From patchwork Thu Jan 19 14:36:12 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Valentin Schneider X-Patchwork-Id: 4242 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp364905wrn; Thu, 19 Jan 2023 06:43:26 -0800 (PST) X-Google-Smtp-Source: AMrXdXtWo+z/z/vFPtZdLi4Fi3lRjXvoBdqxR2wtaORDPwpMKjQpzmKWnwUPusitc3zn6+lmiN1J X-Received: by 2002:aa7:cfc5:0:b0:49e:7d83:43b8 with SMTP id r5-20020aa7cfc5000000b0049e7d8343b8mr864133edy.32.1674139406783; Thu, 19 Jan 2023 06:43:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674139406; cv=none; d=google.com; s=arc-20160816; b=ehu3O1zOxoc7KCqEOucAwSqa89mCjfxQVSsIBEiAEFq4PefT4aGmm18xwMk1vlJa8i xB7ktS41S/sPYaeWM0avXhh7nfaOXmvQTUMEa0X8tgQNMnhm5i8dZ9nZbT5MZHncrtoN tfrmc73K/CUaxZ4ZWt0qHyNTvCJVnb8NK2l8xoGtATKQiEIATkiehzfB5xOgaL1wO1j2 7sXtjB2G54CwDQYN3rT7YnXxQo18NJj/9Yc+JlKdzUykBmDlo0tmO5oe10SZginopRNh 1nGrQPuPJ6u0OhbgUDUeZaCsnn+vAjnvtPyxPQqCoxqAK5jH7M6Y1mc5ojJGiHnsnpTn /nWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=AsdIZuRX1FqbcXdVoz7Gc+TzREcs0q3+gEK6IezEmZw=; b=DtSUCRTxKte4K+gAGn3e+1zvSUq+hl2MRL4khbZRfXBuUCWgd0xjpia4MVHkoM+kZM 9XsztAaj5yXMTPIuyifzgX/cGUaJ7HcFrYcZwz9I3A+sdGmHe043uz/Ag9ANBi+oIdNo L7u9nI7ehrjf3wR8po6NSSQffjztO0+z/1R5uIcQb9Av+ZzbzTHRjl178RYtGay5WDfT Kprn8LInDXevE4Zz2UGhXYnZFLpvCEJBhZcD9bx41hD6KdKy/Uuegq5bkZ92A4PPQo98 YLTPoA81k3xIB/z/K4ms9QPb633r+1mW/q+OQNAjIgLPuL6moY8LRjfxtyycSxPJhJq7 X6WQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bRStxDi6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f4-20020a50ee84000000b00487529d2a0dsi37041280edr.335.2023.01.19.06.43.01; Thu, 19 Jan 2023 06:43:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=bRStxDi6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230298AbjASOii (ORCPT + 99 others); Thu, 19 Jan 2023 09:38:38 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58082 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229943AbjASOif (ORCPT ); Thu, 19 Jan 2023 09:38:35 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CBE16402DC for ; Thu, 19 Jan 2023 06:37:00 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1674139020; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=AsdIZuRX1FqbcXdVoz7Gc+TzREcs0q3+gEK6IezEmZw=; b=bRStxDi68sw1ScQmJQ7QlI+3Le7RE13wARU6VnIYR0Dj65o/VRjqGDXElJyiUPzr1xKuO4 p8xeng3IFTWPE07F2V3c0jVZWEg5wd5CiJ3Rwr5Co1JIf+7qnnWRv7YK68P2TlPYBv6f9B CdkzZs84FpjC3KF8rAfIweFrVjagf4c= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-148-b28KbUDEM-eWLe2FBNQyOw-1; Thu, 19 Jan 2023 09:36:56 -0500 X-MC-Unique: b28KbUDEM-eWLe2FBNQyOw-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id C36981C0A586; Thu, 19 Jan 2023 14:36:54 +0000 (UTC) Received: from vschneid.remote.csb (unknown [10.33.36.13]) by smtp.corp.redhat.com (Postfix) with ESMTPS id CD6222026D68; Thu, 19 Jan 2023 14:36:48 +0000 (UTC) From: Valentin Schneider To: linux-alpha@vger.kernel.org, linux-kernel@vger.kernel.org, linux-snps-arc@lists.infradead.org, linux-arm-kernel@lists.infradead.org, linux-csky@vger.kernel.org, linux-hexagon@vger.kernel.org, linux-ia64@vger.kernel.org, loongarch@lists.linux.dev, linux-mips@vger.kernel.org, openrisc@lists.librecores.