From nobody Wed Dec 17 07:09:50 2025 Received: from mail-pl1-f181.google.com (mail-pl1-f181.google.com [209.85.214.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2DA1A250C05 for ; Wed, 19 Mar 2025 08:11:58 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.181 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742371920; cv=none; b=PtHBbjMZyClvixVFeYl0UZXqNK0CW267Y006eKvqms2NrKa3bBg7kFTMQl9o2l/2eJjVfOXkigDPSdhGwd/GEuKla81Xp68i5jaa8cyyZmxRbwmsi6VH3r2SpJye0lAK6zuApveGqSxvTpkiW5S25+myuudX/zFWHe7r4+ZsWos= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742371920; c=relaxed/simple; bh=4EhUfCVQUxR5J7gqv/boEpWQ3MGl/dt+SCdq02OsOyA=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=pj2Bpg31/Js3/ddm6Umo0wxbhKmt8Jb7CINLZrIs1CXQglbNwdAlkCWR5E4Nl9CiFTm5o1T1LFWFWAzYDDtCWrHBovyuiDm5SRE1VrX/w+mVcg4dWXo6A6BQ4kU7VLrmN2AMV1GJyxAYN2wLy57dbeSFA/8FY/9sL6rO+RHz/aQ= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=O6OPNCOM; arc=none smtp.client-ip=209.85.214.181 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="O6OPNCOM" Received: by mail-pl1-f181.google.com with SMTP id d9443c01a7336-225477548e1so115158335ad.0 for ; Wed, 19 Mar 2025 01:11:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1742371918; x=1742976718; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=JZlFDlSF7AqvF57mjv5vrSlNteUTqwoDL2WmwvhirRE=; b=O6OPNCOMbFZBEhLrUxCSCCKP2Bdkar/jWYs+9jllqGfLbi1S2yKF37QPrbaCKNw4Xz BZJLulyiZ5YtEWq1Iq5in6NkI6vTMEFEe6kzeh8TeVFZ9En0+LulzyEJFFFRl91ppwOa oNcY0y7SQmPT/YKlv54PmoOQ3R3LsV1FMm52LcxBDUQv5ls3fb/QAam5mGNl9QwpX9y9 JbD7A1BxljZOvIVjrPaudqTXldOSVZ1q37jeJ0xA/2zKNOv8TVPEU9gwRLUB5VpIXfar dJuwvdkuOIYY5RWPXkHV3uWi+n4fnpQ55W5qyy5vQYo+D5u0Jumq/zdReviigxv8LpMx SqQw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742371918; x=1742976718; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=JZlFDlSF7AqvF57mjv5vrSlNteUTqwoDL2WmwvhirRE=; b=PO7a7gV8HwkC95jtf7iHZXjVkEH4Wu6xE8arx/6DJdQWK7l0DZrLEcryOc7lHqUmqg NPeUR0lfCMc6pdtBDdGITGeFWyXx7ABFExED8ZeiqGr3u/V4HREqtPIkm9y70LqWqMbO UlG25Fc3z81DBI+aSozb4jBvFcPmA9bE6kPmRgWcKK+SSbXNnVBb0z+bj/n3sFGvS4D0 rPTLWuqQeAZEudEDnlwf2MdfjEsa+IulsWwlec7D/mC7F9MCtiFLWSiKfxKGsDsRhGWf TcGYiPjqex7GvOJf+AEYcjniuIv9e9ZP+cvI5obbiqhOgO346bKY0N43eomZUR+igqWA Vi+Q== X-Forwarded-Encrypted: i=1; AJvYcCVIDnIKJGnsZ+vd8xOKc7nuAeB2xw47zME3qqmxddHxIcXPvyrujBamctSqx2gK3f4FTP7jV9nO50wmdkA=@vger.kernel.org X-Gm-Message-State: AOJu0YyFC/zQ0QPj+s0x62XQItndoR6DVTvhOs6b4ASeST5L5J2AhV/g dTf+m0FtanOLGHFPfkapFJygxaVoAdJJzjRqWKzJOnPH5lowHecV X-Gm-Gg: ASbGncuV0gKUp47TgG6hqtxVmzIODLcewXnIsc/hOyqNnzKSvCmHMof3SaQ2SjHc2uR D+23S0jUcG1qdo3SwrDSiKyq+aFHW13hbxbV9kzZ+U1OCgIEpmnB6txEREEHxl/8fuivBKQEtCq IHs+KtNRO+EE3cAUHMkmNr3alTJkEcDL05BDxBO9BW7MiC2tLLxLxYfxQZneczZ+x6rq/EGJmPa +jVe4zVRDFWOXyVSdCrUFnX2dDH5+YZVtgRSknDP0U5VObZAmLeoS7XCy9qZGhUTXgBHOdGKGE6 3hdeDjFGpFnbMfFy+pYyQ1v5Omn1gR5Fg83Lw0dhO6UzKGNphQ== X-Google-Smtp-Source: AGHT+IFLeir0kUG1XyDANghNlfpfVcyJRyygUh5d0Ei/zdJYbncofCJGaKBymSabp6bdQAU5C77NvQ== X-Received: by 2002:a17:902:e80d:b0:224:26f2:97d7 with SMTP id d9443c01a7336-2264980c676mr22793935ad.8.1742371918389; Wed, 19 Mar 2025 01:11:58 -0700 (PDT) Received: from EBJ9932692.tcent.cn ([43.129.202.66]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-225c68887bfsm108059455ad.34.2025.03.19.01.11.54 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Wed, 19 Mar 2025 01:11:58 -0700 (PDT) From: Lance Yang To: akpm@linux-foundation.org Cc: will@kernel.org, peterz@infradead.org, mingo@redhat.com, longman@redhat.com, mhiramat@kernel.org, anna.schumaker@oracle.com, boqun.feng@gmail.com, joel.granados@kernel.org, kent.overstreet@linux.dev, leonylgao@tencent.com, linux-kernel@vger.kernel.org, rostedt@goodmis.org, senozhatsky@chromium.org, tfiga@chromium.org, amaindex@outlook.com, jstultz@google.com, Lance Yang , Mingzhe Yang Subject: [PATCH v3 1/3] hung_task: replace blocker_mutex with encoded blocker Date: Wed, 19 Mar 2025 16:11:36 +0800 Message-ID: <20250319081138.25133-2-ioworker0@gmail.com> X-Mailer: git-send-email 2.45.2 In-Reply-To: <20250319081138.25133-1-ioworker0@gmail.com> References: <20250319081138.25133-1-ioworker0@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" This patch replaces 'struct mutex *blocker_mutex' with 'unsigned long blocker', as only one blocker is active at a time. The blocker filed can store both the lock addrees and the lock type, with LSB used to encode the type as Masami suggested, making it easier to extend the feature to cover other types of locks. Also, once the lock type is determined, we can directly extract the address and cast it to a lock