2019-01-17 18:41:31 +00:00
|
|
|
// SPDX-License-Identifier: GPL-2.0+
|
2014-01-27 19:49:39 +00:00
|
|
|
/*
|
|
|
|
* Common functions for in-kernel torture tests.
|
|
|
|
*
|
|
|
|
* Copyright (C) IBM Corporation, 2014
|
|
|
|
*
|
2019-01-17 18:41:31 +00:00
|
|
|
* Author: Paul E. McKenney <paulmck@linux.ibm.com>
|
2014-01-27 19:49:39 +00:00
|
|
|
* Based on kernel/rcu/torture.c.
|
|
|
|
*/
|
2018-05-15 19:25:05 +00:00
|
|
|
|
|
|
|
#define pr_fmt(fmt) fmt
|
|
|
|
|
2014-01-27 19:49:39 +00:00
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/kthread.h>
|
|
|
|
#include <linux/err.h>
|
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <linux/smp.h>
|
|
|
|
#include <linux/interrupt.h>
|
|
|
|
#include <linux/sched.h>
|
2017-02-01 15:36:40 +00:00
|
|
|
#include <linux/sched/clock.h>
|
2014-01-27 19:49:39 +00:00
|
|
|
#include <linux/atomic.h>
|
|
|
|
#include <linux/bitops.h>
|
|
|
|
#include <linux/completion.h>
|
|
|
|
#include <linux/moduleparam.h>
|
|
|
|
#include <linux/percpu.h>
|
|
|
|
#include <linux/notifier.h>
|
|
|
|
#include <linux/reboot.h>
|
|
|
|
#include <linux/freezer.h>
|
|
|
|
#include <linux/cpu.h>
|
|
|
|
#include <linux/delay.h>
|
|
|
|
#include <linux/stat.h>
|
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/trace_clock.h>
|
2016-06-18 14:45:43 +00:00
|
|
|
#include <linux/ktime.h>
|
2014-01-27 19:49:39 +00:00
|
|
|
#include <asm/byteorder.h>
|
|
|
|
#include <linux/torture.h>
|
2023-06-02 22:02:10 +00:00
|
|
|
#include <linux/sched/rt.h>
|
2017-10-04 18:23:10 +00:00
|
|
|
#include "rcu/rcu.h"
|
2014-01-27 19:49:39 +00:00
|
|
|
|
2024-05-18 23:18:39 +00:00
|
|
|
MODULE_DESCRIPTION("Common functions for in-kernel torture tests");
|
2014-01-27 19:49:39 +00:00
|
|
|
MODULE_LICENSE("GPL");
|
2019-01-17 18:41:31 +00:00
|
|
|
MODULE_AUTHOR("Paul E. McKenney <paulmck@linux.ibm.com>");
|
2014-01-27 19:49:39 +00:00
|
|
|
|
2019-12-06 23:02:59 +00:00
|
|
|
static bool disable_onoff_at_boot;
|
|
|
|
module_param(disable_onoff_at_boot, bool, 0444);
|
|
|
|
|
2020-06-16 22:38:24 +00:00
|
|
|
static bool ftrace_dump_at_shutdown;
|
|
|
|
module_param(ftrace_dump_at_shutdown, bool, 0444);
|
|
|
|
|
2020-11-25 21:00:04 +00:00
|
|
|
static int verbose_sleep_frequency;
|
|
|
|
module_param(verbose_sleep_frequency, int, 0444);
|
|
|
|
|
|
|
|
static int verbose_sleep_duration = 1;
|
|
|
|
module_param(verbose_sleep_duration, int, 0444);
|
|
|
|
|
2023-06-02 22:02:09 +00:00
|
|
|
static int random_shuffle;
|
|
|
|
module_param(random_shuffle, int, 0444);
|
|
|
|
|
2014-01-30 21:38:09 +00:00
|
|
|
static char *torture_type;
|
2018-05-09 17:29:18 +00:00
|
|
|
static int verbose;
|
2014-01-30 21:38:09 +00:00
|
|
|
|
2014-01-30 23:49:29 +00:00
|
|
|
/* Mediate rmmod and system shutdown. Concurrent rmmod & shutdown illegal! */
|
|
|
|
#define FULLSTOP_DONTSTOP 0 /* Normal operation. */
|
|
|
|
#define FULLSTOP_SHUTDOWN 1 /* System shutdown with torture running. */
|
|
|
|
#define FULLSTOP_RMMOD 2 /* Normal rmmod of torture. */
|
|
|
|
static int fullstop = FULLSTOP_RMMOD;
|
2014-01-30 23:37:19 +00:00
|
|
|
static DEFINE_MUTEX(fullstop_mutex);
|
2014-01-29 15:40:27 +00:00
|
|
|
|
2020-11-25 21:00:04 +00:00
|
|
|
static atomic_t verbose_sleep_counter;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Sleep if needed from VERBOSE_TOROUT*().
|
|
|
|
*/
|
|
|
|
void verbose_torout_sleep(void)
|
|
|
|
{
|
|
|
|
if (verbose_sleep_frequency > 0 &&
|
|
|
|
verbose_sleep_duration > 0 &&
|
|
|
|
!(atomic_inc_return(&verbose_sleep_counter) % verbose_sleep_frequency))
|
|
|
|
schedule_timeout_uninterruptible(verbose_sleep_duration);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(verbose_torout_sleep);
|
|
|
|
|
2020-11-17 19:30:18 +00:00
|
|
|
/*
|
|
|
|
* Schedule a high-resolution-timer sleep in nanoseconds, with a 32-bit
|
|
|
|
* nanosecond random fuzz. This function and its friends desynchronize
|
|
|
|
* testing from the timer wheel.
|
|
|
|
*/
|
2023-07-26 20:57:03 +00:00
|
|
|
int torture_hrtimeout_ns(ktime_t baset_ns, u32 fuzzt_ns, const enum hrtimer_mode mode,
|
|
|
|
struct torture_random_state *trsp)
|
2020-11-17 19:30:18 +00:00
|
|
|
{
|
|
|
|
ktime_t hto = baset_ns;
|
|
|
|
|
|
|
|
if (trsp)
|
2023-07-12 21:56:51 +00:00
|
|
|
hto += torture_random(trsp) % fuzzt_ns;
|
2023-06-26 21:59:29 +00:00
|
|
|
set_current_state(TASK_IDLE);
|
2023-07-26 20:57:03 +00:00
|
|
|
return schedule_hrtimeout(&hto, mode);
|
2020-11-17 19:30:18 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_hrtimeout_ns);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Schedule a high-resolution-timer sleep in microseconds, with a 32-bit
|
|
|
|
* nanosecond (not microsecond!) random fuzz.
|
|
|
|
*/
|
|
|
|
int torture_hrtimeout_us(u32 baset_us, u32 fuzzt_ns, struct torture_random_state *trsp)
|
|
|
|
{
|
|
|
|
ktime_t baset_ns = baset_us * NSEC_PER_USEC;
|
|
|
|
|
2023-07-26 20:57:03 +00:00
|
|
|
return torture_hrtimeout_ns(baset_ns, fuzzt_ns, HRTIMER_MODE_REL, trsp);
|
2020-11-17 19:30:18 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_hrtimeout_us);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Schedule a high-resolution-timer sleep in milliseconds, with a 32-bit
|
|
|
|
* microsecond (not millisecond!) random fuzz.
|
|
|
|
*/
|
|
|
|
int torture_hrtimeout_ms(u32 baset_ms, u32 fuzzt_us, struct torture_random_state *trsp)
|
|
|
|
{
|
|
|
|
ktime_t baset_ns = baset_ms * NSEC_PER_MSEC;
|
|
|
|
u32 fuzzt_ns;
|
|
|
|
|
|
|
|
if ((u32)~0U / NSEC_PER_USEC < fuzzt_us)
|
|
|
|
fuzzt_ns = (u32)~0U;
|
|
|
|
else
|
|
|
|
fuzzt_ns = fuzzt_us * NSEC_PER_USEC;
|
2023-07-26 20:57:03 +00:00
|
|
|
return torture_hrtimeout_ns(baset_ns, fuzzt_ns, HRTIMER_MODE_REL, trsp);
|
2020-11-17 19:30:18 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_hrtimeout_ms);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Schedule a high-resolution-timer sleep in jiffies, with an
|
|
|
|
* implied one-jiffy random fuzz. This is intended to replace calls to
|
|
|
|
* schedule_timeout_interruptible() and friends.
