2010-02-05 21:47:04 -05:00
|
|
|
/*
|
|
|
|
* HW NMI watchdog support
|
|
|
|
*
|
|
|
|
* started by Don Zickus, Copyright (C) 2010 Red Hat, Inc.
|
|
|
|
*
|
|
|
|
* Arch specific calls to support NMI watchdog
|
|
|
|
*
|
|
|
|
* Bits copied from original nmi.c file
|
|
|
|
*
|
|
|
|
*/
|
2010-05-13 09:12:39 +02:00
|
|
|
#include <asm/apic.h>
|
x86: Fix trigger_all_cpu_backtrace() implementation
The following change fixes the x86 implementation of
trigger_all_cpu_backtrace(), which was previously (accidentally,
as far as I can tell) disabled to always return false as on
architectures that do not implement this function.
trigger_all_cpu_backtrace(), as defined in include/linux/nmi.h,
should call arch_trigger_all_cpu_backtrace() if available, or
return false if the underlying arch doesn't implement this
function.
x86 did provide a suitable arch_trigger_all_cpu_backtrace()
implementation, but it wasn't actually being used because it was
declared in asm/nmi.h, which linux/nmi.h doesn't include. Also,
linux/nmi.h couldn't easily be fixed by including asm/nmi.h,
because that file is not available on all architectures.
I am proposing to fix this by moving the x86 definition of
arch_trigger_all_cpu_backtrace() to asm/irq.h.
Tested via: echo l > /proc/sysrq-trigger
Before the change, this uses a fallback implementation which
shows backtraces on active CPUs (using
smp_call_function_interrupt() )
After the change, this shows NMI backtraces on all CPUs
Signed-off-by: Michel Lespinasse <walken@google.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Link: http://lkml.kernel.org/r/1370518875-1346-1-git-send-email-walken@google.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2013-06-06 04:41:15 -07:00
|
|
|
#include <asm/nmi.h>
|
2010-02-05 21:47:04 -05:00
|
|
|
|
|
|
|
#include <linux/cpumask.h>
|
2010-05-07 17:11:48 -04:00
|
|
|
#include <linux/kdebug.h>
|
|
|
|
#include <linux/notifier.h>
|
|
|
|
#include <linux/kprobes.h>
|
2010-02-05 21:47:04 -05:00
|
|
|
#include <linux/nmi.h>
|
|
|
|
#include <linux/module.h>
|
2011-03-25 15:20:14 +01:00
|
|
|
#include <linux/delay.h>
|
2014-06-19 17:33:32 -04:00
|
|
|
#include <linux/seq_buf.h>
|
2010-02-05 21:47:04 -05:00
|
|
|
|
2010-11-12 11:22:23 -05:00
|
|
|
#ifdef CONFIG_HARDLOCKUP_DETECTOR
|
2011-05-22 22:10:23 -07:00
|
|
|
u64 hw_nmi_get_sample_period(int watchdog_thresh)
|
2010-02-12 17:19:19 -05:00
|
|
|
{
|
2011-05-22 22:10:23 -07:00
|
|
|
return (u64)(cpu_khz) * 1000 * watchdog_thresh;
|
2010-02-12 17:19:19 -05:00
|
|
|
}
|
2010-11-12 11:22:23 -05:00
|
|
|
#endif
|
2010-02-12 17:19:19 -05:00
|
|
|
|
2010-12-09 14:47:34 +06:00
|
|
|
#ifdef arch_trigger_all_cpu_backtrace
|
2010-11-12 09:50:54 -05:00
|
|
|
/* For reliability, we're prepared to waste bits here. */
|
|
|
|
static DECLARE_BITMAP(backtrace_mask, NR_CPUS) __read_mostly;
|
2014-06-19 17:33:32 -04:00
|
|
|
static cpumask_var_t printtrace_mask;
|
|
|
|
|
|
|
|
#define NMI_BUF_SIZE 4096
|
|
|
|
|
|
|
|
struct nmi_seq_buf {
|
|
|
|
unsigned char buffer[NMI_BUF_SIZE];
|
|
|
|
struct seq_buf seq;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Safe printing in NMI context */
|
|
|
|
static DEFINE_PER_CPU(struct nmi_seq_buf, nmi_print_seq);
|
2010-11-12 09:50:54 -05:00
|
|
|
|
2011-01-04 22:38:08 -05:00
|
|
|
/* "in progress" flag of arch_trigger_all_cpu_backtrace */
|
|
|
|
static unsigned long backtrace_flag;
|
|
|
|
|
2014-06-19 17:33:32 -04:00
|
|
|
static void print_seq_line(struct nmi_seq_buf *s, int start, int end)
|
|
|
|
{
|
|
|
|
const char *buf = s->buffer + start;
|
|
|
|
|
|
|
|
printk("%.*s", (end - start) + 1, buf);
|
|
|
|
}
|
|
|
|
|
2014-06-23 13:22:05 -07:00
|
|
|
void arch_trigger_all_cpu_backtrace(bool include_self)
|
2010-02-05 21:47:04 -05:00
|
|
|
{
|
2014-06-19 17:33:32 -04:00
|
|
|
struct nmi_seq_buf *s;
|
|
|
|
int len;
|
|
|
|
int cpu;
|
2010-02-05 21:47:04 -05:00
|
|
|
int i;
|
2014-06-19 17:33:32 -04:00
|
|
|
int this_cpu = get_cpu();
|
2010-02-05 21:47:04 -05:00
|
|
|
|
2014-06-23 13:22:05 -07:00
|
|
|
if (test_and_set_bit(0, &backtrace_flag)) {
|
2011-01-04 22:38:08 -05:00
|
|
|
/*
|
|
|
|
* If there is already a trigger_all_cpu_backtrace() in progress
|
|
|
|
* (backtrace_flag == 1), don't output double cpu dump infos.