pointer ;) Suggested-by: Masami Hiramatsu (Google) Signed-off-by: Mingzhe Yang Signed-off-by: Lance Yang Reviewed-by: Masami Hiramatsu (Google) --- include/linux/hung_task.h | 93 +++++++++++++++++++++++++++++++++++++++ include/linux/sched.h | 2 +- kernel/hung_task.c | 12 ++--- kernel/locking/mutex.c | 5 ++- 4 files changed, 104 insertions(+), 8 deletions(-) create mode 100644 include/linux/hung_task.h diff --git a/include/linux/hung_task.h b/include/linux/hung_task.h new file mode 100644 index 000000000000..c772bca6775b --- /dev/null +++ b/include/linux/hung_task.h @@ -0,0 +1,93 @@ +/* SPDX-License-Identifier: GPL-2.0-only */ +/* + * Detect Hung Task: detecting tasks stuck in D state + * + * Copyright (C) 2025 Tongcheng Travel (www.ly.com) + * Author: Lance Yang + */ +#ifndef __LINUX_HUNG_TASK_H +#define __LINUX_HUNG_TASK_H + +#include +#include +#include + +/* + * @blocker: Combines lock address and blocking type. + * + * Since lock pointers are at least 4-byte aligned(32-bit) or 8-byte + * aligned(64-bit). This leaves the 2 least bits (LSBs) of the pointer + * always zero. So we can use these bits to encode the specific blocking + * type. + * + * Type encoding: + * 00 - Blocked on mutex (BLOCKER_TYPE_MUTEX) + * 01 - Blocked on semaphore (BLOCKER_TYPE_SEM) + * 10 - Blocked on rt-mutex (BLOCKER_TYPE_RTMUTEX) + * 11 - Blocked on rw-semaphore (BLOCKER_TYPE_RWSEM) + */ +#define BLOCKER_TYPE_MUTEX 0x00UL +#define BLOCKER_TYPE_SEM 0x01UL +#define BLOCKER_TYPE_RTMUTEX 0x02UL +#define BLOCKER_TYPE_RWSEM 0x03UL + +#define BLOCKER_TYPE_MASK 0x03UL + +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER +static inline void hung_task_set_blocker(void *lock, unsigned long type) +{ + unsigned long lock_ptr =3D (unsigned long)lock; + + WARN_ON_ONCE(!lock_ptr); + WARN_ON_ONCE(READ_ONCE(current->blocker)); + + /* + * If the lock pointer matches the BLOCKER_TYPE_MASK, return + * without writing anything. + */ + if (WARN_ON_ONCE(lock_ptr & BLOCKER_TYPE_MASK)) + return; + + WRITE_ONCE(current->blocker, lock_ptr | type); +} + +static inline void hung_task_clear_blocker(void) +{ + WARN_ON_ONCE(!READ_ONCE(current->blocker)); + + WRITE_ONCE(current->blocker, 0UL); +} + +static inline bool hung_task_blocker_is_type(unsigned long blocker, + unsigned long type) +{ + WARN_ON_ONCE(!blocker); + + return (blocker & BLOCKER_TYPE_MASK) =3D=3D type; +} + +static inline void *hung_task_blocker_to_lock(unsigned long blocker) +{ + WARN_ON_ONCE(!blocker); + + return (void *)(blocker & ~BLOCKER_TYPE_MASK); +} +#else +static inline void hung_task_set_blocker(void *lock, unsigned long type) +{ +} +static inline void hung_task_clear_blocker(void) +{ +} +static inline bool hung_task_blocker_is_type(unsigned long blocker, + unsigned long type) +{ + return false; +} +static inline void *hung_task_blocker_to_lock(unsigned long blocker) +{ + return NULL; +} +#endif + +#endif /* __LINUX_HUNG_TASK_H */ diff --git a/include/linux/sched.h b/include/linux/sched.h index 1419d94c8e87..f27060dac499 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -1218,7 +1218,7 @@ struct task_struct { #endif =20 #ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER - struct mutex *blocker_mutex; + unsigned long blocker; #endif =20 #ifdef CONFIG_DEBUG_ATOMIC_SLEEP diff --git a/kernel/hung_task.c b/kernel/hung_task.c index dc898ec93463..75dc1048f2c1 100644 --- a/kernel/hung_task.c +++ b/kernel/hung_task.c @@ -22,6 +22,7 @@ #include #include #include +#include =20 #include =20 @@ -98,16 +99,17 @@ static struct notifier_block panic_block =3D { static void debug_show_blocker(struct task_struct *task) { struct task_struct *g, *t; - unsigned long owner; - struct mutex *lock; + unsigned long owner, blocker; =20 RCU_LOCKDEP_WARN(!rcu_read_lock_held(), "No rcu lock held"); =20 - lock =3D READ_ONCE(task->blocker_mutex); - if (!lock) + blocker =3D READ_ONCE(task->blocker); + if (!blocker || !hung_task_blocker_is_type(blocker, BLOCKER_TYPE_MUTEX)) return; =20 - owner =3D mutex_get_owner(lock); + owner =3D mutex_get_owner( + (struct mutex *)hung_task_blocker_to_lock(blocker)); + if (unlikely(!owner)) { pr_err("INFO: task %s:%d is blocked on a mutex, but the owner is not fou= nd.