Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp2117930ybm; Thu, 23 May 2019 11:38:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqwAElv5zWaqT+UDCS1d4z+ekXkd23XC9jMMzJa4tYcqIMH008TxV4zm4NoLODYE4VE5LLtN X-Received: by 2002:a17:902:7202:: with SMTP id ba2mr46138268plb.177.1558636735459; Thu, 23 May 2019 11:38:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558636735; cv=none; d=google.com; s=arc-20160816; b=NvuPHFimtdQqHVAGvp9/zF1ohf/hnfPYVqQxMm3f5aJXlUPqavphaiVpgi/c/goa7s 1t5BE13rymRafcd6JIipULQVTu9+PREssQ5p6eXNmAgnIRsW/SPGvFQVZhXpQY3Hqrcj 9e8o4i4RTZw44kQ6AAgwvCPgd+mY3i0vboEcPoKQ8WbcgY+9aR9gSQgh03lUYkYfhFWp +RPWVotbXJ2lsggjg+q21wqKwh61rsZqKq8hG3RQR39XE5PVMbFRb7bZyb8OkjjsEe0Y gq3JdDzPtWM0mQCr1Epv7C5EZ8rF38lrojVx1Myim1Xbl9l66kObnQ+AYv3Vpd4kzuR4 dIVA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=6AvOUIgQ2K3S4kyokBSon0Lolms8Kp5ZvwlwGpgK3Jk=; b=uVmFu45fJRcZu1MnIe0R0UZzzBzgCAJDb8ztuIVa8kR1b3iCDgfVnQBpljNwiFoXpN al0CN9HBW+JsKa8tCWt8RpMCwGjnqe5vEI6inIl2gumArrZv00qivFIaIaXlYpKpAsEa Gq9i5Je6WWofoP24Aj4knAq9eWTxqChiY68sJ8kBopS1rI7xEMXSta8kXiCSuQs14k/F 6okFfkBb3eDFvNDcoWi3bCIsOPr9Omw49rRRBb6u9EslhmbTnTXjCbfU34kLJRb88ohd ip5BfEUiB/7+aKEXlctvuqPII4bRdZEKTXz2fg6le8GSF9mnjEofLgikQd1d/3HFAREO d+Gg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i12si342527pgt.255.2019.05.23.11.38.39; Thu, 23 May 2019 11:38:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731488AbfEWShH (ORCPT + 99 others); Thu, 23 May 2019 14:37:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:36118 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731383AbfEWShG (ORCPT ); Thu, 23 May 2019 14:37:06 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id B42342177E; Thu, 23 May 2019 18:37:04 +0000 (UTC) Date: Thu, 23 May 2019 14:37:03 -0400 From: Steven Rostedt To: Zhenzhong Duan , corbet@lwn.net Cc: linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, paulmck@linux.ibm.com, josh@joshtriplett.org, mathieu.desnoyers@efficios.com, jiangshanlai@gmail.com, joel@joelfernandes.org, tglx@linutronix.de, mingo@kernel.org, gregkh@linuxfoundation.org, keescook@chromium.org, srinivas.eeda@oracle.com Subject: Re: [PATCH v3] doc: kernel-parameters.txt: fix documentation of nmi_watchdog parameter Message-ID: <20190523143703.2fb71f71@gandalf.local.home> In-Reply-To: <1558405928-29449-1-git-send-email-zhenzhong.duan@oracle.com> References: <1558405928-29449-1-git-send-email-zhenzhong.duan@oracle.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 21 May 2019 10:32:08 +0800 Zhenzhong Duan wrote: > The default behavior of hardlockup depends on the config of > CONFIG_BOOTPARAM_HARDLOCKUP_PANIC. > Jon, You want to take this in your tree? -- Steve > Fix the description of nmi_watchdog to make it clear. > > Suggested-by: Steven Rostedt (VMware) > Signed-off-by: Zhenzhong Duan > Reviewed-by: Joel Fernandes (Google) > Acked-by: Ingo Molnar > Acked-by: Steven Rostedt (VMware) > Cc: Thomas Gleixner > Cc: Kees Cook > Cc: Greg Kroah-Hartman > Cc: linux-doc@vger.kernel.org > --- > v3: add Suggested-by and Acked-by > v2: fix description using words suggested by Steven Rostedt > > Documentation/admin-guide/kernel-parameters.txt | 5 +++-- > 1 file changed, 3 insertions(+), 2 deletions(-) > > diff --git a/Documentation/admin-guide/kernel-parameters.txt b/Documentation/admin-guide/kernel-parameters.txt > index 08df588..b9d4358 100644 > --- a/Documentation/admin-guide/kernel-parameters.txt > +++ b/Documentation/admin-guide/kernel-parameters.txt > @@ -2805,8 +2805,9 @@ > 0 - turn hardlockup detector in nmi_watchdog off > 1 - turn hardlockup detector in nmi_watchdog on > When panic is specified, panic when an NMI watchdog > - timeout occurs (or 'nopanic' to override the opposite > - default). To disable both hard and soft lockup detectors, > + timeout occurs (or 'nopanic' to not panic on an NMI > + watchdog, if CONFIG_BOOTPARAM_HARDLOCKUP_PANIC is set) > + To disable both hard and soft lockup detectors, > please see 'nowatchdog'. > This is useful when you use a panic=... timeout and > need the box quickly up again.