大家好,又见面了,我是你们的朋友全栈君。
Why does kworker hog your CPU? To find out why a kworker is wasting your CPU, you can create CPU backtraces: watch your processor load (with top
or something) and in moments of high load through kworker
, execute echo l > /proc/sysrq-trigger
to create a backtrace. (On Ubuntu, this needs you to login with sudo -s
). Do this several times, then watch the backtraces at the end of dmesg
output. See what happens frequently in the CPU backtraces, it hopefully points you to the source of your problem.
Example: e1000e. In my case, I found a backtrace like this nearly every time:
Call Trace:
delay_tsc+0x4a/0x80
__const_udelay+0x2c/0x30
e1000_acquire_swflag_ich8lan+0xa2/0x240 [e1000e]
e1000e_read_phy_reg_igp+0x29/0x80 [e1000e]
e1000e_phy_has_link_generic+0x85/0x120 [e1000e]
e1000_check_for_copper_link_ich8lan+0x48/0x930 [e1000e]
e1000e_has_link+0x55/0xd0 [e1000e]
e1000_watchdog_task+0x5e/0x960 [e1000e]
It hinted me to a problem in the e1000e
Ethernet card module, and indeed a sudo rmmod e1000e
made the high CPU load go away immediatel
先清理dmesg
adb shell
dmesg -c
再开始测试并且出现问题时执行
adb shell
echo l > /proc/sysrq-trigger
再执行
dmesg
hdd_update_dbs_scan_ctrl_ext_flag: 617: DBS scan duty cycle is disabled [ 675.311466] IRQ5 no longer affine to CPU5 [ 690.351261] IRQ5 no longer affine to CPU4 [ 705.321534] IRQ5 no longer affine to CPU7 [ 723.194943] sysrq: SysRq : Show backtrace of all active CPUs Back trace起始点 [ 723.195033] Backtrace for cpu 1 (current): [ 723.195083] CPU: 1 PID: 12445 Comm: sh Tainted: P W O 4.4.78-perf+ #1 [ 723.195106] Hardware name: SoMC Maple-DSDS(MSM8998 v2.1) (DT) [ 723.195130] Call trace: [ 723.195193] [<ffffff9746a89bc8>] dump_backtrace+0x0/0x1fc [ 723.195228] [<ffffff9746a89ed0>] show_stack+0x14/0x1c [ 723.195271] [<ffffff9746db8ecc>] dump_stack+0x8c/0xac
——————————————————————————————————————————–
要知道任何kworker在做什么,你可以看看cat /proc/<kworker_pid>/stack
版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请发送邮件至 举报,一经查实,本站将立刻删除。
发布者:全栈程序员栈长,转载请注明出处:https://javaforall.cn/192878.html原文链接:https://javaforall.cn