\n", task->comm, task->pid); diff --git a/kernel/locking/mutex.c b/kernel/locking/mutex.c index 6a543c204a14..e9ef70a6cb5f 100644 --- a/kernel/locking/mutex.c +++ b/kernel/locking/mutex.c @@ -29,6 +29,7 @@ #include #include #include +#include =20 #define CREATE_TRACE_POINTS #include @@ -189,7 +190,7 @@ __mutex_add_waiter(struct mutex *lock, struct mutex_wai= ter *waiter, struct list_head *list) { #ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER - WRITE_ONCE(current->blocker_mutex, lock); + hung_task_set_blocker(lock, BLOCKER_TYPE_MUTEX); #endif debug_mutex_add_waiter(lock, waiter, current); =20 @@ -207,7 +208,7 @@ __mutex_remove_waiter(struct mutex *lock, struct mutex_= waiter *waiter) =20 debug_mutex_remove_waiter(lock, waiter, current); #ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER - WRITE_ONCE(current->blocker_mutex, NULL); + hung_task_clear_blocker(); #endif } =20 --=20 2.45.2 From nobody Wed Dec 17 07:09:50 2025 Received: from mail-pl1-f177.google.com (mail-pl1-f177.google.com [209.85.214.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E8041250C1E for ; Wed, 19 Mar 2025 08:12:03 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.177 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742371925; cv=none; b=iVbgHXAjCpIRCeYoDv16VI1y+3KlzxXaTvgxbhDWrUR+meVA1kXTUoQ9g6CSZ7oxHIr82YH/gDdKAhC9YcAc38A3ybiQScge5IzR/Gmcps0FLR1c6ubniVzvlFjIT97zS+KkMY6htuazRKXdZfLExlrvZnTcOOoWVY7XNsEjfuk= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742371925; c=relaxed/simple; bh=0pg96570/DWQ9kK+1kWvJx26/2gCXEfjQRFN6c++RlY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=QmAKnC+8wJx7Ziq1Fm92eBpcJk1E11YSODRazsWNckwv9vvh91GeyXD1bPoDAFoaJuAdfvIXxJ2Q6FfFLK1ZcYfLxW6po7+dbfv/yAp+W2hKkfI1aTnE1QaNQi4ICD+dJ6GesoRwcw08siQIji3A4xiCB36h6iQX68lZWDwQi7g= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=XWbLwGeM; arc=none smtp.client-ip=209.85.214.177 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="XWbLwGeM" Received: by mail-pl1-f177.google.com with SMTP id d9443c01a7336-223fb0f619dso110672735ad.1 for ; Wed, 19 Mar 2025 01:12:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1742371923; x=1742976723; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=bp+093aAsh+QnWxtzdVtL38jzib+ORy5VJVUCZ4KHO4=; b=XWbLwGeMRNzmp67x1FsjOMtDDv1l2MMXySGFZsyLsBVL7ob4Rv6ysvCC7ETfWxgrzL G6Wxu3ppbnSbI44LB48e2/c0K2+3MRppDLIiQ4+Wy5v2tVhlNgqOgouLZh1yG7Hdywsj Il5ooniImeDaXzVWhkAENDYrwVtSJ0lo5tYWouywP+dhDxQKTD+b/vn10R3OLkJ2Sg/U FQBMh9PYRIvCNSf6nz4ebK2fBvoLE4GvQRF+u5hL8laiESY2qL/LHytrAS3gxPHNjgle BzRPwMESqqQ1i7eTlBR1ETsh6lTmyZlQ44V8+cFBgqb7gFcvZPnbOMjKE3KcJTkC34Ze fibw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742371923; x=1742976723; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=bp+093aAsh+QnWxtzdVtL38jzib+ORy5VJVUCZ4KHO4=; b=FmG53XeSXJxSe5MvtZeB0Gf/E73FdshRHQzDo9cZbX5L5Xnd8k/gn4BRGyFzYrqwwb JYxu9vtUKruMiv/ySW5Vw/YhVNPd8dgO2bGdaidzJqDPFnhtdvLXjITClgiYmFqkgl/E javoa/lFotHbb+72/JwmO6YepLwWrgP6zxESEOBznwSafPFw1ZdPNV1vU2FNSUTfse+v lWOiSrbqUZIT1DWlijvOfY/H4+tn8XSbL2qs/pMv9xII9TLL/vQ5m2oCT/98Uwuf+HXN tbOhEXtvTVxuhRC679vpcEnXf/E87+eVUTjLvHWMivzS+UO4PcTR7DDD8AXeQQpqVsfz gEng== X-Forwarded-Encrypted: i=1; AJvYcCXoOtrTUVxy58dd0Y6rQbTMki3asptFJKl6LK9zUTFIDLwZmaWT4KucmzuQo+CYNt9fL/sWIfVgvF+NLjU=@vger.kernel.org X-Gm-Message-State: AOJu0YwV08fRtWVQTbOH1WXglCeHvYNduNjnij0syyxocDRdB8ZlWi5E 3GNWgxpsOG4lyzqeQRV/h/DubtpzVdu/1ByjZoggQDprm4XgCneK X-Gm-Gg: ASbGnctFoKqaKiWFaZCw4bEuhkV7Zbi/aAR209aAp2d1DqXTAGgI867EHzbKBg5Io59 IgfaRdDR+AtJMPo6mfU4lSyDVVKHq6qqVwhjU3Q5sDiPkDSyzlRnoYpFbqJz13AaE0sJ/WRV9Go +5+65p7EM1fzt7XTz/z3JyhBgMsQ6eT9HtqOOwanzKnO9wKWxA9dGg7VzoJYpwPMvhIh07eYpG9 aw/+2PGJlQwEXH3M+8dV5wxTGGctwf3N478QI3pKf3TxssPLYoIDa882Ts665gZxFLmTBnY66r+ K3LxtmTjWDF4WOr6aMmXNaxvvwebcn/GELiNPvpBoxUwCY+GRxTKzAsITG1q X-Google-Smtp-Source: AGHT+IEfDltqdvsqVwR/CE9OmPlEgqRDSaVaVajo4J0oD0Y3tgEY9RZJchwdADkhN1tyvLKc/mRXEQ== X-Received: by 2002:a17:902:e84a:b0:224:fa0:36d2 with SMTP id d9443c01a7336-226499389c3mr24211705ad.26.1742371923078; Wed, 19 Mar 2025 01:12:03 -0700 (PDT) Received: from EBJ9932692.tcent.cn ([43.129.202.66]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-225c68887bfsm108059455ad.34.2025.03.19.01.11.58 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Wed, 19 Mar 2025 01:12:02 -0700 (PDT) From: Lance Yang To: akpm@linux-foundation.org Cc: will@kernel.org, peterz@infradead.org, mingo@redhat.com, longman@redhat.com, mhiramat@kernel.org, anna.schumaker@oracle.com, boqun.feng@gmail.com, joel.granados@kernel.org, kent.overstreet@linux.dev, leonylgao@tencent.com, linux-kernel@vger.kernel.org, rostedt@goodmis.org, senozhatsky@chromium.org, tfiga@chromium.org, amaindex@outlook.com, jstultz@google.com, Lance Yang , Mingzhe Yang Subject: [PATCH v3 2/3] hung_task: show the blocker task if the task is hung on semaphore Date: Wed, 19 Mar 2025 16:11:37 +0800 Message-ID: <20250319081138.25133-3-ioworker0@gmail.com> X-Mailer: git-send-email 2.45.2 In-Reply-To: <20250319081138.25133-1-ioworker0@gmail.com> References: <20250319081138.25133-1-ioworker0@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Inspired by mutex blocker tracking[1], this patch makes a trade-off to balance the overhead and utility of the hung task detector. Unlike mutexes, semaphores lack explicit ownership tracking, making it challenging to identify the root cause of hangs. To address this, we introduce a last_holder field to the semaphore structure, which is updated when a task successfully calls down() and cleared during up(). The assumption is that if a task is blocked on a semaphore, the holders must not have released it. While this does not guarantee that the last holder is one of the current blockers, it likely provides a practical hint for diagnosing semaphore-related stalls. With this change, the hung task detector can now show blocker task's info like below: [Thu Mar 13 15:18:38 2025] INFO: task cat:1803 blocked for more than 122 se= conds. [Thu Mar 13 15:18:38 2025] Tainted: G OE 6.14.0-rc3+ #= 14 [Thu Mar 13 15:18:38 2025] "echo 0 > /proc/sys/kernel/hung_task_timeout_sec= s" disables this message. [Thu Mar 13 15:18:38 2025] task:cat state:D stack:0 pid:180= 3 tgid:1803 ppid:1057 task_flags:0x400000 flags:0x00000004 [Thu Mar 13 15:18:38 2025] Call trace: [Thu Mar 13 15:18:38 2025] __switch_to+0x1ec/0x380 (T) [Thu Mar 13 15:18:38 2025] __schedule+0xc30/0x44f8 [Thu Mar 13 15:18:38 2025] schedule+0xb8/0x3b0 [Thu Mar 13 15:18:38 2025] schedule_timeout+0x1d0/0x208 [Thu Mar 13 15:18:38 2025] __down_common+0x2d4/0x6f8 [Thu Mar 13 15:18:38 2025] __down+0x24/0x50 [Thu Mar 13 15:18:38 2025] down+0xd0/0x140 [Thu Mar 13 15:18:38 2025] read_dummy+0x3c/0xa0 [hung_task_sem] [Thu Mar 13 15:18:38 2025] full_proxy_read+0xfc/0x1d0 [Thu Mar 13 15:18:38 2025] vfs_read+0x1a0/0x858 [Thu Mar 13 15:18:38 2025] ksys_read+0x100/0x220 [Thu Mar 13 15:18:38 2025] __arm64_sys_read+0x78/0xc8 [Thu Mar 13 15:18:38 2025] invoke_syscall+0xd8/0x278 [Thu Mar 13 15:18:38 2025] el0_svc_common.constprop.0+0xb8/0x298 [Thu Mar 13 15:18:38 2025] do_el0_svc+0x4c/0x88 [Thu Mar 13 15:18:38 2025] el0_svc+0x44/0x108 [Thu Mar 13 15:18:38 2025] el0t_64_sync_handler+0x134/0x160 [Thu Mar 13 15:18:38 2025] el0t_64_sync+0x1b8/0x1c0 [Thu Mar 13 15:18:38 2025] INFO: task cat:1803 blocked on a semaphore likel= y last held by task cat:1802 [Thu Mar 13 15:18:38 2025] task:cat state:S stack:0 pid:180= 2 tgid:1802 ppid:1057 task_flags:0x400000 flags:0x00000004 [Thu Mar 13 15:18:38 2025] Call trace: [Thu Mar 13 15:18:38 2025] __switch_to+0x1ec/0x380 (T) [Thu Mar 13 15:18:38 2025] __schedule+0xc30/0x44f8 [Thu Mar 13 15:18:38 2025] schedule+0xb8/0x3b0 [Thu Mar 13 15:18:38 2025] schedule_timeout+0xf4/0x208 [Thu Mar 13 15:18:38 2025] msleep_interruptible+0x70/0x130 [Thu Mar 13 15:18:38 2025] read_dummy+0x48/0xa0 [hung_task_sem] [Thu Mar 13 15:18:38 2025] full_proxy_read+0xfc/0x1d0 [Thu Mar 13 15:18:38 2025] vfs_read+0x1a0/0x858 [Thu Mar 13 15:18:38 2025] ksys_read+0x100/0x220 [Thu Mar 13 15:18:38 2025] __arm64_sys_read+0x78/0xc8 [Thu Mar 13 15:18:38 2025] invoke_syscall+0xd8/0x278 [Thu Mar 13 15:18:38 2025] el0_svc_common.constprop.0+0xb8/0x298 [Thu Mar 13 15:18:38 2025] do_el0_svc+0x4c/0x88 [Thu Mar 13 15:18:38 2025] el0_svc+0x44/0x108 [Thu Mar 13 15:18:38 2025] el0t_64_sync_handler+0x134/0x160 [Thu Mar 13 15:18:38 2025] el0t_64_sync+0x1b8/0x1c0 [1] https://lore.kernel.org/all/174046694331.2194069.15472952050240807469.s= tgit@mhiramat.tok.corp.google.com Suggested-by: Masami Hiramatsu (Google) Signed-off-by: Mingzhe Yang Signed-off-by: Lance Yang Reviewed-by: Masami Hiramatsu (Google) --- include/linux/semaphore.h | 15 ++++++++++- kernel/hung_task.c | 45 +++++++++++++++++++++++++-------- kernel/locking/semaphore.c | 52 +++++++++++++++++++++++++++++++++----- 3 files changed, 95 insertions(+), 17 deletions(-) diff --git a/include/linux/semaphore.h b/include/linux/semaphore.h index 04655faadc2d..89706157e622 100644 --- a/include/linux/semaphore.h +++ b/include/linux/semaphore.h @@ -16,13 +16,25 @@ struct semaphore { raw_spinlock_t lock; unsigned int count; struct list_head wait_list; + +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER + unsigned long last_holder; +#endif }; =20 +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER +#define __LAST_HOLDER_SEMAPHORE_INITIALIZER \ + , .last_holder =3D 0UL +#else +#define __LAST_HOLDER_SEMAPHORE_INITIALIZER +#endif + #define __SEMAPHORE_INITIALIZER(name, n) \ { \ .lock =3D __RAW_SPIN_LOCK_UNLOCKED((name).lock), \ .count =3D n, \ - .wait_list =3D LIST_HEAD_INIT((name).wait_list), \ + .wait_list =3D LIST_HEAD_INIT((name).wait_list) \ + __LAST_HOLDER_SEMAPHORE_INITIALIZER \ } =20 /* @@ -47,5 +59,6 @@ extern int __must_check down_killable(struct semaphore *s= em); extern int __must_check down_trylock(struct semaphore *sem); extern int __must_check down_timeout(struct semaphore *sem, long jiffies); extern void up(struct semaphore *sem); +extern unsigned long sem_last_holder(struct semaphore *sem); =20 #endif /* __LINUX_SEMAPHORE_H */ diff --git a/kernel/hung_task.c b/kernel/hung_task.c index 75dc1048f2c1..1403e71df039 100644 --- a/kernel/hung_task.c +++ b/kernel/hung_task.c @@ -99,31 +99,56 @@ static struct notifier_block panic_block =3D { static void debug_show_blocker(struct task_struct *task) { struct task_struct *g, *t; - unsigned long owner, blocker; + unsigned long owner, blocker, blocker_lock_type; =20 RCU_LOCKDEP_WARN(!rcu_read_lock_held(), "No rcu lock held"); =20 blocker =3D READ_ONCE(task->blocker); - if (!blocker || !hung_task_blocker_is_type(blocker, BLOCKER_TYPE_MUTEX)) + if (!blocker) return; =20 - owner =3D mutex_get_owner( - (struct mutex *)hung_task_blocker_to_lock(blocker)); + if (hung_task_blocker_is_type(blocker, BLOCKER_TYPE_MUTEX)) { + owner =3D mutex_get_owner( + (struct mutex *)hung_task_blocker_to_lock(blocker)); + blocker_lock_type =3D BLOCKER_TYPE_MUTEX; + } else if (hung_task_blocker_is_type(blocker, BLOCKER_TYPE_SEM)) { + owner =3D sem_last_holder( + (struct semaphore *)hung_task_blocker_to_lock(blocker)); + blocker_lock_type =3D BLOCKER_TYPE_SEM; + } else + return; =20 if (unlikely(!owner)) { - pr_err("INFO: task %s:%d is blocked on a mutex, but the owner is not fou= nd.\n", - task->comm, task->pid); + switch (blocker_lock_type) { + case BLOCKER_TYPE_MUTEX: + pr_err("INFO: task %s:%d is blocked on a mutex, but the owner is not fo= und.\n", + task->comm, task->pid); + break; + case BLOCKER_TYPE_SEM: + pr_err("INFO: task %s:%d is blocked on a semaphore, but the last holder= is not found.\n", + task->comm, task->pid); + break; + } return; } =20 /* Ensure the owner information is correct. */ for_each_process_thread(g, t) { - if ((unsigned long)t =3D=3D owner) { + if ((unsigned long)t !=3D owner) + continue; + + switch (blocker_lock_type) { + case BLOCKER_TYPE_MUTEX: pr_err("INFO: task %s:%d is blocked on a mutex likely owned by task %s:= %d.\n", - task->comm, task->pid, t->comm, t->pid); - sched_show_task(t); - return; + task->comm, task->pid, t->comm, t->pid); + break; + case BLOCKER_TYPE_SEM: + pr_err("INFO: task %s:%d blocked on a semaphore likely last held by tas= k %s:%d\n", + task->comm, task->pid, t->comm, t->pid); + break; } + sched_show_task(t); + return; } } #else diff --git a/kernel/locking/semaphore.c b/kernel/locking/semaphore.c index 34bfae72f295..3d06d4adc05b 100644 --- a/kernel/locking/semaphore.c +++ b/kernel/locking/semaphore.c @@ -33,12 +33,14 @@ #include #include #include +#include =20 static noinline void __down(struct semaphore *sem); static noinline int __down_interruptible(struct semaphore *sem); static noinline int __down_killable(struct semaphore *sem); static noinline int __down_timeout(struct semaphore *sem, long timeout); static noinline void __up(struct semaphore *sem); +static inline void __sem_acquire(struct semaphore *sem); =20 /** * down - acquire the semaphore @@ -58,7 +60,7 @@ void __sched down(struct semaphore *sem) might_sleep(); raw_spin_lock_irqsave(&sem->lock, flags); if (likely(sem->count > 0)) - sem->count--; + __sem_acquire(sem); else __down(sem); raw_spin_unlock_irqrestore(&sem->lock, flags); @@ -82,7 +84,7 @@ int __sched down_interruptible(struct semaphore *sem) might_sleep(); raw_spin_lock_irqsave(&sem->lock, flags); if (likely(sem->count > 0)) - sem->count--; + __sem_acquire(sem); else result =3D __down_interruptible(sem); raw_spin_unlock_irqrestore(&sem->lock, flags); @@ -109,7 +111,7 @@ int __sched down_killable(struct semaphore *sem) might_sleep(); raw_spin_lock_irqsave(&sem->lock, flags); if (likely(sem->count > 0)) - sem->count--; + __sem_acquire(sem); else result =3D __down_killable(sem); raw_spin_unlock_irqrestore(&sem->lock, flags); @@ -139,7 +141,7 @@ int __sched down_trylock(struct semaphore *sem) raw_spin_lock_irqsave(&sem->lock, flags); count =3D sem->count - 1; if (likely(count >=3D 0)) - sem->count =3D count; + __sem_acquire(sem); raw_spin_unlock_irqrestore(&sem->lock, flags); =20 return (count < 0); @@ -164,7 +166,7 @@ int __sched down_timeout(struct semaphore *sem, long ti= meout) might_sleep(); raw_spin_lock_irqsave(&sem->lock, flags); if (likely(sem->count > 0)) - sem->count--; + __sem_acquire(sem); else result =3D __down_timeout(sem, timeout); raw_spin_unlock_irqrestore(&sem->lock, flags); @@ -185,6 +187,12 @@ void __sched up(struct semaphore *sem) unsigned long flags; =20 raw_spin_lock_irqsave(&sem->lock, flags); + +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER + if (READ_ONCE(sem->last_holder) =3D=3D (unsigned long)current) + WRITE_ONCE(sem->last_holder, 0UL); +#endif + if (likely(list_empty(&sem->wait_list))) sem->count++; else @@ -224,8 +232,12 @@ static inline int __sched ___down_common(struct semaph= ore *sem, long state, raw_spin_unlock_irq(&sem->lock); timeout =3D schedule_timeout(timeout); raw_spin_lock_irq(&sem->lock); - if (waiter.up) + if (waiter.up) { +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER + WRITE_ONCE(sem->last_holder, (unsigned long)current); +#endif return 0; + } } =20 timed_out: @@ -242,10 +254,18 @@ static inline int __sched __down_common(struct semaph= ore *sem, long state, { int ret; =20 +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER + hung_task_set_blocker(sem, BLOCKER_TYPE_SEM); +#endif + trace_contention_begin(sem, 0); ret =3D ___down_common(sem, state, timeout); trace_contention_end(sem, ret); =20 +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER + hung_task_clear_blocker(); +#endif + return ret; } =20 @@ -277,3 +297,23 @@ static noinline void __sched __up(struct semaphore *se= m) waiter->up =3D true; wake_up_process(waiter->task); } + +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER +unsigned long sem_last_holder(struct semaphore *sem) +{ + return READ_ONCE(sem->last_holder); +} +#else +unsigned long sem_last_holder(struct semaphore *sem) +{ + return 0UL; +} +#endif + +static inline void __sem_acquire(struct semaphore *sem) +{ + sem->count--; +#ifdef CONFIG_DETECT_HUNG_TASK_BLOCKER + WRITE_ONCE(sem->last_holder, (unsigned long)current); +#endif +} --=20 2.45.2 From nobody Wed Dec 17 07:09:50 2025 Received: from mail-pj1-f48.google.com (mail-pj1-f48.google.com [209.85.216.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id D06492512CF for ; Wed, 19 Mar 2025 08:12:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.48 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742371930; cv=none; b=LnmBAa39NSBucAz99EiSE+Nmgrwf77zp2ylNpvXG7r/cSt7lCxpYKtuUMAozl3qnQVIGcsfsc1SSb1zLS0X+b/CyBq9qKqveJChypOocEt4+jQCwa1v6XTkLXRlBqMEkBoLt1JvkGA65JG6Riw087LsQAOLFFsGxc2KrP/F9vDw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1742371930; c=relaxed/simple; bh=7rPZTeGhdI3Ln/Z1N9HwWMHQseHL4s9TkJyTiDkBXYU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=e9Rn3TYraYyI94sLnufs5z1l7kyvWxZsVzLZc0BVzQoG2tzYRH0EClAmaQSyZjlXExhR8v8mmOd0Q1SHwY22HBW1gzGYAEvrPBZ6+ehwF02DXaicd6bJROuDnP9cNWd+y6E2baRFpQpweQDoUg4O/SOCVexJj2HlhMXAqwmoPkk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=lATh1+H7; arc=none smtp.client-ip=209.85.216.48 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="lATh1+H7" Received: by mail-pj1-f48.google.com with SMTP id 98e67ed59e1d1-2ff85fec403so855805a91.1 for ; Wed, 19 Mar 2025 01:12:08 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1742371928; x=1742976728; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=TR30uU4szHa/1P3ked4ixlsJHVltwDf5YGhf0SDzuac=; b=lATh1+H7DG3F4fuCo7+TuRfv5UZjiLqIzxWgMeWfGHRCP+TfCNPuBbOHXOo2mEAxYb JneeJ00rP3tI65eRKKkLRODwSQMim2p4GxlKgxp1JCqoo50d+yPCff4H9ZYhKKry4HIA MzzseEDKac/zEUXxqdOOwdoJorzmAplZtgB7H/HfH3JdOwZI3FfoYLoLFgYFTN91GLpH yYnnk2RLdSUGRdMVgebU7lxpb+DuVswnDI72aYbJtK9U5Q0WS4nw3Vn8gFW/EA5ehKni tcGyCYvT6jN3+omSXxue9CxwU+bJT7pxMLgLVZwruW5p9oJFTbJw2OoPRwIrTvLv5/zB P3mA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1742371928; x=1742976728; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=TR30uU4szHa/1P3ked4ixlsJHVltwDf5YGhf0SDzuac=; b=o796ztJkVeLxiJQIUBAbxnxsvL2kkI8dICuwuaeLi92Za0VZD3dc5/aE9NiEWtTrkj dOeZpPz4yqzg45hS5xhQB0zYOeLCBrzlF7dcWbNzSgPCTaIbmQq8+iwdzPDeI6tpQsLM F+kKfod7RBY6ucmaM2jeZD1NVfyNMaiSthtL/e2Y/K5GSi9FsdPuzxvIlcibvYsCzqKo Lh6jY22UtGz9YSsuTJJUBpAGzlevYTrMz3TqaZNJWM06Is3ors7jr8o4SmkRLA3HfSn+ 2rCU0Da06Q3f8qRBf+IukhVCzZfykaImKHC5DdvBqMTFKfAFgQAaM4BLd+hElUqq5gVk 5rCQ== X-Forwarded-Encrypted: i=1; AJvYcCUnPVKR5KOicqBbKaR5pNQGmAtq1myyQzTcNpr2Fg8IfuAqLnvKpSebdPYSZSnqQNhXEmq0qBHIN0SCvPc=@vger.kernel.org X-Gm-Message-State: AOJu0YyruqfLMKreBeyAcnAgQE1NPNNu6tp8LKFqwi4umfN2snJAvLr+ 4/mOrG2AHkAwBrXUKpVHtdqPu0fPLBSat8AujIY4aaBwifJdLKbT X-Gm-Gg: ASbGncsW/u2GBwWV4bRhz2Vu0iy6SFKB1QUEmDIkWegYmEAUy0fS1spxgFXEpKEyiWD zbIKyqkJ98mVit9wQOpI/0QLdek7V/9J6oLd4/iGIlm6lKxXFhuXgRZgT5/U6DO8lKHf9YmtezA