Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1384182rdb; Tue, 30 Jan 2024 17:50:49 -0800 (PST) X-Google-Smtp-Source: AGHT+IHpxkKtmxj/GZmskse3FzONoDhfrlhWfMltsQUIvGo3dls2ICtOwGsntjwW+yr7SNQ/k1XW X-Received: by 2002:a2e:ab0d:0:b0:2cc:d4ae:c2ce with SMTP id ce13-20020a2eab0d000000b002ccd4aec2cemr149910ljb.38.1706665849193; Tue, 30 Jan 2024 17:50:49 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706665848; cv=pass; d=google.com; s=arc-20160816; b=aRymMjmTFOZMoLNyN5C1a3T7dJ895w8F2OZu7EbBsUgRHrQvxdxpk41Q//lUQ2cwrz IfKKE2weCaBMQJ01tybIH1GKkwT69VLyQGnQ1ZhYZl3IvX3DFsBoFX6M2HK+FCvN+8Vt kVNG79XhbXJ2DddprCjyAtWVM9JVnGBhdbP+jtr/la9Xre63qJ0n4HEngyXixU4WpZPv 65wPZee3tvvxk4Gf9pjsPnAGViESup0yVX4aXJSFLYqtJhOjbLkkb2TgskaNe9EFowBz xGYM+YotNMy+iywjg0OybQTVO1wXKaH83VfCAnn4Hl7e4OscBnAFvovN28HH5mHW/Gyx gl7Q== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to:subject :user-agent:mime-version:list-unsubscribe:list-subscribe:list-id :precedence:date:message-id:dkim-signature; bh=Gypkhh0e3i5pcKat3m6nz81xdN6y/lW5xtHUauKeWvc=; fh=8hdxrQGGHIEl4gjdx41pKyZbiSI5bS/YfqewKTg1F3U=; b=hZYcHjLDlSeuV2QnOvp7seYEga6JQHN9oHKfJPr1Vf8gmQjBpZZ6gUFhrhGriXe/fw 3zRHS2MfWsepEoIyPXWAcFRJSqeuAc4jCypwVX1oVA3nJ66HSSVMAazBnt2OHr4UWGyZ HhmCoAjghS0qjywSsjmaUH8YKq0kE1/oDshHMeZGI4C5/QXbfRXxexIz2nX1V8gLQyDl HMoS1Zwgps6JmQ7x8kIJaXa0cUekvrJ721zJ6LO7n6Zf5AfVzImzuESF4uVMTms8nRNs cCm6qeu6EG64SD9R8w1gdHXMGsFH1wGZq5C7AlLLHAFTwXyXKTrDHXDhbaKXUE9tQeLA uUfQ==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.alibaba.com header.s=default header.b=XAoAkMzb; arc=pass (i=1 spf=pass spfdomain=linux.alibaba.com dkim=pass dkdomain=linux.alibaba.com dmarc=pass fromdomain=linux.alibaba.com); spf=pass (google.com: domain of linux-kernel+bounces-45613-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-45613-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.alibaba.com X-Forwarded-Encrypted: i=1; AJvYcCURVV7wzcAa1uuCMqnY4K3VtAK5cO9WR2di9Ko9h6E99nHFic+PuQVTE0mDXTknXXwJ7yUS07AnOKM4OUnbDuvDGImoQpW5Gez+vPidng== Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id t15-20020a056402524f00b005591a22e2b4si2905947edd.461.2024.01.30.17.50.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 30 Jan 2024 17:50:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-45613-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.alibaba.com header.s=default header.b=XAoAkMzb; arc=pass (i=1 spf=pass spfdomain=linux.alibaba.com dkim=pass dkdomain=linux.alibaba.com dmarc=pass fromdomain=linux.alibaba.com); spf=pass (google.com: domain of linux-kernel+bounces-45613-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-45613-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.alibaba.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 333C51F272B2 for ; Wed, 31 Jan 2024 01:50:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 123C94C92; Wed, 31 Jan 2024 01:50:28 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b="XAoAkMzb" Received: from out30-101.freemail.mail.aliyun.com (out30-101.freemail.mail.aliyun.com [115.124.30.101]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 104B4538A for ; Wed, 31 Jan 2024 01:50:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.124.30.101 