Message ID | 20240219161920.15752-1-yaoma@linux.alibaba.com |
---|---|
Headers |
Return-Path: <linux-kernel+bounces-71662-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:693c:2685:b0:108:e6aa:91d0 with SMTP id mn5csp1388288dyc; Mon, 19 Feb 2024 08:20:03 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCWESkgTL+dYIOlrU40tge+Ss2bNrYW4jQ1kbq+1/pWDgnilwvmpGEfmzttUsXYrxxOCDfEWPUiLOwuy8NAJ5cAZhwJ39g== X-Google-Smtp-Source: AGHT+IGL2X9zBL/rz2sFy5/IfPq1QPwVWNYBfu2vSuH/73tdGNgiqosKx14LVrb3drCxsS6GDbxO X-Received: by 2002:a05:6402:500f:b0:561:fc2:bec0 with SMTP id p15-20020a056402500f00b005610fc2bec0mr16098145eda.4.1708359603455; Mon, 19 Feb 2024 08:20:03 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1708359603; cv=pass; d=google.com; s=arc-20160816; b=t73ogMDwZIIfOLn1xMPAAoMCpvJBaS0Rdnn72EdRhW7o6kuzp9klWBvLmbmHy6dGUR SOOdZalo6G8cGcBF73N5FiDubYuVdkfHkXFiR2d73a6sig0YR/kgzKt19LULNBCbv5lj OvSiHEPEMCbJK8CBhoLqE8lvWZTe5udpFsnCe42GNrTEnlXfg5v5pjYFdevM+ojJstlQ 03vTHxzN4alkWid0AEBa+AzG9phn196A7fZs/QyHxSVae01oMJRYcMUu7fKrr818ARli XGcRsOZSZjAdsdYHl/4FEDHUbe08tcGp6nub07ABqzbsk3p2o+ANiS9XEfMK+sXfLPXJ cZzw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=5PwNPGoMJ7CW08mOs+1ZY9zWs2CVp91wKkFaBXXx+ns=; fh=OYm67UkXmTMOgVpllmH4ZrSoS6KlZcHBNusn5qng2Zo=; b=tTgm5a8+opJQx4z0iZ0Fn48JDdnhBHBTtE9pQ9EnCnwroHE223iHKH7SzRqbirThXm MRcd1ok3imGisv5uTnVoDu9ZE0NG9d9YBk309UtaD6CZLqVXxhPT+S1JTakvlJAHB7LS NWKQJfru4jkcjpOQQPREI//m1VYAWZBKoZRvDGQ//8D9TA0fN3NTkjYd/jhGLbdMGZOZ QYRtMxse7qKMgc1M4NyTDIXJJx3bd9/MuXmzrAlfJjEaVaIecu/m/p66BfY8IK5tWz8I nwi5U1E9bgQzOLThpnP//lNosCfbBSsmkdLSWrtcr2uidckb77tTA0JDm/rhDRnVqWyO ztGg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.alibaba.com header.s=default header.b=X5+G85Ql; arc=pass (i=1 spf=pass spfdomain=linux.alibaba.com dkim=pass dkdomain=linux.alibaba.com dmarc=pass fromdomain=linux.alibaba.com); spf=pass (google.com: domain of linux-kernel+bounces-71662-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-71662-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.alibaba.com Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id v26-20020aa7cd5a000000b005614a0e6566si2420315edw.11.2024.02.19.08.20.03 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 19 Feb 2024 08:20:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-71662-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.alibaba.com header.s=default header.b=X5+G85Ql; arc=pass (i=1 spf=pass spfdomain=linux.alibaba.com dkim=pass dkdomain=linux.alibaba.com dmarc=pass fromdomain=linux.alibaba.com); spf=pass (google.com: domain of linux-kernel+bounces-71662-ouuuleilei=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-71662-ouuuleilei=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.alibaba.