Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp1358065ybe; Fri, 6 Sep 2019 16:34:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqzR7DqQU30bQF4t9ayip/yRzMVH4oNuEVpwf1gPdHW6fBFcjFSd4DhTUR/OHsnRX7V6JqwD X-Received: by 2002:a62:14cb:: with SMTP id 194mr14361440pfu.192.1567812898081; Fri, 06 Sep 2019 16:34:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567812898; cv=none; d=google.com; s=arc-20160816; b=LeNNh+8BA09+eK3UU33URHUiIyic2K8etal+TBI4sra/ISnaWtMHg/br95OBqtfVUx 5nr0qQv5s8udqTAoOlRadthh3ZvN5WcEdE8MAfxXj5lXhuH+mqogcEilJAbUz8FWT6G2 d1zL2Nuim/KhqFQc3bRMsgF/FBR64NDCXq5TRgVVHNjTNKcTg7xK7/LSfbfcH6Q8mNjd BuTi6YEE5G34JbtFojwbNhJf6VNbTbRgGAduxZvo6RTFm9TusLOh/R7A76YeTOFCPsUu /4PvUR5QBYvq0kzGM2MK4Ki9FcZVha0hf+ONsKo38OgjaKZQsPVoYwH8FHDDvhdETiHF 0OGg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=mNLSvyR6BC7gzcgJ5lYtoD8MAYAuDr7cVKyKNqKQWds=; b=VDQCPUdeQ/EH/x8HtI6yBUy2mgckLosuKg8SiwfLVs+//+1Ox/Y3UroqkSLblF66wv gOc7DDvA409yVZ/aZTXutpLV2qBLPObl8bWXC/eeyG5BZkMbptJ3n7Zd+R02tYkjCEkL vAUlMHdcYj7Tq6KF28/Zyj+E0H+e0bzD3djTxCNYzpoy8Bt8jKsAWSOVM7uT6MPzCKgL aez1Ee2Z5e0E4UTl9OkOQvOb/c+m9m+cUX79XwXx/8EpDnXbxzTfUIx2mFnmeHoflp1M uy/qJ7wvOdSbbwS+t49zZ4miaV1iqqTY0n+EiIjDI1ocHaSSE7TVs4VWVhOJS8PCYeLF rnCw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l16si5476464pgt.568.2019.09.06.16.34.32; Fri, 06 Sep 2019 16:34:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2394437AbfIFO2B (ORCPT + 99 others); Fri, 6 Sep 2019 10:28:01 -0400 Received: from mga03.intel.com ([134.134.136.65]:63411 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731142AbfIFO2B (ORCPT ); Fri, 6 Sep 2019 10:28:01 -0400 X-Amp-Result: UNSCANNABLE X-Amp-File-Uploaded: False Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 06 Sep 2019 07:28:00 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,473,1559545200"; d="scan'208";a="188327645" Received: from unknown (HELO localhost.localdomain) ([10.232.112.69]) by orsmga006.jf.intel.com with ESMTP; 06 Sep 2019 07:27:59 -0700 Date: Fri, 6 Sep 2019 08:18:58 -0600 From: Keith Busch To: Ming Lei Cc: Daniel Lezcano , Keith Busch , Hannes Reinecke , Bart Van Assche , linux-scsi@vger.kernel.org, Peter Zijlstra , Long Li , John Garry , LKML , linux-nvme@lists.infradead.org, Jens Axboe , Ingo Molnar , Thomas Gleixner , Christoph Hellwig , Sagi Grimberg Subject: Re: [PATCH 1/4] softirq: implement IRQ flood detection mechanism Message-ID: <20190906141858.GA3953@localhost.localdomain> References: <299fb6b5-d414-2e71-1dd2-9d6e34ee1c79@linaro.org> <20190903063125.GA21022@ming.t460p> <6b88719c-782a-4a63-db9f-bf62734a7874@linaro.org> <20190903072848.GA22170@ming.t460p> <6f3b6557-1767-8c80-f786-1ea667179b39@acm.org> <2a8bd278-5384-d82f-c09b-4fce236d2d95@linaro.org> <20190905090617.GB4432@ming.t460p> <6a36ccc7-24cd-1d92-fef1-2c5e0f798c36@linaro.org> <20190906014819.GB27116@ming.t460p> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190906014819.GB27116@ming.t460p> User-Agent: Mutt/1.9.1 (2017-09-22) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 06, 2019 at 09:48:21AM +0800, Ming Lei wrote: > When one IRQ flood happens on one CPU: > > 1) softirq handling on this CPU can't make progress > > 2) kernel thread bound to this CPU can't make progress > > For example, network may require softirq to xmit packets, or another irq > thread for handling keyboards/mice or whatever, or rcu_sched may depend > on that CPU for making progress, then the irq flood stalls the whole > system. > > > > > AFAIU, there are fast medium where the responses to requests are faster > > than the time to process them, right? > > Usually medium may not be faster than CPU, now we are talking about > interrupts, which can be originated from lots of devices concurrently, > for example, in Long Li'test, there are 8 NVMe drives involved. Why are all 8 nvmes sharing the same CPU for interrupt handling? Shouldn't matrix_find_best_cpu_managed() handle selecting the least used CPU from the cpumask for the effective interrupt handling?