From: Andrew Morton <akpm@linux-foundation.org>
To: Jan Kara <jack@suse.cz>
Cc: Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
LKML <linux-kernel@vger.kernel.org>,
jslaby@suse.cz
Subject: Re: [PATCH] printk: Avoid softlockups in console_unlock()
Date: Thu, 17 Jan 2013 13:39:17 -0800 [thread overview]
Message-ID: <20130117133917.0f75728e.akpm@linux-foundation.org> (raw)
In-Reply-To: <20130117210442.GA23984@quack.suse.cz>
On Thu, 17 Jan 2013 22:04:42 +0100
Jan Kara <jack@suse.cz> wrote:
> ...
>
> So I played a bit with this. To make things easier for me I added
> artificial mdelay(len*10) (effectively simulating console able to print 100
> characters per second) just after call_console_drivers() so that I can
> trigger issues even on a machine easily available to me. Booting actually
> doesn't trigger any problems because there aren't enough things happening
> in parallel on common machine during boot but
> echo t >/proc/sysrq-trigger &
> for i in /lib/modules/3.8.0-rc3-0-default/kernel/fs/*/*.ko; do
> name=`basename $i`; name=${name%.ko}; modprobe $name
> done
> easily triggers the problem (as modprobe uses both RCU & IPIs to signal all
> CPUs).
>
> Adding
> touch_nmi_watchdog();
> touch_all_softlockup_watchdogs();
> rcu_cpu_stall_reset();
I'm not sure that touch_all_softlockup_watchdogs() is needed?
touch_nmi_watchdog() itself calls touch_softlockup_watchdog().
If the rcu_cpu_stall_reset() is needed here then presumably it is
needed elsewhere and we should put a call to rcu_cpu_stall_reset() into
(the increasingly misnamed) touch_nmi_watchdog().
> into the printk loop did stop all the warnings and the machine eventually
> came alive again after finishing printing sysrq-t output (while printing
> the machine was responding to ping but ssh stopped working after a while -
> not sure what was happening but apparently some IO requests weren't
> completing and maybe networking started dropping packets because it
> accumulated too much RCU work).
>
> So your suggestion seems certainly plausible. I was just wondering
> a) Above three lines can be pretty expensive on big machines as they
> iterate over all CPUs. So we should probably limit it to once per jiffy or
> something like that?
I guess so - is it hard to test the effects of such a change? Maybe do
a few MB of printks with the output disabled with `dmesg -n' and see
what effect such a patch has?
If it does need ratelimiting, I'd worry about using jiffies for that.
If the kernel is spending a long time with interrupts disabled, jiffies
might not be incrementing. Using the CPU timestamp would be better
(eg, sched_clock()).
> b) Above three lines can make softlockup detection pretty useless if
> there's enough printk traffic (it would be enough to printk() something
> every 10s or so which can happen with netfilter logging packets or so).
Yes, that is a concern.
> But if we touch the watchdogs only if we spend more than 1 jiffy in the
> console_unlock() we should hopefully touch those watchdogs only in rare
> cases of heavy printk traffic.
yup. Another option might be to do the touch_nmi_watchdog() only if
there is a "large" amount of data being emitted within
console_unlock(). Like your 1000 character threshold.
> PS: sysrq-t was ~200 KB on that freshly booted machine so on a busy machine
> that would trigger softlockups with 115200 serial console as well (I
> actually do remember seeing it in some customer's reports). So it's not
> just boot.
Yes, we have hit this before. Large printks over slow console devices.
See the sad little touch_nmi_watchdog() in lib/show_mem.c, for
example. I actually thought we'd fixed this in printk itself but it
seems not - the two touch_nmi_watchdog()s in there are for special
cases.
Actually, a bit of grepping for touch_nmi_watchdog() is interesting. A
number of serial drivers are doing it, which makes me wonder why your
customers weren't saved by that - using the wrong driver, perhaps? If
we can get this fixed centrally then a lot of those calls should be
removeable.
The presence of all those touch_nmi_watchdog() calls around the place
has implications for the testing of your patch, btw ;)
next prev parent reply other threads:[~2013-01-17 21:39 UTC|newest]
Thread overview: 16+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-01-15 17:58 [PATCH] printk: Avoid softlockups in console_unlock() Jan Kara
2013-01-16 7:37 ` Andrew Morton
2013-01-16 10:16 ` Jan Kara
2013-01-16 22:50 ` Andrew Morton
2013-01-16 23:55 ` Jan Kara
2013-01-17 0:11 ` Andrew Morton
2013-01-17 21:04 ` Jan Kara
2013-01-17 21:39 ` Andrew Morton [this message]
2013-01-17 23:46 ` Jan Kara
2013-01-17 23:50 ` Andrew Morton
2013-01-21 21:00 ` Jan Kara
2013-01-29 14:54 ` Jan Kara
2013-01-31 0:08 ` Andrew Morton
2013-01-31 12:46 ` Jan Kara
2013-01-31 7:44 ` anish singh
2013-01-31 21:21 ` Andrew Morton
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20130117133917.0f75728e.akpm@linux-foundation.org \
--to=akpm@linux-foundation.org \
--cc=gregkh@linuxfoundation.org \
--cc=jack@suse.cz \
--cc=jslaby@suse.cz \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).