|
|
|
/*
|
|
|
|
* The watchdog threads are unparked if they were previously running
|
|
|
|
* and if there is no more active suspend request.
|
|
|
|
*/
|
|
|
|
if (watchdog_running && !watchdog_suspended)
|
|
|
|
watchdog_unpark_threads();
|
|
|
|
|
|
|
|
mutex_unlock(&watchdog_proc_mutex);
|
2015-11-05 18:44:47 -08:00
|
|
|
put_online_cpus();
|
2015-09-04 15:45:18 -07:00
|
|
|
}
|
|
|
|
|
2015-11-05 18:44:33 -08:00
|
|
|
static int update_watchdog_all_cpus(void)
|
2013-09-24 15:27:30 -07:00
|
|
|
{
|
2015-11-05 18:44:33 -08:00
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = watchdog_park_threads();
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
2015-09-04 15:45:21 -07:00
|
|
|
watchdog_unpark_threads();
|
2015-11-05 18:44:33 -08:00
|
|
|
|
|
|
|
return 0;
|
2013-09-24 15:27:30 -07:00
|
|
|
}
|
|
|
|
|
2015-04-14 15:44:16 -07:00
|
|
|
static int watchdog_enable_all_cpus(void)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
2013-06-06 15:42:53 +02:00
|
|
|
int err = 0;
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2013-05-19 20:45:15 +02:00
|
|
|
if (!watchdog_running) {
|
2015-09-04 15:45:06 -07:00
|
|
|
err = smpboot_register_percpu_thread_cpumask(&watchdog_threads,
|
|
|
|
&watchdog_cpumask);
|
2013-06-06 15:42:53 +02:00
|
|
|
if (err)
|
|
|
|
pr_err("Failed to create watchdog threads, disabled\n");
|
2015-09-04 15:45:06 -07:00
|
|
|
else
|
2013-05-19 20:45:15 +02:00
|
|
|
watchdog_running = 1;
|
2015-04-14 15:44:16 -07:00
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* Enable/disable the lockup detectors or
|
|
|
|
* change the sample period 'on the fly'.
|
|
|
|
*/
|
2015-11-05 18:44:33 -08:00
|
|
|
err = update_watchdog_all_cpus();
|
|
|
|
|
|
|
|
if (err) {
|
|
|
|
watchdog_disable_all_cpus();
|
|
|
|
pr_err("Failed to update lockup detectors, disabled\n");
|
|
|
|
}
|
2012-07-16 10:42:38 +00:00
|
|
|
}
|
2013-06-06 15:42:53 +02:00
|
|
|
|
2015-11-05 18:44:33 -08:00
|
|
|
if (err)
|
|
|
|
watchdog_enabled = 0;
|
|
|
|
|
2013-06-06 15:42:53 +02:00
|
|
|
return err;
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void watchdog_disable_all_cpus(void)
|
|
|
|
{
|
2013-05-19 20:45:15 +02:00
|
|
|
if (watchdog_running) {
|
|
|
|
watchdog_running = 0;
|
2013-06-06 15:42:53 +02:00
|
|
|
smpboot_unregister_percpu_thread(&watchdog_threads);
|
2012-07-16 10:42:38 +00:00
|
|
|
}
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
|
|
|
|
2015-11-05 18:44:30 -08:00
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
|
2010-05-07 17:11:44 -04:00
|
|
|
/*
|
2015-04-14 15:43:58 -07:00
|
|
|
* Update the run state of the lockup detectors.
|
|
|
|
*/
|
|
|
|
static int proc_watchdog_update(void)
|
|
|
|
{
|
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Watchdog threads won't be started if they are already active.
|
|
|
|
* The 'watchdog_running' variable in watchdog_*_all_cpus() takes
|
|
|
|
* care of this. If those threads are already active, the sample
|
|
|
|
* period will be updated and the lockup detectors will be enabled
|
|
|
|
* or disabled 'on the fly'.
