Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp1582052rdb; Wed, 31 Jan 2024 03:10:12 -0800 (PST) X-Google-Smtp-Source: AGHT+IHrET1kPau0M3LU6KMiAOgqonBksHoiiQ2S+gL1SPa22mIORFx0BuHmiC/jIjQ/mzUchurZ X-Received: by 2002:a05:6402:1215:b0:55e:fc56:ad9a with SMTP id c21-20020a056402121500b0055efc56ad9amr822679edw.30.1706699411948; Wed, 31 Jan 2024 03:10:11 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706699411; cv=pass; d=google.com; s=arc-20160816; b=lR4wiCJXnWMwb26rsI6IW+HaKy5jG+9jm1rIdQdDRorJkM2kJK2G3hmKtGZxCIYxPS lQySKes/CICCjQ/YUy+uL+8jBdy/3FtlsvePslyWdp8GNlz4xBg1aNbB9EMz7OnISmC5 E3gHVp8IFL9hTLTxodDM1ZqvPz81Dx2Legzklj+N1UisQPMwStk1YBY27cHSHlZoNaOZ Z0LPQIx66qo1Gl4xXugU5cS/2C3S/oEtsTqM0iFtHaApfmDhoK+bhaOG19G4TeJdVPul fAW+hQd40oBzG/Lnqf5o/ur3FwgbepZ37xOM2dj4x42Kwq36ThNOHwaT1aO5bhL1RZqv 4bkg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id:dkim-signature; bh=BtDpBlYrJT19LLzhatnciKlO7Bh7yEt22vXAZTHidUc=; fh=5Ru8qTpG4EOKnnuBTIq1sgbLowUm14ctst2XV2A8vDI=; b=HjTzlMXD1MfaIvVRwItNKMGqCGR/9YS6AdllY18kYN5IIyBnSqj2c3l2JA/wAx5bV6 qgBUWQb/9VYzuRcTOtplLJcRD2qUxFGmdZMZwiHyZmXO04FuR4JpecJ5sjEkqzqfh4LJ O+weqyVwvdpEWZuZ1I6SwRcGX5gre0OHrIVA1VnAasp9Cy5zneStyh2qVfEPdN4qv4rn bD3ZZnhFqd7OvVshav6SZ8Ue0D3eXA159+Zae+zMN70KQg/YFwG5SbzJSnegLUwiOhpE M+6377/8hLk/H1Kef5isBmpDjm3yLe1xmQgvm0lrJTfBKjZYdbtzpSBWnNxOrFKZm7x1 Wcsw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linux.alibaba.com header.s=default header.b=YaP5S3Lk; arc=pass (i=1 spf=pass spfdomain=linux.alibaba.com dkim=pass dkdomain=linux.alibaba.com dmarc=pass fromdomain=linux.alibaba.com); spf=pass (google.com: domain of linux-kernel+bounces-46315-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-46315-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.alibaba.com X-Forwarded-Encrypted: i=1; AJvYcCU+h0IrxPc6P0/eAiNGm59UyibkNjd1XL+qYuFGUbeFb8qI/6nufmWmmfYrhkVHaTbti98hNg1SRI2H1alo/07uY67BZ00LMx+MB8KGZQ== Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id 10-20020a50874a000000b0055e23113314si4800004edv.657.2024.01.31.03.10.11 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 31 Jan 2024 03:10:11 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-46315-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.alibaba.com header.s=default header.b=YaP5S3Lk; arc=pass (i=1 spf=pass spfdomain=linux.alibaba.com dkim=pass dkdomain=linux.alibaba.com dmarc=pass fromdomain=linux.alibaba.com); spf=pass (google.com: domain of linux-kernel+bounces-46315-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-46315-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.alibaba.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 04E461F21298 for ; Wed, 31 Jan 2024 11:09:40 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9178371B34; Wed, 31 Jan 2024 11:08:44 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b="YaP5S3Lk" Received: from out30-132.freemail.mail.aliyun.com (out30-132.freemail.mail.aliyun.com [115.124.30.132]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 8E34D6EB4A for ; Wed, 31 Jan 2024 11:08:39 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=115.124.30.132 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706699323; cv=none; b=BNxU9h/UT06cuP3sI7SvEGJwRuGiSgEmQBNLowh0b+B3kx3634Jr2zZa9Wk4NZJuiRkr2UTMdFijQvW/kIGp+nBxCc9ZB2Exx8RlekbmIDZ+4fQR0HTDbnyouRfkVy6TbCtuxr0TVNb4229Qo3XSWxOQ7OO/cqRVruJK2QN4W0Q= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706699323; c=relaxed/simple; bh=HY58CsLPzA1lVXcWNzUEh1Thv5YQ2zaWtkVZl330PLE=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=dAimET/9gptKn0A79jIvItbzGiUY2t3wdMuWBz5pEvG+K78QveUzeEmllfm8trS0BXL9iNp8I75V/Tb3YDEUcxT11WNfBlzniNj3XbpP40HZ4nh0ll/3MZe+wfuwf8vVGuGWdcFoxbkAWBkcbLBBIuytoXVZAlzkocckm9yrRQk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com; spf=pass smtp.mailfrom=linux.alibaba.com; dkim=pass (1024-bit key) header.d=linux.alibaba.com header.i=@linux.alibaba.com header.b=YaP5S3Lk; arc=none smtp.client-ip=115.124.30.132 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linux.alibaba.