Message ID | 1498130534-26568-3-git-send-email-root@ip-172-31-39-62.us-west-2.compute.internal (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
On 22/06/2017 13:22, root wrote: > ============================================================== > > +poll_grow: (X86 only) > + > +This parameter is multiplied in the grow_poll_ns() to increase the poll time. > +By default, the values is 2. > + > +============================================================== > +poll_shrink: (X86 only) > + > +This parameter is divided in the shrink_poll_ns() to reduce the poll time. > +By default, the values is 2. Even before starting the debate on whether this is a good idea or a bad idea, KVM reduces the polling value to the minimum (10 us) by default when polling fails. Also, it shouldn't be bound to CONFIG_HYPERVISOR_GUEST, since there's nothing specific to virtual machines here. Regarding the good/bad idea part, KVM's polling is made much more acceptable by single_task_running(). At least you need to integrate it with paravirtualization. If the VM is scheduled out, you shrink the polling period. There is already vcpu_is_preempted for this, it is used by mutexes. Paolo
On Thu, 22 Jun 2017, root wrote: > @@ -962,6 +962,7 @@ __visible void __irq_entry smp_apic_timer_interrupt(struct pt_regs *regs) > * interrupt lock, which is the WrongThing (tm) to do. > */ > entering_ack_irq(); > + check_poll(); No way, that we sprinkle this function into every interrupt hotpath. There are enough genuine ways to do that w/o touching a gazillion of files. > #ifdef CONFIG_HYPERVISOR_GUEST > +static unsigned int grow_poll_ns(unsigned int old, unsigned int grow, > + unsigned int max) > +{ > + unsigned int val; > + > + /* 10us as base poll duration */ > + if (old == 0 && grow) > + return 10000; > + > + val = old * grow; > + if (val > max) > + val = max; > + > + return val; > +} > + > +static unsigned int shrink_poll_ns(unsigned int old, unsigned int shrink) > +{ > + if (shrink == 0) > + return 0; > + > + return old / shrink; > +} > + > +void check_poll(void) > +{ > + unsigned int val, poll_duration; > + unsigned long begin_ns, now_ns; > + > + if (!poll_threshold_ns) > + return; If at all then this needs to be a static key based decision. > + > + begin_ns = this_cpu_read(poll_begin_ns); > + /* Not from halt state */ > + if (!begin_ns) > + return; If you integrate this stuff into the proper place, then the whole mess goes away. We really do not need another facility to track idle state. We have enough already, really. Thanks, tglx
Hi Yang, [auto build test WARNING on linus/master] [also build test WARNING on v4.12-rc6] [cannot apply to tip/x86/core next-20170622] [if your patch is applied to the wrong git tree, please drop us a note to help improve the system] url: https://github.com/0day-ci/linux/commits/root/x86-idle-add-halt-poll-for-halt-idle/20170623-061318 config: i386-randconfig-x016-06222129 (attached as .config) compiler: gcc-6 (Debian 6.2.0-3) 6.2.0 20160901 reproduce: # save the attached .config to linux build tree make ARCH=i386 Note: it may well be a FALSE warning. FWIW you are at least aware of it now. http://gcc.gnu.org/wiki/Better_Uninitialized_Warnings All warnings (new ones prefixed by >>): In file included from arch/x86/include/asm/preempt.h:5:0, from include/linux/preempt.h:80, from include/linux/spinlock.h:50, from include/linux/mmzone.h:7, from include/linux/gfp.h:5, from include/linux/mm.h:9, from arch/x86/kernel/process.c:5: arch/x86/kernel/process.c: In function 'check_poll': >> arch/x86/include/asm/percpu.h:109:3: warning: 'val' may be used uninitialized in this function [-Wmaybe-uninitialized] asm(op "l %1,"__percpu_arg(0) \ ^~~ arch/x86/kernel/process.c:351:15: note: 'val' was declared here unsigned int val, poll_duration; ^~~ -- In file included from arch/x86/include/asm/preempt.h:5:0, from include/linux/preempt.h:80, from include/linux/spinlock.h:50, from include/linux/mmzone.h:7, from include/linux/gfp.h:5, from include/linux/mm.h:9, from arch/x86//kernel/process.c:5: arch/x86//kernel/process.c: In function 'check_poll': >> arch/x86/include/asm/percpu.h:109:3: warning: 'val' may be used uninitialized in this function [-Wmaybe-uninitialized] asm(op "l %1,"__percpu_arg(0) \ ^~~ arch/x86//kernel/process.c:351:15: note: 'val' was declared here unsigned int val, poll_duration; ^~~ vim +/val +109 arch/x86/include/asm/percpu.h 0f5e4816 arch/x86/include/asm/percpu.h Tejun Heo 2009-10-29 93 pto_T__ pto_tmp__; \ 0f5e4816 arch/x86/include/asm/percpu.h Tejun Heo 2009-10-29 94 pto_tmp__ = (val); \ 23b764d0 arch/x86/include/asm/percpu.h Andi Kleen 2010-06-10 95 (void)pto_tmp__; \ bc9e3be2 include/asm-x86/percpu.h Joe Perches 2008-03-23 96 } \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 97 switch (sizeof(var)) { \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 98 case 1: \ 87b26406 arch/x86/include/asm/percpu.h Brian Gerst 2009-01-19 99 asm(op "b %1,"__percpu_arg(0) \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 100 : "+m" (var) \ 0f5e4816 arch/x86/include/asm/percpu.h Tejun Heo 2009-10-29 101 : "qi" ((pto_T__)(val))); \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 102 break; \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 103 case 2: \ 87b26406 arch/x86/include/asm/percpu.h Brian Gerst 2009-01-19 104 asm(op "w %1,"__percpu_arg(0) \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 105 : "+m" (var) \ 0f5e4816 arch/x86/include/asm/percpu.h Tejun Heo 2009-10-29 106 : "ri" ((pto_T__)(val))); \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 107 break; \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 108 case 4: \ 87b26406 arch/x86/include/asm/percpu.h Brian Gerst 2009-01-19 @109 asm(op "l %1,"__percpu_arg(0) \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 110 : "+m" (var) \ 0f5e4816 arch/x86/include/asm/percpu.h Tejun Heo 2009-10-29 111 : "ri" ((pto_T__)(val))); \ 3334052a include/asm-x86/percpu.h travis@sgi.com 2008-01-30 112 break; \ 9939ddaf arch/x86/include/asm/percpu.h Tejun Heo 2009-01-13 113 case 8: \ 87b26406 arch/x86/include/asm/percpu.h Brian Gerst 2009-01-19 114 asm(op "q %1,"__percpu_arg(0) \ 9939ddaf arch/x86/include/asm/percpu.h Tejun Heo 2009-01-13 115 : "+m" (var) \ 0f5e4816 arch/x86/include/asm/percpu.h Tejun Heo 2009-10-29 116 : "re" ((pto_T__)(val))); \ 9939ddaf arch/x86/include/asm/percpu.h Tejun Heo 2009-01-13 117 break; \ :::::: The code at line 109 was first introduced by commit :::::: 87b264065880fa696c121dad8498a60524e0f6de x86-64: Use absolute displacements for per-cpu accesses. :::::: TO: Brian Gerst <brgerst@gmail.com> :::::: CC: Tejun Heo <tj@kernel.org> --- 0-DAY kernel test infrastructure Open Source Technology Center https://lists.01.org/pipermail/kbuild-all Intel Corporation
On 2017/6/22 19:51, Paolo Bonzini wrote: > > > On 22/06/2017 13:22, root wrote: >> ============================================================== >> >> +poll_grow: (X86 only) >> + >> +This parameter is multiplied in the grow_poll_ns() to increase the poll time. >> +By default, the values is 2. >> + >> +============================================================== >> +poll_shrink: (X86 only) >> + >> +This parameter is divided in the shrink_poll_ns() to reduce the poll time. >> +By default, the values is 2. > > Even before starting the debate on whether this is a good idea or a bad > idea, KVM reduces the polling value to the minimum (10 us) by default I noticed it. It looks like the logic inside KVM is more reasonable. I will do more testing to compare the two. > when polling fails. Also, it shouldn't be bound to > CONFIG_HYPERVISOR_GUEST, since there's nothing specific to virtual > machines here. Yes. The original idea to use CONFIG_HYPERVISOR_GUEST because this mechanism will only helpful inside VM. But as Thomas mentioned on other thread it is wrong to use it since most distribution kernel will set it to yes and still affect the bare metal. I will integrate it with paravirtualizaion part as you suggested in below. > > Regarding the good/bad idea part, KVM's polling is made much more > acceptable by single_task_running(). At least you need to integrate it > with paravirtualization. If the VM is scheduled out, you shrink the > polling period. There is already vcpu_is_preempted for this, it is used > by mutexes. I have considered single_task_running() before. But since there is no such paravirtual interface currently and i am not sure whether it is a information leak from host if introducing such interface, so i didn't do it. Do you mean vcpu_is_preempted can do the same thing? I check the code and seems it only tells whether the VCPU is scheduled out or not which cannot satisfy the needs. > > Paolo >
