Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp6952686ybl; Wed, 15 Jan 2020 12:57:52 -0800 (PST) X-Google-Smtp-Source: APXvYqxrgD4pQWaJCK/1prIlUmZiK/NlKbY2EDAsFrm9ko3T6pqQSBlZWeg8w/GghSSQWlQJG2TB X-Received: by 2002:a9d:7ccc:: with SMTP id r12mr4321148otn.22.1579121872804; Wed, 15 Jan 2020 12:57:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579121872; cv=none; d=google.com; s=arc-20160816; b=rv5MU+jNaDcMKyqmawz5oOobEKs3D9cKL/aP2Ycew1/0CeaPZI2EYHY9yg05+RExmR eB5YDmEqtjBNqSbkPGOoczzJt2KnH7ARUTnDnHIj+iU93AHC45NO6UxvH+3n2y2fRAYg GDSfGcK2+taBYGFGdD9Zw0doitiS1tox2r6UaAegVXPQsUGYjyFoK4DPZH4PG/AE0WBL EUi78IhX5VnCd0cli6oE6GTxMrEOBLeerszFjs6UG0odv1EYLvkF6ol49TaVdvFGky9E jsewpdqTFL8VtbpTpp2Oyd/hhf4K9+nnp60aq9PIMIzabaeVlbD0ua36itaPyIS3NhOd tNWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :robot-unsubscribe:robot-id:message-id:mime-version:references :in-reply-to:cc:subject:to:reply-to:from:date; bh=mNPMuVyVyH4ewfNsGFAUPbukRbtBQMqmud3fW07wBCw=; b=eReUaGC5iSckQjW9GBjFH7IxePFBTFMDrId7kqr+HSsKB6NgTAR4PphABsDehcIcJu QqAF+CAnilgVc0BdCR4unVZt6d0L+zhXDymkf0FoYFIcoEULacADbHHJlGfXIpSPOhM+ xlcusmkcCk46pBLlJCwfa/NzNuxMTT+MzX/8qSCjzyX7RPnNYhbC7lavZRTRrfn+E4Ap z6UFBjZBs9rZpi6KYNZkb7OimCIJFYnzEK54FqbQu8Puc/OjMUhyWAiDmX+QagdaWoSa yF8JNzCsmoqoVL3ylNxF+W9d6dr7UdppzIxKsVL6J8XwwElHZcrpvdh4rir7bCD6Lvje Q9hA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r4si11818493otd.50.2020.01.15.12.57.40; Wed, 15 Jan 2020 12:57:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729241AbgAOUxu (ORCPT + 99 others); Wed, 15 Jan 2020 15:53:50 -0500 Received: from Galois.linutronix.de ([193.142.43.55]:48976 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729208AbgAOUxu (ORCPT ); Wed, 15 Jan 2020 15:53:50 -0500 Received: from [5.158.153.53] (helo=tip-bot2.lab.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1irpfb-0000cw-2s; Wed, 15 Jan 2020 21:53:43 +0100 Received: from [127.0.1.1] (localhost [IPv6:::1]) by tip-bot2.lab.linutronix.de (Postfix) with ESMTP id 919D71C0879; Wed, 15 Jan 2020 21:53:42 +0100 (CET) Date: Wed, 15 Jan 2020 20:53:42 -0000 From: "tip-bot2 for Chunyan Zhang" Reply-to: linux-kernel@vger.kernel.org To: linux-tip-commits@vger.kernel.org Subject: [tip: timers/core] tick/common: Touch watchdog in tick_unfreeze() on all CPUs Cc: Chunyan Zhang , Thomas Gleixner , x86 , LKML In-Reply-To: <20200110083902.27276-1-chunyan.zhang@unisoc.com> References: <20200110083902.27276-1-chunyan.zhang@unisoc.com> MIME-Version: 1.0 Message-ID: <157912162226.396.7446117828577037844.tip-bot2@tip-bot2> X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The following commit has been merged into the timers/core branch of tip: Commit-ID: 5167c506d62dd9ffab73eba23c79b0a8845c9fe1 Gitweb: https://git.kernel.org/tip/5167c506d62dd9ffab73eba23c79b0a8845c9fe1 Author: Chunyan Zhang AuthorDate: Fri, 10 Jan 2020 16:39:02 +08:00 Committer: Thomas Gleixner CommitterDate: Wed, 15 Jan 2020 21:29:45 +01:00 tick/common: Touch watchdog in tick_unfreeze() on all CPUs Suspend to IDLE invokes tick_unfreeze() on resume. tick_unfreeze() on the first resuming CPU resumes timekeeping, which also has the side effect of resetting the softlockup watchdog on this CPU. But on the secondary CPUs the watchdog is not reset in the resume / unfreeze() path, which can result in false softlockup warnings on those CPUs depending on the time spent in suspend. Prevent this by clearing the softlock watchdog in the unfreeze path also on the secondary resuming CPUs. [ tglx: Massaged changelog ] Signed-off-by: Chunyan Zhang Signed-off-by: Thomas Gleixner Link: https://lore.kernel.org/r/20200110083902.27276-1-chunyan.zhang@unisoc.com --- kernel/time/tick-common.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/kernel/time/tick-common.c b/kernel/time/tick-common.c index 59225b4..7e5d352 100644 --- a/kernel/time/tick-common.c +++ b/kernel/time/tick-common.c @@ -11,6 +11,7 @@ #include #include #include +#include #include #include #include @@ -558,6 +559,7 @@ void tick_unfreeze(void) trace_suspend_resume(TPS("timekeeping_freeze"), smp_processor_id(), false); } else { + touch_softlockup_watchdog(); tick_resume_local(); }