Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 19D36C61DA4 for ; Fri, 3 Mar 2023 23:36:34 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229681AbjCCXgc (ORCPT ); Fri, 3 Mar 2023 18:36:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42094 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229512AbjCCXga (ORCPT ); Fri, 3 Mar 2023 18:36:30 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 545426547E; Fri, 3 Mar 2023 15:36:29 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id DE86761924; Fri, 3 Mar 2023 23:36:28 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 360F0C433EF; Fri, 3 Mar 2023 23:36:28 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1677886588; bh=3u0XsrT3MOKCCnW5myaNz9pwfFsB2lT81dW3MxBXCVI=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=hCGM0LD3uF1QqcsQSaE1mgkjMuVZCKxluma9CjrihKBDquxuKagKJB8nDzXtrbqgq n80EV7rnL+G7m60bk4pJqpZUeVGsMaaRciMFDz2ypVLuGPWjvCb5kowWWHq7+RcdCc glWyfLUVSwiHilXBFTYiaWb5SCGfkTknuouRueg6bj5qgC4j/XVGR6LFOZbXssRuUk 0sM+Kq2Y2yVaTOuhFn5Yvdw16f19wz736P6jDWzydilTrd++xxHNcLJJXIP+P0OvkN KY1S2W0UvRgFW/c54GZXgaPEz13yr9SX1kULanqy1kEJRIhJ5B0TgXW5pJjyJdctpR fyMCHfF2INAYA== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id C78735C0278; Fri, 3 Mar 2023 15:36:27 -0800 (PST) Date: Fri, 3 Mar 2023 15:36:27 -0800 From: "Paul E. McKenney" To: Jakub Kicinski Cc: Thomas Gleixner , peterz@infradead.org, jstultz@google.com, edumazet@google.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/3] softirq: avoid spurious stalls due to need_resched() Message-ID: <20230303233627.GA2136520@paulmck-ThinkPad-P17-Gen-1> Reply-To: paulmck@kernel.org References: <20221222221244.1290833-1-kuba@kernel.org> <20221222221244.1290833-3-kuba@kernel.org> <87r0u6j721.ffs@tglx> <20230303133143.7b35433f@kernel.org> <20230303223739.GC1301832@paulmck-ThinkPad-P17-Gen-1> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230303223739.GC1301832@paulmck-ThinkPad-P17-Gen-1> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 03, 2023 at 02:37:39PM -0800, Paul E. McKenney wrote: > On Fri, Mar 03, 2023 at 01:31:43PM -0800, Jakub Kicinski wrote: > > On Fri, 03 Mar 2023 14:30:46 +0100 Thomas Gleixner wrote: > > > > - if (time_before(jiffies, end) && !need_resched() && > > > > - --max_restart) > > > > + unsigned long limit; > > > > + > > > > + if (time_is_before_eq_jiffies(end) || !--max_restart) > > > > + limit = SOFTIRQ_OVERLOAD_TIME; > > > > + else if (need_resched()) > > > > + limit = SOFTIRQ_DEFER_TIME; > > > > + else > > > > goto restart; > > > > > > > > + __this_cpu_write(overload_limit, jiffies + limit); > > > > > > The logic of all this is non-obvious and I had to reread it 5 times to > > > conclude that it is matching the intent. Please add comments. > > > > > > While I'm not a big fan of heuristical duct tape, this looks harmless > > > enough to not end up in an endless stream of tweaking. Famous last > > > words... > > > > Would it all be more readable if I named the "overload_limit" > > "overloaded_until" instead? Naming.. > > I'll add comments, too. > > > > > But without the sched_clock() changes the actual defer time depends on > > > HZ and the point in time where limit is set. That means it ranges from 0 > > > to 1/HZ, i.e. the 2ms defer time ends up with close to 10ms on HZ=100 in > > > the worst case, which perhaps explains the 8ms+ stalls you are still > > > observing. Can you test with that sched_clock change applied, i.e. the > > > first two commits from > > > > > > git://git.kernel.org/pub/scm/linux/kernel/git/peterz/queue.git core/softirq > > > > > > 59be25c466d9 ("softirq: Use sched_clock() based timeout") > > > bd5a5bd77009 ("softirq: Rewrite softirq processing loop") > > > > Those will help, but I spent some time digging into the jiffies related > > warts with kprobes - while annoying they weren't a major source of wake > > ups. (FWIW the jiffies noise on our workloads is due to cgroup stats > > disabling IRQs for multiple ms on the timekeeping CPU). > > > > Here are fresh stats on why we wake up ksoftirqd on our Web workload > > (collected over 100 sec): > > > > Time exceeded: 484 > > Loop max run out: 6525 > > need_resched(): 10219 > > (control: 17226 - number of times wakeup_process called for ksirqd) > > > > As you can see