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, linux-xtensa@linux-xtensa.org, x86@kernel.org Cc: "Paul E. McKenney" , Steven Rostedt , Peter Zijlstra , Thomas Gleixner , Sebastian Andrzej Siewior , Juri Lelli , Daniel Bristot de Oliveira , Marcelo Tosatti , Frederic Weisbecker , Ingo Molnar , Borislav Petkov , Dave Hansen , "H. Peter Anvin" , Marc Zyngier , Mark Rutland , Russell King , Nicholas Piggin , Guo Ren , "David S. Miller" Subject: [PATCH v4 0/7] Generic IPI sending tracepoint Date: Thu, 19 Jan 2023 14:36:12 +0000 Message-Id: <20230119143619.2733236-1-vschneid@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.4 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1755462402666142109?= X-GMAIL-MSGID: =?utf-8?q?1755462402666142109?= Background ========== Detecting IPI *reception* is relatively easy, e.g. using trace_irq_handler_{entry,exit} or even just function-trace flush_smp_call_function_queue() for SMP calls. Figuring out their *origin*, is trickier as there is no generic tracepoint tied to e.g. smp_call_function(): o AFAIA x86 has no tracepoint tied to sending IPIs, only receiving them (cf. trace_call_function{_single}_entry()). o arm/arm64 do have trace_ipi_raise(), which gives us the target cpus but also a mostly useless string (smp_calls will all be "Function call interrupts"). o Other architectures don't seem to have any IPI-sending related tracepoint. I believe one reason those tracepoints used by arm/arm64 ended up as they were is because these archs used to handle IPIs differently from regular interrupts (the IRQ driver would directly invoke an IPI-handling routine), which meant they never showed up in trace_irq_handler_{entry, exit}. The trace_ipi_{entry,exit} tracepoints gave a way to trace IPI reception but those have become redundant as of: 56afcd3dbd19 ("ARM: Allow IPIs to be handled as normal interrupts") d3afc7f12987 ("arm64: Allow IPIs to be handled as normal interrupts") which gave IPIs a "proper" handler function used through generic_handle_domain_irq(), which makes them show up via trace_irq_handler_{entry, exit}. Changing stuff up ================= Per the above, it would make sense to reshuffle trace_ipi_raise() and move it into generic code. This also came up during Daniel's talk on Osnoise at the CPU isolation MC of LPC 2022 [1]. Now, to be useful, such a tracepoint needs to export: o targeted CPU(s) o calling context The only way to get the calling context with trace_ipi_raise() is to trigger a stack dump, e.g. $(trace-cmd -e ipi* -T echo 42). This is instead introducing a new tracepoint which exports the relevant context (callsite, and requested callback for when the callsite isn't helpful), and is usable by all architectures as it sits in generic code. Another thing worth mentioning is that depending on the callsite, the _RET_IP_ fed to the tracepoint is not always useful - generic_exec_single() doesn't tell you much about the actual callback being sent via IPI, which is why the new tracepoint also has a @callback argument. Patches ======= o Patches 1-5 spread out the tracepoint across relevant sites. Patch 5 ends up sprinkling lots of #include which I'm not the biggest fan of, but is the least horrible solution I've been able to come up with so far. o Patch 7 is trying to be smart about tracing the callback associated with the IPI. This results in having IPI trace events for: o smp_call_function*() o smp_send_reschedule() o