|
|
|
|
*/
|
|
|
|
int torture_hrtimeout_jiffies(u32 baset_j, struct torture_random_state *trsp)
|
|
|
|
{
|
|
|
|
ktime_t baset_ns = jiffies_to_nsecs(baset_j);
|
|
|
|
|
2023-07-26 20:57:03 +00:00
|
|
|
return torture_hrtimeout_ns(baset_ns, jiffies_to_nsecs(1), HRTIMER_MODE_REL, trsp);
|
2020-11-17 19:30:18 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_hrtimeout_jiffies);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Schedule a high-resolution-timer sleep in milliseconds, with a 32-bit
|
|
|
|
* millisecond (not second!) random fuzz.
|
|
|
|
*/
|
|
|
|
int torture_hrtimeout_s(u32 baset_s, u32 fuzzt_ms, struct torture_random_state *trsp)
|
|
|
|
{
|
|
|
|
ktime_t baset_ns = baset_s * NSEC_PER_SEC;
|
|
|
|
u32 fuzzt_ns;
|
|
|
|
|
|
|
|
if ((u32)~0U / NSEC_PER_MSEC < fuzzt_ms)
|
|
|
|
fuzzt_ns = (u32)~0U;
|
|
|
|
else
|
|
|
|
fuzzt_ns = fuzzt_ms * NSEC_PER_MSEC;
|
2023-07-26 20:57:03 +00:00
|
|
|
return torture_hrtimeout_ns(baset_ns, fuzzt_ns, HRTIMER_MODE_REL, trsp);
|
2020-11-17 19:30:18 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_hrtimeout_s);
|
|
|
|
|
2014-01-28 23:58:22 +00:00
|
|
|
#ifdef CONFIG_HOTPLUG_CPU
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Variables for online-offline handling. Only present if CPU hotplug
|
|
|
|
* is enabled, otherwise does nothing.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static struct task_struct *onoff_task;
|
|
|
|
static long onoff_holdoff;
|
|
|
|
static long onoff_interval;
|
2018-12-10 17:44:52 +00:00
|
|
|
static torture_ofl_func *onoff_f;
|
2014-01-28 23:58:22 +00:00
|
|
|
static long n_offline_attempts;
|
|
|
|
static long n_offline_successes;
|
|
|
|
static unsigned long sum_offline;
|
|
|
|
static int min_offline = -1;
|
|
|
|
static int max_offline;
|
|
|
|
static long n_online_attempts;
|
|
|
|
static long n_online_successes;
|
|
|
|
static unsigned long sum_online;
|
|
|
|
static int min_online = -1;
|
|
|
|
static int max_online;
|
|
|
|
|
2020-12-19 15:34:35 +00:00
|
|
|
static int torture_online_cpus = NR_CPUS;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Some torture testing leverages confusion as to the number of online
|
|
|
|
* CPUs. This function returns the torture-testing view of this number,
|
|
|
|
* which allows torture tests to load-balance appropriately.
|
|
|
|
*/
|
|
|
|
int torture_num_online_cpus(void)
|
|
|
|
{
|
|
|
|
return READ_ONCE(torture_online_cpus);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_num_online_cpus);
|
|
|
|
|
2016-04-21 00:18:41 +00:00
|
|
|
/*
|
|
|
|
* Attempt to take a CPU offline. Return false if the CPU is already
|
|
|
|
* offline or if it is not subject to CPU-hotplug operations. The
|
|
|
|
* caller can detect other failures by looking at the statistics.
|
|
|
|
*/
|
|
|
|
bool torture_offline(int cpu, long *n_offl_attempts, long *n_offl_successes,
|
|
|
|
unsigned long *sum_offl, int *min_offl, int *max_offl)
|
|
|
|
{
|
|
|
|
unsigned long delta;
|
|
|
|
int ret;
|
2019-12-05 18:49:11 +00:00
|
|
|
char *s;
|
2016-04-21 00:18:41 +00:00
|
|
|
unsigned long starttime;
|
|
|
|
|
|
|
|
if (!cpu_online(cpu) || !cpu_is_hotpluggable(cpu))
|
|
|
|
return false;
|
2019-01-23 03:23:00 +00:00
|
|
|
if (num_online_cpus() <= 1)
|
|
|
|
return false; /* Can't offline the last CPU. */
|
2016-04-21 00:18:41 +00:00
|
|
|
|
2018-05-09 17:29:18 +00:00
|
|
|
if (verbose > 1)
|
2016-04-21 00:18:41 +00:00
|
|
|
pr_alert("%s" TORTURE_FLAG
|
|
|
|
"torture_onoff task: offlining %d\n",
|
|
|
|
torture_type, cpu);
|
|
|
|
starttime = jiffies;
|
|
|
|
(*n_offl_attempts)++;
|
2020-03-23 13:51:08 +00:00
|
|
|
ret = remove_cpu(cpu);
|
2016-04-21 00:18:41 +00:00
|
|
|
if (ret) {
|
2019-12-05 18:49:11 +00:00
|
|
|
s = "";
|
|
|
|
if (!rcu_inkernel_boot_has_ended() && ret == -EBUSY) {
|
|
|
|
// PCI probe frequently disables hotplug during boot.
|
|
|
|
(*n_offl_attempts)--;
|
|
|
|
s = " (-EBUSY forgiven during boot)";
|
|
|
|
}
|
2016-04-21 00:18:41 +00:00
|
|
|
if (verbose)
|
|
|
|
pr_alert("%s" TORTURE_FLAG
|
2019-12-05 18:49:11 +00:00
|
|
|
"torture_onoff task: offline %d failed%s: errno %d\n",
|
|
|
|
torture_type, cpu, s, ret);
|
2016-04-21 00:18:41 +00:00
|
|
|
} else {
|
2018-05-09 17:29:18 +00:00
|
|
|
if (verbose > 1)
|
2016-04-21 00:18:41 +00:00
|
|
|
pr_alert("%s" TORTURE_FLAG
|
|
|
|
"torture_onoff task: offlined %d\n",
|
|
|
|
torture_type, cpu);
|
2018-12-10 17:44:52 +00:00
|
|
|
if (onoff_f)
|
|
|
|
onoff_f();
|
2016-04-21 00:18:41 +00:00
|
|
|
(*n_offl_successes)++;
|
|
|
|
delta = jiffies - starttime;
|
2017-06-22 22:38:26 +00:00
|
|
|
*sum_offl += delta;
|
2016-04-21 00:18:41 +00:00
|
|
|
if (*min_offl < 0) {
|
|
|
|
*min_offl = delta;
|
|
|
|
*max_offl = delta;
|
|
|
|
}
|
|
|
|
if (*min_offl > delta)
|
|
|
|
*min_offl = delta;
|
|
|
|
if (*max_offl < delta)
|
|
|
|
*max_offl = delta;
|
2020-12-19 15:34:35 +00:00
|
|
|
WRITE_ONCE(torture_online_cpus, torture_online_cpus - 1);
|
|
|
|
WARN_ON_ONCE(torture_online_cpus <= 0);
|
2016-04-21 00:18:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_offline);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Attempt to bring a CPU online. Return false if the CPU is already
|
|
|
|
* online or if it is not subject to CPU-hotplug operations. The
|
|
|
|
* caller can detect other failures by looking at the statistics.
