Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5919049rdb; Thu, 14 Dec 2023 03:38:14 -0800 (PST) X-Google-Smtp-Source: AGHT+IEdCCgiYdzVJLedOVV3CiK0puhmhjtpW1frOW9h+Qv/LOw3N2TwvFHqOD0pmFGx3QSynSni X-Received: by 2002:a05:6a21:9985:b0:191:520b:6d92 with SMTP id ve5-20020a056a21998500b00191520b6d92mr6131369pzb.63.1702553893807; Thu, 14 Dec 2023 03:38:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702553893; cv=none; d=google.com; s=arc-20160816; b=OTNK+Bd5ZnfRO6jC/UciK/KZe4MxthXmasijeUWf/cWyDsYR8OCB8Rcu2nWPMNrYyg 3DGbHBBrjNo0hsnW5vKs7smbZ/ZbPCctnkq0e6tyfnum0eF6gw47p2AzEAqdWsy3en/s S3DJuoZqnxenZhEMlNsmubLy2QKK9dRv0co4P//+FQWOJyubv1gDaVDhe1zuSKjJoEDg SAGHzaRlLdLLbGdSd+/39PGcJWTMyoKxOsZH9Fshg9I35R8sy7lI+vwIjDT62mknztT1 l73DskelHa+yLwWjIG/74noJEU+qD6E2sjDtQzNX09cMBY/6//Xg/xkk89nIqH0Nug3Y NoOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=5pP4k6G5GCkYu5ThkDLUvhZewmIJPZ47AUOgHmYSmD4=; fh=HBNJCb1O5m4cQgWGcwqoKY3KTbKsr5rANYvH6uVWzvA=; b=Kor0Z/KSq1NFOnOyyEt0lIwt+iW6fxdyk9043LX+tS7LB8vGDu1PbzIDolwuHbUHaO Io1D5HuHbDJuqH75O/fwseV7gEDsHHbzj25DdK6NJEE+btTYzsMIyJSEPLYjXj2gJKXt ikKkkE3eZZ8OsRCf4jXUJUE4rZp+20t4g190I1bdhc7OrWxzM8at0OSZUrVykuPQ9PEd 2PnuNypwFfR6NmSDt59f37geutPf+EI9+oukIHBJiTgGHHeqV+P1exq7jqJrN12Q9IVF ++LAciChUOeyPmhAxNyuZQ0pBiZKdLelrruf+iGkLLhB89EJkXY6ZPoPmwRZz3IyeMum InDA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id r11-20020a65508b000000b005b95fbb1745si11179027pgp.562.2023.12.14.03.38.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Dec 2023 03:38:13 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id C7B438076650; Thu, 14 Dec 2023 03:38:10 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1444034AbjLNLh5 (ORCPT + 99 others); Thu, 14 Dec 2023 06:37:57 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54956 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1444097AbjLNLhv (ORCPT ); Thu, 14 Dec 2023 06:37:51 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 03CC118A for ; Thu, 14 Dec 2023 03:37:57 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 565A9C15; Thu, 14 Dec 2023 03:38:42 -0800 (PST) Received: from [10.1.197.60] (eglon.cambridge.arm.com [10.1.197.60]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 485A73F738; Thu, 14 Dec 2023 03:37:54 -0800 (PST) Message-ID: Date: Thu, 14 Dec 2023 11:37:52 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH v7 14/24] x86/resctrl: Allow resctrl_arch_rmid_read() to sleep Content-Language: en-GB To: babu.moger@amd.com, x86@kernel.org, linux-kernel@vger.kernel.org Cc: Fenghua Yu , Reinette Chatre , Thomas Gleixner , Ingo Molnar , Borislav Petkov , H Peter Anvin , shameerali.kolothum.thodi@huawei.com, D Scott Phillips OS , carl@os.amperecomputing.com, lcherian@marvell.com, bobo.shaobowang@huawei.com, tan.shaopeng@fujitsu.com, baolin.wang@linux.alibaba.com, Jamie Iles , Xin Hao , peternewman@google.com, dfustini@baylibre.com, amitsinght@marvell.com References: <20231025180345.28061-1-james.morse@arm.com> <20231025180345.28061-15-james.morse@arm.com> <1d28db1a-196d-4aaf-922a-12ce31d71aa2@amd.com> From: James Morse In-Reply-To: <1d28db1a-196d-4aaf-922a-12ce31d71aa2@amd.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Thu, 14 Dec 2023 03:38:11 -0800 (PST) Hi Babu, On 09/11/2023 20:42, Moger, Babu wrote: > On 10/25/23 13:03, James Morse wrote: >> MPAM's cache occupancy counters can take a little while to settle once >> the monitor has been configured. The maximum settling time is described >> to the driver via a firmware table. The value could be large enough >> that it makes sense to sleep. To avoid exposing this to resctrl, it >> should be hidden behind MPAM's resctrl_arch_rmid_read(). >> >> resctrl_arch_rmid_read() may be called via IPI meaning it is unable >> to sleep. In this case resctrl_arch_rmid_read() should return an error >> if it needs to sleep. This will only affect MPAM platforms where >> the cache occupancy counter isn't available immediately, nohz_full is >> in use, and there are no housekeeping CPUs in the necessary domain. >> >> There