Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5412399pxv; Wed, 28 Jul 2021 10:06:11 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyHaHc1myLe/hICjDurmmLIb1t7EOnDT0Lc8yg8XIsHgeeK7aDqm3PmWecWI+RLDoMAHrHv X-Received: by 2002:a05:6402:51c7:: with SMTP id r7mr1069141edd.150.1627491971325; Wed, 28 Jul 2021 10:06:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627491971; cv=none; d=google.com; s=arc-20160816; b=I98pKlM2n96QC3cbfVZ/hUQMq8QdVA+qtJ3kAMJKzvQUVbw3dY/M2cmeHtVusFujjc EFj+5E585U0G9A9PyxhXtd2R2hEZviAvGbHYxMrhRrmlgVFvl0rMYXwRUgRtDS24ZB89 iODOgblJ1Q3WNuk7o4eZsuLnR0ORdnDPmS9h66lHWtfMXu+zcuu6amAIaldMP5A75888 uQIgis7WpwtDF7oDjBHSABgFCLTaYqlId93W3+QgrC88oDhTySN0OdOrNS7n/MQF70gV 0auvJuEts4rLhZeKa09Bn9MrR1M84D4uWWjTA4iUrR57XaonUHlXqlkwGjOs5cabw40M G4KA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=E3uBpYEeCp2ab+84nD2BgXgpyzIveheCt5Dj3yFcGcg=; b=CSCdhzjMiEWFMH/F6lyz+ehmoi7uS4DajyJoZPD78q6JkxV8nm+8dw0bf4T1vx0ML8 bgnjDStM3TO+1nTY/IYfRllPkBsif/U3KlDSNmcSSyXqpqygdE4b94v3sFa0aP2cFXlq hmr8rtvgy0fZWrjh6ooYbI0F4f1bQCtpAJXDX+qsZuwsYvLbP9c8gugv8IEsMKIWU2MP seq9AaCVAxCt17ATSzEIFvvsAt5mTV73vjeE4cCsmC4oeU1MYtIGWEfck734iZI2+sKt bV8LP/3REOG7s3xiK+mONjwPb22ANZsLcwoKNiWwMeC7ENTzCJIbmCTf0hWkjl1w5cT4 qsHg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=KtQxkAHY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w17si219437edc.39.2021.07.28.10.05.48; Wed, 28 Jul 2021 10:06:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=KtQxkAHY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230313AbhG1REF (ORCPT + 99 others); Wed, 28 Jul 2021 13:04:05 -0400 Received: from us-smtp-delivery-124.mimecast.com ([170.10.133.124]:59516 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229515AbhG1RED (ORCPT ); Wed, 28 Jul 2021 13:04:03 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1627491841; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=E3uBpYEeCp2ab+84nD2BgXgpyzIveheCt5Dj3yFcGcg=; b=KtQxkAHYo6AAzFtUHKEAFgx9SXZgRqAkKN8tBI2PYwTszncjNpnLPshNTyPu6LiplRWp+5 4ppF5DRlP99SojQJAL1HGs33MST7i9KjIe8ZU2sED1XMEfS+WZLeDmabVZYLnRtKwInKTv wXhOp1U3goQQ7pGa7nkBzqBnFraOUe0= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-412-F1m4UDKSNf-JNAL-OqsGtA-1; Wed, 28 Jul 2021 13:03:57 -0400 X-MC-Unique: F1m4UDKSNf-JNAL-OqsGtA-1 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 370331026200; Wed, 28 Jul 2021 17:03:56 +0000 (UTC) Received: from fuller.cnet (ovpn-112-3.gru2.redhat.com [10.97.112.3]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 0EA2260C05; Wed, 28 Jul 2021 17:03:48 +0000 (UTC) Received: by fuller.cnet (Postfix, from userid 1000) id 8F0C4416F5D2; Wed, 28 Jul 2021 13:17:37 -0300 (-03) Date: Wed, 28 Jul 2021 13:17:37 -0300 From: Marcelo Tosatti To: Nitesh Lal Cc: Frederic Weisbecker , Nicolas Saenz Julienne , linux-kernel@vger.kernel.org, Christoph Lameter , Juri Lelli , Peter Zijlstra , Alex Belits , Peter Xu , Thomas Gleixner Subject: Re: [patch 1/4] add basic task isolation prctl interface Message-ID: <20210728161737.GA24635@fuller.cnet> References: <20210727103803.464432924@fuller.cnet> <20210727104119.551607458@fuller.cnet> <7b2d6bf91d30c007e19a7d2cbddcb2460e72d163.camel@redhat.com> <20210727110050.GA502360@fuller.cnet> <20210727130930.GB283787@lothringen> <20210727145209.GA518735@fuller.cnet> <20210727234539.GH283787@lothringen> <20210728093707.GA3242@fuller.cnet> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jul 28, 2021 at 10:48:25AM -0400, Nitesh Lal wrote: > On Wed, Jul 28, 2021 at 5:56 AM Marcelo Tosatti wrote: > > > On Wed, Jul 28, 2021 at 01:45:39AM +0200, Frederic Weisbecker wrote: > > > On Tue, Jul 27, 2021 at 11:52:09AM -0300, Marcelo Tosatti wrote: > > > > The meaning of isolated is specified as follows: > > > > > > > > Isolation features > > > > ================== > > > > > > > > - prctl(PR_ISOL_GET, ISOL_SUP_FEATURES, 0, 0, 0) returns the supported > > > > features as a return value. > > > > > > > > - prctl(PR_ISOL_SET, ISOL_FEATURES, bitmask, 0, 0) enables the > > features in > > > > the bitmask. > > > > > > > > - prctl(PR_ISOL_GET, ISOL_FEATURES, 0, 0, 0) returns the currently > > > > enabled features. > > > > > > So what are the ISOL_FEATURES here? A mode that we enter such as flush > > > vmstat _everytime_ we resume to userpace after (and including) this > > prctl() ? > > > > ISOL_FEATURES is just the "command" type (which you can get and set). > > > > So, ISOL_FEATURES is really defining when the operations are really going > to take place for eg. on every uret? ISOL_F_QUIESCE_ON_URET enables quiescing on userspace return. > > The bitmask would include ISOL_F_QUIESCE_ON_URET, so: > > > > > When we talk about full/complete isolation https://lwn.net/Articles/816298/ Nohz and task isolation section These features reduce interruptions on the isolated CPUs, but do not fully eliminate them; task isolation is an attempt to finish the job by removing all interruptions. A process that enters the isolation mode will be able to run in user space with no interference from the kernel or other processes. > then does that translates to > enabling all possible features supported by something like > ISOL_F_QUIESCE_ON_URET? Not necessarily. If one controls what apps execute on the system (say the system is completly idle), ISOL_F_QUIESCE_ON_URET with vmstat sync should be sufficient for complete isolation (one can read events via rt-trace-bpf.py). > - bitmask = ISOL_F_QUIESCE_ON_URET; > > - prctl(PR_ISOL_SET, ISOL_FEATURES, bitmask, 0, 0) enables the features in > > the bitmask. > > > > - quiesce_bitmap = prctl(PR_ISOL_GET, PR_ISOL_SUP_QUIESCE_CFG, 0, 0, 0) > > (1) > > > > (returns the supported actions to be quiesced). > > > > - prctl(PR_ISOL_SET, PR_ISOL_QUIESCE_CFG, quiesce_bitmask, 0, 0) _sets_ > > the actions to be quiesced (2) > > > > If an application does not modify "quiesce_bitmask" between > > points (1) and (2) above, it will enable quiescing of all > > "features" the kernel supports. > > > > Application can, however, modify quiesce_bitmap to its preference. > > > > Flushing vmstat _everytime_ you resume to userspace is enabled only > > _after_ prctl(PR_ISOL_ENTER, 0, 0, 0, 0) is performed (which happens > > only when isolation is fully configured with the PR_ISOL_SET calls). > > > > Will this also happen if I disable ISOL_F_QUIESCE_VMSTAT_SYNC from the > quiesce_bitmask? Yes. > > OK, will better document that. > > > > > If so I'd rather call that ISOL_MODE because feature is too general. > > > > Well, in the first patchset, there was one "mode" implemented (but > > it was possible to implement different modes in the future). > > > > This would allow for example easier integration of "full task isolation" > > patchset type of functionality, disallowing syscalls. > > > > > Makes sense to go back to the usage of ISOL_MODE. > After this change, the ISOL_FEATURES will be replaced with something like > PR_ISOL_MODE_NORMAL/PR_MODE_ISOL? > > I think we'd like to keep that, so i'll keep the previous distinct modes > > (but allow configuration of individual features on the bitmap). > > > > > > > > > > The supported features are: > > > > > > > > ISOL_F_QUIESCE_ON_URET: quiesce deferred actions on return to > > userspace. > > > > ---------------------- > > > > > > > > Quiescing of different actions can be performed on return to