|
|
|
|
*/
|
|
|
|
bool torture_online(int cpu, long *n_onl_attempts, long *n_onl_successes,
|
|
|
|
unsigned long *sum_onl, int *min_onl, int *max_onl)
|
|
|
|
{
|
|
|
|
unsigned long delta;
|
|
|
|
int ret;
|
2019-12-05 18:49:11 +00:00
|
|
|
char *s;
|
2016-04-21 00:18:41 +00:00
|
|
|
unsigned long starttime;
|
|
|
|
|
|
|
|
if (cpu_online(cpu) || !cpu_is_hotpluggable(cpu))
|
|
|
|
return false;
|
|
|
|
|
2018-05-09 17:29:18 +00:00
|
|
|
if (verbose > 1)
|
2016-04-21 00:18:41 +00:00
|
|
|
pr_alert("%s" TORTURE_FLAG
|
|
|
|
"torture_onoff task: onlining %d\n",
|
|
|
|
torture_type, cpu);
|
|
|
|
starttime = jiffies;
|
|
|
|
(*n_onl_attempts)++;
|
2020-03-23 13:51:08 +00:00
|
|
|
ret = add_cpu(cpu);
|
2016-04-21 00:18:41 +00:00
|
|
|
if (ret) {
|
2019-12-05 18:49:11 +00:00
|
|
|
s = "";
|
|
|
|
if (!rcu_inkernel_boot_has_ended() && ret == -EBUSY) {
|
|
|
|
// PCI probe frequently disables hotplug during boot.
|
|
|
|
(*n_onl_attempts)--;
|
|
|
|
s = " (-EBUSY forgiven during boot)";
|
|
|
|
}
|
2016-04-21 00:18:41 +00:00
|
|
|
if (verbose)
|
|
|
|
pr_alert("%s" TORTURE_FLAG
|
2019-12-05 18:49:11 +00:00
|
|
|
"torture_onoff task: online %d failed%s: errno %d\n",
|
|
|
|
torture_type, cpu, s, ret);
|
2016-04-21 00:18:41 +00:00
|
|
|
} else {
|
2018-05-09 17:29:18 +00:00
|
|
|
if (verbose > 1)
|
2016-04-21 00:18:41 +00:00
|
|
|
pr_alert("%s" TORTURE_FLAG
|
|
|
|
"torture_onoff task: onlined %d\n",
|
|
|
|
torture_type, cpu);
|
|
|
|
(*n_onl_successes)++;
|
|
|
|
delta = jiffies - starttime;
|
|
|
|
*sum_onl += delta;
|
|
|
|
if (*min_onl < 0) {
|
|
|
|
*min_onl = delta;
|
|
|
|
*max_onl = delta;
|
|
|
|
}
|
|
|
|
if (*min_onl > delta)
|
|
|
|
*min_onl = delta;
|
|
|
|
if (*max_onl < delta)
|
|
|
|
*max_onl = delta;
|
2020-12-19 15:34:35 +00:00
|
|
|
WRITE_ONCE(torture_online_cpus, torture_online_cpus + 1);
|
2016-04-21 00:18:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_online);
|
|
|
|
|
2020-12-19 15:05:58 +00:00
|
|
|
/*
|
|
|
|
* Get everything online at the beginning and ends of tests.
|
|
|
|
*/
|
|
|
|
static void torture_online_all(char *phase)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
for_each_possible_cpu(cpu) {
|
|
|
|
if (cpu_online(cpu))
|
|
|
|
continue;
|
|
|
|
ret = add_cpu(cpu);
|
|
|
|
if (ret && verbose) {
|
|
|
|
pr_alert("%s" TORTURE_FLAG
|
|
|
|
"%s: %s online %d: errno %d\n",
|
|
|
|
__func__, phase, torture_type, cpu, ret);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-28 23:58:22 +00:00
|
|
|
/*
|
|
|
|
* Execute random CPU-hotplug operations at the interval specified
|
|
|
|
* by the onoff_interval.
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
torture_onoff(void *arg)
|
|
|
|
{
|
|
|
|
int cpu;
|
|
|
|
int maxcpu = -1;
|
|
|
|
DEFINE_TORTURE_RANDOM(rand);
|
|
|
|
|
|
|
|
VERBOSE_TOROUT_STRING("torture_onoff task started");
|
|
|
|
for_each_online_cpu(cpu)
|
|
|
|
maxcpu = cpu;
|
|
|
|
WARN_ON(maxcpu < 0);
|
2020-12-19 15:05:58 +00:00
|
|
|
torture_online_all("Initial");
|
2016-05-02 02:30:00 +00:00
|
|
|
if (maxcpu == 0) {
|
|
|
|
VERBOSE_TOROUT_STRING("Only one CPU, so CPU-hotplug testing is disabled");
|
|
|
|
goto stop;
|
|
|
|
}
|
|
|
|
|
2014-01-28 23:58:22 +00:00
|
|
|
if (onoff_holdoff > 0) {
|
|
|
|
VERBOSE_TOROUT_STRING("torture_onoff begin holdoff");
|
2023-06-26 22:19:56 +00:00
|
|
|
torture_hrtimeout_jiffies(onoff_holdoff, &rand);
|
2014-01-28 23:58:22 +00:00
|
|
|
VERBOSE_TOROUT_STRING("torture_onoff end holdoff");
|
|
|
|
}
|
|
|
|
while (!torture_must_stop()) {
|
2019-12-06 23:02:59 +00:00
|
|
|
if (disable_onoff_at_boot && !rcu_inkernel_boot_has_ended()) {
|
2023-06-26 22:19:56 +00:00
|
|
|
torture_hrtimeout_jiffies(HZ / 10, &rand);
|
2019-12-06 23:02:59 +00:00
|
|
|
continue;
|
|
|
|
}
|
2023-07-12 21:56:51 +00:00
|
|
|
cpu = torture_random(&rand) % (maxcpu + 1);
|
2016-04-21 00:18:41 +00:00
|
|
|
if (!torture_offline(cpu,
|
|
|
|
&n_offline_attempts, &n_offline_successes,
|
|
|
|
&sum_offline, &min_offline, &max_offline))
|
|
|
|
torture_online(cpu,
|
|
|
|
&n_online_attempts, &n_online_successes,
|
|
|
|
&sum_online, &min_online, &max_online);
|
2023-06-26 22:19:56 +00:00
|
|
|
torture_hrtimeout_jiffies(onoff_interval, &rand);
|
2014-01-28 23:58:22 +00:00
|
|
|
}
|
2016-05-02 02:30:00 +00:00
|
|
|
|
|
|
|
stop:
|
2014-02-01 01:37:28 +00:00
|
|
|
torture_kthread_stopping("torture_onoff");
|
2020-12-19 15:05:58 +00:00
|
|
|
torture_online_all("Final");
|
2014-01-28 23:58:22 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* #ifdef CONFIG_HOTPLUG_CPU */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initiate online-offline handling.
|
|
|
|
*/
|
2018-12-10 17:44:52 +00:00
|
|
|
int torture_onoff_init(long ooholdoff, long oointerval, torture_ofl_func *f)
|
2014-01-28 23:58:22 +00:00
|
|
|
{
|
2014-02-03 19:52:27 +00:00
|
|
|
#ifdef CONFIG_HOTPLUG_CPU
|
2014-01-28 23:58:22 +00:00
|
|
|
onoff_holdoff = ooholdoff;
|
|
|
|
onoff_interval = oointerval;
|
2018-12-10 17:44:52 +00:00
|
|
|
onoff_f = f;
|
2014-01-28 23:58:22 +00:00
|
|
|
if (onoff_interval <= 0)
|
|
|
|
return 0;
|
2018-09-22 01:21:31 +00:00
|
|
|
return torture_create_kthread(torture_onoff, NULL, onoff_task);
|
|
|
|
#else /* #ifdef CONFIG_HOTPLUG_CPU */
|
|
|
|
return 0;
|
|
|
|
#endif /* #else #ifdef CONFIG_HOTPLUG_CPU */
|
2014-01-28 23:58:22 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_onoff_init);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Clean up after online/offline testing.
|
|
|
|
*/
|
2014-01-30 22:21:11 +00:00
|
|
|
static void torture_onoff_cleanup(void)
|
2014-01-28 23:58:22 +00:00
|
|
|
{
|
|
|
|
#ifdef CONFIG_HOTPLUG_CPU
|
|
|
|
if (onoff_task == NULL)
|
|
|
|
return;
|
|
|
|
VERBOSE_TOROUT_STRING("Stopping torture_onoff task");
|
|
|
|
kthread_stop(onoff_task);
|
|
|
|
onoff_task = NULL;
|
|
|
|
#endif /* #ifdef CONFIG_HOTPLUG_CPU */
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Print online/offline testing statistics.
