Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp695367rwd; Thu, 15 Jun 2023 00:17:29 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ528piuw8rS/78vbDMjRdk3WhHp2TdnzEWq/7dz/8y7iIOoxY3t8aSQKZ4ODtYX+5G4suNB X-Received: by 2002:a17:906:eec7:b0:974:1c98:d2d9 with SMTP id wu7-20020a170906eec700b009741c98d2d9mr19170490ejb.3.1686813449706; Thu, 15 Jun 2023 00:17:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686813449; cv=none; d=google.com; s=arc-20160816; b=slm/2MF9yzCF89HXgQ+S3tXAnFGvlHTN6kO08pUR/RwyrygrnZDgPF9JAfhtBgxcRy eiOB7aqtLHtpTaWfjEtTi8E7SXyNyzHH2q+LpG6lX6Xi0XHd1DoaaUZHQw98z88pTCp6 scxh4mpYRc0XbuQhi5aETwlz1uo+aKNUxhEFUJ8LIttvwAlYUZJYawtnkRMrw3Z2uOVu i9n3UleeYVSTAfnGjeWGJExJ9IIK2MxF4s0ks9uMPgGhcrq/rcdxEhEjRy+wOHL1BXJ+ Ze0A1Xdf79lPc0AIOIs29DgbAmLyi9yJxjuhcJZhUjF8km48UAraXo73rUs0jBYtCQs8 72uw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=tWug6tK250qyQQCYO8fMKWJIjS1otJVNG8Ic8LjsM4w=; b=KebzJgBUNjUBski9QDvTPOovMnlMwMt0cox3GB1p+qU1JOEyspOynU4T5efHI9EVnO jH2XMnkOowRpM5GTVBdec1BTnxI3dKKXEvZUxGlkRRmoYTGEeEC/DbwDzo+L1020IbW0 sMMCc5Pwa9/50GR8ac1rFFb04IsbALYUpZmaLZUsIiBwsSPpcVeDKlWCb4NsGD+rOGW3 lulQMVrqz0nN/H8iT5oW7X/4rq+0kyvTgcPWg0dXlTKYsTOxVH3Mjii4AVJLoiv1Wzp9 iYmo06ox90DgsXNIons4kFj6euUfP9JphqZhmX0md4EqAt9q8L7/l/HiqHAgyf49+X7R z7Ig== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Eo2AlVCp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id lr20-20020a170906fb9400b0098287baecc2si1359007ejb.50.2023.06.15.00.17.05; Thu, 15 Jun 2023 00:17:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Eo2AlVCp; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244009AbjFOHBW (ORCPT + 99 others); Thu, 15 Jun 2023 03:01:22 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33424 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244464AbjFOHBP (ORCPT ); Thu, 15 Jun 2023 03:01:15 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 238482689 for ; Thu, 15 Jun 2023 00:00:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1686812438; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=tWug6tK250qyQQCYO8fMKWJIjS1otJVNG8Ic8LjsM4w=; b=Eo2AlVCpxtNTiodVcclX37lu5QQ3DHc2WwyiP7bIYIgpD6REFtO2KiooRu+V3DKnmp1hQC c94jSK9nNdX/czB5Ven1M2md25oH4qANYPPmm2oBVEZjVu4NvvwVRKIDuZYwHf6IqyfIib dUaItSi1o58JlpvjJTFI88wG9RauteI= Received: from mail-ot1-f69.google.com (mail-ot1-f69.google.com [209.85.210.69]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-518-P64RxU-QPqSJrB-0L9WY0A-1; Thu, 15 Jun 2023 03:00:37 -0400 X-MC-Unique: P64RxU-QPqSJrB-0L9WY0A-1 Received: by mail-ot1-f69.google.com with SMTP id 46e09a7af769-6b2ac1fe3d6so5838076a34.1 for ; Thu, 15 Jun 2023 00:00:36 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686812436; x=1689404436; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=tWug6tK250qyQQCYO8fMKWJIjS1otJVNG8Ic8LjsM4w=; b=QDlc4XBOHY1hIE9aJDv+c1mh3FJ5Y9HBPxctdUuyeV/n5doS8oVPz7/ht4HJbXLxOx