Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp3485867rwe; Mon, 29 Aug 2022 12:47:05 -0700 (PDT) X-Google-Smtp-Source: AA6agR7ppwrchrm3XKAx9d5mnGbrBYloG1JWjgw7mazDuvc3MFkse2Y621JFrouWHkILYPHET6k3 X-Received: by 2002:a17:90b:4acb:b0:1fe:212:986 with SMTP id mh11-20020a17090b4acb00b001fe02120986mr717991pjb.19.1661802424786; Mon, 29 Aug 2022 12:47:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1661802424; cv=none; d=google.com; s=arc-20160816; b=eGKlSsMtXGnpYKRnNzw70SXaK35tFZzixjCrzmDlR8HsGTkfPp1jlfMfZiJ3Nyjf2n KrAAX7aRPENEvU7WDy2lWxrDjAkoW7xIXtqycJQ3+0RlRsb96aWrJLMLgVD7+pml/ttR cse5HkQELgS4E3MJ0CrtfgTO39WN3fWVn2slgFTGHkxEV8AWv7naITnOWaFfpit3kV7g QJFmJh4xd7eNasCuNhrUKHtr+I7dmG5blfWGvcGtsmvXHtulp0WU9/W7YGooIyyszQz1 ly38rX4EHDX6DUS047UKVYY54qnYExDGIfsUksgGwudEjJZyHqvWbQiOo/il70itQNl7 H4XQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=W6AmRUwnbDKIOqmHGGBBGTpBc5taHplx30SLwCodPpk=; b=bjMQRhJrenVVAYP8JaHZLgclQubfhKdfSz+BLDCnD8d93q5oVV4mbohMoYtnLWSdug sKhFuKeQCtBOmuf7jWq9byjHzF98VFmERED4hVESJiGreX8q0G/9wtwwPS6UlA2EDLug EvOR16aCQzFtYh9NLx11hniNYZciJF9CsWqp7gW8t90I17N3Yr1OLSTuDvKmITfAfn4/ lZcoo5ZuaW0yscH8j/OAZp+m+puvVkpRWarcJrlaw0N/6zW41TR9dbVYZD8k+yqnuEFR pEoja+PNF07kkH0fSo6rebytiolgk5RdomvG6n8UT6WEED1vxs9mG42EOWtpmiQ7W3Sl CbDg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f8-20020a170902ce8800b00174e5611039si2544293plg.246.2022.08.29.12.46.54; Mon, 29 Aug 2022 12:47:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229570AbiH2TMI (ORCPT + 99 others); Mon, 29 Aug 2022 15:12:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34438 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229490AbiH2TMF (ORCPT ); Mon, 29 Aug 2022 15:12:05 -0400 Received: from vps-vb.mhejs.net (vps-vb.mhejs.net [37.28.154.113]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6E8E885A88 for ; Mon, 29 Aug 2022 12:11:59 -0700 (PDT) Received: from MUA by vps-vb.mhejs.net with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1oSkAk-00020k-KC; Mon, 29 Aug 2022 21:11:46 +0200 From: "Maciej S. Szmigiero" To: John Stultz , Thomas Gleixner , Stephen Boyd Cc: linux-kernel@vger.kernel.org Subject: [PATCH] clocksource: downgrade messages about skipping watchdog check under load Date: Mon, 29 Aug 2022 21:11:38 +0200 Message-Id: <841757364754f8d0a8834982ca16da10a6a44d72.1661799955.git.maciej.szmigiero@oracle.com> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Maciej S. Szmigiero" Since commit c86ff8c55b8a ("clocksource: Avoid accidental unstable marking of clocksources") the watchdog check is skipped if two consecutive watchdog reads are too far apart. This might happen, for example, when the system is under heavy load, so it isn't a totally unexpected condition. Since some systems are prone to producing significant number of these messages when the system is constantly under heavy load downgrade their log level to "debug" to avoid filling the kernel log in such case. These messages can then still be enabled via dyndbg mechanism in case someone really needs to see them. Signed-off-by: Maciej S. Szmigiero --- kernel/time/clocksource.c | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/kernel/time/clocksource.c b/kernel/time/clocksource.c index cee5da1e54c41..ff99b25bc1aec 100644 --- a/kernel/time/clocksource.c +++ b/kernel/time/clocksource.c @@ -236,8 +236,8 @@ static enum wd_read_status cs_watchdog_read(struct clocksource *cs, u64 *csnow, watchdog->shift); if (wd_delay <= WATCHDOG_MAX_SKEW) { if (nretries > 1 || nretries >= max_cswd_read_retries) { - pr_warn("timekeeping watchdog on CPU%d: %s retried %d times before success\n", - smp_processor_id(), watchdog->name, nretries); + pr_debug("timekeeping watchdog on CPU%d: %s retried %d times before success\n", + smp_processor_id(), watchdog->name, nretries); } return WD_READ_SUCCESS; } @@ -262,10 +262,10 @@ static enum wd_read_status cs_watchdog_read(struct clocksource *cs, u64 *csnow, return WD_READ_UNSTABLE; skip_test: - pr_info("timekeeping watchdog on CPU%d: %s wd-wd read-back delay of %lldns\n", - smp_processor_id(), watchdog->name, wd_seq_delay); - pr_info("wd-%s-wd read-back delay of %lldns, clock-skew test skipped!\n", - cs->name, wd_delay); + pr_debug("timekeeping watchdog on CPU%d: %s wd-wd read-back delay of %lldns\n", + smp_processor_id(), watchdog->name, wd_seq_delay); + pr_debug("wd-%s-wd read-back delay of %lldns, clock-skew test skipped!\n", + cs->name, wd_delay); return WD_READ_SKIP; }