|
|
|
|
*/
|
2014-07-14 13:16:15 +00:00
|
|
|
void torture_onoff_stats(void)
|
2014-01-28 23:58:22 +00:00
|
|
|
{
|
|
|
|
#ifdef CONFIG_HOTPLUG_CPU
|
2014-07-14 13:16:15 +00:00
|
|
|
pr_cont("onoff: %ld/%ld:%ld/%ld %d,%d:%d,%d %lu:%lu (HZ=%d) ",
|
|
|
|
n_online_successes, n_online_attempts,
|
|
|
|
n_offline_successes, n_offline_attempts,
|
|
|
|
min_online, max_online,
|
|
|
|
min_offline, max_offline,
|
|
|
|
sum_online, sum_offline, HZ);
|
2014-01-28 23:58:22 +00:00
|
|
|
#endif /* #ifdef CONFIG_HOTPLUG_CPU */
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_onoff_stats);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Were all the online/offline operations successful?
|
|
|
|
*/
|
|
|
|
bool torture_onoff_failures(void)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_HOTPLUG_CPU
|
|
|
|
return n_online_successes != n_online_attempts ||
|
|
|
|
n_offline_successes != n_offline_attempts;
|
|
|
|
#else /* #ifdef CONFIG_HOTPLUG_CPU */
|
|
|
|
return false;
|
|
|
|
#endif /* #else #ifdef CONFIG_HOTPLUG_CPU */
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_onoff_failures);
|
|
|
|
|
2014-01-27 19:49:39 +00:00
|
|
|
#define TORTURE_RANDOM_MULT 39916801 /* prime */
|
|
|
|
#define TORTURE_RANDOM_ADD 479001701 /* prime */
|
|
|
|
#define TORTURE_RANDOM_REFRESH 10000
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Crude but fast random-number generator. Uses a linear congruential
|
|
|
|
* generator, with occasional help from cpu_clock().
|
|
|
|
*/
|
|
|
|
unsigned long
|
|
|
|
torture_random(struct torture_random_state *trsp)
|
|
|
|
{
|
|
|
|
if (--trsp->trs_count < 0) {
|
2022-11-07 02:16:14 +00:00
|
|
|
trsp->trs_state += (unsigned long)local_clock() + raw_smp_processor_id();
|
2014-01-27 19:49:39 +00:00
|
|
|
trsp->trs_count = TORTURE_RANDOM_REFRESH;
|
|
|
|
}
|
|
|
|
trsp->trs_state = trsp->trs_state * TORTURE_RANDOM_MULT +
|
|
|
|
TORTURE_RANDOM_ADD;
|
|
|
|
return swahw32(trsp->trs_state);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_random);
|
2014-01-29 15:40:27 +00:00
|
|
|
|
2014-01-28 23:29:21 +00:00
|
|
|
/*
|
|
|
|
* Variables for shuffling. The idea is to ensure that each CPU stays
|
|
|
|
* idle for an extended period to test interactions with dyntick idle,
|
2017-02-27 22:29:06 +00:00
|
|
|
* as well as interactions with any per-CPU variables.
|
2014-01-28 23:29:21 +00:00
|
|
|
*/
|
|
|
|
struct shuffle_task {
|
|
|
|
struct list_head st_l;
|
|
|
|
struct task_struct *st_t;
|
|
|
|
};
|
|
|
|
|
|
|
|
static long shuffle_interval; /* In jiffies. */
|
|
|
|
static struct task_struct *shuffler_task;
|
|
|
|
static cpumask_var_t shuffle_tmp_mask;
|
|
|
|
static int shuffle_idle_cpu; /* Force all torture tasks off this CPU */
|
|
|
|
static struct list_head shuffle_task_list = LIST_HEAD_INIT(shuffle_task_list);
|
|
|
|
static DEFINE_MUTEX(shuffle_task_mutex);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Register a task to be shuffled. If there is no memory, just splat
|
|
|
|
* and don't bother registering.
|
|
|
|
*/
|
|
|
|
void torture_shuffle_task_register(struct task_struct *tp)
|
|
|
|
{
|
|
|
|
struct shuffle_task *stp;
|
|
|
|
|
|
|
|
if (WARN_ON_ONCE(tp == NULL))
|
|
|
|
return;
|
|
|
|
stp = kmalloc(sizeof(*stp), GFP_KERNEL);
|
|
|
|
if (WARN_ON_ONCE(stp == NULL))
|
|
|
|
return;
|
|
|
|
stp->st_t = tp;
|
|
|
|
mutex_lock(&shuffle_task_mutex);
|
|
|
|
list_add(&stp->st_l, &shuffle_task_list);
|
|
|
|
mutex_unlock(&shuffle_task_mutex);
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_shuffle_task_register);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Unregister all tasks, for example, at the end of the torture run.
|
|
|
|
*/
|
|
|
|
static void torture_shuffle_task_unregister_all(void)
|
|
|
|
{
|
|
|
|
struct shuffle_task *stp;
|
|
|
|
struct shuffle_task *p;
|
|
|
|
|
|
|
|
mutex_lock(&shuffle_task_mutex);
|
|
|
|
list_for_each_entry_safe(stp, p, &shuffle_task_list, st_l) {
|
|
|
|
list_del(&stp->st_l);
|
|
|
|
kfree(stp);
|
|
|
|
}
|
|
|
|
mutex_unlock(&shuffle_task_mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Shuffle tasks such that we allow shuffle_idle_cpu to become idle.
|
|
|
|
* A special case is when shuffle_idle_cpu = -1, in which case we allow
|
|
|
|
* the tasks to run on all CPUs.
|
|
|
|
*/
|
2023-07-19 19:03:20 +00:00
|
|
|
static void torture_shuffle_tasks(struct torture_random_state *trp)
|
2014-01-28 23:29:21 +00:00
|
|
|
{
|
|
|
|
struct shuffle_task *stp;
|
|
|
|
|
|
|
|
cpumask_setall(shuffle_tmp_mask);
|
2021-08-03 14:16:18 +00:00
|
|
|
cpus_read_lock();
|
2014-01-28 23:29:21 +00:00
|
|
|
|
|
|
|
/* No point in shuffling if there is only one online CPU (ex: UP) */
|
|
|
|
if (num_online_cpus() == 1) {
|
2021-08-03 14:16:18 +00:00
|
|
|
cpus_read_unlock();
|
2014-01-28 23:29:21 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Advance to the next CPU. Upon overflow, don't idle any CPUs. */
|
|
|
|
shuffle_idle_cpu = cpumask_next(shuffle_idle_cpu, shuffle_tmp_mask);
|
|
|
|
if (shuffle_idle_cpu >= nr_cpu_ids)
|
|
|
|
shuffle_idle_cpu = -1;
|
2014-03-17 13:21:21 +00:00
|
|
|
else
|
2014-01-28 23:29:21 +00:00
|
|
|
cpumask_clear_cpu(shuffle_idle_cpu, shuffle_tmp_mask);
|
|
|
|
|
|
|
|
mutex_lock(&shuffle_task_mutex);
|
2023-06-02 22:02:09 +00:00
|
|
|
list_for_each_entry(stp, &shuffle_task_list, st_l) {
|
2023-07-19 19:03:20 +00:00
|
|
|
if (!random_shuffle || torture_random(trp) & 0x1)
|
2023-06-02 22:02:09 +00:00
|
|
|
set_cpus_allowed_ptr(stp->st_t, shuffle_tmp_mask);
|
|
|
|
}
|
2014-01-28 23:29:21 +00:00
|
|
|
mutex_unlock(&shuffle_task_mutex);
|
|
|
|
|
2021-08-03 14:16:18 +00:00
|
|
|
cpus_read_unlock();
|
2014-01-28 23:29:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Shuffle tasks across CPUs, with the intent of allowing each CPU in the
|
|
|
|
* system to become idle at a time and cut off its timer ticks. This is meant
|
|
|
|
* to test the support for such tickless idle CPU in RCU.