g/JYQpqoITnsQCzflUwUVm33FfD6bfz+TyJ8h6TYJtW3Cy5LIZNzjlTL2I/1tHbmwRHh BrFkWLP16/DTFsZzgwBFblN5xrUoz2D1xE6mehOF4H3VKPI7dCtbsrkJ4/6oYDesnioF MxfVYGaDlNo7qHj8/lB3EDA9VZEqJuyWkFLblpLzgjobX0v8tFbcyjPo3S+BeaQMxDva o/4/rj2XyLze+ri8ZiMSYi0gXUrZtN/Bo94lh/RlUTB1qPlBZ4zFAn3f2///1is+jllK IQEA== X-Gm-Message-State: AC+VfDw8FUN0wwWamAiNkWBeUrPv2qBr7LsF8MeKBzw8h0Cr22GioesD Aa6HaUeeJuUIDoGRiVRfk+wrkYtYSDXmGAMAp5dM2clzY8TGWbsYOjdU3S9QLz/9enqEqHFI6fg 15XbzifuNSQz+OudPMgLxz5GQ X-Received: by 2002:a05:6830:10d5:b0:6b0:a7f8:aef3 with SMTP id z21-20020a05683010d500b006b0a7f8aef3mr14682447oto.25.1686812436206; Thu, 15 Jun 2023 00:00:36 -0700 (PDT) X-Received: by 2002:a05:6830:10d5:b0:6b0:a7f8:aef3 with SMTP id z21-20020a05683010d500b006b0a7f8aef3mr14682438oto.25.1686812435989; Thu, 15 Jun 2023 00:00:35 -0700 (PDT) Received: from localhost.localdomain ([2804:1b3:a800:60ac:48e:4eb0:11b4:f1e8]) by smtp.gmail.com with ESMTPSA id d4-20020a0568301b6400b006b2b51fd2ebsm6472317ote.81.2023.06.15.00.00.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 15 Jun 2023 00:00:35 -0700 (PDT) From: Leonardo Bras To: Steven Rostedt , Masami Hiramatsu , Leonardo Bras , Peter Zijlstra , "Paul E. McKenney" , Juergen Gross , Valentin Schneider , Yury Norov , Sebastian Andrzej Siewior Cc: linux-kernel@vger.kernel.org, linux-trace-kernel@vger.kernel.org Subject: [RFC PATCH v5 1/2] trace,smp: Add tracepoints around remotelly called functions Date: Thu, 15 Jun 2023 03:59:45 -0300 Message-ID: <20230615065944.188876-5-leobras@redhat.com> X-Mailer: git-send-email 2.41.0 In-Reply-To: <20230615065944.188876-3-leobras@redhat.com> References: <20230615065944.188876-3-leobras@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The recently added ipi_send_{cpu,cpumask} tracepoints allow finding sources of IPIs targeting CPUs running latency-sensitive applications. For NOHZ_FULL CPUs, all IPIs are interference, and those tracepoints are sufficient to find them and work on getting rid of them. In some setups however, not *all* IPIs are to be suppressed, but long-running IPI callbacks can still be problematic. Add a pair of tracepoints to mark the start and end of processing a CSD IPI callback, similar to what exists for softirq, workqueue or timer callbacks. Signed-off-by: Leonardo Bras --- include/trace/events/csd.h | 45 ++++++++++++++++++++++++++++++++++++++ kernel/smp.c | 25 ++++++++++++++++----- 2 files changed, 64 insertions(+), 6 deletions(-) create mode 100644 include/trace/events/csd.h diff --git a/include/trace/events/csd.h b/include/trace/events/csd.h new file mode 100644 index 000000000000..af1df5200ae6 --- /dev/null +++ b/include/trace/events/csd.h @@ -0,0 +1,45 @@ +/* SPDX-License-Identifier: GPL-2.0 */ +#undef TRACE_SYSTEM +#define TRACE_SYSTEM csd + +#if !defined(_TRACE_CSD_H) || defined(TRACE_HEADER_MULTI_READ) +#define _TRACE_CSD_H + +#include + +/* + * Tracepoints for a function which is called as an effect of smp_call_function.