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linux.alibaba.com DKIM-Signature:v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.alibaba.com; s=default; t=1706699318; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type; bh=BtDpBlYrJT19LLzhatnciKlO7Bh7yEt22vXAZTHidUc=; b=YaP5S3LkYjY87l8CaimLEua3xQlOWmg0Kr7xasXQZnEfbQ3co7a7ipguUXEHIMj5DolB3HIoOlNBsoJ2nGXl4vJx8P95Oe9vHNghglDXilH2/iJ/JK7v1rlOD6d+oqSuTwEn4EIsho5LRXRSEgQinZS449v9mP5yl2htpVC19K0= X-Alimail-AntiSpam:AC=PASS;BC=-1|-1;BR=01201311R211e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018046059;MF=yaoma@linux.alibaba.com;NM=1;PH=DS;RN=8;SR=0;TI=SMTPD_---0W.jNxow_1706699316; Received: from 30.178.67.117(mailfrom:yaoma@linux.alibaba.com fp:SMTPD_---0W.jNxow_1706699316) by smtp.aliyun-inc.com; Wed, 31 Jan 2024 19:08:37 +0800 Message-ID: Date: Wed, 31 Jan 2024 19:08:36 +0800 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCHv2 2/2] watchdog/softlockup: report the most frequent interrupts Content-Language: en-US To: Liu Song , dianders@chromium.org, akpm@linux-foundation.org, pmladek@suse.com, lecopzer.chen@mediatek.com, kernelfans@gmail.com Cc: linux-kernel@vger.kernel.org, yaoma@linux.alibaba.com References: <20240130074744.45759-1-yaoma@linux.alibaba.com> <20240130074744.45759-3-yaoma@linux.alibaba.com> From: Bitao Hu In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit On 2024/1/31 09:50, Liu Song wrote: > > 在 2024/1/30 15:47, Bitao Hu 写道: >> When the watchdog determines that the current soft lockup is due >> to an interrupt storm based on CPU utilization, reporting the >> most frequent interrupts could be good enough for further >> troubleshooting. >> >> Below is an example of interrupt storm. The call tree does not >> provide useful information, but we can analyze which interrupt >> caused the soft lockup by comparing the counts of interrupts. >> >> [ 2987.488075] watchdog: BUG: soft lockup - CPU#9 stuck for 23s! >> [kworker/9:1:214] >> [ 2987.488607] CPU#9 Utilization every 4s during lockup: >> [ 2987.488941]  #1:   0% system,          0% softirq,   100% >> hardirq,     0% idle >> [ 2987.489357]  #2:   0% system,          0% softirq,   100% >> hardirq,     0% idle >> [ 2987.489771]  #3:   0% system,          0% softirq,   100% >> hardirq,     0% idle >> [ 2987.490186]  #4:   0% system,          0% softirq,   100% >> hardirq,     0% idle >> [ 2987.490601]  #5:   0% system,          0% softirq,   100% >> hardirq,     0% idle >> [ 2987.491034] CPU#9 Detect HardIRQ Time exceeds 50%. Most frequent >> HardIRQs: >> [ 2987.491493]  #1: 330985      irq#7(IPI) >> [ 2987.491743]  #2: 5000        irq#10(arch_timer) >> [ 2987.492039]  #3: 9           irq#91(nvme0q2) >> [ 2987.492318]  #4: 3           irq#118(virtio1-output.12) >> ... >> [ 2987.492728] Call trace: >> [ 2987.492729]  __do_softirq+0xa8/0x364 >> >> Signed-off-by: Bitao Hu >> --- >>   kernel/watchdog.c | 150 ++++++++++++++++++++++++++++++++++++++++++++++ >>   1 file changed, 150 insertions(+) >> >> diff --git a/kernel/watchdog.c b/kernel/watchdog.c >> index 0efe9604c3c2..38fb18e17d71 