|
|
|
|
*/
|
|
|
|
static int torture_shuffle(void *arg)
|
|
|
|
{
|
2023-06-26 23:27:02 +00:00
|
|
|
DEFINE_TORTURE_RANDOM(rand);
|
|
|
|
|
2014-01-28 23:29:21 +00:00
|
|
|
VERBOSE_TOROUT_STRING("torture_shuffle task started");
|
|
|
|
do {
|
2023-06-26 23:27:02 +00:00
|
|
|
torture_hrtimeout_jiffies(shuffle_interval, &rand);
|
2023-07-19 19:03:20 +00:00
|
|
|
torture_shuffle_tasks(&rand);
|
2014-01-28 23:29:21 +00:00
|
|
|
torture_shutdown_absorb("torture_shuffle");
|
|
|
|
} while (!torture_must_stop());
|
2014-02-01 01:37:28 +00:00
|
|
|
torture_kthread_stopping("torture_shuffle");
|
2014-01-28 23:29:21 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Start the shuffler, with shuffint in jiffies.
|
|
|
|
*/
|
|
|
|
int torture_shuffle_init(long shuffint)
|
|
|
|
{
|
|
|
|
shuffle_interval = shuffint;
|
|
|
|
|
|
|
|
shuffle_idle_cpu = -1;
|
|
|
|
|
|
|
|
if (!alloc_cpumask_var(&shuffle_tmp_mask, GFP_KERNEL)) {
|
2021-11-03 08:30:28 +00:00
|
|
|
TOROUT_ERRSTRING("Failed to alloc mask");
|
2014-01-28 23:29:21 +00:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Create the shuffler thread */
|
2014-02-03 19:52:27 +00:00
|
|
|
return torture_create_kthread(torture_shuffle, NULL, shuffler_task);
|
2014-01-28 23:29:21 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_shuffle_init);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Stop the shuffling.
|
|
|
|
*/
|
2014-01-30 22:21:11 +00:00
|
|
|
static void torture_shuffle_cleanup(void)
|
2014-01-28 23:29:21 +00:00
|
|
|
{
|
|
|
|
torture_shuffle_task_unregister_all();
|
|
|
|
if (shuffler_task) {
|
|
|
|
VERBOSE_TOROUT_STRING("Stopping torture_shuffle task");
|
|
|
|
kthread_stop(shuffler_task);
|
|
|
|
free_cpumask_var(shuffle_tmp_mask);
|
|
|
|
}
|
|
|
|
shuffler_task = NULL;
|
|
|
|
}
|
|
|
|
|
2014-01-31 22:52:13 +00:00
|
|
|
/*
|
|
|
|
* Variables for auto-shutdown. This allows "lights out" torture runs
|
|
|
|
* to be fully scripted.
|
|
|
|
*/
|
|
|
|
static struct task_struct *shutdown_task;
|
2016-06-18 14:45:43 +00:00
|
|
|
static ktime_t shutdown_time; /* time to system shutdown. */
|
2014-01-31 22:52:13 +00:00
|
|
|
static void (*torture_shutdown_hook)(void);
|
|
|
|
|
2014-01-29 15:40:27 +00:00
|
|
|
/*
|
|
|
|
* Absorb kthreads into a kernel function that won't return, so that
|
|
|
|
* they won't ever access module text or data again.
|
|
|
|
*/
|
|
|
|
void torture_shutdown_absorb(const char *title)
|
|
|
|
{
|
2015-03-03 22:57:58 +00:00
|
|
|
while (READ_ONCE(fullstop) == FULLSTOP_SHUTDOWN) {
|
2014-01-30 23:37:19 +00:00
|
|
|
pr_notice("torture thread %s parking due to system shutdown\n",
|
|
|
|
title);
|
2014-01-29 15:40:27 +00:00
|
|
|
schedule_timeout_uninterruptible(MAX_SCHEDULE_TIMEOUT);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_shutdown_absorb);
|
2014-01-30 21:38:09 +00:00
|
|
|
|
2014-01-31 22:52:13 +00:00
|
|
|
/*
|
|
|
|
* Cause the torture test to shutdown the system after the test has
|
|
|
|
* run for the time specified by the shutdown_secs parameter.
|
|
|
|
*/
|
|
|
|
static int torture_shutdown(void *arg)
|
|
|
|
{
|
2016-06-18 14:45:43 +00:00
|
|
|
ktime_t ktime_snap;
|
2014-01-31 22:52:13 +00:00
|
|
|
|
|
|
|
VERBOSE_TOROUT_STRING("torture_shutdown task started");
|
2016-06-18 14:45:43 +00:00
|
|
|
ktime_snap = ktime_get();
|
|
|
|
while (ktime_before(ktime_snap, shutdown_time) &&
|
2014-01-31 22:52:13 +00:00
|
|
|
!torture_must_stop()) {
|
|
|
|
if (verbose)
|
|
|
|
pr_alert("%s" TORTURE_FLAG
|
2016-06-18 14:45:43 +00:00
|
|
|
"torture_shutdown task: %llu ms remaining\n",
|
|
|
|
torture_type,
|
|
|
|
ktime_ms_delta(shutdown_time, ktime_snap));
|
|
|
|
set_current_state(TASK_INTERRUPTIBLE);
|
|
|
|
schedule_hrtimeout(&shutdown_time, HRTIMER_MODE_ABS);
|
|
|
|
ktime_snap = ktime_get();
|
2014-01-31 22:52:13 +00:00
|
|
|
}
|
|
|
|
if (torture_must_stop()) {
|
2014-02-01 01:37:28 +00:00
|
|
|
torture_kthread_stopping("torture_shutdown");
|
2014-01-31 22:52:13 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* OK, shut down the system. */
|
|
|
|
|
|
|
|
VERBOSE_TOROUT_STRING("torture_shutdown task shutting down system");
|
|
|
|
shutdown_task = NULL; /* Avoid self-kill deadlock. */
|
2014-02-07 22:42:51 +00:00
|
|
|
if (torture_shutdown_hook)
|
|
|
|
torture_shutdown_hook();
|
|
|
|
else
|
|
|
|
VERBOSE_TOROUT_STRING("No torture_shutdown_hook(), skipping.");
|
2020-06-16 22:38:24 +00:00
|
|
|
if (ftrace_dump_at_shutdown)
|
|
|
|
rcu_ftrace_dump(DUMP_ALL);
|
2014-01-31 22:52:13 +00:00
|
|
|
kernel_power_off(); /* Shut down the system. */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Start up the shutdown task.
|
|
|
|
*/
|
|
|
|
int torture_shutdown_init(int ssecs, void (*cleanup)(void))
|
|
|
|
{
|
|
|
|
torture_shutdown_hook = cleanup;
|
2016-06-18 14:45:43 +00:00
|
|
|
if (ssecs > 0) {
|
|
|
|
shutdown_time = ktime_add(ktime_get(), ktime_set(ssecs, 0));
|
2018-09-22 01:21:31 +00:00
|
|
|
return torture_create_kthread(torture_shutdown, NULL,
|
2023-07-19 19:03:20 +00:00
|
|
|
shutdown_task);
|
2014-01-31 22:52:13 +00:00
|
|
|
}
|
2018-09-22 01:21:31 +00:00
|
|
|
return 0;
|
2014-01-31 22:52:13 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_shutdown_init);
|
|
|
|
|
2014-01-30 23:37:19 +00:00
|
|
|
/*
|
|
|
|
* Detect and respond to a system shutdown.