|
|
|
|
*/
|
|
|
|
if (watchdog_enabled && watchdog_thresh)
|
2015-04-14 15:44:16 -07:00
|
|
|
err = watchdog_enable_all_cpus();
|
2015-04-14 15:43:58 -07:00
|
|
|
else
|
|
|
|
watchdog_disable_all_cpus();
|
|
|
|
|
|
|
|
return err;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-04-14 15:44:05 -07:00
|
|
|
/*
|
|
|
|
* common function for watchdog, nmi_watchdog and soft_watchdog parameter
|
|
|
|
*
|
|
|
|
* caller | table->data points to | 'which' contains the flag(s)
|
|
|
|
* -------------------|-----------------------|-----------------------------
|
|
|
|
* proc_watchdog | watchdog_user_enabled | NMI_WATCHDOG_ENABLED or'ed
|
|
|
|
* | | with SOFT_WATCHDOG_ENABLED
|
|
|
|
* -------------------|-----------------------|-----------------------------
|
|
|
|
* proc_nmi_watchdog | nmi_watchdog_enabled | NMI_WATCHDOG_ENABLED
|
|
|
|
* -------------------|-----------------------|-----------------------------
|
|
|
|
* proc_soft_watchdog | soft_watchdog_enabled | SOFT_WATCHDOG_ENABLED
|
|
|
|
*/
|
|
|
|
static int proc_watchdog_common(int which, struct ctl_table *table, int write,
|
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
int err, old, new;
|
|
|
|
int *watchdog_param = (int *)table->data;
|
|
|
|
|
2015-11-05 18:44:50 -08:00
|
|
|
get_online_cpus();
|
2015-04-14 15:44:05 -07:00
|
|
|
mutex_lock(&watchdog_proc_mutex);
|
|
|
|
|
2015-09-04 15:45:18 -07:00
|
|
|
if (watchdog_suspended) {
|
|
|
|
/* no parameter changes allowed while watchdog is suspended */
|
|
|
|
err = -EAGAIN;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-04-14 15:44:05 -07:00
|
|
|
/*
|
|
|
|
* If the parameter is being read return the state of the corresponding
|
|
|
|
* bit(s) in 'watchdog_enabled', else update 'watchdog_enabled' and the
|
|
|
|
* run state of the lockup detectors.
|
|
|
|
*/
|
|
|
|
if (!write) {
|
|
|
|
*watchdog_param = (watchdog_enabled & which) != 0;
|
|
|
|
err = proc_dointvec_minmax(table, write, buffer, lenp, ppos);
|
|
|
|
} else {
|
|
|
|
err = proc_dointvec_minmax(table, write, buffer, lenp, ppos);
|
|
|
|
if (err)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* There is a race window between fetching the current value
|
|
|
|
* from 'watchdog_enabled' and storing the new value. During
|
|
|
|
* this race window, watchdog_nmi_enable() can sneak in and
|
|
|
|
* clear the NMI_WATCHDOG_ENABLED bit in 'watchdog_enabled'.
|
|
|
|
* The 'cmpxchg' detects this race and the loop retries.
|
|
|
|
*/
|
|
|
|
do {
|
|
|
|
old = watchdog_enabled;
|
|
|
|
/*
|
|
|
|
* If the parameter value is not zero set the
|
|
|
|
* corresponding bit(s), else clear it(them).
|
|
|
|
*/
|
|
|
|
if (*watchdog_param)
|
|
|
|
new = old | which;
|
|
|
|
else
|
|
|
|
new = old & ~which;
|
|
|
|
} while (cmpxchg(&watchdog_enabled, old, new) != old);
|
|
|
|
|
|
|
|
/*
|
2015-11-05 18:44:33 -08:00
|
|
|
* Update the run state of the lockup detectors. There is _no_
|
|
|
|
* need to check the value returned by proc_watchdog_update()
|
|
|
|
* and to restore the previous value of 'watchdog_enabled' as
|
|
|
|
* both lockup detectors are disabled if proc_watchdog_update()
|
|
|
|
* returns an error.
