Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3853067pxb; Tue, 17 Nov 2020 05:25:51 -0800 (PST) X-Google-Smtp-Source: ABdhPJx25JQNMdjXadmwvzm0GEIWKmzDk3wXHxgL7P+0zKz+rKtlQvxMMOZ7D/cSogAg2JPlqFPL X-Received: by 2002:a17:906:3087:: with SMTP id 7mr18756819ejv.375.1605619551540; Tue, 17 Nov 2020 05:25:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605619551; cv=none; d=google.com; s=arc-20160816; b=UDW2P5dEC+T+qyTg4wRbLsI4Uw9HxegjbehULY4BF3tLOYVrxvZdSP8KFVwzNFsd53 yi+b471Iet003F7LqrtTVrhrQA4LMFJtSIz8j2nhi20HwtKFOXiUstigAVb2sWEW0rpR X+yTeDh7hmaCSucQUaqccWMe3pcX7LzgEM4UhW54xGqAkKwFtfRvFT11gGALFLkplPS0 xIwvTow+lieCuflR8vmByf1D/KIZ73u03jlQ+4Vbx/t5GzRVSYSsiUvsd6jxqwyrUp+l I2OvGWW5Qb0m6W80yIMRNXJyHQ/DdUNQs3osDlAf5Qhd69zcx9HpXlRP6FwZJ0WVMj+F tb7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=4kAjQ4Lgs3QRjgCQv7cNe8oZXotXcisHkcZaZ4dk0FM=; b=QDahwXzo7qhZZJzShM8/VvVwTbSEK4oFyqk+IIMQnkDZRh1lHMmmxPNPzxmYWnDsX8 kCFTWCQxTIk3S9/rIjkvSea7wp15pIIEP/9l64NBRDTupaddeygRtZalTy17B1fdH0wT v4KIwGbINOsdQ+/64JGTqfezEdNlJc4OsBNF4osIFNEuaFT+YtP0KEmbQeady3NtW8en cvjUKUIlkjGRE6KbYw88zx7vND4bVBsYbVFX+Y+hpyAYQJpflgQtjol3y4txmHHJp8FD FQY5VyfIuFAki4eYi7/OLpitQldV5+RCpKU9fTEza0UjK01KvFxpoGBk5TQ5WUEji6fd P9Tg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ealvU2Vo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qc1si13876625ejb.315.2020.11.17.05.25.28; Tue, 17 Nov 2020 05:25:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ealvU2Vo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730812AbgKQNUy (ORCPT + 99 others); Tue, 17 Nov 2020 08:20:54 -0500 Received: from mail.kernel.org ([198.145.29.99]:54270 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730764AbgKQNUu (ORCPT ); Tue, 17 Nov 2020 08:20:50 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A9FD024631; Tue, 17 Nov 2020 13:20:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605619248; bh=WRRFcS8HW06GjyG4XnjywfcmKjugjc+4n/ozvN6bTNE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ealvU2VoLAcDuriulHUEzggyUdXz7C5oRu5l2xj9wPSSi7YX+BTh1rXezJ16t6Q7q Ad/gfqXhYLNSvyE1+isEwJhW9kNjwc2B0YZIP9b+AjAK3r1PYG23+ncDKC9sTYOpVi N6gQfbpbP9sCf2m2onGp/sn7NpYjSDACUqfIXQ34= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Chunyan Zhang , Thomas Gleixner Subject: [PATCH 4.19 048/101] tick/common: Touch watchdog in tick_unfreeze() on all CPUs Date: Tue, 17 Nov 2020 14:05:15 +0100 Message-Id: <20201117122115.431893723@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201117122113.128215851@linuxfoundation.org> References: <20201117122113.128215851@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Chunyan Zhang commit 5167c506d62dd9ffab73eba23c79b0a8845c9fe1 upstream. Suspend to IDLE invokes tick_unfreeze() on resume. tick_unfreeze() on the first resuming CPU resumes timekeeping, which also has the side effect of resetting the softlockup watchdog on this CPU. But on the secondary CPUs the watchdog is not reset in the resume / unfreeze() path, which can result in false softlockup warnings on those CPUs depending on the time spent in suspend. Prevent this by clearing the softlock watchdog in the unfreeze path also on the secondary resuming CPUs. [ tglx: Massaged changelog ] Signed-off-by: Chunyan Zhang Signed-off-by: Thomas Gleixner Link: https://lore.kernel.org/r/20200110083902.27276-1-chunyan.zhang@unisoc.com Signed-off-by: Greg Kroah-Hartman --- kernel/time/tick-common.c | 2 ++ 1 file changed, 2 insertions(+) --- a/kernel/time/tick-common.c +++ b/kernel/time/tick-common.c @@ -15,6 +15,7 @@ #include #include #include +#include #include #include #include @@ -520,6 +521,7 @@ void tick_unfreeze(void) trace_suspend_resume(TPS("timekeeping_freeze"), smp_processor_id(), false); } else { + touch_softlockup_watchdog(); tick_resume_local(); }