|
|
|
|
*/
|
|
|
|
static int torture_shutdown_notify(struct notifier_block *unused1,
|
|
|
|
unsigned long unused2, void *unused3)
|
|
|
|
{
|
|
|
|
mutex_lock(&fullstop_mutex);
|
2015-03-03 22:57:58 +00:00
|
|
|
if (READ_ONCE(fullstop) == FULLSTOP_DONTSTOP) {
|
2014-01-31 01:06:30 +00:00
|
|
|
VERBOSE_TOROUT_STRING("Unscheduled system shutdown detected");
|
2015-03-03 22:57:58 +00:00
|
|
|
WRITE_ONCE(fullstop, FULLSTOP_SHUTDOWN);
|
2014-01-31 01:06:30 +00:00
|
|
|
} else {
|
2014-01-30 23:37:19 +00:00
|
|
|
pr_warn("Concurrent rmmod and shutdown illegal!\n");
|
2014-01-31 01:06:30 +00:00
|
|
|
}
|
2014-01-30 23:37:19 +00:00
|
|
|
mutex_unlock(&fullstop_mutex);
|
|
|
|
return NOTIFY_DONE;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct notifier_block torture_shutdown_nb = {
|
|
|
|
.notifier_call = torture_shutdown_notify,
|
|
|
|
};
|
|
|
|
|
2014-02-04 20:35:27 +00:00
|
|
|
/*
|
|
|
|
* Shut down the shutdown task. Say what??? Heh! This can happen if
|
|
|
|
* the torture module gets an rmmod before the shutdown time arrives. ;-)
|
|
|
|
*/
|
|
|
|
static void torture_shutdown_cleanup(void)
|
|
|
|
{
|
|
|
|
unregister_reboot_notifier(&torture_shutdown_nb);
|
|
|
|
if (shutdown_task != NULL) {
|
|
|
|
VERBOSE_TOROUT_STRING("Stopping torture_shutdown task");
|
|
|
|
kthread_stop(shutdown_task);
|
|
|
|
}
|
|
|
|
shutdown_task = NULL;
|
|
|
|
}
|
|
|
|
|
2014-01-31 19:57:43 +00:00
|
|
|
/*
|
|
|
|
* Variables for stuttering, which means to periodically pause and
|
|
|
|
* restart testing in order to catch bugs that appear when load is
|
|
|
|
* suddenly applied to or removed from the system.
|
|
|
|
*/
|
|
|
|
static struct task_struct *stutter_task;
|
rcutorture: Fix stuttering races and other issues
The stuttering code isn't functioning as expected. Ideally, it should
pause the torture threads for a designated period before resuming. Yet,
it fails to halt the test for the correct duration. Additionally, a race
condition exists, potentially causing the stuttering code to pause for
an extended period if the 'spt' variable is non-zero due to the stutter
orchestration thread's inadequate CPU time.
Moreover, over-stuttering can hinder RCU's progress on TREE07 kernels.
This happens as the stuttering code may run within a softirq due to RCU
callbacks. Consequently, ksoftirqd keeps a CPU busy for several seconds,
thus obstructing RCU's progress. This situation triggers a warning
message in the logs:
[ 2169.481783] rcu_torture_writer: rtort_pipe_count: 9
This warning suggests that an RCU torture object, although invisible to
RCU readers, couldn't make it past the pipe array and be freed -- a
strong indication that there weren't enough grace periods during the
stutter interval.
To address these issues, this patch sets the "stutter end" time to an
absolute point in the future set by the main stutter thread. This is
then used for waiting in stutter_wait(). While the stutter thread still
defines this absolute time, the waiters' waiting logic doesn't rely on
the stutter thread receiving sufficient CPU time to halt the stuttering
as the halting is now self-controlled.
Cc: stable@vger.kernel.org
Signed-off-by: Joel Fernandes (Google) <joel@joelfernandes.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
2023-07-29 14:27:31 +00:00
|
|
|
static ktime_t stutter_till_abs_time;
|
2014-01-31 19:57:43 +00:00
|
|
|
static int stutter;
|
2019-04-09 21:44:49 +00:00
|
|
|
static int stutter_gap;
|
2014-01-31 19:57:43 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Block until the stutter interval ends. This must be called periodically
|
|
|
|
* by all running kthreads that need to be subject to stuttering.
|
|
|
|
*/
|
2018-08-07 21:34:44 +00:00
|
|
|
bool stutter_wait(const char *title)
|
2014-01-31 19:57:43 +00:00
|
|
|
{
|
2019-04-09 18:06:32 +00:00
|
|
|
bool ret = false;
|
rcutorture: Fix stuttering races and other issues
The stuttering code isn't functioning as expected. Ideally, it should
pause the torture threads for a designated period before resuming. Yet,
it fails to halt the test for the correct duration. Additionally, a race
condition exists, potentially causing the stuttering code to pause for
an extended period if the 'spt' variable is non-zero due to the stutter
orchestration thread's inadequate CPU time.
Moreover, over-stuttering can hinder RCU's progress on TREE07 kernels.
This happens as the stuttering code may run within a softirq due to RCU
callbacks. Consequently, ksoftirqd keeps a CPU busy for several seconds,
thus obstructing RCU's progress. This situation triggers a warning
message in the logs:
[ 2169.481783] rcu_torture_writer: rtort_pipe_count: 9
This warning suggests that an RCU torture object, although invisible to
RCU readers, couldn't make it past the pipe array and be freed -- a
strong indication that there weren't enough grace periods during the
stutter interval.
To address these issues, this patch sets the "stutter end" time to an
absolute point in the future set by the main stutter thread. This is
then used for waiting in stutter_wait(). While the stutter thread still
defines this absolute time, the waiters' waiting logic doesn't rely on
the stutter thread receiving sufficient CPU time to halt the stuttering
as the halting is now self-controlled.
Cc: stable@vger.kernel.org
Signed-off-by: Joel Fernandes (Google) <joel@joelfernandes.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
2023-07-29 14:27:31 +00:00
|
|
|
ktime_t till_ns;
|
2017-11-21 23:01:02 +00:00
|
|
|
|
2018-03-03 00:35:27 +00:00
|
|
|
cond_resched_tasks_rcu_qs();
|
rcutorture: Fix stuttering races and other issues
The stuttering code isn't functioning as expected. Ideally, it should
pause the torture threads for a designated period before resuming. Yet,
it fails to halt the test for the correct duration. Additionally, a race
condition exists, potentially causing the stuttering code to pause for
an extended period if the 'spt' variable is non-zero due to the stutter
orchestration thread's inadequate CPU time.
Moreover, over-stuttering can hinder RCU's progress on TREE07 kernels.
This happens as the stuttering code may run within a softirq due to RCU
callbacks. Consequently, ksoftirqd keeps a CPU busy for several seconds,
thus obstructing RCU's progress. This situation triggers a warning
message in the logs:
[ 2169.481783] rcu_torture_writer: rtort_pipe_count: 9
This warning suggests that an RCU torture object, although invisible to
RCU readers, couldn't make it past the pipe array and be freed -- a
strong indication that there weren't enough grace periods during the
stutter interval.
To address these issues, this patch sets the "stutter end" time to an
absolute point in the future set by the main stutter thread. This is
then used for waiting in stutter_wait(). While the stutter thread still
defines this absolute time, the waiters' waiting logic doesn't rely on
the stutter thread receiving sufficient CPU time to halt the stuttering
as the halting is now self-controlled.
Cc: stable@vger.kernel.org
Signed-off-by: Joel Fernandes (Google) <joel@joelfernandes.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
2023-07-29 14:27:31 +00:00
|
|
|
till_ns = READ_ONCE(stutter_till_abs_time);
|
|
|
|
if (till_ns && ktime_before(ktime_get(), till_ns)) {
|
|
|
|
torture_hrtimeout_ns(till_ns, 0, HRTIMER_MODE_ABS, NULL);
|
|
|
|
ret = true;
|
2014-01-31 19:57:43 +00:00
|
|
|
}
|
rcutorture: Fix stuttering races and other issues
The stuttering code isn't functioning as expected. Ideally, it should
pause the torture threads for a designated period before resuming. Yet,
it fails to halt the test for the correct duration. Additionally, a race
condition exists, potentially causing the stuttering code to pause for
an extended period if the 'spt' variable is non-zero due to the stutter
orchestration thread's inadequate CPU time.
Moreover, over-stuttering can hinder RCU's progress on TREE07 kernels.
This happens as the stuttering code may run within a softirq due to RCU
callbacks. Consequently, ksoftirqd keeps a CPU busy for several seconds,
thus obstructing RCU's progress. This situation triggers a warning
message in the logs:
[ 2169.481783] rcu_torture_writer: rtort_pipe_count: 9
This warning suggests that an RCU torture object, although invisible to
RCU readers, couldn't make it past the pipe array and be freed -- a
strong indication that there weren't enough grace periods during the
stutter interval.