|
2015-04-14 15:44:05 -07:00
|
|
|
*/
|
2016-03-17 14:17:23 -07:00
|
|
|
if (old == new)
|
|
|
|
goto out;
|
|
|
|
|
2015-04-14 15:44:05 -07:00
|
|
|
err = proc_watchdog_update();
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
mutex_unlock(&watchdog_proc_mutex);
|
2015-11-05 18:44:50 -08:00
|
|
|
put_online_cpus();
|
2015-04-14 15:44:05 -07:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2015-04-14 15:44:08 -07:00
|
|
|
/*
|
|
|
|
* /proc/sys/kernel/watchdog
|
|
|
|
*/
|
|
|
|
int proc_watchdog(struct ctl_table *table, int write,
|
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
return proc_watchdog_common(NMI_WATCHDOG_ENABLED|SOFT_WATCHDOG_ENABLED,
|
|
|
|
table, write, buffer, lenp, ppos);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* /proc/sys/kernel/nmi_watchdog
|
2010-05-07 17:11:44 -04:00
|
|
|
*/
|
2015-04-14 15:44:08 -07:00
|
|
|
int proc_nmi_watchdog(struct ctl_table *table, int write,
|
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
return proc_watchdog_common(NMI_WATCHDOG_ENABLED,
|
|
|
|
table, write, buffer, lenp, ppos);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* /proc/sys/kernel/soft_watchdog
|
|
|
|
*/
|
|
|
|
int proc_soft_watchdog(struct ctl_table *table, int write,
|
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
return proc_watchdog_common(SOFT_WATCHDOG_ENABLED,
|
|
|
|
table, write, buffer, lenp, ppos);
|
|
|
|
}
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2015-04-14 15:44:08 -07:00
|
|
|
/*
|
|
|
|
* /proc/sys/kernel/watchdog_thresh
|
|
|
|
*/
|
|
|
|
int proc_watchdog_thresh(struct ctl_table *table, int write,
|
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
2016-03-17 14:17:23 -07:00
|
|
|
int err, old, new;
|
2010-05-07 17:11:44 -04:00
|
|
|
|
2015-11-05 18:44:50 -08:00
|
|
|
get_online_cpus();
|
2013-09-24 15:27:29 -07:00
|
|
|
mutex_lock(&watchdog_proc_mutex);
|
2012-07-16 10:42:38 +00:00
|
|
|
|
2015-09-04 15:45:18 -07:00
|
|
|
if (watchdog_suspended) {
|
|
|
|
/* no parameter changes allowed while watchdog is suspended */
|
|
|
|
err = -EAGAIN;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-04-14 15:44:08 -07:00
|
|
|
old = ACCESS_ONCE(watchdog_thresh);
|
2013-06-06 15:42:53 +02:00
|
|
|
err = proc_dointvec_minmax(table, write, buffer, lenp, ppos);
|
2015-04-14 15:44:08 -07:00
|
|
|
|
2013-06-06 15:42:53 +02:00
|
|
|
if (err || !write)
|
2013-09-24 15:27:29 -07:00
|
|
|
goto out;
|
2011-05-22 22:10:21 -07:00
|
|
|
|
2013-03-12 14:44:08 -04:00
|
|
|
/*
|
2015-11-05 18:44:27 -08:00
|
|
|
* Update the sample period. Restore on failure.
|
2013-03-12 14:44:08 -04:00
|
|
|
*/
|
2016-03-17 14:17:23 -07:00
|
|
|
new = ACCESS_ONCE(watchdog_thresh);
|
|
|
|
if (old == new)
|
|
|
|
goto out;
|
|
|
|
|
2015-04-14 15:44:08 -07:00
|
|
|
set_sample_period();
|
|
|
|
err = proc_watchdog_update();
|
2015-11-05 18:44:27 -08:00
|
|
|
if (err) {
|
2015-04-14 15:44:08 -07:00
|
|
|
watchdog_thresh = old;
|
2015-11-05 18:44:27 -08:00
|
|
|
set_sample_period();
|
|
|
|
}
|
2013-09-24 15:27:29 -07:00
|
|
|
out:
|
|
|
|
mutex_unlock(&watchdog_proc_mutex);
|
2015-11-05 18:44:50 -08:00
|
|
|
put_online_cpus();
|
2013-06-06 15:42:53 +02:00
|
|
|
return err;
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
2015-06-24 16:55:45 -07:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The cpumask is the mask of possible cpus that the watchdog can run
|
|
|
|
* on, not the mask of cpus it is actually running on. This allows the
|
|
|
|
* user to specify a mask that will include cpus that have not yet
|
|
|
|
* been brought online, if desired.