userspace. > > > > > > > > - prctl(PR_ISOL_GET, PR_ISOL_SUP_QUIESCE_CFG, 0, 0, 0) returns > > > > the supported actions to be quiesced. > > > > > > > > - prctl(PR_ISOL_SET, PR_ISOL_QUIESCE_CFG, quiesce_bitmask, 0, 0) > > returns > > > > s/returns/sets/ > > > > > > the currently supported actions to be quiesced. > > > > > > > > - prctl(PR_ISOL_GET, PR_ISOL_QUIESCE_CFG, 0, 0, 0) returns > > > > the currently enabled actions to be quiesced. > > > > > > > > #define ISOL_F_QUIESCE_VMSTAT_SYNC (1<<0) > > > > #define ISOL_F_QUIESCE_NOHZ_FULL (1<<1) > > > > #define ISOL_F_QUIESCE_DEFER_TLB_FLUSH (1<<2) > > > > > > And then PR_ISOL_QUIESCE_CFG is a oneshot operation that applies only > > upon > > > return to this ctrl, right? If so perhaps this should be called just > > > ISOL_QUIESCE or ISOL_QUIESCE_ONCE or ISOL_REQ ? > > > > There was no one-shot operation implemented in the first patchset. What > > application would do to achieve that is: > > > > 1. Configure isolation with PR_ISOL_SET (say configure mode which > > allows system calls, and when a system call happens, flush all deferred > > actions on return to userspace). > > > > 2. prctl(PR_ISOL_ENTER, 0, 0, 0, 0) (this actually enables the flushing, > > and tags the task_struct as isolated). Here we can transfer this > > information > > from per-task to per-CPU data, for example, to be able to implement > > other features such as deferred TLB flushing. > > > > On return from this prctl(), deferrable actions are flushed. > > > > 3. latency sensitive loop, with no system calls. > > > > 4. some event which requires system calls is noticed: > > prctl(PR_ISOL_EXIT, 0, 0, 0, 0) > > (this would untag task_struct as isolated). > > > > 5. perform system calls A, B, C, D (with no flushing of vmstat, > > for example). > > > > 6. jmp to 2. > > > > So there is a problem with this logic, which is that one would like > > certain isolation functionality to remain enabled between points 4 > > and 6 (for example, blocking CPU hotplug or other blockable activities > > that would cause interruptions). > > > > One way to achieve this would be to replace PR_ISOL_ENTER/PR_ISOL_EXIT > > with PR_ISOL_ENABLE, which accepts a bitmask: > > > > 1. Configure isolation with PR_ISOL_SET (say configure mode which > > allows system calls, and when a system call happens, flush all deferred > > actions on return to userspace). > > > > 2. enabled_bitmask = ISOL_F_QUIESCE_ON_URET|ISOL_F_BLOCK_INTERRUPTORS; > > prctl(PR_ISOL_ENABLE, enabled_bitmask, 0, 0, 0) > > > > On return from this prctl(), deferrable actions are flushed. > > > > 3. latency sensitive loop, with no system calls. > > > > 4. some event which requires system calls is noticed: > > > > prctl(PR_ISOL_ENABLE, ISOL_F_BLOCK_INTERRUPTORS, 0, 0, 0) > > (this would clear ISOL_F_QUIESCE_ON_URET, so no flushing > > is performed on return from system calls). > > > > FWIU we will still exit before this via prctl(PR_ISOL_EXIT, 0, 0, 0, 0)? > Because if we are still in a latency-sensitive loop then not flushing > while returning to the userspace can cause interruptions anyways. No, PR_ISOL_ENABLE replaces PR_ISOL_ENTER/PR_ISOL_EXIT. > > 5. perform system calls A, B, C, D (with no flushing of vmstat). > > > > 6. jmp to 2. > > > > ... > > > > On exit: prctl(PR_ISOL_ENABLE, 0, 0, 0, 0) > > > > IOW: the one-shot operation does not allow the application > > to inform the kernel when the latency sensitive loop has > > begun or has ended. > > > > > > > > But that's just naming debate because otherwise that prctl layout looks > > good > > > to me. > > > > > > Thanks! > > > > Thank you for the input! > > > > > > -- > Thanks > Nitesh