* + */ +DECLARE_EVENT_CLASS(csd_function, + + TP_PROTO(smp_call_func_t func, struct __call_single_data *csd), + + TP_ARGS(func, csd), + + TP_STRUCT__entry( + __field(void *, func) + __field(void *, csd) + ), + + TP_fast_assign( + __entry->func = func; + __entry->csd = csd; + ), + + TP_printk("func=%ps, csd=%p", __entry->func, __entry->csd) +); + +DEFINE_EVENT(csd_function, csd_function_entry, + TP_PROTO(smp_call_func_t func, struct __call_single_data *csd), + TP_ARGS(func, csd) +); + +DEFINE_EVENT(csd_function, csd_function_exit, + TP_PROTO(smp_call_func_t func, struct __call_single_data *csd), + TP_ARGS(func, csd) +); + +#endif /* _TRACE_CSD_H */ + +/* This part must be outside protection */ +#include diff --git a/kernel/smp.c b/kernel/smp.c index 919387be6d4e..7199b5a22043 100644 --- a/kernel/smp.c +++ b/kernel/smp.c @@ -27,6 +27,9 @@ #include #include +#define CREATE_TRACE_POINTS +#include +#undef CREATE_TRACE_POINTS #include "smpboot.h" #include "sched/smp.h" @@ -121,6 +124,14 @@ send_call_function_ipi_mask(struct cpumask *mask) arch_send_call_function_ipi_mask(mask); } +static __always_inline void +csd_do_func(smp_call_func_t func, void *info, struct __call_single_data *csd) +{ + trace_csd_function_entry(func, csd); + func(info); + trace_csd_function_exit(func, csd); +} + #ifdef CONFIG_CSD_LOCK_WAIT_DEBUG static DEFINE_STATIC_KEY_MAYBE(CONFIG_CSD_LOCK_WAIT_DEBUG_DEFAULT, csdlock_debug_enabled); @@ -375,7 +386,7 @@ static int generic_exec_single(int cpu, call_single_data_t *csd) csd_lock_record(csd); csd_unlock(csd); local_irq_save(flags); - func(info); + csd_do_func(func, info, NULL); csd_lock_record(NULL); local_irq_restore(flags); return 0; @@ -477,7 +488,7 @@ static void __flush_smp_call_function_queue(bool warn_cpu_offline) } csd_lock_record(csd); - func(info); + csd_do_func(func, info, csd); csd_unlock(csd); csd_lock_record(NULL); } else { @@ -508,7 +519,7 @@ static void __flush_smp_call_function_queue(bool warn_cpu_offline) csd_lock_record(csd); csd_unlock(csd); - func(info); + csd_do_func(func, info, csd); csd_lock_record(NULL); } else if (type == CSD_TYPE_IRQ_WORK) { irq_work_single(csd); @@ -522,8 +533,10 @@ static void __flush_smp_call_function_queue(bool warn_cpu_offline) /* * Third; only CSD_TYPE_TTWU is left, issue those. */ - if (entry) - sched_ttwu_pending(entry); + if (entry) { + csd = llist_entry(entry, typeof(*csd), node.llist); + csd_do_func(sched_ttwu_pending, entry, csd); + } } @@ -816,7 +829,7 @@ static void smp_call_function_many_cond(const struct cpumask *mask, unsigned long flags; local_irq_save(flags); - func(info); + csd_do_func(func, info, NULL); local_irq_restore(flags); } -- 2.41.0