|
|
|
|
*/
|
|
|
|
int proc_watchdog_cpumask(struct ctl_table *table, int write,
|
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
2015-11-05 18:44:50 -08:00
|
|
|
get_online_cpus();
|
2015-06-24 16:55:45 -07:00
|
|
|
mutex_lock(&watchdog_proc_mutex);
|
2015-09-04 15:45:18 -07:00
|
|
|
|
|
|
|
if (watchdog_suspended) {
|
|
|
|
/* no parameter changes allowed while watchdog is suspended */
|
|
|
|
err = -EAGAIN;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2015-06-24 16:55:45 -07:00
|
|
|
err = proc_do_large_bitmap(table, write, buffer, lenp, ppos);
|
|
|
|
if (!err && write) {
|
|
|
|
/* Remove impossible cpus to keep sysctl output cleaner. */
|
|
|
|
cpumask_and(&watchdog_cpumask, &watchdog_cpumask,
|
|
|
|
cpu_possible_mask);
|
|
|
|
|
|
|
|
if (watchdog_running) {
|
|
|
|
/*
|
|
|
|
* Failure would be due to being unable to allocate
|
|
|
|
* a temporary cpumask, so we are likely not in a
|
|
|
|
* position to do much else to make things better.
|
|
|
|
*/
|
|
|
|
if (smpboot_update_cpumask_percpu_thread(
|
|
|
|
&watchdog_threads, &watchdog_cpumask) != 0)
|
|
|
|
pr_err("cpumask update failed\n");
|
|
|
|
}
|
|
|
|
}
|
2015-09-04 15:45:18 -07:00
|
|
|
out:
|
2015-06-24 16:55:45 -07:00
|
|
|
mutex_unlock(&watchdog_proc_mutex);
|
2015-11-05 18:44:50 -08:00
|
|
|
put_online_cpus();
|
2015-06-24 16:55:45 -07:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2010-05-07 17:11:44 -04:00
|
|
|
#endif /* CONFIG_SYSCTL */
|
|
|
|
|
2010-11-25 18:38:29 +01:00
|
|
|
void __init lockup_detector_init(void)
|
2010-05-07 17:11:44 -04:00
|
|
|
{
|
2012-12-17 15:59:50 -08:00
|
|
|
set_sample_period();
|
2013-06-06 15:42:53 +02:00
|
|
|
|
2015-06-24 16:55:45 -07:00
|
|
|
#ifdef CONFIG_NO_HZ_FULL
|
|
|
|
if (tick_nohz_full_enabled()) {
|
2015-09-04 15:45:09 -07:00
|
|
|
pr_info("Disabling watchdog on nohz_full cores by default\n");
|
|
|
|
cpumask_copy(&watchdog_cpumask, housekeeping_mask);
|
2015-06-24 16:55:45 -07:00
|
|
|
} else
|
|
|
|
cpumask_copy(&watchdog_cpumask, cpu_possible_mask);
|
|
|
|
#else
|
|
|
|
cpumask_copy(&watchdog_cpumask, cpu_possible_mask);
|
|
|
|
#endif
|
|
|
|
|
2015-04-14 15:44:13 -07:00
|
|
|
if (watchdog_enabled)
|
2015-04-14 15:44:16 -07:00
|
|
|
watchdog_enable_all_cpus();
|
2010-05-07 17:11:44 -04:00
|
|
|
}
|
2020-02-04 13:44:48 +02:00
|
|
|
|
|
|
|
#ifdef CONFIG_HARDLOCKUP_DETECTOR_OTHER_CPU
|
|
|
|
static DEFINE_PER_CPU(bool, hard_watchdog_warn);
|
|
|
|
static DEFINE_PER_CPU(bool, watchdog_nmi_touch);
|
|
|
|
static cpumask_t __read_mostly watchdog_cpus;
|
|
|
|
ATOMIC_NOTIFIER_HEAD(hardlockup_notifier_list);
|
|
|
|
EXPORT_SYMBOL(hardlockup_notifier_list);
|
|
|
|
|
|
|
|
/* boot commands */
|
|
|
|
/*
|
|
|
|
* Should we panic when a soft-lockup or hard-lockup occurs:
|
|
|
|
*/
|
|
|
|
unsigned int __read_mostly hardlockup_panic =
|
|
|
|
CONFIG_BOOTPARAM_HARDLOCKUP_PANIC_VALUE;
|
|
|
|
/*
|
|
|
|
* We may not want to enable hard lockup detection by default in all cases,
|
|
|
|
* for example when running the kernel as a guest on a hypervisor. In these
|
|
|
|
* cases this function can be called to disable hard lockup detection. This
|
|
|
|
* function should only be executed once by the boot processor before the
|
|
|
|
* kernel command line parameters are parsed, because otherwise it is not
|
|
|
|
* possible to override this in hardlockup_panic_setup().