|
|
|
|
*/
|
2014-06-23 13:22:05 -07:00
|
|
|
put_cpu();
|
2011-01-04 22:38:08 -05:00
|
|
|
return;
|
2014-06-23 13:22:05 -07:00
|
|
|
}
|
2011-01-04 22:38:08 -05:00
|
|
|
|
2010-02-05 21:47:04 -05:00
|
|
|
cpumask_copy(to_cpumask(backtrace_mask), cpu_online_mask);
|
2014-06-23 13:22:05 -07:00
|
|
|
if (!include_self)
|
2014-06-19 17:33:32 -04:00
|
|
|
cpumask_clear_cpu(this_cpu, to_cpumask(backtrace_mask));
|
|
|
|
|
|
|
|
cpumask_copy(printtrace_mask, to_cpumask(backtrace_mask));
|
|
|
|
/*
|
|
|
|
* Set up per_cpu seq_buf buffers that the NMIs running on the other
|
|
|
|
* CPUs will write to.
|
|
|
|
*/
|
|
|
|
for_each_cpu(cpu, to_cpumask(backtrace_mask)) {
|
|
|
|
s = &per_cpu(nmi_print_seq, cpu);
|
|
|
|
seq_buf_init(&s->seq, s->buffer, NMI_BUF_SIZE);
|
|
|
|
}
|
2010-02-05 21:47:04 -05:00
|
|
|
|
2014-06-23 13:22:05 -07:00
|
|
|
if (!cpumask_empty(to_cpumask(backtrace_mask))) {
|
|
|
|
pr_info("sending NMI to %s CPUs:\n",
|
|
|
|
(include_self ? "all" : "other"));
|
|
|
|
apic->send_IPI_mask(to_cpumask(backtrace_mask), NMI_VECTOR);
|
|
|
|
}
|
2010-02-05 21:47:04 -05:00
|
|
|
|
|
|
|
/* Wait for up to 10 seconds for all CPUs to do the backtrace */
|
|
|
|
for (i = 0; i < 10 * 1000; i++) {
|
|
|
|
if (cpumask_empty(to_cpumask(backtrace_mask)))
|
|
|
|
break;
|
|
|
|
mdelay(1);
|
2014-06-23 13:22:05 -07:00
|
|
|
touch_softlockup_watchdog();
|
2010-02-05 21:47:04 -05:00
|
|
|
}
|
2011-01-04 22:38:08 -05:00
|
|
|
|
2014-06-19 17:33:32 -04:00
|
|
|
/*
|
|
|
|
* Now that all the NMIs have triggered, we can dump out their
|
|
|
|
* back traces safely to the console.