To address these issues, this patch sets the "stutter end" time to an
absolute point in the future set by the main stutter thread. This is
then used for waiting in stutter_wait(). While the stutter thread still
defines this absolute time, the waiters' waiting logic doesn't rely on
the stutter thread receiving sufficient CPU time to halt the stuttering
as the halting is now self-controlled.
Cc: stable@vger.kernel.org
Signed-off-by: Joel Fernandes (Google) <joel@joelfernandes.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
2023-07-29 14:27:31 +00:00
|
|
|
torture_shutdown_absorb(title);
|
2019-04-09 18:06:32 +00:00
|
|
|
return ret;
|
2014-01-31 19:57:43 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(stutter_wait);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Cause the torture test to "stutter", starting and stopping all
|
|
|
|
* threads periodically.
|
|
|
|
*/
|
|
|
|
static int torture_stutter(void *arg)
|
|
|
|
{
|
rcutorture: Fix stuttering races and other issues
The stuttering code isn't functioning as expected. Ideally, it should
pause the torture threads for a designated period before resuming. Yet,
it fails to halt the test for the correct duration. Additionally, a race
condition exists, potentially causing the stuttering code to pause for
an extended period if the 'spt' variable is non-zero due to the stutter
orchestration thread's inadequate CPU time.
Moreover, over-stuttering can hinder RCU's progress on TREE07 kernels.
This happens as the stuttering code may run within a softirq due to RCU
callbacks. Consequently, ksoftirqd keeps a CPU busy for several seconds,
thus obstructing RCU's progress. This situation triggers a warning
message in the logs:
[ 2169.481783] rcu_torture_writer: rtort_pipe_count: 9
This warning suggests that an RCU torture object, although invisible to
RCU readers, couldn't make it past the pipe array and be freed -- a
strong indication that there weren't enough grace periods during the
stutter interval.
To address these issues, this patch sets the "stutter end" time to an
absolute point in the future set by the main stutter thread. This is
then used for waiting in stutter_wait(). While the stutter thread still
defines this absolute time, the waiters' waiting logic doesn't rely on
the stutter thread receiving sufficient CPU time to halt the stuttering
as the halting is now self-controlled.
Cc: stable@vger.kernel.org
Signed-off-by: Joel Fernandes (Google) <joel@joelfernandes.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
2023-07-29 14:27:31 +00:00
|
|
|
ktime_t till_ns;
|
2019-04-09 18:06:32 +00:00
|
|
|
|
2014-01-31 19:57:43 +00:00
|
|
|
VERBOSE_TOROUT_STRING("torture_stutter task started");
|
|
|
|
do {
|
2017-11-21 23:01:02 +00:00
|
|
|
if (!torture_must_stop() && stutter > 1) {
|
rcutorture: Fix stuttering races and other issues
The stuttering code isn't functioning as expected. Ideally, it should
pause the torture threads for a designated period before resuming. Yet,
it fails to halt the test for the correct duration. Additionally, a race
condition exists, potentially causing the stuttering code to pause for
an extended period if the 'spt' variable is non-zero due to the stutter
orchestration thread's inadequate CPU time.
Moreover, over-stuttering can hinder RCU's progress on TREE07 kernels.
This happens as the stuttering code may run within a softirq due to RCU
callbacks. Consequently, ksoftirqd keeps a CPU busy for several seconds,
thus obstructing RCU's progress. This situation triggers a warning
message in the logs:
[ 2169.481783] rcu_torture_writer: rtort_pipe_count: 9
This warning suggests that an RCU torture object, although invisible to
RCU readers, couldn't make it past the pipe array and be freed -- a
strong indication that there weren't enough grace periods during the
stutter interval.
To address these issues, this patch sets the "stutter end" time to an
absolute point in the future set by the main stutter thread. This is
then used for waiting in stutter_wait(). While the stutter thread still
defines this absolute time, the waiters' waiting logic doesn't rely on
the stutter thread receiving sufficient CPU time to halt the stuttering
as the halting is now self-controlled.
Cc: stable@vger.kernel.org
Signed-off-by: Joel Fernandes (Google) <joel@joelfernandes.org>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
Signed-off-by: Frederic Weisbecker <frederic@kernel.org>
2023-07-29 14:27:31 +00:00
|
|
|
till_ns = ktime_add_ns(ktime_get(),
|
|
|
|
jiffies_to_nsecs(stutter));
|
|
|
|
WRITE_ONCE(stutter_till_abs_time, till_ns);
|
|
|
|
torture_hrtimeout_jiffies(stutter - 1, NULL);
|
2014-01-31 19:57:43 +00:00
|
|
|
}
|
|
|
|
if (!torture_must_stop())
|
2020-11-17 20:17:42 +00:00
|
|
|
torture_hrtimeout_jiffies(stutter_gap, NULL);
|
2014-01-31 19:57:43 +00:00
|
|
|
torture_shutdown_absorb("torture_stutter");
|
|
|
|
} while (!torture_must_stop());
|
2014-02-01 01:37:28 +00:00
|
|
|
torture_kthread_stopping("torture_stutter");
|
2014-01-31 19:57:43 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Initialize and kick off the torture_stutter kthread.
|
|
|
|
*/
|
2019-04-09 21:44:49 +00:00
|
|
|
int torture_stutter_init(const int s, const int sgap)
|
2014-01-31 19:57:43 +00:00
|
|
|
{
|
|
|
|
stutter = s;
|
2019-04-09 21:44:49 +00:00
|
|
|
stutter_gap = sgap;
|
2018-09-22 01:21:31 +00:00
|
|
|
return torture_create_kthread(torture_stutter, NULL, stutter_task);
|
2014-01-31 19:57:43 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_stutter_init);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Cleanup after the torture_stutter kthread.
|
|
|
|
*/
|
2014-02-04 20:35:27 +00:00
|
|
|
static void torture_stutter_cleanup(void)
|
2014-01-31 19:57:43 +00:00
|
|
|
{
|
|
|
|
if (!stutter_task)
|
|
|
|
return;
|
|
|
|
VERBOSE_TOROUT_STRING("Stopping torture_stutter task");
|
|
|
|
kthread_stop(stutter_task);
|
|
|
|
stutter_task = NULL;
|
|
|
|
}
|
|
|
|
|
2023-08-16 19:24:44 +00:00
|
|
|
static void
|
|
|
|
torture_print_module_parms(void)
|
|
|
|
{
|
|
|
|
pr_alert("torture module --- %s: disable_onoff_at_boot=%d ftrace_dump_at_shutdown=%d verbose_sleep_frequency=%d verbose_sleep_duration=%d random_shuffle=%d\n",
|
|
|
|
torture_type, disable_onoff_at_boot, ftrace_dump_at_shutdown, verbose_sleep_frequency, verbose_sleep_duration, random_shuffle);
|
|
|
|
}
|
|
|
|
|
2014-01-30 21:38:09 +00:00
|
|
|
/*
|
|
|
|
* Initialize torture module. Please note that this is -not- invoked via
|
|
|
|
* the usual module_init() mechanism, but rather by an explicit call from
|
|
|
|
* the client torture module. This call must be paired with a later
|
|
|
|
* torture_init_end().
|
2014-01-31 19:57:43 +00:00
|
|
|
*
|
|
|
|
* The runnable parameter points to a flag that controls whether or not
|
|
|
|
* the test is currently runnable. If there is no such flag, pass in NULL.
|
2014-01-30 21:38:09 +00:00
|
|
|
*/
|
2018-05-09 17:29:18 +00:00
|
|
|
bool torture_init_begin(char *ttype, int v)
|
2014-01-30 21:38:09 +00:00
|
|
|
{
|
|
|
|
mutex_lock(&fullstop_mutex);
|
2014-04-07 16:14:11 +00:00
|
|
|
if (torture_type != NULL) {
|
2021-01-23 08:34:01 +00:00
|
|
|
pr_alert("%s: Refusing %s init: %s running.\n",
|
|
|
|
__func__, ttype, torture_type);
|
|
|
|
pr_alert("%s: One torture test at a time!\n", __func__);
|
2014-04-07 16:14:11 +00:00
|
|
|
mutex_unlock(&fullstop_mutex);
|
|
|
|
return false;
|
|
|
|
}
|
2014-01-30 21:38:09 +00:00
|
|
|
torture_type = ttype;
|
|
|
|
verbose = v;
|
2014-01-30 23:49:29 +00:00
|
|
|
fullstop = FULLSTOP_DONTSTOP;
|
2023-08-16 19:24:44 +00:00
|
|
|
torture_print_module_parms();
|
2014-04-07 16:14:11 +00:00
|
|
|
return true;
|
2014-01-30 21:38:09 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_init_begin);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Tell the torture module that initialization is complete.