100644 >> --- a/kernel/watchdog.c >> +++ b/kernel/watchdog.c >> @@ -25,6 +25,9 @@ >>   #include >>   #include >>   #include >> +#include >> +#include >> +#include >>   #include >>   #include >> @@ -431,11 +434,15 @@ void touch_softlockup_watchdog_sync(void) >>       __this_cpu_write(watchdog_report_ts, SOFTLOCKUP_DELAY_REPORT); >>   } >> +static void set_potential_softlockup(unsigned long now, unsigned long >> touch_ts); >> + >>   static int is_softlockup(unsigned long touch_ts, >>                unsigned long period_ts, >>                unsigned long now) >>   { >>       if ((watchdog_enabled & WATCHDOG_SOFTOCKUP_ENABLED) && >> watchdog_thresh) { >> +        /* Softlockup may occur in the current period */ >> +        set_potential_softlockup(now, period_ts); >>           /* Warn about unreasonable delays. */ >>           if (time_after(now, period_ts + get_softlockup_thresh())) >>               return now - touch_ts; >> @@ -457,6 +464,8 @@ static enum cpu_usage_stat >> idx_to_stat[NUM_STATS_PER_GROUP] = { >>       CPUTIME_SYSTEM, CPUTIME_SOFTIRQ, CPUTIME_IRQ, CPUTIME_IDLE >>   }; >> +static void print_hardirq_counts(void); >> + >>   static void update_cpustat(void) >>   { >>       u8 i; >> @@ -504,10 +513,150 @@ static void print_cpustat(void) >>               utilization[i][STATS_SYSTEM], >> utilization[i][STATS_SOFTIRQ], >>               utilization[i][STATS_HARDIRQ], utilization[i][STATS_IDLE]); >>       } >> +    print_hardirq_counts(); >> +} >> + >> +#define HARDIRQ_PERCENT_THRESH        50 >> +#define NUM_HARDIRQ_REPORT        5 >> +static DECLARE_BITMAP(softlockup_hardirq_cpus, CONFIG_NR_CPUS); >> +static DEFINE_PER_CPU(u32 *, hardirq_counts); >> + >> +static void find_counts_top(u32 *irq_counts, int *irq, u32 >> perirq_counts, int perirq_id, int range) >> +{ >> +    unsigned int i, j; >> + >> +    for (i = 0; i < range; i++) { >> +        if (perirq_counts > irq_counts[i]) { >> +            for (j = range - 1; j > i; j--) { >> +                irq_counts[j] = irq_counts[j - 1]; >> +                irq[j] = irq[j - 1]; >> +            } >> +            irq_counts[j] = perirq_counts; >> +            irq[j] = perirq_id; >> +            break; >> +        } >> +    } >> +} >> + >> +/* >> + * If the proportion of time spent handling irq exceeds >> HARDIRQ_PERCENT_THRESH% >> + * during sample_period, then it is necessary to record the counts of >> each irq. >> + */ >> +static inline bool need_record_irq_counts(int type) >> +{ >> +    int tail = this_cpu_read(cpustat_tail); >> +    u8 utilization; >> + >> +    if (--tail == -1) >> +        tail = 4; >> +    utilization = this_cpu_read(cpustat_utilization[tail][type]); >> +    return utilization > HARDIRQ_PERCENT_THRESH; >>   } >> + >> +/* >> + * Mark softlockup as potentially caused by hardirq >> + */ >> +static void set_potential_softlockup_hardirq(void) >> +{ >> +    u32 i; >> +    u32 *counts = __this_cpu_read(hardirq_counts); >> +    int cpu = smp_processor_id(); >> +    struct irq_desc *desc; >> + >> +    if (!need_record_irq_counts(STATS_HARDIRQ)) >> +        return; >> + >> +    if (!test_bit(cpu, softlockup_hardirq_cpus)) { >> +        counts = kmalloc_array(nr_irqs, sizeof(u32), GFP_ATOMIC); >> +        if (!counts) >> +            return; >> +        for_each_irq_desc(i, desc) { >> +            if (!desc) >> +                continue; >> +            counts[i] = desc->kstat_irqs ? >> +                *this_cpu_ptr(desc->kstat_irqs) : 0; >> +        } >> +        __this_cpu_write(hardirq_counts, counts); >> +        