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706665826; cv=none; b=A/6IdnJ0WWX3t7LK0HilfD+I7uQ+jQ0OcsRJTfaaA0XdHiQYmtjz+nrK8vvUmQzhAjdK+rRENrllWKZHpCt5xp2ilVB/3X/T77ya3yhxRK4lWkNdNjxvbgxpAxURopygKlp3Q1vZuVuDVsW0Oocv/8IL7WVlOSr7H1KQRSfOugc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706665826; c=relaxed/simple; bh=FBDLfiXa6eGY20crZ+KFLNMI2nVjlflolmYfDdvvqRs=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=Jm/eY8/kAQSVRhxhtMXip2isy0vW7z5SNoSgedbB3m2ZZD7JsE+M2bwktNDQcSfxti8TR3A2BMwcdvpZPlo6HntED3pSxz0xx4msIQUkXbHYC7XPa6hvmh10XuuApna7TuMyTv8HFFoq6jPe9MMw//aohub4retflwcmE5fMk80= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com; spf=pass smtp.mailfrom=linux.alibaba.com; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b=XAoAkMzb; arc=none smtp.client-ip=115.124.30.101 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.alibaba.com DKIM-Signature:v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.alibaba.com; s=default; t=1706665821; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type; bh=Gypkhh0e3i5pcKat3m6nz81xdN6y/lW5xtHUauKeWvc=; b=XAoAkMzb5TjZRgI/vAY2WSWuGb3rBMFMhZoG96FV7fmAu5Vt/fvAd4GCGcEeW5X3yKHfWB9AU096feLChYnUPBDn8CHG7sHnBpnkpbFOyLtuEGIU5tQ8gGnpOQhjJRspudkiOImhqf8C284m9RIZvhfVF40ifj3nzWjRsSMOoqE= X-Alimail-AntiSpam:AC=PASS;BC=-1|-1;BR=01201311R531e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046050;MF=liusong@linux.alibaba.com;NM=1;PH=DS;RN=7;SR=0;TI=SMTPD_---0W.haG19_1706665819; Received: from 30.178.80.124(mailfrom:liusong@linux.alibaba.com fp:SMTPD_---0W.haG19_1706665819) by smtp.aliyun-inc.com; Wed, 31 Jan 2024 09:50:20 +0800 Message-ID: Date: Wed, 31 Jan 2024 09:50:19 +0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCHv2 2/2] watchdog/softlockup: report the most frequent interrupts To: Bitao Hu , dianders@chromium.org, akpm@linux-foundation.org, pmladek@suse.com, lecopzer.chen@mediatek.com, kernelfans@gmail.com Cc: linux-kernel@vger.kernel.org References: <20240130074744.45759-1-yaoma@linux.alibaba.com> <20240130074744.45759-3-yaoma@linux.alibaba.com> From: Liu Song In-Reply-To: <20240130074744.45759-3-yaoma@linux.alibaba.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit 在 2024/1/30 15:47, Bitao Hu 写道: > When the watchdog determines that the current soft lockup is due > to an interrupt storm based on CPU utilization, reporting the > most frequent interrupts could be good enough for further > troubleshooting. > > Below is an example of interrupt storm. The call tree does not > provide useful information, but we can analyze which interrupt > caused the soft lockup by comparing the counts of interrupts. > > [ 2987.488075] watchdog: BUG: soft lockup - CPU#9 stuck for 23s! [kworker/9:1:214] > [ 2987.488607] CPU#9 Utilization every 4s during lockup: > [ 2987.488941] #1: 0% system, 0% softirq, 100% hardirq, 0% idle > [ 2987.489357] #2: 0% system, 0% softirq, 100% hardirq, 0% idle > [ 2987.489771] #3: 0% system, 0% softirq, 100% hardirq, 0% idle > [ 2987.490186] #4: 0% system, 0% softirq, 100% hardirq, 0% idle > [ 2987.490601] #5: 0% system, 0% softirq, 100% hardirq, 0% idle > [ 2987.491034] CPU#9 Detect HardIRQ Time exceeds 50%. Most frequent HardIRQs: > [ 2987.491493] #1: 330985 