Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp3731953pxy; Mon, 26 Apr 2021 08:29:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyuJcDRCc+WoyZr86c9k34R1NMVoF7XmiYVPwyNnVk/4ZMAO2FtwRpfzXY+4N5vYkTCrxoy X-Received: by 2002:a17:90b:915:: with SMTP id bo21mr8295914pjb.27.1619450995870; Mon, 26 Apr 2021 08:29:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619450995; cv=none; d=google.com; s=arc-20160816; b=dKrbS/9CWkYuQDMUTUajc5MOZ4PobMCUpTtJi8UChFJgm34Eel2E+IMrv5nozn8mgS 7JyOjffWpAGZ+sAU1O5QgitXztOni9bTkh9iF/zXwFpVcPwTKY3WGW445JxMlZmKRZV4 LjAA6UNJW4OX/I4zqblWBx/T3wv8gMC1YUjN7xAoFKWAHbEf+0HpAA5DTNMHIFua3fsS LToQFG+oZ13Dh7bPD4DXWxJTXXvFl8mWHlEIVMfWe+sIRhDY8HizdAIChc55Lgt9C8e3 s5ph/pmRNcR62WnUKRMw4t8zuEDCDXyBNV6WYfJEOIM3ZIaq3biskk+DwaXlh6xT3jKa pAKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=b9vHCo8AZ4S4cm5+L3E3jl4Wt3SIIjple+87sEwN8ms=; b=RHQhiLnsNCP1TLMCmBLVFNuAsFSXTcWBR7mNKSkIjzbvEw6GWMwMDTYP6kSzKZw76k 2aLZk4X2yllHPP28t+tjkeEdrJ2l0qKcizcHH/tMYUU8KrYnoH7RNdY7kq6ow7kC3MKf PgOmJP15nDRYAHWC7uvgl9cHwDreIJRcV009HJGyI6YjYc32WVDH78OgBycb25kus3aK Xg6ejncLA8FUauyiargDflApGFysc3ATnxUf8PLxEZm1uN/8e19JjHnzuJVFBhdAzfpV tBfG+0sBzyCsqEqmBS3FVlx8K83M2pjJsp3QZmrcLhqLX8sAmCoE4fbkgyAKoC6ziDzP fOsA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=dRmOo9ZV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c9si18982736pga.53.2021.04.26.08.29.43; Mon, 26 Apr 2021 08:29:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=dRmOo9ZV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234011AbhDZP2o (ORCPT + 99 others); Mon, 26 Apr 2021 11:28:44 -0400 Received: from mail.kernel.org ([198.145.29.99]:34412 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233674AbhDZP2n (ORCPT ); Mon, 26 Apr 2021 11:28:43 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 2C6EB61076; Mon, 26 Apr 2021 15:28:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1619450882; bh=AwhTbcawstyLCkCKuD8TwEtnhQvod3F3gZm+IW/Bb6I=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=dRmOo9ZVfxCtmfBY5Durmki5k7x6WWssiMaFS3cJxfhed9VJTllzhWaHAb5tArLjT x/Vk2e1SXMq734AzV8ResxZtLdhvYHSvEqXcm7Mevh3lsx7pOEV6aNFWjidjF9SZ3w yskZeVInlhAS2UbE1gcnSNHwRW+CsaEcoz2OFxT1dY4KlgYc4n6dw/jqltMGPsXNJN VFX4UNzPOlrNxBPZLQYTmQWopzS1H3KWlY7lK9DTs/BsK5aQY49DvUulM7SPqHxV8q pVal0imAxPwzOXKS3aSNln4VeOlEPi9Bgf0ta60E5acV6zpnuxlmE2zU9Uyj8K4F44 PcibNCL8XYtRw== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id D36E85C0121; Mon, 26 Apr 2021 08:28:01 -0700 (PDT) Date: Mon, 26 Apr 2021 08:28:01 -0700 From: "Paul E. McKenney" To: Andi Kleen Cc: tglx@linutronix.de, linux-kernel@vger.kernel.org, john.stultz@linaro.org, sboyd@kernel.org, corbet@lwn.net, Mark.Rutland@arm.com, maz@kernel.org, kernel-team@fb.com, neeraju@codeaurora.org, feng.tang@intel.com, zhengjun.xing@intel.com, Chris Mason Subject: Re: [PATCH v10 clocksource 1/7] clocksource: Provide module parameters to inject delays in watchdog Message-ID: <20210426152801.GY975577@paulmck-ThinkPad-P17-Gen-1> Reply-To: paulmck@kernel.org References: <20210425224540.GA1312438@paulmck-ThinkPad-P17-Gen-1> <20210425224709.1312655-1-paulmck@kernel.org> <20210426040736.GS1401198@tassilo.jf.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210426040736.GS1401198@tassilo.jf.intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Apr 25, 2021 at 09:07:36PM -0700, Andi Kleen wrote: [ . . . ] > > + clocksource.inject_delay_period= [KNL] > > + Number of calls to clocksource_watchdog() before > > + delays are injected between reads from the > > + two clocksources. Values of zero disable this > > + delay injection. These delays can cause clocks > > + to be marked unstable, so use of this parameter > > + should therefore be avoided on production systems. > > + Defaults to zero (disabled). > > + > > + clocksource.inject_delay_repeat= [KNL] > > + Number of repeated clocksource_watchdog() delay > > + injections per period. If inject_delay_period > > + is five and inject_delay_repeat is three, there > > + will be five delay-free reads followed by three > > + delayed reads. > > I'm not sure command line options are the right way to do this. > How about integrating it with the fault injection framework in debugfs. > > This way syzkaller etc. can play with it, which long term would > give much better test coverage. > > This wouldn't allow boot time coverage, but presumably that's not > too important here. Boot-time coverage is important, as we saw in kbuild test robot testing of v9 of this patchset, which triggered clocksource_tsc_early, but not clocksource_tsc. Note that v10 avoids this triggering. Thanx, Paul