Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp5186801ybf; Wed, 4 Mar 2020 19:12:09 -0800 (PST) X-Google-Smtp-Source: ADFU+vutopbU1r4rhewxpIEw7kLhmvz4UfYq1UKkBxGz/63SzUg6mWbd4x4K8orzwNAEAZnA3leC X-Received: by 2002:aca:4d82:: with SMTP id a124mr4272214oib.103.1583377928929; Wed, 04 Mar 2020 19:12:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583377928; cv=none; d=google.com; s=arc-20160816; b=ZwzpNlfBfK0jWmVKhz8UhluB/9AIDnRz0KtmJsDFTLxljlyPFzPwiGVsV3jWO8O4mm HWARA8c5MywhQ7wWmWW+EfdGg9pwI0KZKQCcNb4UKEodhm0FF9Y5RU/Vm5UmydhF0kak 2SGPHBA9K7OqS7Wyx6bVPmgNgD1Wf66GMG/QU38RAB+q3NiQR20k+qw0KnLhO4h7m/6f lpxdfvwO3UxQa3xcx8jM10YeDZVAWbsln6hKNPWaa7nKt5WRfu12kJCflnEvGbquOV7s 76YeTz9H6LBbNA97uvRlytYG8htCEL8rfXohu4p5XNbl84/jp58WeYZuGwev7ebe7sm3 RV8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=Gm+69K3x1B8bUAMQ86XioyFdyodPHp8XgVaGsYPBgok=; b=JM112Rt7XHwocMnHy/1V1RYHJy07LhusRqU9g2/DjTEbzNL/3RYaSAqGVyEVRd5Nnn e4LZaR4jlpARjuuJCylSVR0PzFk2xh/sxbs0r89m0wtT8TJEWlE00U6qqqbFICZzqu5/ hdaXCMfeqCysCRLgkVV6WX0RXWOgOLJ9saf4+8dHnnCQOzAXhcr1jmeOYhZ3x75l1/Jy EXznCiFMXXyXsudlniC50QQK7DZK5oUEy3XrDPjfpizUDaWDrm4tAdm0nIzVFLQMc1X2 PDg6NeuJ+/D5pi6y3zo/I4d2i/AMGHqL8i7UDdXGhowgVEDTHBjbikJ2YQEF7agBbJxQ 0IxA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m16si1832341oig.129.2020.03.04.19.11.56; Wed, 04 Mar 2020 19:12:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725903AbgCEDL0 (ORCPT + 99 others); Wed, 4 Mar 2020 22:11:26 -0500 Received: from mail.kernel.org ([198.145.29.99]:51052 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725839AbgCEDL0 (ORCPT ); Wed, 4 Mar 2020 22:11:26 -0500 Received: from oasis.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EF24520866; Thu, 5 Mar 2020 03:11:24 +0000 (UTC) Date: Wed, 4 Mar 2020 22:11:23 -0500 From: Steven Rostedt To: Xi Wang Cc: Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Josh Don , linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Paul Turner Subject: Re: [PATCH] sched: watchdog: Touch kernel watchdog in sched code Message-ID: <20200304221123.7cef48d7@oasis.local.home> In-Reply-To: <20200304213941.112303-1-xii@google.com> References: <20200304213941.112303-1-xii@google.com> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 4 Mar 2020 13:39:41 -0800 Xi Wang wrote: > The main purpose of kernel watchdog is to test whether scheduler can > still schedule tasks on a cpu. In order to reduce latency from > periodically invoking watchdog reset in thread context, we can simply > touch watchdog from pick_next_task in scheduler. Compared to actually > resetting watchdog from cpu stop / migration threads, we lose coverage > on: a migration thread actually get picked and we actually context > switch to the migration thread. Both steps are heavily protected by > kernel locks and unlikely to silently fail. Thus the change would > provide the same level of protection with less overhead. Have any measurements showing the drop in overhead? > > The new way vs the old way to touch the watchdogs is configurable > from: > > /proc/sys/kernel/watchdog_touch_in_thread_interval > > The value means: > 0: Always touch watchdog from pick_next_task > 1: Always touch watchdog from migration thread > N (N>0): Touch watchdog from migration thread once in every N > invocations, and touch watchdog from pick_next_task for > other invocations. > > Suggested-by: Paul Turner > Signed-off-by: Xi Wang > --- > kernel/sched/core.c | 36 ++++++++++++++++++++++++++++++++++-- > kernel/sysctl.c | 11 ++++++++++- > kernel/watchdog.c | 39 ++++++++++++++++++++++++++++++++++----- > 3 files changed, 78 insertions(+), 8 deletions(-) > > diff --git a/kernel/sched/core.c b/kernel/sched/core.c > index 1a9983da4408..9d8e00760d1c 100644 > --- a/kernel/sched/core.c > +++ b/kernel/sched/core.c > @@ -3898,6 +3898,27 @@ static inline void schedule_debug(struct task_struct *prev, bool preempt) > schedstat_inc(this_rq()->sched_count); > } > > +#ifdef CONFIG_SOFTLOCKUP_DETECTOR > + > +DEFINE_PER_CPU(bool, sched_should_touch_watchdog); > + > +void touch_watchdog_from_sched(void); > + > +/* Helper called by watchdog code */ > +void resched_for_watchdog(void) > +{ > + unsigned long flags; > + struct rq *rq = this_rq(); > + > + this_cpu_write(sched_should_touch_watchdog, true); Perhaps we should have a preempt_disable, otherwise it is possible to get preempted here. -- Steve > + raw_spin_lock_irqsave(&rq->lock, flags); > + /* Trigger resched for code in pick_next_task to touch watchdog */ > + resched_curr(rq); > + raw_spin_unlock_irqrestore(&rq->lock, flags); > +} > + > +#endif /* CONFIG_SOFTLOCKUP_DETECTOR */ > +