Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp36950454rwd; Tue, 11 Jul 2023 07:41:12 -0700 (PDT) X-Google-Smtp-Source: APBJJlGliE8gvi+Q0ZC958mFv5iTrVUSuISjHBp0ZgFAMNrVQnPQgTOJk6bTOTBkH974L9ZUJ0MY X-Received: by 2002:a05:6512:3ac:b0:4f8:62a6:8b2 with SMTP id v12-20020a05651203ac00b004f862a608b2mr11941864lfp.46.1689086472080; Tue, 11 Jul 2023 07:41:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1689086472; cv=none; d=google.com; s=arc-20160816; b=tyLgmeoesNq9RHDWHlnck7ycj9bAoIrqp32+Cip6ncD+nyRcfrb06ilrHaTZh/DPwd V1K3jLaxF59H5wOs4HPX5iulPatZu00R6Djfj4g8eO0SnbBq/yqCxcXX9GIn1HDgYg9/ ULGljAGv5uCBjCQQsSFaQ83Kw5/WbEtOfGViSakV2d2n/PVOrud8Fd1M7DADPt0YsrnT Wd4z2V2MI+zxs0tQ1PiCgk7u7zwVRG8VenLX2srXKwUXilZ43ZwMiwfl6IsJPyaONf2x U1zxhaQxf3ww6DU1YwiDbjICVjfZ46hCqG6Nj1HX0AX16CtZQeEM1iZ03ogvQtUsTqAM Gq5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=1pOGR1OljASy2bUmotj5py8g/E83mf7vWRZig5PbuEs=; fh=M2CE1Bvtm1SBXbBqRuDoJxhFdGmfgKZ6ZCCt02Bkls8=; b=FY9q/Tg1dDILW2EotsbYqhr3QqFXujAMWZ/fhdJep5cTXwIT51bbt1XIddgAxbGLm/ X6McHzCCYCb6E6Y+mU2rxn30NlIZGj4GheUuGpgiLO8fhD+3D0dnQA/lJo747N7/omPh L4LorClF7EwM+tSaxbdzbSU4hSSvaFhlhOqjoOKWa1SKkTDDuWouCkf+vOgSgafr7WFN 1tCLgWJw5JqPw3Y7sacgBT/G9+HuV1FTiOX6bdNrGeH/TXy4028LKOxK5vn60kH0j4hx ZyjJb5xSbDnAbVEwoJ2OOGr01Lu3CQQ/ECfMJ6cR+ED325j1adVOX/l1tNZA0NyQJxLb UHLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BOVaF+dK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j15-20020a50ed0f000000b0051e05151467si2206890eds.224.2023.07.11.07.40.47; Tue, 11 Jul 2023 07:41:12 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=BOVaF+dK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232888AbjGKOQB (ORCPT + 99 others); Tue, 11 Jul 2023 10:16:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52464 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233358AbjGKOP7 (ORCPT ); Tue, 11 Jul 2023 10:15:59 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A411012A for ; Tue, 11 Jul 2023 07:15:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1689084905; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=1pOGR1OljASy2bUmotj5py8g/E83mf7vWRZig5PbuEs=; b=BOVaF+dKD0Klr4F9aOs3vWa0qTrzpoba56ox87OVWzeZ1CXV5WiWk5V//6zY2sjsQign5r o+ldsS2J9Lp9AbFnnNKq4ddEEMpXZP5mcyDQWAkA4yRKgr0R1MYqH/zFIVKKBLLFFb4SwG SUvuftEqpnxgB5/VVV1ic2wYuddLwAk= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-414-RLSu_dQkM8CP6iyDbHG9sg-1; Tue, 11 Jul 2023 10:15:03 -0400 X-MC-Unique: RLSu_dQkM8CP6iyDbHG9sg-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 8F9D7108BD88; Tue, 11 Jul 2023 14:12:13 +0000 (UTC) Received: from lorien.usersys.redhat.com (unknown [10.22.17.109]) by smtp.corp.redhat.com (Postfix) with ESMTPS id F118E200B406; Tue, 11 Jul 2023 14:12:12 +0000 (UTC) Date: Tue, 11 Jul 2023 10:12:10 -0400 From: Phil Auld To: Benjamin Segall Cc: linux-kernel@vger.kernel.org, Juri Lelli , Ingo Molnar , Daniel Bristot de Oliveira , Peter Zijlstra , Vincent Guittot , Dietmar Eggemann , Valentin Schneider , Steven Rostedt , Mel Gorman , Frederic Weisbecker , Tejun Heo Subject: Re: [PATCH v5 2/2] Sched/fair: Block nohz tick_stop when cfs bandwidth in use Message-ID: <20230711141210.GC150804@lorien.usersys.redhat.com> References: <20230707195748.2918490-1-pauld@redhat.com> <20230707195748.2918490-3-pauld@redhat.com> <20230711131024.GA150804@lorien.usersys.