|
|
|
|
*/
|
|
|
|
void hardlockup_detector_disable(void)
|
|
|
|
{
|
|
|
|
watchdog_enabled &= ~NMI_WATCHDOG_ENABLED;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __init hardlockup_panic_setup(char *str)
|
|
|
|
{
|
|
|
|
if (!strncmp(str, "panic", 5))
|
|
|
|
hardlockup_panic = 1;
|
|
|
|
else if (!strncmp(str, "nopanic", 7))
|
|
|
|
hardlockup_panic = 0;
|
|
|
|
else if (!strncmp(str, "0", 1))
|
|
|
|
watchdog_enabled &= ~NMI_WATCHDOG_ENABLED;
|
|
|
|
else if (!strncmp(str, "1", 1))
|
|
|
|
watchdog_enabled |= NMI_WATCHDOG_ENABLED;
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
__setup("nmi_watchdog=", hardlockup_panic_setup);
|
|
|
|
|
|
|
|
static unsigned int watchdog_next_cpu(unsigned int cpu)
|
|
|
|
{
|
|
|
|
cpumask_t cpus = watchdog_cpus;
|
|
|
|
unsigned int next_cpu;
|
|
|
|
|
|
|
|
next_cpu = cpumask_next(cpu, &cpus);
|
|
|
|
if (next_cpu >= nr_cpu_ids)
|
|
|
|
next_cpu = cpumask_first(&cpus);
|
|
|
|
|
|
|
|
if (next_cpu == cpu)
|
|
|
|
return nr_cpu_ids;
|
|
|
|
|
|
|
|
return next_cpu;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int is_hardlockup_other_cpu(unsigned int cpu)
|
|
|
|
{
|
|
|
|
unsigned long hrint = per_cpu(hrtimer_interrupts, cpu);
|
|
|
|
|
|
|
|
if (per_cpu(hrtimer_interrupts_saved, cpu) == hrint) {
|
|
|
|
unsigned long now = get_timestamp();
|
|
|
|
unsigned long touch_ts = per_cpu(hardlockup_touch_ts, cpu);
|
|
|
|
|
|
|
|
if (time_after(now, touch_ts) &&
|
|
|
|
(now - touch_ts >= hardlockup_thresh))
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
per_cpu(hrtimer_interrupts_saved, cpu) = hrint;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void watchdog_check_hardlockup_other_cpu(void)
|
|
|
|
{
|
|
|
|
unsigned int next_cpu;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Test for hardlockups every 3 samples. The sample period is
|
|
|
|
* watchdog_thresh * 2 / 5, so 3 samples gets us back to slightly over
|
|
|
|
* watchdog_thresh (over by 20%).
|
|
|
|
*/
|
|
|
|
if (__this_cpu_read(hrtimer_interrupts) % 3 != 0)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* check for a hardlockup on the next cpu */
|
|
|
|
next_cpu = watchdog_next_cpu(smp_processor_id());
|
|
|
|
if (next_cpu >= nr_cpu_ids)
|
|
|
|
return;
|
|
|
|
|
|
|
|
smp_rmb();
|
|
|
|
|
|
|
|
if (per_cpu(watchdog_nmi_touch, next_cpu) == true) {
|
|
|
|
per_cpu(watchdog_nmi_touch, next_cpu) = false;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_hardlockup_other_cpu(next_cpu)) {
|
|
|
|
#ifdef CONFIG_SEC_DEBUG
|
|
|
|
check_hardlockup_type(next_cpu);
|
|
|
|
#endif
|
|
|
|
/* only warn once */
|
|
|
|
if (per_cpu(hard_watchdog_warn, next_cpu) == true)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (hardlockup_panic) {
|
|
|
|
exynos_ss_set_hardlockup(hardlockup_panic);
|
|
|
|
atomic_notifier_call_chain(&hardlockup_notifier_list, 0, (void *)&next_cpu);
|
|
|
|
panic("Watchdog detected hard LOCKUP on cpu %u", next_cpu);
|
|
|
|
} else {
|
|
|
|
WARN(1, "Watchdog detected hard LOCKUP on cpu %u", next_cpu);
|
|
|
|
}
|
|
|
|
|
|
|
|
per_cpu(hard_watchdog_warn, next_cpu) = true;
|
|
|
|
} else {
|
|
|
|
per_cpu(hard_watchdog_warn, next_cpu) = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void touch_nmi_watchdog(void)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* Using __raw here because some code paths have
|
|
|
|
* preemption enabled. If preemption is enabled
|
|
|
|
* then interrupts should be enabled too, in which
|
|
|
|
* case we shouldn't have to worry about the watchdog
|
|
|
|
* going off.
