Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2455265yba; Fri, 10 May 2019 11:51:19 -0700 (PDT) X-Google-Smtp-Source: APXvYqx53OTKpQGqIQ+bXmFibnfKo5CLW0urI4+TqqxTyTGOr8pYxmNUKrO/EUs0Hfq9zB+PdWtx X-Received: by 2002:a62:2805:: with SMTP id o5mr16595887pfo.256.1557514279286; Fri, 10 May 2019 11:51:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557514279; cv=none; d=google.com; s=arc-20160816; b=lKiy4bjRJSWWo46t0VikaSmPhZWKVu+fIkmqYouK6Arnrf5bbBk93Dy+fVdASSiIom aZlomGPlW+CbZH+3Kv1fPGNSND03hOkbGdPvU7RHQ7fLzJOXZvVxoyX86HfOjp1jNeaG oT6F02gIvIKGKy6+LpvGGorNsQxKloMCoxSNiS6hPfFQGhoY2EjXYqvW2FpJMDMFlaoD 0QnD8v7VMiNj8Cl+94Qxul84gLSLEWD3fAQ9FtHOrx8ReQj6de+ubGDzcLX4uU050c3t ByFw9KC/QxZjlC5WtzLn9IE/GAXTK1oFQqE7+lH63K67EzukstrMEZIWUks7Y7ufnLR/ pE3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=pmW1r3gxy+c6VouX3rHPi/hzLQwzyZNekV4x5xOg/Ck=; b=qgoDkkKL/rbL0LgoYWNAAkJjKoa4Aq0KqhT6bX04y+06mv5OJ458QOHQWqtb8aodU4 C1fm4UsDEHGedeGpNfJc1FRxj6Jsi9xMo6ENi+wejWqo6CFYfP1FDwP8Lic6fWoQaJP3 Nqr7QX1DfnJCgNpoeyxpFY/RsALOAdmzcaDXxsTGNlXRraPkivYonulXnyvr28Dta6Q5 NH/iXCKYIoAUJJPwYAcuEHiWSgvA6gwC2hLsV4Wp7vM6s55Grfv+ANKh0l1FtvSsl252 a7Y+snQe2/aUvPScUjGpB+81m04bwJrYzQzT0REfXjq6mz/4GTl8YsfgdhshAakdx92k 5o7A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m19si8848357pgb.427.2019.05.10.11.51.02; Fri, 10 May 2019 11:51:19 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727985AbfEJSry (ORCPT + 99 others); Fri, 10 May 2019 14:47:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:44016 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727638AbfEJSry (ORCPT ); Fri, 10 May 2019 14:47:54 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DEE4C21479; Fri, 10 May 2019 18:47:51 +0000 (UTC) Date: Fri, 10 May 2019 14:47:49 -0400 From: Steven Rostedt To: Zhenzhong Duan Cc: linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, paulmck@linux.ibm.com, josh@joshtriplett.org, mathieu.desnoyers@efficios.com, jiangshanlai@gmail.com, joel@joelfernandes.org, corbet@lwn.net, tglx@linutronix.de, mingo@kernel.org, gregkh@linuxfoundation.org, keescook@chromium.org, srinivas.eeda@oracle.com Subject: Re: [PATCH 2/2] doc: kernel-parameters.txt: fix documentation of nmi_watchdog parameter Message-ID: <20190510144749.592f4249@gandalf.local.home> In-Reply-To: <1555211464-28652-2-git-send-email-zhenzhong.duan@oracle.com> References: <1555211464-28652-1-git-send-email-zhenzhong.duan@oracle.com> <1555211464-28652-2-git-send-email-zhenzhong.duan@oracle.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As nobody else commented, I will ;) Hi Zhenzhong! On Sun, 14 Apr 2019 11:11:04 +0800 Zhenzhong Duan wrote: > As stated in "Documentation/lockup-watchdogs.txt:line 22", the default > behaivor after 'hardlockup' is to stay locked up rather than panic. That actually says: A 'hardlockup' is defined as a bug that causes the CPU to loop in kernel mode for more than 10 seconds (see "Implementation" below for details), without letting other interrupts have a chance to run. Similarly to the softlockup case, the current stack trace is displayed upon detection and the system will stay locked up unless the default behavior is changed, which can be done through a sysctl, 'hardlockup_panic', a compile time knob, "BOOTPARAM_HARDLOCKUP_PANIC", and a kernel parameter, "nmi_watchdog" If your config has: CONFIG_BOOTPARAM_HARDLOCKUP_PANIC=y The kernel will panic on hard lockup by default unless you add nopanic. If your config has: # CONFIG_BOOTPARAM_HARDLOCKUP_PANIC is not set Then the default will be not to panic unless you add "panic" to the kernel command line. > > Signed-off-by: Zhenzhong Duan > --- > Documentation/admin-guide/kernel-parameters.txt | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > index 2b8ee90..fcc9579 100644 > --- a/Documentation/admin-guide/kernel-parameters.txt > +++ b/Documentation/admin-guide/kernel-parameters.txt > @@ -2769,7 +2769,7 @@ > 0 - turn hardlockup detector in nmi_watchdog off > 1 - turn hardlockup detector in nmi_watchdog on > When panic is specified, panic when an NMI watchdog > - timeout occurs (or 'nopanic' to override the opposite > + timeout occurs (or 'nopanic' which is the opposite > default). To disable both hard and soft lockup detectors, Honestly, I think the original text states what it does better than your update. Because the nopanic is added to override the "opposite default" which is if the config was set to do so. That said, this all still can be explained better. What about: nmi_watchdog= [KNL,BUGS=X86] Debugging features for SMP kernels Format: [panic,][nopanic,][num] Valid num: 0 or 1 0 - turn hardlockup detector in nmi_watchdog off 1 - turn hardlockup detector in nmi_watchdog on When panic is specified, panic when an NMI watchdog timeout occurs (or 'nopanic' to not panic on an NMI watchdog, if CONFIG_BOOTPARAM_HARDLOCKUP_PANIC is set) To disable both hard and soft lockup detectors, please see 'nowatchdog'. This is useful when you use a panic=... timeout and need the box quickly up again. -- Steve > please see 'nowatchdog'. > This is useful when you use a panic=... timeout and