P8a73egd4W2USvlCqrdCLKj6y0EZYxMXdy/+vVBpSJ7ZmwP9/pMEYsrk1bERIoogmVWuvZMyWNU ljPlL4i12/aeRD9EplZXAczQrgjHYuqM3y6O9awfjkcv6Nx/tJL3HBFTTX9B4tuXPHCxfUqXGcx Iqied4gqyHZ5sdT5+P8hWh7tOOPZm2aCzSqM4GjDowReDY+Ac4a6G9zi01tM X-Google-Smtp-Source: AGHT+IHo2DNGtYbveJRzVDoK2c7abC2UjdVFIlVaNLgUXoNv97fpNm9ks1c8+AINXFaaTn4gnsGx5g== X-Received: by 2002:a17:90b:4a48:b0:2f9:d0cd:3403 with SMTP id 98e67ed59e1d1-301bdb11b37mr2766337a91.16.1742371927909; Wed, 19 Mar 2025 01:12:07 -0700 (PDT) Received: from EBJ9932692.tcent.cn ([43.129.202.66]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-225c68887bfsm108059455ad.34.2025.03.19.01.12.03 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Wed, 19 Mar 2025 01:12:07 -0700 (PDT) From: Lance Yang To: akpm@linux-foundation.org Cc: will@kernel.org, peterz@infradead.org, mingo@redhat.com, longman@redhat.com, mhiramat@kernel.org, anna.schumaker@oracle.com, boqun.feng@gmail.com, joel.granados@kernel.org, kent.overstreet@linux.dev, leonylgao@tencent.com, linux-kernel@vger.kernel.org, rostedt@goodmis.org, senozhatsky@chromium.org, tfiga@chromium.org, amaindex@outlook.com, jstultz@google.com, Lance Yang Subject: [PATCH v3 3/3] samples: extend hung_task detector test with semaphore support Date: Wed, 19 Mar 2025 16:11:38 +0800 Message-ID: <20250319081138.25133-4-ioworker0@gmail.com> X-Mailer: git-send-email 2.45.2 In-Reply-To: <20250319081138.25133-1-ioworker0@gmail.com> References: <20250319081138.25133-1-ioworker0@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" From: Zi Li Extend the existing hung_task detector test module to support multiple lock types, including mutex and semaphore, with room for future additions (e.g., spinlock, etc.). This module creates dummy files under /hung_task, such as 'mutex' and 'semaphore'. The read process on any of these files will sleep for enough long time (256 seconds) while holding the respective lock. As a result, the second process will wait on the lock for a prolonged duration and be detected by the hung_task detector. This change unifies the previous mutex-only sample into a single, extensible hung_task_tests module, reducing code duplication and improving maintainability. Usage is: > cd /sys/kernel/debug/hung_task > cat mutex & cat mutex # Test mutex blocking > cat semaphore & cat semaphore # Test semaphore blocking Update the Kconfig description to reflect multiple debugfs files support. Suggested-by: Masami Hiramatsu (Google) Signed-off-by: Lance Yang Signed-off-by: Zi Li Acked-by: Masami Hiramatsu (Google) --- samples/Kconfig | 9 +-- samples/hung_task/Makefile | 2 +- samples/hung_task/hung_task_mutex.c | 66 -------------------- samples/hung_task/hung_task_tests.c | 97 +++++++++++++++++++++++++++++ 4 files changed, 103 insertions(+), 71 deletions(-) delete mode 100644 samples/hung_task/hung_task_mutex.c create mode 100644 samples/hung_task/hung_task_tests.c diff --git a/samples/Kconfig b/samples/Kconfig index 09011be2391a..753ed1f170b5 100644 --- a/samples/Kconfig +++ b/samples/Kconfig @@ -304,10 +304,11 @@ config SAMPLE_HUNG_TASK tristate "Hung task detector test code" depends on DETECT_HUNG_TASK && DEBUG_FS help - Build a module which provide a simple debugfs file. If user reads - the file, it will sleep long time (256 seconds) with holding a - mutex. Thus if there are 2 or more processes read this file, it - will be detected by the hung_task watchdog. + Build a module that provides debugfs files (e.g., mutex, semaphore, + etc.) under /hung_task. If user reads one of these files, + it will sleep long time (256 seconds) with holding a lock. Thus, + if 2 or more processes read the same file concurrently, it will + be detected by the hung_task watchdog. =20 source "samples/rust/Kconfig" =20 diff --git a/samples/hung_task/Makefile b/samples/hung_task/Makefile index fe9dde799880..86036f1a204d 100644 --- a/samples/hung_task/Makefile +++ b/samples/hung_task/Makefile @@ -1,2 +1,2 @@ # SPDX-License-Identifier: GPL-2.0-only -obj-$(CONFIG_SAMPLE_HUNG_TASK) +=3D hung_task_mutex.o \ No newline at end of file +obj-$(CONFIG_SAMPLE_HUNG_TASK) +=3D hung_task_tests.o diff --git a/samples/hung_task/hung_task_mutex.c b/samples/hung_task/hung_t= ask_mutex.c deleted file mode 100644 index 7a29f2246d22..000000000000 --- a/samples/hung_task/hung_task_mutex.c +++ /dev/null @@ -1,66 +0,0 @@ -// SPDX-License-Identifier: GPL-2.0-or-later -/* - * hung_task_mutex.c - Sample code which causes hung task by mutex - * - * Usage: load this module and read `/hung_task/mutex` - * by 2 or more processes. - * - * This is for testing kernel