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230711131024.GA150804@lorien.usersys.redhat.com> X-Scanned-By: MIMEDefang 3.1 on 10.11.54.4 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H4,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 11, 2023 at 09:10:24AM -0400 Phil Auld wrote: > On Mon, Jul 10, 2023 at 04:54:58PM -0700 Benjamin Segall wrote: > > Phil Auld writes: > > > > > CFS bandwidth limits and NOHZ full don't play well together. Tasks > > > can easily run well past their quotas before a remote tick does > > > accounting. This leads to long, multi-period stalls before such > > > tasks can run again. Currently, when presented with these conflicting > > > requirements the scheduler is favoring nohz_full and letting the tick > > > be stopped. However, nohz tick stopping is already best-effort, there > > > are a number of conditions that can prevent it, whereas cfs runtime > > > bandwidth is expected to be enforced. > > > > > > Make the scheduler favor bandwidth over stopping the tick by setting > > > TICK_DEP_BIT_SCHED when the only running task is a cfs task with > > > runtime limit enabled. We use cfs_b->hierarchical_quota to > > > determine if the task requires the tick. > > > > > > Add check in pick_next_task_fair() as well since that is where > > > we have a handle on the task that is actually going to be running. > > > > > > Add check in sched_can_stop_tick() to cover some edge cases such > > > as nr_running going from 2->1 and the 1 remains the running task. > > > > > > Add sched_feat HZ_BW (off by default) to control the tick_stop > > > behavior. > > > > > > Signed-off-by: Phil Auld > > > Cc: Ingo Molnar > > > Cc: Peter Zijlstra > > > Cc: Vincent Guittot > > > Cc: Juri Lelli > > > Cc: Dietmar Eggemann > > > Cc: Valentin Schneider > > > Cc: Ben Segall > > > Cc: Frederic Weisbecker > > > --- > > > kernel/sched/core.c | 12 ++++++++++ > > > kernel/sched/fair.c | 49 +++++++++++++++++++++++++++++++++++++++++ > > > kernel/sched/features.h | 2 ++ > > > kernel/sched/sched.h | 1 + > > > 4 files changed, 64 insertions(+) > > > > > > diff --git a/kernel/sched/core.c b/kernel/sched/core.c > > > index 1b214e10c25d..4b8534abdf4f 100644 > > > --- a/kernel/sched/core.c > > > +++ b/kernel/sched/core.c > > > @@ -1229,6 +1229,18 @@ bool sched_can_stop_tick(struct rq *rq) > > > if (rq->nr_running > 1) > > > return false; > > > > > > + /* > > > + * If there is one task and it has CFS runtime bandwidth constraints > > > + * and it's on the cpu now we don't want to stop the tick. > > > + * This check prevents clearing the bit if a newly enqueued task here is > > > + * dequeued by migrating while the constrained task continues to run. > > > + * E.g. going from 2->1 without going through pick_next_task(). > > > + */ > > > + if (sched_feat(HZ_BW) && rq->nr_running == 1 && task_on_rq_queued(rq->curr)) { > > > + if (cfs_task_bw_constrained(rq->curr)) > > > + return false; > > > + } > > > + > > > > I think we still need the fair_sched_class check with the bit being on > > cfs_rq/tg rather than task. > > > > Is there a way a non-fair_sched_class task will be in a cfs_rq with > cfs_rq->runtime_enabled and/or cfs_b->hierarchical_quota set to non > RUNTIME_INF? I suppose if they are stale and it's had its class changed? > > That makes the condition pretty ugly but I can add that back if needed. > Sigh, yeah. I took that out when I had the bit in the task. I'll put it back in... Cheers, Phil > > Thanks, > Phil > > > > -- > --