|
|
|
|
*/
|
2014-04-16 20:42:09 +00:00
|
|
|
void torture_init_end(void)
|
2014-01-30 21:38:09 +00:00
|
|
|
{
|
|
|
|
mutex_unlock(&fullstop_mutex);
|
2014-01-30 23:37:19 +00:00
|
|
|
register_reboot_notifier(&torture_shutdown_nb);
|
2014-01-30 21:38:09 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_init_end);
|
2014-01-30 22:21:11 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Clean up torture module. Please note that this is -not- invoked via
|
|
|
|
* the usual module_exit() mechanism, but rather by an explicit call from
|
|
|
|
* the client torture module. Returns true if a race with system shutdown
|
2014-02-04 20:35:27 +00:00
|
|
|
* is detected, otherwise, all kthreads started by functions in this file
|
|
|
|
* will be shut down.
|
2014-01-30 22:21:11 +00:00
|
|
|
*
|
|
|
|
* This must be called before the caller starts shutting down its own
|
|
|
|
* kthreads.
|
2014-09-12 03:40:21 +00:00
|
|
|
*
|
|
|
|
* Both torture_cleanup_begin() and torture_cleanup_end() must be paired,
|
|
|
|
* in order to correctly perform the cleanup. They are separated because
|
|
|
|
* threads can still need to reference the torture_type type, thus nullify
|
|
|
|
* only after completing all other relevant calls.
|
2014-01-30 22:21:11 +00:00
|
|
|
*/
|
2014-09-12 03:40:21 +00:00
|
|
|
bool torture_cleanup_begin(void)
|
2014-01-30 22:21:11 +00:00
|
|
|
{
|
|
|
|
mutex_lock(&fullstop_mutex);
|
2015-03-03 22:57:58 +00:00
|
|
|
if (READ_ONCE(fullstop) == FULLSTOP_SHUTDOWN) {
|
2014-01-30 22:21:11 +00:00
|
|
|
pr_warn("Concurrent rmmod and shutdown illegal!\n");
|
|
|
|
mutex_unlock(&fullstop_mutex);
|
|
|
|
schedule_timeout_uninterruptible(10);
|
|
|
|
return true;
|
|
|
|
}
|
2015-03-03 22:57:58 +00:00
|
|
|
WRITE_ONCE(fullstop, FULLSTOP_RMMOD);
|
2014-01-30 22:21:11 +00:00
|
|
|
mutex_unlock(&fullstop_mutex);
|
2014-02-04 20:35:27 +00:00
|
|
|
torture_shutdown_cleanup();
|
2014-01-30 22:21:11 +00:00
|
|
|
torture_shuffle_cleanup();
|
2014-02-04 20:35:27 +00:00
|
|
|
torture_stutter_cleanup();
|
2014-01-30 22:21:11 +00:00
|
|
|
torture_onoff_cleanup();
|
2014-09-12 03:40:21 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_cleanup_begin);
|
|
|
|
|
|
|
|
void torture_cleanup_end(void)
|
|
|
|
{
|
2014-04-07 16:14:11 +00:00
|
|
|
mutex_lock(&fullstop_mutex);
|
|
|
|
torture_type = NULL;
|
|
|
|
mutex_unlock(&fullstop_mutex);
|
2014-01-30 22:21:11 +00:00
|
|
|
}
|
2014-09-12 03:40:21 +00:00
|
|
|
EXPORT_SYMBOL_GPL(torture_cleanup_end);
|
2014-01-30 23:49:29 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Is it time for the current torture test to stop?
|
|
|
|
*/
|
|
|
|
bool torture_must_stop(void)
|
|
|
|
{
|
|
|
|
return torture_must_stop_irq() || kthread_should_stop();
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_must_stop);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Is it time for the current torture test to stop? This is the irq-safe
|
|
|
|
* version, hence no check for kthread_should_stop().
|
|
|
|
*/
|
|
|
|
bool torture_must_stop_irq(void)
|
|
|
|
{
|
2015-03-03 22:57:58 +00:00
|
|
|
return READ_ONCE(fullstop) != FULLSTOP_DONTSTOP;
|
2014-01-30 23:49:29 +00:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_must_stop_irq);
|
2014-02-01 01:37:28 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Each kthread must wait for kthread_should_stop() before returning from
|
|
|
|
* its top-level function, otherwise segfaults ensue. This function
|
|
|
|
* prints a "stopping" message and waits for kthread_should_stop(), and
|
|
|
|
* should be called from all torture kthreads immediately prior to
|
|
|
|
* returning.
|
|
|
|
*/
|
|
|
|
void torture_kthread_stopping(char *title)
|
|
|
|
{
|
2014-03-04 00:58:03 +00:00
|
|
|
char buf[128];
|
|
|
|
|
2021-12-16 20:23:31 +00:00
|
|
|
snprintf(buf, sizeof(buf), "%s is stopping", title);
|
2014-03-04 00:58:03 +00:00
|
|
|
VERBOSE_TOROUT_STRING(buf);
|
2014-02-01 01:37:28 +00:00
|
|
|
while (!kthread_should_stop()) {
|
|
|
|
torture_shutdown_absorb(title);
|
2023-01-01 06:15:55 +00:00
|
|
|
schedule_timeout_uninterruptible(HZ / 20);
|
2014-02-01 01:37:28 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(torture_kthread_stopping);
|
2014-02-03 19:52:27 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Create a generic torture kthread that is immediately runnable. If you
|
|
|
|
* need the kthread to be stopped so that you can do something to it before
|
|
|
|
* it starts, you will need to open-code your own.
|
|
|
|
*/
|
|
|
|
int _torture_create_kthread(int (*fn)(void *arg), void *arg, char *s, char *m,
|
2023-07-19 22:50:07 +00:00
|
|
|
char *f, struct task_struct **tp, void (*cbf)(struct task_struct *tp))
|
2014-02-03 19:52:27 +00:00
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
VERBOSE_TOROUT_STRING(m);
|
2022-01-03 14:07:09 +00:00
|
|
|
*tp = kthread_create(fn, arg, "%s", s);
|
2014-02-03 19:52:27 +00:00
|
|
|
if (IS_ERR(*tp)) {
|
|
|
|
ret = PTR_ERR(*tp);
|
2021-11-03 08:30:28 +00:00
|
|
|
TOROUT_ERRSTRING(f);
|
2014-02-03 19:52:27 +00:00
|
|
|
*tp = NULL;
|
2022-01-03 14:07:09 +00:00
|
|
|
return ret;
|
2014-02-03 19:52:27 +00:00
|
|
|
}
|
2023-07-19 22:50:07 +00:00
|
|
|
|
|
|
|
if (cbf)
|
|
|
|
cbf(*tp);
|
|
|
|
|
2022-01-03 14:07:09 +00:00
|
|
|
wake_up_process(*tp); // Process is sleeping, so ordering provided.
|
2014-02-03 19:52:27 +00:00
|
|
|
torture_shuffle_task_register(*tp);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(_torture_create_kthread);
|
2014-02-04 19:47:08 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Stop a generic kthread, emitting a message.
|
|
|
|
*/
|
|
|
|
void _torture_stop_kthread(char *m, struct task_struct **tp)
|
|
|
|
{
|
|
|
|
if (*tp == NULL)
|
|
|
|
return;
|
|
|
|
VERBOSE_TOROUT_STRING(m);
|
|
|
|
kthread_stop(*tp);
|
|
|
|
*tp = NULL;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(_torture_stop_kthread);
|