hung_task error message. - * Note that this will make your system freeze and maybe - * cause panic. So do not use this except for the test. - */ - -#include -#include -#include -#include -#include - -#define HUNG_TASK_DIR "hung_task" -#define HUNG_TASK_FILE "mutex" -#define SLEEP_SECOND 256 - -static const char dummy_string[] =3D "This is a dummy string."; -static DEFINE_MUTEX(dummy_mutex); -struct dentry *hung_task_dir; - -static ssize_t read_dummy(struct file *file, char __user *user_buf, - size_t count, loff_t *ppos) -{ - /* If the second task waits on the lock, it is uninterruptible sleep. */ - guard(mutex)(&dummy_mutex); - - /* When the first task sleep here, it is interruptible. */ - msleep_interruptible(SLEEP_SECOND * 1000); - - return simple_read_from_buffer(user_buf, count, ppos, - dummy_string, sizeof(dummy_string)); -} - -static const struct file_operations hung_task_fops =3D { - .read =3D read_dummy, -}; - -static int __init hung_task_sample_init(void) -{ - hung_task_dir =3D debugfs_create_dir(HUNG_TASK_DIR, NULL); - if (IS_ERR(hung_task_dir)) - return PTR_ERR(hung_task_dir); - - debugfs_create_file(HUNG_TASK_FILE, 0400, hung_task_dir, - NULL, &hung_task_fops); - - return 0; -} - -static void __exit hung_task_sample_exit(void) -{ - debugfs_remove_recursive(hung_task_dir); -} - -module_init(hung_task_sample_init); -module_exit(hung_task_sample_exit); - -MODULE_LICENSE("GPL"); -MODULE_AUTHOR("Masami Hiramatsu"); -MODULE_DESCRIPTION("Simple sleep under mutex file for testing hung task"); diff --git a/samples/hung_task/hung_task_tests.c b/samples/hung_task/hung_t= ask_tests.c new file mode 100644 index 000000000000..a5c09bd3a47d --- /dev/null +++ b/samples/hung_task/hung_task_tests.c @@ -0,0 +1,97 @@ +// SPDX-License-Identifier: GPL-2.0-or-later +/* + * hung_task_tests.c - Sample code for testing hung tasks with mutex, + * semaphore, etc. + * + * Usage: Load this module and read `/hung_task/mutex`, + * `/hung_task/semaphore`, etc., with 2 or more processes. + * + * This is for testing kernel hung_task error messages with various locking + * mechanisms (e.g., mutex, semaphore, etc.). Note that this may freeze + * your system or cause a panic. Use only for testing purposes. + */ + +#include +#include +#include +#include +#include +#include + +#define HUNG_TASK_DIR "hung_task" +#define HUNG_TASK_MUTEX_FILE "mutex" +#define HUNG_TASK_SEM_FILE "semaphore" +#define SLEEP_SECOND 256 + +static const char dummy_string[] =3D "This is a dummy string."; +static DEFINE_MUTEX(dummy_mutex); +static DEFINE_SEMAPHORE(dummy_sem, 1); +static struct dentry *hung_task_dir; + +/* Mutex-based read function */ +static ssize_t read_dummy_mutex(struct file *file, char __user *user_buf, + size_t count, loff_t *ppos) +{ + /* Second task waits on mutex, entering uninterruptible sleep */ + guard(mutex)(&dummy_mutex); + + /* First task sleeps here, interruptible */ + msleep_interruptible(SLEEP_SECOND * 1000); + + return simple_read_from_buffer(user_buf, count, ppos, dummy_string, + sizeof(dummy_string)); +} + +/* Semaphore-based read function */ +static ssize_t read_dummy_semaphore(struct file *file, char __user *user_b= uf, + size_t count, loff_t *ppos) +{ + /* Second task waits on semaphore, entering uninterruptible sleep */ + down(&dummy_sem); + + /* First task sleeps here, interruptible */ + msleep_interruptible(SLEEP_SECOND * 1000); + + up(&dummy_sem); + + return simple_read_from_buffer(user_buf, count, ppos, dummy_string, + sizeof(dummy_string)); +} + +/* File operations for mutex */ +static const struct file_operations hung_task_mutex_fops =3D { + .read =3D read_dummy_mutex, +}; + +/* File operations for semaphore */ +static const struct file_operations hung_task_sem_fops =3D { + .read =3D read_dummy_semaphore, +}; + +static int __init hung_task_tests_init(void) +{ + hung_task_dir =3D debugfs_create_dir(HUNG_TASK_DIR, NULL); + if (IS_ERR(hung_task_dir)) + return PTR_ERR(hung_task_dir); + + /* Create debugfs files for mutex and semaphore tests */ + debugfs_create_file(HUNG_TASK_MUTEX_FILE, 0400, hung_task_dir, NULL, + &hung_task_mutex_fops); + debugfs_create_file(HUNG_TASK_SEM_FILE, 0400, hung_task_dir, NULL, + &hung_task_sem_fops); + + return 0; +} + +static void __exit hung_task_tests_exit(void) +{ + debugfs_remove_recursive(hung_task_dir); +} + +module_init(hung_task_tests_init); +module_exit(hung_task_tests_exit); + +MODULE_LICENSE("GPL"); +MODULE_AUTHOR("Masami Hiramatsu "); +MODULE_AUTHOR("Zi Li "); +MODULE_DESCRIPTION("Simple sleep under lock files for testing hung task"); --=20 2.45.2