irq_work_queue*() o standalone uses of __smp_call_single_queue() This is incomplete, just looking at arm64 there's more IPI types that aren't covered: IPI_CPU_STOP, IPI_CPU_CRASH_STOP, IPI_TIMER, IPI_WAKEUP, but apart from IPI_TIMER (cf. tick_broadcast()), those IPIs are both unfrequent and accompanied with identifiable interference (stopper or cpuhp threads being scheduled). I've added a point in my todolist to handle those in a later series for the sake of completeness. Links ===== [1]: https://youtu.be/5gT57y4OzBM?t=14234 Revisions ========= v3 -> v4 ++++++++ o Rebased against 6.2-rc4 Re-ran my coccinelle scripts for the treewide change; only loongarch needed changes o Dropped cpumask trace event field patch (now in 6.2-rc1) o Applied RB and Ack tags Ingo, I wasn't sure if you meant to Ack the whole series or just the patch you replied to, so since I didn't want to unlawfully forge any tag I only added the one. o Did a small pass on comments and changelogs v2 -> v3 ++++++++ o Dropped the generic export of smp_send_reschedule(), turned it into a macro and a bunch of imports o Dropped the send_call_function_single_ipi() macro madness, split it into sched and smp bits using some of Peter's suggestions v1 -> v2 ++++++++ o Ditched single-CPU tracepoint o Changed tracepoint signature to include callback o Changed tracepoint callsite field to void *; the parameter is still UL to save up on casts due to using _RET_IP_. o Fixed linking failures due to not exporting smp_send_reschedule() git range-diff v3 vs v4 ========================= 1: 6820c1880d97d < -: ------------- tracing: Add __cpumask to denote a trace event field that is a cpumask_t 2: ef594e168af0d ! 1: 8f1309849c859 trace: Add trace_ipi_send_cpumask() @@ Commit message its "reason" argument being an uninformative string (on arm64 all you get is "Function call interrupts" for SMP calls). - Add a variant of it that exports a target CPU, a callsite and a callback. + Add a variant of it that exports a target cpumask, a callsite and a callback. Signed-off-by: Valentin Schneider Reviewed-by: Steven Rostedt (Google) 3: 17ccdc591aec9 ! 2: 3e0f952a905ce sched, smp: Trace IPIs sent via send_call_function_single_ipi() @@ Commit message Signed-off-by: Valentin Schneider Reviewed-by: Steven Rostedt (Google) + Acked-by: Ingo Molnar ## arch/arm/kernel/smp.c ## @@ 4: 9253a0b5abf59 = 3: 6345aa71c64be smp: Trace IPIs sent via arch_send_call_function_ipi_mask() 5: a5d13519caa7e = 4: d2ebdfedcb5f1 irq_work: Trace self-IPIs sent via arch_irq_work_raise() 6: d3e59fe921eae ! 5: 0167b33c7be0c treewide: Trace IPIs sent via smp_send_reschedule() @@ Commit message Signed-off-by: Valentin Schneider [csky bits] Acked-by: Guo Ren + [riscv bits] + Acked-by: Palmer Dabbelt ## arch/alpha/kernel/smp.c ## @@ arch/alpha/kernel/smp.c: handle_ipi(struct pt_regs *regs) @@ arch/ia64/kernel/smp.c: kdump_smp_send_init(void) /* * Called with preemption disabled. - ## arch/loongarch/include/asm/smp.h ## -@@ arch/loongarch/include/asm/smp.h: extern void show_ipi_list(struct seq_file *p, int prec); + ## arch/loongarch/kernel/smp.c ## +@@ arch/loongarch/kernel/smp.c: void loongson_send_ipi_mask(const struct cpumask *mask, unsigned int action) * it goes straight through and wastes no time serializing * anything. Worst case is that we lose a reschedule ... */ --static inline void smp_send_reschedule(int cpu) -+static inline void arch_smp_send_reschedule(int cpu) +-void smp_send_reschedule(int cpu) ++void arch_smp_send_reschedule(int cpu) { loongson_send_ipi_single(cpu, SMP_RESCHEDULE); } +-EXPORT_SYMBOL_GPL(smp_send_reschedule); ++EXPORT_SYMBOL_GPL(arch_smp_send_reschedule); + + irqreturn_t loongson_ipi_interrupt(int irq, void *dev) + { ## arch/mips/include/asm/smp.h ## @@ arch/mips/include/asm/smp.h: extern void calculate_cpu_foreign_map(void); @@ arch/powerpc/platforms/powernv/subcore.c ## arch/riscv/kernel/smp.c ## -@@ arch/riscv/kernel/smp.c: void smp_send_stop(void) - cpumask_pr_args(cpu_online_mask)); +@@ arch/riscv/kernel/smp.c: bool smp_crash_stop_failed(void) } + #endif -void smp_send_reschedule(int cpu) +void arch_smp_send_reschedule(int cpu) @@ include/linux/smp.h: extern void smp_send_stop(void); -extern void smp_send_reschedule(int cpu); - +extern void arch_smp_send_reschedule(int cpu); ++/* ++ * scheduler_ipi() is inline so can't be passed as callback reason, but the ++ * callsite IP should be sufficient for root-causing IPIs sent from here. ++ */ +#define smp_send_reschedule(cpu) ({ \ -+ /* XXX scheduler_ipi is inline :/ */ \ + trace_ipi_send_cpumask(cpumask_of(cpu), _RET_IP_, NULL); \ + arch_smp_send_reschedule(cpu); \ +}) @@ include/linux/smp.h: extern void smp_send_stop(void); ## virt/kvm/kvm_main.c ## @@ - #include "kvm_mm.h" - #include "vfio.h" + + #include +#include - #define CREATE_TRACE_POINTS - #include ++ + /* Worst case buffer size needed for holding an integer. */ + #define ITOA_MAX_LEN 12 7: a4027c288ce0c = 6: fa0de903cf99a smp: reword smp call IPI comment 8: 124946403688e = 7: 7ecb1c29c7f1f sched, smp: Trace smp callback causing an IPI Valentin Schneider (7): trace: Add trace_ipi_send_cpumask() sched, smp: Trace IPIs sent via send_call_function_single_ipi() smp: Trace IPIs sent via arch_send_call_function_ipi_mask() irq_work: Trace self-IPIs sent via arch_irq_work_raise() treewide: Trace IPIs sent via smp_send_reschedule() smp: reword smp call IPI comment sched, smp: Trace smp callback causing an IPI arch/alpha/kernel/smp.c | 2 +- arch/arc/kernel/smp.c | 2 +- arch/arm/kernel/smp.c | 5 +- arch/arm/mach-actions/platsmp.c | 2 + arch/arm64/kernel/smp.c | 3 +- arch/csky/kernel/smp.c | 2 +- arch/hexagon/kernel/smp.c | 2 +- arch/ia64/kernel/smp.c | 4 +- arch/loongarch/kernel/smp.c | 4 +- arch/mips/include/asm/smp.h | 2 +- arch/mips/kernel/rtlx-cmp.c | 2 + arch/openrisc/kernel/smp.c | 2 +- arch/parisc/kernel/smp.c | 4 +- arch/powerpc/kernel/smp.c | 6 +- arch/powerpc/kvm/book3s_hv.c | 3 + arch/powerpc/platforms/powernv/subcore.c | 2 + arch/riscv/kernel/smp.c | 4 +- arch/s390/kernel/smp.c | 2 +- arch/sh/kernel/smp.c | 2 +- arch/sparc/kernel/smp_32.c | 2 +- arch/sparc/kernel/smp_64.c | 2 +- arch/x86/include/asm/smp.h | 2 +- arch/x86/kvm/svm/svm.c | 4 ++ arch/x86/kvm/x86.c | 2 + arch/xtensa/kernel/smp.c | 2 +- include/linux/smp.h | 11 +++- include/trace/events/ipi.h | 22 +++++++ kernel/irq_work.c | 14 ++++- kernel/sched/core.c | 19 ++++-- kernel/sched/smp.h | 2 +- kernel/smp.c | 78 +++++++++++++++++++----- virt/kvm/kvm_main.c | 2 + 32 files changed, 164 insertions(+), 53 deletions(-) --- 2.31.1