Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752249AbbDCIH6 (ORCPT ); Fri, 3 Apr 2015 04:07:58 -0400 Received: from mail-bn1bon0113.outbound.protection.outlook.com ([157.56.111.113]:45184 "EHLO na01-bn1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751338AbbDCIHt (ORCPT ); Fri, 3 Apr 2015 04:07:49 -0400 Authentication-Results: linutronix.de; dkim=none (message not signed) header.d=none; Message-ID: <551E4A41.1080705@freescale.com> Date: Fri, 3 Apr 2015 11:07:29 +0300 From: Purcareata Bogdan User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.5.0 MIME-Version: 1.0 To: Scott Wood CC: Sebastian Andrzej Siewior , Paolo Bonzini , Alexander Graf , Bogdan Purcareata , , , , , Thomas Gleixner Subject: Re: [PATCH 0/2] powerpc/kvm: Enable running guests on RT Linux References: <1424251955-308-1-git-send-email-bogdan.purcareata@freescale.com> <54E73A6C.9080500@suse.de> <54E740E7.5090806@redhat.com> <54E74A8C.30802@linutronix.de> <1424734051.4698.17.camel@freescale.com> <54EF196E.4090805@redhat.com> <54EF2025.80404@linutronix.de> <1424999159.4698.78.camel@freescale.com> <55158E6D.40304@freescale.com> <1428016310.22867.289.camel@freescale.com> In-Reply-To: <1428016310.22867.289.camel@freescale.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [192.88.166.1] X-ClientProxiedBy: AMSPR02CA0025.eurprd02.prod.outlook.com (10.242.225.153) To BL2PR03MB178.namprd03.prod.outlook.com (10.255.230.150) X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BL2PR03MB178; X-Forefront-Antispam-Report: BMV:1;SFV:NSPM;SFS:(10019020)(6009001)(6049001)(51704005)(377424004)(377454003)(479174004)(50466002)(62966003)(87976001)(23676002)(54356999)(36756003)(40100003)(76176999)(87266999)(65816999)(77156002)(50986999)(122386002)(77096005)(2950100001)(92566002)(110136001)(83506001)(42186005)(66066001)(47776003)(80316001)(33656002)(65956001)(86362001)(46102003)(42262002);DIR:OUT;SFP:1102;SCL:1;SRVR:BL2PR03MB178;H:[10.171.74.79];FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(5002010)(5005006);SRVR:BL2PR03MB178;BCL:0;PCL:0;RULEID:;SRVR:BL2PR03MB178; X-Forefront-PRVS: 05352A48BE X-OriginatorOrg: freescale.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Apr 2015 08:07:45.7291 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR03MB178 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4078 Lines: 82 On 03.04.2015 02:11, Scott Wood wrote: > On Fri, 2015-03-27 at 19:07 +0200, Purcareata Bogdan wrote: >> On 27.02.2015 03:05, Scott Wood wrote: >>> On Thu, 2015-02-26 at 14:31 +0100, Sebastian Andrzej Siewior wrote: >>>> On 02/26/2015 02:02 PM, Paolo Bonzini wrote: >>>>> >>>>> >>>>> On 24/02/2015 00:27, Scott Wood wrote: >>>>>> This isn't a host PIC driver. It's guest PIC emulation, some of which >>>>>> is indeed not suitable for a rawlock (in particular, openpic_update_irq >>>>>> which loops on the number of vcpus, with a loop body that calls >>>>>> IRQ_check() which loops over all pending IRQs). >>>>> >>>>> The question is what behavior is wanted of code that isn't quite >>>>> RT-ready. What is preferred, bugs or bad latency? >>>>> >>>>> If the answer is bad latency (which can be avoided simply by not running >>>>> KVM on a RT kernel in production), patch 1 can be applied. If the >>>> can be applied *but* makes no difference if applied or not. >>>> >>>>> answer is bugs, patch 1 is not upstream material. >>>>> >>>>> I myself prefer to have bad latency; if something takes a spinlock in >>>>> atomic context, that spinlock should be raw. If it hurts (latency), >>>>> don't do it (use the affected code). >>>> >>>> The problem, that is fixed by this s/spin_lock/raw_spin_lock/, exists >>>> only in -RT. There is no change upstream. In general we fix such things >>>> in -RT first and forward the patches upstream if possible. This convert >>>> thingy would be possible. >>>> Bug fixing comes before latency no matter if RT or not. Converting >>>> every lock into a rawlock is not always the answer. >>>> Last thing I read from Scott is that he is not entirely sure if this is >>>> the right approach or not and patch #1 was not acked-by him either. >>>> >>>> So for now I wait for Scott's feedback and maybe a backtrace :) >>> >>> Obviously leaving it in a buggy state is not what we want -- but I lean >>> towards a short term "fix" of putting "depends on !PREEMPT_RT" on the >>> in-kernel MPIC emulation (which is itself just an optimization -- you >>> can still use KVM without it). This way people don't enable it with RT >>> without being aware of the issue, and there's more of an incentive to >>> fix it properly. >>> >>> I'll let Bogdan supply the backtrace. >> >> So about the backtrace. Wasn't really sure how to "catch" this, so what >> I did was to start a 24 VCPUs guest on a 24 CPU board, and in the guest >> run 24 netperf flows with an external back to back board of the same >> kind. I assumed this would provide the sufficient VCPUs and external >> interrupt to expose an alleged culprit. >> >> With regards to measuring the latency, I thought of using ftrace, >> specifically the preemptirqsoff latency histogram. Unfortunately, I >> wasn't able to capture any major differences between running a guest >> with in-kernel MPIC emulation (with the openpic raw_spinlock_conversion >> applied) vs. no in-kernel MPIC emulation. Function profiling >> (trace_stat) shows that in the second case there's a far greater time >> spent in kvm_handle_exit (100x), but overall, the maximum latencies for >> preemptirqsoff don't look that much different. >> >> Here are the max numbers (preemptirqsoff) for the 24 CPUs, on the host >> RT Linux, sorted in descending order, expressed in microseconds: >> >> In-kernel MPIC QEMU MPIC >> 3975 5105 > > What are you measuring? Latency in the host, or in the guest? This is in the host kernel. It's the maximum continuous period of time when both interrupts and preemption were disabled on the host kernel (basically making it unresponsive). This has been tracked while the guest was running with high prio, with 24 VCPUs, and in the guest there were 24 netperf flows - so a lot of VCPUs and a lot of external interrupts - for about 15 minutes. Bogdan P. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/