|
|
|
|
*/
|
|
|
|
for_each_cpu(cpu, printtrace_mask) {
|
|
|
|
int last_i = 0;
|
|
|
|
|
|
|
|
s = &per_cpu(nmi_print_seq, cpu);
|
|
|
|
len = seq_buf_used(&s->seq);
|
|
|
|
if (!len)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* Print line by line. */
|
|
|
|
for (i = 0; i < len; i++) {
|
|
|
|
if (s->buffer[i] == '\n') {
|
|
|
|
print_seq_line(s, last_i, i);
|
|
|
|
last_i = i + 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Check if there was a partial line. */
|
|
|
|
if (last_i < len) {
|
|
|
|
print_seq_line(s, last_i, len - 1);
|
|
|
|
pr_cont("\n");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-01-04 22:38:08 -05:00
|
|
|
clear_bit(0, &backtrace_flag);
|
2014-03-13 19:00:35 +01:00
|
|
|
smp_mb__after_atomic();
|
2014-06-23 13:22:05 -07:00
|
|
|
put_cpu();
|
2010-02-05 21:47:04 -05:00
|
|
|
}
|
2010-05-07 17:11:48 -04:00
|
|
|
|
2014-06-19 17:33:32 -04:00
|
|
|
/*
|
|
|
|
* It is not safe to call printk() directly from NMI handlers.
|
|
|
|
* It may be fine if the NMI detected a lock up and we have no choice
|
|
|
|
* but to do so, but doing a NMI on all other CPUs to get a back trace
|
|
|
|
* can be done with a sysrq-l. We don't want that to lock up, which
|
|
|
|
* can happen if the NMI interrupts a printk in progress.
|
|
|
|
*
|
|
|
|
* Instead, we redirect the vprintk() to this nmi_vprintk() that writes
|
|
|
|
* the content into a per cpu seq_buf buffer. Then when the NMIs are
|
|
|
|
* all done, we can safely dump the contents of the seq_buf to a printk()
|
|
|
|
* from a non NMI context.
|
|
|
|
*/
|
|
|
|
static int nmi_vprintk(const char *fmt, va_list args)
|
|
|
|
{
|
|
|
|
struct nmi_seq_buf *s = this_cpu_ptr(&nmi_print_seq);
|
|
|
|
unsigned int len = seq_buf_used(&s->seq);
|
|
|
|
|
|
|
|
seq_buf_vprintf(&s->seq, fmt, args);
|
|
|
|
return seq_buf_used(&s->seq) - len;
|
|
|
|
}
|
|
|
|
|
2014-04-17 17:18:14 +09:00
|
|
|
static int
|
2011-09-30 15:06:21 -04:00
|
|
|
arch_trigger_all_cpu_backtrace_handler(unsigned int cmd, struct pt_regs *regs)
|
2010-05-07 17:11:48 -04:00
|
|
|
{
|
2011-01-04 22:38:07 -05:00
|
|
|
int cpu;
|
2010-05-07 17:11:48 -04:00
|
|
|
|
2011-01-04 22:38:07 -05:00
|
|
|
cpu = smp_processor_id();
|
2010-05-07 17:11:48 -04:00
|
|
|
|
|
|
|
if (cpumask_test_cpu(cpu, to_cpumask(backtrace_mask))) {
|
2014-06-19 17:33:32 -04:00
|
|
|
printk_func_t printk_func_save = this_cpu_read(printk_func);
|
2010-05-07 17:11:48 -04:00
|
|
|
|
2014-06-19 17:33:32 -04:00
|
|
|
/* Replace printk to write into the NMI seq */
|
|
|
|
this_cpu_write(printk_func, nmi_vprintk);
|
2010-05-07 17:11:48 -04:00
|
|
|
printk(KERN_WARNING "NMI backtrace for cpu %d\n", cpu);
|
|
|
|
show_regs(regs);
|
2014-06-19 17:33:32 -04:00
|
|
|
this_cpu_write(printk_func, printk_func_save);
|
|
|
|
|
2010-05-07 17:11:48 -04:00
|
|
|
cpumask_clear_cpu(cpu, to_cpumask(backtrace_mask));
|
2011-09-30 15:06:21 -04:00
|
|
|
return NMI_HANDLED;
|
2010-05-07 17:11:48 -04:00
|
|
|
}
|
|
|
|
|
2011-09-30 15:06:21 -04:00
|
|
|
return NMI_DONE;
|
2010-05-07 17:11:48 -04:00
|
|
|
}
|
2014-04-17 17:18:14 +09:00
|
|
|
NOKPROBE_SYMBOL(arch_trigger_all_cpu_backtrace_handler);
|
2010-05-07 17:11:48 -04:00
|
|
|
|
|
|
|
static int __init register_trigger_all_cpu_backtrace(void)
|
|
|
|
{
|
2011-09-30 15:06:21 -04:00
|
|
|
register_nmi_handler(NMI_LOCAL, arch_trigger_all_cpu_backtrace_handler,
|
|
|
|
0, "arch_bt");
|
2010-05-07 17:11:48 -04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
early_initcall(register_trigger_all_cpu_backtrace);
|
2010-02-18 21:56:52 -05:00
|
|
|
#endif
|