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 019261F24CF1 for <ouuuleilei@gmail.com>; Mon, 19 Feb 2024 16:20:03 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B09E33E491; Mon, 19 Feb 2024 16:19:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b="X5+G85Ql" Received: from out30-118.freemail.mail.aliyun.com (out30-118.freemail.mail.aliyun.com [115.124.30.118]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 87F263B79D; Mon, 19 Feb 2024 16:19:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.124.30.118 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708359573; cv=none; b=YqUQdQdr4chRfT+C2giqPLtOB0zftutD249LJeQWiaHpdIOqfpasU4hChgYve9HjoMHTjiq4B5Kr0fuWR58R+BKnnr2TZCoXpqGb96KXnNFvnJQrdiO4bQmAFrA3Nqu19neJ7hPngSi7BcUNg67YooV6rIxSjrvd6I+UUDDDf3k= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1708359573; c=relaxed/simple; bh=Jy9k09PAlwl2enFfxaMgkzK9iRBdmSRKjEAtKTGbCKo=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version:Content-Type; b=l9GqlARBHA9E7KyRd74v0NyPeFTOcNXDEl6wumHnB+gRv48yIf5xvkQPDbmJVn+3rZIUQauTkK7zEw3hhXmSUQ/2QWgHhSoA0PlsfKgfJBQFCLlVFToZCtnqnjeig3ZVUQRPgSLZZq3BiIEEqplrBydJyTxhhUa/9mYiAIdOSpA= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com; spf=pass smtp.mailfrom=linux.alibaba.com; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b=X5+G85Ql; arc=none smtp.client-ip=115.124.30.118 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.alibaba.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.alibaba.com; s=default; t=1708359567; h=From:To:Subject:Date:Message-Id:MIME-Version:Content-Type; bh=5PwNPGoMJ7CW08mOs+1ZY9zWs2CVp91wKkFaBXXx+ns=; b=X5+G85QlodZlQ5xES/KTNP2T4PVsHYvqYAKrp5RD1GsM/e3XOwe7zKxh6/huZ32VRxnC6obQYirzB5FnCfXzOV7ICl7kF7dDA/FFGqrAvmBsyBxuRk33fH7zdojIhID2OrK/gzS7dq4SLFuml/WC/dUR6INwZ82LguLwobmXDRM= X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R101e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046059;MF=yaoma@linux.alibaba.com;NM=1;PH=DS;RN=16;SR=0;TI=SMTPD_---0W0tz6l._1708359563; Received: from localhost.localdomain(mailfrom:yaoma@linux.alibaba.com fp:SMTPD_---0W0tz6l._1708359563) by smtp.aliyun-inc.com; Tue, 20 Feb 2024 00:19:25 +0800 From: Bitao Hu <yaoma@linux.alibaba.com> To: tglx@linutronix.de, dianders@chromium.org, pmladek@suse.com, akpm@linux-foundation.org, kernelfans@gmail.com, liusong@linux.alibaba.com, deller@gmx.de, npiggin@gmail.com, jan.kiszka@siemens.com, kbingham@kernel.org Cc: linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, kvm@vger.kernel.org, Bitao Hu <yaoma@linux.alibaba.com> Subject: [PATCHv8 0/2] *** Detect interrupt storm in softlockup *** Date: Tue, 20 Feb 2024 00:19:18 +0800 Message-Id: <20240219161920.15752-1-yaoma@linux.alibaba.com> X-Mailer: git-send-email 2.37.1 (Apple Git-137.1) Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1791344879426641123 X-GMAIL-MSGID: 1791344879426641123 |
Series |
*** Detect interrupt storm in softlockup ***
|
|
Message
Bitao Hu
Feb. 19, 2024, 4:19 p.m. UTC
Hi, guys. I have implemented a low-overhead method for detecting interrupt storm in softlockup. Please review it, all comments are welcome. Changes from v7 to v8: - From Thomas Gleixner, implement statistics within the interrupt core code and provide sensible interfaces for the watchdog code. - Patch #1 remains unchanged. Patch #2 has significant changes based on Thomas's suggestions, which is why I have removed Liu Song and Douglas's Reviewed-by from patch #2. Please review it again, and all comments are welcome. Changes from v6 