1
0
mirror of https://github.com/golang/go synced 2024-11-14 22:30:26 -07:00

Revert "runtime: remove GODEBUG=runtimecontentionstacks"

This reverts commit 87e930f728 (CL 585639)

Reason for revert: This is part of a patch series that changed the
handling of contended lock2/unlock2 calls, reducing the maximum
throughput of contended runtime.mutex values, and causing a performance
regression on applications where that is (or became) the bottleneck.

Updates #66999
Updates #67585

Change-Id: I1e286d2a16d16e4af202cd5dc04b2d9c4ee71b32
Reviewed-on: https://go-review.googlesource.com/c/go/+/589097
Reviewed-by: Than McIntosh <thanm@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Michael Pratt <mpratt@google.com>
Auto-Submit: Rhys Hiltner <rhys.hiltner@gmail.com>
This commit is contained in:
Rhys Hiltner 2024-05-29 16:41:10 +00:00 committed by Gopher Robot
parent e6b8b2f3e2
commit ca7d300509
7 changed files with 37 additions and 11 deletions

View File

@ -176,9 +176,6 @@ This behavior is controlled by the `winreadlinkvolume` setting.
For Go 1.23, it defaults to `winreadlinkvolume=1`. For Go 1.23, it defaults to `winreadlinkvolume=1`.
Previous versions default to `winreadlinkvolume=0`. Previous versions default to `winreadlinkvolume=0`.
Go 1.23 corrected the semantics of contention reports for runtime-internal locks,
and so removed the [`runtimecontentionstacks` setting](/pkg/runtime#hdr-Environment_Variable).
Go 1.23 enabled the experimental post-quantum key exchange mechanism Go 1.23 enabled the experimental post-quantum key exchange mechanism
X25519Kyber768Draft00 by default. The default can be reverted using the X25519Kyber768Draft00 by default. The default can be reverted using the
[`tlskyber` setting](/pkg/crypto/tls/#Config.CurvePreferences). [`tlskyber` setting](/pkg/crypto/tls/#Config.CurvePreferences).

View File

@ -1,5 +0,0 @@
The mutex profile for contention on runtime-internal locks now correctly points
to the end of the critical section that caused the delay. This matches the
profile's behavior for contention on `sync.Mutex` values. The
`runtimecontentionstacks` setting for `GODEBUG`, which allowed opting in to Go
1.22's unusual behavior for this part of the profile, is now gone.

View File

@ -159,6 +159,15 @@ It is a comma-separated list of name=val pairs setting these named variables:
panicnil: setting panicnil=1 disables the runtime error when calling panic with nil panicnil: setting panicnil=1 disables the runtime error when calling panic with nil
interface value or an untyped nil. interface value or an untyped nil.
runtimecontentionstacks: setting runtimecontentionstacks=1 enables inclusion of call stacks
related to contention on runtime-internal locks in the "mutex" profile, subject to the
MutexProfileFraction setting. When runtimecontentionstacks=0, contention on
runtime-internal locks will report as "runtime._LostContendedRuntimeLock". When
runtimecontentionstacks=1, the call stacks will correspond to the unlock call that released
the lock. But instead of the value corresponding to the amount of contention that call
stack caused, it corresponds to the amount of time the caller of unlock had to wait in its
original call to lock. A future release is expected to align those and remove this setting.
invalidptr: invalidptr=1 (the default) causes the garbage collector and stack invalidptr: invalidptr=1 (the default) causes the garbage collector and stack
copier to crash the program if an invalid pointer value (for example, 1) copier to crash the program if an invalid pointer value (for example, 1)
is found in a pointer-typed location. Setting invalidptr=0 disables this check. is found in a pointer-typed location. Setting invalidptr=0 disables this check.