need_resched() dominates. > > > > Zooming into the time exceeded - we can count nanoseconds between > > __do_softirq starting and the check. This is the histogram of actual > > usecs as seen by BPF (AKA ktime_get_mono_fast_ns() / 1000): > > > > [256, 512) 1 | | > > [512, 1K) 0 | | > > [1K, 2K) 217 |@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ | > > [2K, 4K) 266 |@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@| > > > > So yes, we can probably save ourselves ~200 wakeup with a better clock > > but that's just 1.3% of the total wake ups :( > > > > > > Now - now about the max loop count. I ORed the pending softirqs every > > time we get to the end of the loop. Looks like vast majority of the > > loop counter wake ups are exclusively due to RCU: > > > > @looped[512]: 5516 > > > > Where 512 is the ORed pending mask over all iterations > > 512 == 1 << RCU_SOFTIRQ. > > > > And they usually take less than 100us to consume the 10 iterations. > > Histogram of usecs consumed when we run out of loop iterations: > > > > [16, 32) 3 | | > > [32, 64) 4786 |@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@| > > [64, 128) 871 |@@@@@@@@@ | > > [128, 256) 34 | | > > [256, 512) 9 | | > > [512, 1K) 262 |@@ | > > [1K, 2K) 35 | | > > [2K, 4K) 1 | | > > > > Paul, is this expected? Is RCU not trying too hard to be nice? > > This is from way back in the day, so it is quite possible that better > tuning and/or better heuristics should be applied. > > On the other hand, 100 microseconds is a good long time from an > CONFIG_PREEMPT_RT=y perspective! > > > # cat /sys/module/rcutree/parameters/blimit > > 10 > > > > Or should we perhaps just raise the loop limit? Breaking after less > > than 100usec seems excessive :( > > But note that RCU also has rcutree.rcu_divisor, which defaults to 7. > And an rcutree.rcu_resched_ns, which defaults to three milliseconds > (3,000,000 nanoseconds). This means that RCU will do: > > o All the callbacks if there are less than ten. > > o Ten callbacks or 1/128th of them, whichever is larger. > > o Unless the larger of them is more than 100 callbacks, in which > case there is an additional limit of three milliseconds worth > of them. > > Except that if a given CPU ends up with more than 10,000 callbacks > (rcutree.qhimark), that CPU's blimit is set to 10,000. Also, if in the context of a softirq handler (as opposed to ksoftirqd) that interrupted the idle task with no pending task, the count of callbacks is ignored and only the 3-millisecond limit counts. In the context of ksoftirq, the only limit is that which the scheduler chooses to impose. But it sure seems like the ksoftirqd case should also pay attention to that 3-millisecond limit. I will queue a patch to that effect, and maybe Eric Dumazet will show me the error of my ways. > So there is much opportunity to tune the existing heuristics and also > much opportunity to tweak the heuristics themselves. > > But let's see a good use case before tweaking, please. ;-) Thanx, Paul > > > whether that makes a difference? Those two can be applied with some > > > minor polishing. The rest of that series is broken by f10020c97f4c > > > ("softirq: Allow early break"). > > > > > > There is another issue with this overload limit. Assume max_restart or > > > timeout triggered and limit was set to now + 100ms. ksoftirqd runs and > > > gets the issue resolved after 10ms. > > > > > > So for the remaining 90ms any invocation of raise_softirq() outside of > > > (soft)interrupt context, which wakes ksoftirqd again, prevents > > > processing on return from interrupt until ksoftirqd gets on the CPU and > > > goes back to sleep, because task_is_running() == true and the stale > > > limit is not after jiffies. > > > > > > Probably not a big issue, but someone will notice on some weird workload > > > sooner than later and the tweaking will start nevertheless. :) So maybe > > > we fix it right away. :) > > > > Hm, Paolo raised this point as well, but the overload time is strictly > > to stop paying attention to the fact ksoftirqd is running. > > IOW current kernels behave as if they had overload_limit of infinity. > > > > The current code already prevents processing until ksoftirqd schedules > > in, after raise_softirq() from a funky context.