to v7: - Remove "READ_ONCE" in "start_counting_irqs" - Replace the hard-coded 5 with "NUM_SAMPLE_PERIODS" macro in "set_sample_period". - Add empty lines to help with reading the code. - Remove the branch that processes IRQs where "counts_diff = 0". - Add the Reviewed-by of Liu Song and Douglas. Changes from v5 to v6: - Use "./scripts/checkpatch.pl --strict" to get a few extra style nits and fix them. - Squash patch #3 into patch #1, and wrapp the help text to 80 columns. - Sort existing headers alphabetically in watchdog.c - Drop "softlockup_hardirq_cpus", just read "hardirq_counts" and see if it's non-NULL. - Store "nr_irqs" in a local variable. - Simplify the calculation of "cpu_diff". Changes from v4 to v5: - Rearranging variable placement to make code look neater. Changes from v3 to v4: - Renaming some variable and function names to make the code logic more readable. - Change the code location to avoid predeclaring. - Just swap rather than a double loop in tabulate_irq_count. - Since nr_irqs has the potential to grow at runtime, bounds-check logic has been implemented. - Add SOFTLOCKUP_DETECTOR_INTR_STORM Kconfig knob. Changes from v2 to v3: - From Liu Song, using enum instead of macro for cpu_stats, shortening the name 'idx_to_stat' to 'stats', adding 'get_16bit_precesion' instead of using right shift operations, and using 'struct irq_counts'. - From kernel robot test, using '__this_cpu_read' and '__this_cpu_write' instead of accessing to an per-cpu array directly, in order to avoid this warning. 'sparse: incorrect type in initializer (different modifiers)' Changes from v1 to v2: - From Douglas, optimize the memory of cpustats. With the maximum number of CPUs, that's now this. 2 * 8192 * 4 + 1 * 8192 * 5 * 4 + 1 * 8192 = 237,568 bytes. - From Liu Song, refactor the code format and add necessary comments. - From Douglas, use interrupt counts instead of interrupt time to determine the cause of softlockup. - Remove the cmdline parameter added in PATCHv1. Bitao Hu (2): watchdog/softlockup: low-overhead detection of interrupt watchdog/softlockup: report the most frequent interrupts arch/mips/dec/setup.c | 2 +- arch/parisc/kernel/smp.c | 2 +- arch/powerpc/kvm/book3s_hv_rm_xics.c | 2 +- include/linux/irqdesc.h | 9 +- include/linux/kernel_stat.h | 4 + kernel/irq/internals.h | 2 +- kernel/irq/irqdesc.c | 34 ++++- kernel/irq/proc.c | 9 +- kernel/watchdog.c | 213 ++++++++++++++++++++++++++- lib/Kconfig.debug | 13 ++ scripts/gdb/linux/interrupts.py | 6 +- 11 files changed, 269 insertions(+), 27 deletions(-)
Comments
Hi, On 2024/2/20 17:35, Thomas Gleixner wrote: > On Tue, Feb 20 2024 at 00:19, Bitao Hu wrote: >> arch/mips/dec/setup.c | 2 +- >> arch/parisc/kernel/smp.c | 2 +- >> arch/powerpc/kvm/book3s_hv_rm_xics.c | 2 +- >> include/linux/irqdesc.h | 9 ++- >> include/linux/kernel_stat.h | 4 + >> kernel/irq/internals.h | 2 +- >> kernel/irq/irqdesc.c | 34 ++++++-- >> kernel/irq/proc.c | 9 +-- > > This really wants to be split into two patches. Interrupt infrastructure > first and then the actual usage site in the watchdog code. > Okay, I will split it into two patches.