|
|
|
|
*/
|
|
|
|
raw_cpu_write(watchdog_nmi_touch, true);
|
|
|
|
touch_softlockup_watchdog();
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(touch_nmi_watchdog);
|
|
|
|
|
|
|
|
static int watchdog_nmi_enable(unsigned int cpu)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* The new cpu will be marked online before the first hrtimer interrupt
|
|
|
|
* runs on it. If another cpu tests for a hardlockup on the new cpu
|
|
|
|
* before it has run its first hrtimer, it will get a false positive.
|
|
|
|
* Touch the watchdog on the new cpu to delay the first check for at
|
|
|
|
* least 3 sampling periods to guarantee one hrtimer has run on the new
|
|
|
|
* cpu.
|
|
|
|
*/
|
|
|
|
per_cpu(watchdog_nmi_touch, cpu) = true;
|
|
|
|
smp_wmb();
|
|
|
|
cpumask_set_cpu(cpu, &watchdog_cpus);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void watchdog_nmi_disable(unsigned int cpu)
|
|
|
|
{
|
|
|
|
unsigned int next_cpu = watchdog_next_cpu(cpu);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Offlining this cpu will cause the cpu before this one to start
|
|
|
|
* checking the one after this one. If this cpu just finished checking
|
|
|
|
* the next cpu and updating hrtimer_interrupts_saved, and then the
|
|
|
|
* previous cpu checks it within one sample period, it will trigger a
|
|
|
|
* false positive. Touch the watchdog on the next cpu to prevent it.
|
|
|
|
*/
|
|
|
|
if (next_cpu < nr_cpu_ids)
|
|
|
|
per_cpu(watchdog_nmi_touch, next_cpu) = true;
|
|
|
|
smp_wmb();
|
|
|
|
cpumask_clear_cpu(cpu, &watchdog_cpus);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef CONFIG_SEC_DEBUG
|
|
|
|
void sl_softirq_entry(const char *softirq_type, void *fn)
|
|
|
|
{
|
|
|
|
struct softlockup_info *sl_info = per_cpu_ptr(&percpu_sl_info, smp_processor_id());
|
|
|
|
|
|
|
|
if (softirq_type) {
|
|
|
|
strncpy(sl_info->softirq_info.softirq_type, softirq_type, sizeof(sl_info->softirq_info.softirq_type) - 1);
|
|
|
|
sl_info->softirq_info.softirq_type[SOFTIRQ_TYPE_LEN - 1] = '\0';
|
|
|
|
}
|
|
|
|
sl_info->softirq_info.last_arrival = local_clock();
|
|
|
|
sl_info->softirq_info.fn = fn;
|
|
|
|
}
|
|
|
|
|
|
|
|
void sl_softirq_exit(void)
|
|
|
|
{
|
|
|
|
struct softlockup_info *sl_info = per_cpu_ptr(&percpu_sl_info, smp_processor_id());
|
|
|
|
|
|
|
|
sl_info->softirq_info.last_arrival = 0;
|
|
|
|
sl_info->softirq_info.fn = (void *)0;
|
|
|
|
sl_info->softirq_info.softirq_type[0] = '\0';
|
|
|
|
}
|
|
|
|
|
|
|
|
void check_softlockup_type(void)
|
|
|
|
{
|
|
|
|
int cpu = smp_processor_id();
|
|
|
|
struct softlockup_info *sl_info = per_cpu_ptr(&percpu_sl_info, cpu);
|
|
|
|
|
|
|
|
sl_info->preempt_count = preempt_count();
|
|
|
|
if (softirq_count() &&
|
|
|
|
sl_info->softirq_info.last_arrival != 0 && sl_info->softirq_info.fn != NULL) {
|
|
|
|
sl_info->delay_time = local_clock() - sl_info->softirq_info.last_arrival;
|
|
|
|
sl_info->sl_type = SL_SOFTIRQ_STUCK;
|
|
|
|
pr_auto(ASL9, "Softlockup state: %s, Latency: %lluns, Softirq type: %s, Func: %pf, preempt_count : %x\n",
|
|
|
|