set_bit(cpu, softlockup_hardirq_cpus); >> +    } >> +} >> + >> +static void clear_potential_softlockup_hardirq(void) >> +{ >> +    u32 *counts = __this_cpu_read(hardirq_counts); >> +    int cpu = smp_processor_id(); >> + >> +    if (test_bit(cpu, softlockup_hardirq_cpus)) { >> +        kfree(counts); >> +        counts = NULL; >> +        __this_cpu_write(hardirq_counts, counts); >> +        clear_bit(cpu, softlockup_hardirq_cpus); >> +    } >> +} >> + >> +/* >> + * Mark that softlockup may occur >> + */ >> +static void set_potential_softlockup(unsigned long now, unsigned long >> period_ts) >> +{ >> +    if (time_after_eq(now, period_ts + get_softlockup_thresh() / 5)) >> +        set_potential_softlockup_hardirq(); >> +} >> + >> +static void clear_potential_softlockup(void) >> +{ >> +    clear_potential_softlockup_hardirq(); >> +} >> + >> +static void print_hardirq_counts(void) >> +{ >> +    u32 i; >> +    struct irq_desc *desc; >> +    u32 counts_diff; >> +    u32 *counts = __this_cpu_read(hardirq_counts); >> +    int cpu = smp_processor_id(); >> +    u32 hardirq_counts_top[NUM_HARDIRQ_REPORT] = {0, 0, 0, 0, 0}; >> +    int hardirq_top[NUM_HARDIRQ_REPORT] = {-1, -1, -1, -1, -1}; > "hardirq_counts_top" and "hardirq_top" seem like two members of a struct, > working together to record the most suspicious irq, so wouldn't using a > struct make it clearer? OK, I will define a struct. >> + >> +    if (test_bit(cpu, softlockup_hardirq_cpus)) { >> +        /* Find the top NUM_HARDIRQ_REPORT most frequent interrupts */ >> +        for_each_irq_desc(i, desc) { >> +            if (!desc) >> +                continue; >> +            counts_diff = desc->kstat_irqs ? >> +                *this_cpu_ptr(desc->kstat_irqs) - counts[i] : 0; >> +            find_counts_top(hardirq_counts_top, hardirq_top, >> +                    counts_diff, i, NUM_HARDIRQ_REPORT); >> +        } >> +        /* >> +         * We do not want the "watchdog: " prefix on every line, >> +         * hence we use "printk" instead of "pr_crit". >> +         */ >> +        printk(KERN_CRIT "CPU#%d Detect HardIRQ Time exceeds %d%%. >> Most frequent HardIRQs:\n", >> +            smp_processor_id(), HARDIRQ_PERCENT_THRESH); >> +        for (i = 0; i < NUM_HARDIRQ_REPORT; i++) { >> +            if (hardirq_top[i] == -1) >> +                break; >> +            desc = irq_to_desc(hardirq_top[i]); >> +            if (desc && desc->action) >> +                printk(KERN_CRIT "\t#%u: %-10u\tirq#%d(%s)\n", >> +                    i+1, hardirq_counts_top[i], >> +                    hardirq_top[i], desc->action->name); >> +            else >> +                printk(KERN_CRIT "\t#%u: %-10u\tirq#%d\n", >> +                    i+1, hardirq_counts_top[i], >> +                    hardirq_top[i]); >> +        } >> +        if (!need_record_irq_counts(STATS_HARDIRQ)) >> +            clear_potential_softlockup_hardirq(); >> +    } >> +} >> + >>   #else >>   static inline void update_cpustat(void) { } >>   static inline void print_cpustat(void) { } >> +static inline void set_potential_softlockup(unsigned long now, >> unsigned long period_ts) { } >> +static inline void clear_potential_softlockup(void) { } >>   #endif >>   /* watchdog detector functions */ >> @@ -525,6 +674,7 @@ static DEFINE_PER_CPU(struct cpu_stop_work, >> softlockup_stop_work); >>   static int softlockup_fn(void *data) >>   { >>       update_touch_ts(); >> +    clear_potential_softlockup(); >>       complete(this_cpu_ptr(&softlockup_completion)); >>       return 0;