are three callers of resctrl_arch_rmid_read(): >> __mon_event_count() and __check_limbo() are both called from a >> non-migrateable context. mon_event_read() invokes __mon_event_count() >> using smp_call_on_cpu(), which adds work to the target CPUs workqueue. >> rdtgroup_mutex() is held, meaning this cannot race with the resctrl >> cpuhp callback. __check_limbo() is invoked via schedule_delayed_work_on() >> also adds work to a per-cpu workqueue. >> >> The remaining call is add_rmid_to_limbo() which is called in response >> to a user-space syscall that frees an RMID. This opportunistically >> reads the LLC occupancy counter on the current domain to see if the >> RMID is over the dirty threshold. This has to disable preemption to >> avoid reading the wrong domain's value. Disabling pre-emption here >> prevents resctrl_arch_rmid_read() from sleeping. > I dont know what did you mean by "This has to disable preemption to > avoid reading the wrong domain's value." Pre-emption lets this thread be scheduled out, and potentially scheduled back in on a different CPU, possibly in a different domain. Any code with the concept of 'this domain' has to to ensure it can't be migrated. Disabling pre-emption is the most common way of doing that. Disabling pre-emption also prevents the thread from sleeping, because it can't be scheduled out. > Who is disabling the preemption here? Is that specific to ARM? > Can you please make that clear? Or Am i missing something? add_rmid_to_limbo() is calling get_cpu(), which raises the pre-empt counter. If it only wanted the CPU number it could have just called smp_processor_id() - but that wouldn't be safe because the thread can be migrated, meaning the cpu number can change. All this is to ensure that cpumask_test_cpu() and resctrl_arch_rmid_read() run on the same CPU. Thanks, James >> add_rmid_to_limbo() walks each domain, but only reads the counter >> on one domain. If the system has more than one domain, the RMID will >> always be added to the limbo list. If the RMIDs usage was not over the >> threshold, it will be removed from the list when __check_limbo() runs. >> Make this the default behaviour. Free RMIDs are always added to the >> limbo list for each domain. >> >> The user visible effect of this is that a clean RMID is not available >> for re-allocation immediately after 'rmdir()' completes, this behaviour >> was never portable as it never happened on a machine with multiple >> domains. >> >> Removing this path allows resctrl_arch_rmid_read() to sleep if its called >> with interrupts unmasked. Document this is the expected behaviour, and >> add a might_sleep() annotation to catch changes that won't work on arm64. >> diff --git a/arch/x86/kernel/cpu/resctrl/monitor.c b/arch/x86/kernel/cpu/resctrl/monitor.c >> index fa3319021881..409817b0ae2c 100644 >> --- a/arch/x86/kernel/cpu/resctrl/monitor.c >> +++ b/arch/x86/kernel/cpu/resctrl/monitor.c >> @@ -464,17 +464,7 @@ static void add_rmid_to_limbo(struct rmid_entry *entry) >> idx = resctrl_arch_rmid_idx_encode(entry->closid, entry->rmid); >> >> entry->busy = 0; >> - cpu = get_cpu(); >> list_for_each_entry(d, &r->domains, list) { >> - if (cpumask_test_cpu(cpu, &d->cpu_mask)) { >> - err = resctrl_arch_rmid_read(r, d, entry->closid, >> - entry->rmid, >> - QOS_L3_OCCUP_EVENT_ID, >> - &val); >> - if (err || val <= resctrl_rmid_realloc_threshold) >> - continue; >> - } >> - >> /* >> * For the first limbo RMID in the domain, >> * setup up the limbo worker. >> @@ -484,15 +474,10 @@ static void add_rmid_to_limbo(struct rmid_entry *entry) >> set_bit(idx, d->rmid_busy_llc); >> entry->busy++; >> } >> - put_cpu(); >> >> - if (entry->busy) { >> - rmid_limbo_count++; >> - if (IS_ENABLED(CONFIG_RESCTRL_RMID_DEPENDS_ON_CLOSID)) >> - closid_num_dirty_rmid[entry->closid]++; >> - } else { >> - list_add_tail(&entry->list, &rmid_free_lru); >> - } >> + rmid_limbo_count++; >> + if (IS_ENABLED(CONFIG_RESCTRL_RMID_DEPENDS_ON_CLOSID)) >> + closid_num_dirty_rmid[entry->closid]++; >> } >>