sl_to_name[sl_info->sl_type], sl_info->delay_time, sl_info->softirq_info.softirq_type, sl_info->softirq_info.fn, sl_info->preempt_count);
|
|
|
|
} else {
|
|
|
|
exynos_ss_get_softlockup_info(cpu, sl_info);
|
|
|
|
if (!(preempt_count() & PREEMPT_MASK) || softirq_count())
|
|
|
|
sl_info->sl_type = SL_UNKNOWN_STUCK;
|
|
|
|
pr_auto(ASL9, "Softlockup state: %s, Latency: %lluns, Task: %s, preempt_count: %x\n",
|
|
|
|
sl_to_name[sl_info->sl_type], sl_info->delay_time, sl_info->task_info.task_comm, sl_info->preempt_count);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
unsigned long long get_ess_softlockup_thresh(void)
|
|
|
|
{
|
|
|
|
return watchdog_thresh * 2 * NSEC_PER_SEC;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(get_ess_softlockup_thresh);
|
|
|
|
|
|
|
|
#ifdef CONFIG_HARDLOCKUP_DETECTOR_OTHER_CPU
|
|
|
|
static void check_hardlockup_type(unsigned int cpu)
|
|
|
|
{
|
|
|
|
struct hardlockup_info *hl_info = per_cpu_ptr(&percpu_hl_info, cpu);
|
|
|
|
|
|
|
|
exynos_ss_get_hardlockup_info(cpu, hl_info);
|
|
|
|
|
|
|
|
if (hl_info->hl_type == HL_TASK_STUCK) {
|
|
|
|
pr_auto(ASL9, "Hardlockup state: %s, Latency: %lluns, TASK: %s\n",
|
|
|
|
hl_to_name[hl_info->hl_type], hl_info->delay_time, hl_info->task_info.task_comm);
|
|
|
|
} else if (hl_info->hl_type == HL_IRQ_STUCK) {
|
|
|
|
pr_auto(ASL9, "Hardlockup state: %s, Latency: %lluns, IRQ: %d, Func: %pf\n",
|
|
|
|
hl_to_name[hl_info->hl_type], hl_info->delay_time, hl_info->irq_info.irq, hl_info->irq_info.fn);
|
|
|
|
} else if (hl_info->hl_type == HL_IDLE_STUCK) {
|
|
|
|
pr_auto(ASL9, "Hardlockup state: %s, Latency: %lluns, mode: %s\n",
|
|
|
|
hl_to_name[hl_info->hl_type], hl_info->delay_time, hl_info->cpuidle_info.mode);
|
|
|
|
} else if (hl_info->hl_type == HL_SMC_CALL_STUCK) {
|
|
|
|
pr_auto(ASL9, "Hardlockup state: %s, Latency: %lluns, CMD: %u\n",
|
|
|
|
hl_to_name[hl_info->hl_type], hl_info->delay_time, hl_info->smc_info.cmd);
|
|
|
|
} else if (hl_info->hl_type == HL_IRQ_STORM) {
|
|
|
|
pr_auto(ASL9, "Hardlockup state: %s, Latency: %lluns, IRQ : %d, Func: %pf, Avg period: %lluns\n",
|
|
|
|
hl_to_name[hl_info->hl_type], hl_info->delay_time, hl_info->irq_info.irq, hl_info->irq_info.fn, hl_info->irq_info.avg_period);
|
|
|
|
} else if (hl_info->hl_type == HL_UNKNOWN_STUCK) {
|
|
|
|
pr_auto(ASL9, "Hardlockup state: %s, Latency: %lluns, TASK: %s\n",
|
|
|
|
hl_to_name[hl_info->hl_type], hl_info->delay_time, hl_info->task_info.task_comm);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
void update_hardlockup_type(unsigned int cpu)
|
|
|
|
{
|
|
|
|
struct hardlockup_info *hl_info = per_cpu_ptr(&percpu_hl_info, cpu);
|
|
|
|
|
|
|
|
if (hl_info->hl_type == HL_TASK_STUCK && !irqs_disabled()) {
|
|
|
|
hl_info->hl_type = HL_UNKNOWN_STUCK;
|
|
|
|
pr_info("Unknown stuck because IRQ was enabled but IRQ was not generated\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(update_hardlockup_type);
|
|
|
|
|
|
|
|
unsigned long long get_hardlockup_thresh(void)
|
|
|
|
{
|
|
|
|
return (hardlockup_thresh * NSEC_PER_SEC - sample_period);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL(get_hardlockup_thresh);
|
|
|
|
#endif
|
|
|
|
#endif
|