Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751656AbdFUMkd convert rfc822-to-8bit (ORCPT ); Wed, 21 Jun 2017 08:40:33 -0400 Received: from mga14.intel.com ([192.55.52.115]:41360 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750994AbdFUMkb (ORCPT ); Wed, 21 Jun 2017 08:40:31 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.39,369,1493708400"; d="scan'208";a="117043419" From: "Liang, Kan" To: Andrew Morton CC: "linux-kernel@vger.kernel.org" , "dzickus@redhat.com" , "mingo@kernel.org" , "babu.moger@oracle.com" , "atomlin@redhat.com" , "prarit@redhat.com" , "torvalds@linux-foundation.org" , "peterz@infradead.org" , "tglx@linutronix.de" , "eranian@google.com" , "acme@redhat.com" , "ak@linux.intel.com" , "stable@vger.kernel.org" Subject: RE: [PATCH] kernel/watchdog: fix spurious hard lockups Thread-Topic: [PATCH] kernel/watchdog: fix spurious hard lockups Thread-Index: AQHS6gz8LSkdJFMSZk6lPSiU4VpMCqItyAaAgAFoAmA= Date: Wed, 21 Jun 2017 12:40:28 +0000 Message-ID: <37D7C6CF3E00A74B8858931C1DB2F07753710034@SHSMSX103.ccr.corp.intel.com> References: <20170620213309.30051-1-kan.liang@intel.com> <20170620150359.0fbb417aed72c84ac6ad8498@linux-foundation.org> In-Reply-To: <20170620150359.0fbb417aed72c84ac6ad8498@linux-foundation.org> Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiZDUxODQxNmEtYzc3NC00MTczLWJmODktZTUzMzUxN2UxMDZjIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX0lDIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE2LjUuOS4zIiwiVHJ1c3RlZExhYmVsSGFzaCI6ImQ5SW5ydWtnQUtDN1BMZ0RZQ1VFaFBIZEVIQnVwQVwvVXlDVGZ0UWlJZDY4PSJ9 x-ctpclassification: CTP_IC dlp-product: dlpe-windows dlp-version: 10.0.102.7 dlp-reaction: no-action x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 667 Lines: 20 > > > > The right fix for mainline can be found here. > > perf/x86/intel: enable CPU ref_cycles for GP counter perf/x86/intel, > > watchdog: Switch NMI watchdog to ref cycles on x86 > > https://patchwork.kernel.org/patch/9779087/ > > https://patchwork.kernel.org/patch/9779089/ > > Presumably the "right fix" will later be altered to revert this one-line > workaround? The "right fix" itself will not touch the watchdog rate. I will modify the changelog to notify the people who want to do the backport. As my understanding, it's not harmful even if we don't revert the workaround. It can still detect the hardlockup, only takes a tiny bit longer. Thanks, Kan