irq#7(IPI) > [ 2987.491743] #2: 5000 irq#10(arch_timer) > [ 2987.492039] #3: 9 irq#91(nvme0q2) > [ 2987.492318] #4: 3 irq#118(virtio1-output.12) > ... > [ 2987.492728] Call trace: > [ 2987.492729] __do_softirq+0xa8/0x364 > > Signed-off-by: Bitao Hu > --- > kernel/watchdog.c | 150 ++++++++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 150 insertions(+) > > diff --git a/kernel/watchdog.c b/kernel/watchdog.c > index 0efe9604c3c2..38fb18e17d71 100644 > --- a/kernel/watchdog.c > +++ b/kernel/watchdog.c > @@ -25,6 +25,9 @@ > #include > #include > #include > +#include > +#include > +#include > > #include > #include > @@ -431,11 +434,15 @@ void touch_softlockup_watchdog_sync(void) > __this_cpu_write(watchdog_report_ts, SOFTLOCKUP_DELAY_REPORT); > } > > +static void set_potential_softlockup(unsigned long now, unsigned long touch_ts); > + > static int is_softlockup(unsigned long touch_ts, > unsigned long period_ts, > unsigned long now) > { > if ((watchdog_enabled & WATCHDOG_SOFTOCKUP_ENABLED) && watchdog_thresh) { > + /* Softlockup may occur in the current period */ > + set_potential_softlockup(now, period_ts); > /* Warn about unreasonable delays. */ > if (time_after(now, period_ts + get_softlockup_thresh())) > return now - touch_ts; > @@ -457,6 +464,8 @@ static enum cpu_usage_stat idx_to_stat[NUM_STATS_PER_GROUP] = { > CPUTIME_SYSTEM, CPUTIME_SOFTIRQ, CPUTIME_IRQ, CPUTIME_IDLE > }; > > +static void print_hardirq_counts(void); > + > static void update_cpustat(void) > { > u8 i; > @@ -504,10 +513,150 @@ static void print_cpustat(void) > utilization[i][STATS_SYSTEM], utilization[i][STATS_SOFTIRQ], > utilization[i][STATS_HARDIRQ], utilization[i][STATS_IDLE]); > } > + print_hardirq_counts(); > +} > + > +#define HARDIRQ_PERCENT_THRESH 50 > +#define NUM_HARDIRQ_REPORT 5 > +static DECLARE_BITMAP(softlockup_hardirq_cpus, CONFIG_NR_CPUS); > +static DEFINE_PER_CPU(u32 *, hardirq_counts); > + > +static void find_counts_top(u32 *irq_counts, int *irq, u32 perirq_counts, int perirq_id, int range) > +{ > + unsigned int i, j; > + > + for (i = 0; i < range; i++) { > + if (perirq_counts > irq_counts[i]) { > + for (j = range - 1; j > i; j--) { > + irq_counts[j] = irq_counts[j - 1]; > + irq[j] = irq[j - 1]; > + } > + irq_counts[j] = perirq_counts; > + irq[j] = perirq_id; > + break; > + } > + } > +} > + > +/* > + * If the proportion of time spent handling irq exceeds HARDIRQ_PERCENT_THRESH% > + * during sample_period, then it is necessary to record the counts of each irq. > + */ > +static inline bool need_record_irq_counts(int type) > +{ > + int tail = this_cpu_read(cpustat_tail); > + u8 utilization; > + > + if (--tail == -1) > + tail = 4; > + utilization = this_cpu_read(cpustat_utilization[tail][type]); > + return utilization > HARDIRQ_PERCENT_THRESH; > } > + > +/* > + * Mark softlockup as potentially caused by hardirq > + */ > +static void set_potential_softlockup_hardirq(void) > +{ > + u32 i; > + u32 *counts = __this_cpu_read(hardirq_counts); > + int cpu = smp_processor_id(); > + struct irq_desc *desc; > + > + if (!need_record_irq_counts(STATS_HARDIRQ)) > + return; > + > + if (!test_bit(cpu, softlockup_hardirq_cpus)) { > + counts = kmalloc_array(nr_irqs, sizeof(u32), GFP_ATOMIC); > + if (!counts) > + return; > + for_each_irq_desc(i, desc) { > + if (!desc) > + continue; > + counts[i] = desc->kstat_irqs ? > + *this_cpu_ptr(desc->kstat_irqs) : 0; > + } > + __this_cpu_write(hardirq_counts, counts); > + set_bit(cpu, softlockup_hardirq_cpus); > + } > +} > + > +static void clear_potential_softlockup_hardirq(void) > +{ > + u32 *counts = __this_cpu_read(hardirq_counts); > + int cpu = smp_processor_id(); > + > + if (test_bit(cpu, softlockup_hardirq_cpus)) { > + kfree(counts); > + counts = NULL; > + __this_cpu_write(hardirq_counts, counts); > + clear_bit(cpu, softlockup_hardirq_cpus); > + } > +} > + > +/* > + * Mark that softlockup may occur > + */ > +static void set_potential_softlockup(unsigned long now, unsigned long period_ts) > +{ > + if (time_after_eq(now, period_ts + get_softlockup_thresh() / 5)) > + set_potential_softlockup_hardirq(); > +} > + > +static void clear_potential_softlockup(void) > +{ > + clear_potential_softlockup_hardirq(); > +} > + > +static void print_hardirq_counts(void) > +{ > + u32 i; > + struct irq_desc *desc; > + u32 counts_diff; > + u32 *counts = __this_cpu_read(hardirq_counts); > + int cpu = smp_processor_id(); > + u32 hardirq_counts_top[NUM_HARDIRQ_REPORT] = {0, 0, 0, 0, 0}; > + int hardirq_top[NUM_HARDIRQ_REPORT] = {-1, -1, -1, -1, -1}; "hardirq_counts_top" and "hardirq_top" seem like two members of a struct, working together to record the most suspicious irq, so wouldn't using a struct make it clearer? > + > + if (test_bit(cpu, softlockup_hardirq_cpus)) { > + /* Find the top NUM_HARDIRQ_REPORT most frequent interrupts */ > + for_each_irq_desc(i, desc) { > + if (!desc) > + continue; > + counts_diff = desc->kstat_irqs ? > + *this_cpu_ptr(desc->kstat_irqs) - counts[i] : 0; > + find_counts_top(hardirq_counts_top, hardirq_top, > + counts_diff, i, NUM_HARDIRQ_REPORT); > + } > + /* > + * We do not want the "watchdog: " prefix on every line, > + * hence we use "printk" instead of "pr_crit". > + */ > + printk(KERN_CRIT "CPU#%d Detect HardIRQ Time exceeds %d%%. Most frequent HardIRQs:\n", > + smp_processor_id(), HARDIRQ_PERCENT_THRESH); > + for (i = 0; i < NUM_HARDIRQ_REPORT; i++) { > + if (hardirq_top[i] == -1) > + break; > + desc = irq_to_desc(hardirq_top[i]); > + if (desc && desc->action) > + printk(KERN_CRIT "\t#%u: %-10u\tirq#%d(%s)\n", > + i+1, hardirq_counts_top[i], > + hardirq_top[i], desc->action->name); > + else > + printk(KERN_CRIT "\t#%u: %-10u\tirq#%d\n", > + i+1, hardirq_counts_top[i], > + hardirq_top[i]); > + } > + if (!need_record_irq_counts(STATS_HARDIRQ)) > + clear_potential_softlockup_hardirq(); > + } > +} > + > #else > static inline void update_cpustat(void) { } > static inline void print_cpustat(void) { } > +static inline void set_potential_softlockup(unsigned long now, unsigned long period_ts) { } > +static inline void clear_potential_softlockup(void) { } > #endif > > /* watchdog detector functions */ > @@ -525,6 +674,7 @@ static DEFINE_PER_CPU(struct cpu_stop_work, softlockup_stop_work); > static int softlockup_fn(void *data) > { > update_touch_ts(); > + clear_potential_softlockup(); > complete(this_cpu_ptr(&softlockup_completion)); > > return 0;