Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp1262159ybi; Tue, 16 Jul 2019 12:07:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqygikmutx+uubBxMJhBFCMSWINSaV2MIdkT4rfomklo9IZXcriJXnvRFwHmHcZcycslywvj X-Received: by 2002:a17:90a:8d09:: with SMTP id c9mr39468977pjo.131.1563304054809; Tue, 16 Jul 2019 12:07:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563304054; cv=none; d=google.com; s=arc-20160816; b=yshm8ARuXeh8ui6aPN9hZK4yHbTBUgiNf3g2rALa8tzz2ZZLbEZMHQplXw9wOg38V0 xSpuQKtgGyVj6CRYInSRt8ob8Hn1uY1AN20JtTJVscxHWIHfBFLZrALNGfghHiMCr8QZ 5s2GOh2KtqF9Er9eOlCOE5hlKB/zBkr0St01Qwsc7gZ9ePcKl9vLacR2sGo6efklQOIq eMKwHADFpBwMSejdOBsX+N6aRu/sR+vKKj6rXmvbzG0RkqEG6bfeCwu9X0f6CKOdA93C qJJ7cdIRCG8gBRklfICE/hgZKeL7XcY/aQRbvhxWsW+OHm6Leo5q8ZhDl/Pxk5fA0bDW p7zA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=V37E2IP/idr5aYhz2qY6NDM1CN6wXDbLPyHXBhAUMWU=; b=ph/W4OqJwBY4HKMHV6MWMB+UIGMEJseLcJNlz7jeRTZ7IDLwkFv4bRFrgecXdh7z7B isqq8VrtI+UOLknU7+DhI+Ucgnk1taYNdS+4tTQjiQErsOPL3nOFZG5kphy25PD3Jv24 n1UhcsCkTlk0x4gMPGYq1IBEGn8Mx3yJF8b/y6sM4v4BZNhLgPmy2AxdjBQw86jijFFp ox+rdtfqXClVY2BC3aVWzzyq05ITH++OCXEhpr7FwfYIMOb+AlRMIGz7Oo4EaydZCu/8 yosqiJqLoly/s8Tc26ntrRz2W5M8lblqqWF6KZyoWC/W7q24J0XAwjYJrvY2axWryLTb KRNQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w7si3835330pgl.323.2019.07.16.12.07.17; Tue, 16 Jul 2019 12:07:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728858AbfGPTFf (ORCPT + 99 others); Tue, 16 Jul 2019 15:05:35 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:50989 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726213AbfGPTFf (ORCPT ); Tue, 16 Jul 2019 15:05:35 -0400 Received: from pd9ef1cb8.dip0.t-ipconnect.de ([217.239.28.184] helo=nanos) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1hnSlX-0008WM-JY; Tue, 16 Jul 2019 21:05:31 +0200 Date: Tue, 16 Jul 2019 21:05:30 +0200 (CEST) From: Thomas Gleixner To: Neil Horman cc: linux-kernel@vger.kernel.org, djuran@redhat.com, Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org Subject: Re: [PATCH] x86: Add irq spillover warning In-Reply-To: <20190716160745.GB1498@hmswarspite.think-freely.org> Message-ID: References: <20190716135917.15525-1-nhorman@tuxdriver.com> <20190716160745.GB1498@hmswarspite.think-freely.org> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Linutronix-Spam-Score: -1.0 X-Linutronix-Spam-Level: - X-Linutronix-Spam-Status: No , -1.0 points, 5.0 required, ALL_TRUSTED=-1,SHORTCIRCUIT=-0.0001 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Neil, On Tue, 16 Jul 2019, Neil Horman wrote: > On Tue, Jul 16, 2019 at 05:57:31PM +0200, Thomas Gleixner wrote: > > On Tue, 16 Jul 2019, Neil Horman wrote: > > > If a cpu has more than this number of interrupts affined to it, they > > > will spill over to other cpus, which potentially may be outside of their > > > affinity mask. > > > > Spill over? > > > > The kernel decides to pick a vector on a CPU outside of the affinity when > > it runs out of vectors on the CPUs in the affinity mask. > > > Yes. > > > Please explain issues technically correct. > > > I don't know what you mean by this. I explained it above, and you clearly > understood it. It took me a while to grok it. Simply because I first thought it's some hardware issue. And of course after confusion settled I knew what it is, but just because I know that code like the back of my hand. > > > Given that this might cause unexpected behavior on > > > performance sensitive systems, warn the user should this condition occur > > > so that corrective action can be taken > > > > > @@ -244,6 +244,14 @@ __visible unsigned int __irq_entry do_IRQ(struct pt_regs *regs) > > > > Why on earth warn in the interrupt delivery hotpath? Just because it's the > > place which really needs extra instructions and extra cache lines on > > performance sensitive systems, right? > > > Because theres already a check of the same variety in do_IRQ, but if the > information is available outside the hotpath, I was unaware, and am happy to > update this patch to refelct that. Which check are you referring to? Thanks, tglx