View File

@ -6,6 +6,7 @@ package runtime_test
import ( import (
"bytes" "bytes"
"fmt"
"internal/abi" "internal/abi"
"internal/goexperiment" "internal/goexperiment"
"internal/profile" "internal/profile"
@ -954,6 +955,17 @@ func TestRuntimeLockMetricsAndProfile(t *testing.T) {
t.Fatalf("need MutexProfileRate 0, got %d", old) t.Fatalf("need MutexProfileRate 0, got %d", old)
} }
{
before := os.Getenv("GODEBUG")
for _, s := range strings.Split(before, ",") {
if strings.HasPrefix(s, "runtimecontentionstacks=") {
t.Logf("GODEBUG includes explicit setting %q", s)
}
}
defer func() { os.Setenv("GODEBUG", before) }()
os.Setenv("GODEBUG", fmt.Sprintf("%s,runtimecontentionstacks=1", before))
}
t.Logf("NumCPU %d", runtime.NumCPU()) t.Logf("NumCPU %d", runtime.NumCPU())
t.Logf("GOMAXPROCS %d", runtime.GOMAXPROCS(0)) t.Logf("GOMAXPROCS %d", runtime.GOMAXPROCS(0))
if minCPU := 2; runtime.NumCPU() < minCPU { if minCPU := 2; runtime.NumCPU() < minCPU {
@ -1152,7 +1164,7 @@ func TestRuntimeLockMetricsAndProfile(t *testing.T) {
stks := [][]string{{ stks := [][]string{{
"runtime.unlock", "runtime.unlock",
"runtime_test." + name + ".func4.1", "runtime_test." + name + ".func5.1",
"runtime_test.(*contentionWorker).run", "runtime_test.(*contentionWorker).run",
}} }}
@ -1258,14 +1270,14 @@ func TestRuntimeLockMetricsAndProfile(t *testing.T) {
{ {
"runtime.unlock", "runtime.unlock",
"runtime.semrelease1", "runtime.semrelease1",
"runtime_test.TestRuntimeLockMetricsAndProfile.func5.1", "runtime_test.TestRuntimeLockMetricsAndProfile.func6.1",
"runtime_test.(*contentionWorker).run", "runtime_test.(*contentionWorker).run",
}, },
{ {
"runtime.unlock", "runtime.unlock",
"runtime.semacquire1", "runtime.semacquire1",
"runtime.semacquire", "runtime.semacquire",
"runtime_test.TestRuntimeLockMetricsAndProfile.func5.1", "runtime_test.TestRuntimeLockMetricsAndProfile.func6.1",
"runtime_test.(*contentionWorker).run", "runtime_test.(*contentionWorker).run",
}, },
} }

View File

@ -915,6 +915,11 @@ func (prof *mLockProfile) captureStack() {
} }
prof.stack[0] = logicalStackSentinel prof.stack[0] = logicalStackSentinel
if debug.runtimeContentionStacks.Load() == 0 {
prof.stack[1] = abi.FuncPCABIInternal(_LostContendedRuntimeLock) + sys.PCQuantum
prof.stack[2] = 0
return
}
var nstk int var nstk int
gp := getg() gp := getg()

View File

@ -166,6 +166,12 @@ import (
// holds a lock for 1s while 5 other goroutines are waiting for the entire // holds a lock for 1s while 5 other goroutines are waiting for the entire
// second to acquire the lock, its unlock call stack will report 5s of // second to acquire the lock, its unlock call stack will report 5s of
// contention. // contention.
//
// Runtime-internal locks are always reported at the location
// "runtime._LostContendedRuntimeLock". More detailed stack traces for
// runtime-internal locks can be obtained by setting
// `GODEBUG=runtimecontentionstacks=1` (see package [runtime] docs for
// caveats).
type Profile struct { type Profile struct {
name string name string
mu sync.Mutex mu sync.Mutex

View File

@ -319,6 +319,7 @@ var debug struct {
gctrace int32 gctrace int32
invalidptr int32 invalidptr int32
madvdontneed int32 // for Linux; issue 28466 madvdontneed int32 // for Linux; issue 28466
runtimeContentionStacks atomic.Int32
scavtrace int32 scavtrace int32
scheddetail int32 scheddetail int32
schedtrace int32 schedtrace int32
@ -380,6 +381,7 @@ var dbgvars = []*dbgVar{
{name: "madvdontneed", value: &debug.madvdontneed}, {name: "madvdontneed", value: &debug.madvdontneed},
{name: "panicnil", atomic: &debug.panicnil}, {name: "panicnil", atomic: &debug.panicnil},
{name: "profstackdepth", value: &debug.profstackdepth, def: 128}, {name: "profstackdepth", value: &debug.profstackdepth, def: 128},
{name: "runtimecontentionstacks", atomic: &debug.runtimeContentionStacks},
{name: "sbrk", value: &debug.sbrk}, {name: "sbrk", value: &debug.sbrk},
{name: "scavtrace", value: &debug.scavtrace}, {name: "scavtrace", value: &debug.scavtrace},
{name: "scheddetail", value: &debug.scheddetail}, {name: "scheddetail", value: &debug.scheddetail},