On 2017/6/22 22:32, Thomas Gleixner wrote: > On Thu, 22 Jun 2017, root wrote: >> @@ -962,6 +962,7 @@ __visible void __irq_entry smp_apic_timer_interrupt(struct pt_regs *regs) >> * interrupt lock, which is the WrongThing (tm) to do. >> */ >> entering_ack_irq(); >> + check_poll(); > > No way, that we sprinkle this function into every interrupt hotpath. There > are enough genuine ways to do that w/o touching a gazillion of files. I will find a more correct place to call this function. > >> #ifdef CONFIG_HYPERVISOR_GUEST >> +static unsigned int grow_poll_ns(unsigned int old, unsigned int grow, >> + unsigned int max) >> +{ >> + unsigned int val; >> + >> + /* 10us as base poll duration */ >> + if (old == 0 && grow) >> + return 10000; >> + >> + val = old * grow; >> + if (val > max) >> + val = max; >> + >> + return val; >> +} >> + >> +static unsigned int shrink_poll_ns(unsigned int old, unsigned int shrink) >> +{ >> + if (shrink == 0) >> + return 0; >> + >> + return old / shrink; >> +} >> + >> +void check_poll(void) >> +{ >> + unsigned int val, poll_duration; >> + unsigned long begin_ns, now_ns; >> + >> + if (!poll_threshold_ns) >> + return; > > If at all then this needs to be a static key based decision. Sure, will do it. > >> + >> + begin_ns = this_cpu_read(poll_begin_ns); >> + /* Not from halt state */ >> + if (!begin_ns) >> + return; > > If you integrate this stuff into the proper place, then the whole mess goes > away. We really do not need another facility to track idle state. We have > enough already, really. Agree, I will check current code to find a more proper way to do the check. > > Thanks, > > tglx >
On 2017/6/23 11:58, Yang Zhang wrote: > On 2017/6/22 19:51, Paolo Bonzini wrote: >> >> >> On 22/06/2017 13:22, root wrote: >>> ============================================================== >>> >>> +poll_grow: (X86 only) >>> + >>> +This parameter is multiplied in the grow_poll_ns() to increase the >>> poll time. >>> +By default, the values is 2. >>> + >>> +============================================================== >>> +poll_shrink: (X86 only) >>> + >>> +This parameter is divided in the shrink_poll_ns() to reduce the poll >>> time. >>> +By default, the values is 2. >> >> Even before starting the debate on whether this is a good idea or a bad >> idea, KVM reduces the polling value to the minimum (10 us) by default > > I noticed it. It looks like the logic inside KVM is more reasonable. I > will do more testing to compare the two. > >> when polling fails. Also, it shouldn't be bound to >> CONFIG_HYPERVISOR_GUEST, since there's nothing specific to virtual >> machines here. > > Yes. The original idea to use CONFIG_HYPERVISOR_GUEST because this > mechanism will only helpful inside VM. But as Thomas mentioned on other > thread it is wrong to use it since most distribution kernel will set it > to yes and still affect the bare metal. I will integrate it with > paravirtualizaion part as you suggested in below. > >> >> Regarding the good/bad idea part, KVM's polling is made much more >> acceptable by single_task_running(). At least you need to integrate it >> with paravirtualization. If the VM is scheduled out, you shrink the >> polling period. There is already vcpu_is_preempted for this, it is used >> by mutexes. > > I have considered single_task_running() before. But since there is no > such paravirtual interface currently and i am not sure whether it is a > information leak from host if introducing such interface, so i didn't do > it. Do you mean vcpu_is_preempted can do the same thing? I check the > code and seems it only tells whether the VCPU is scheduled out or not > which cannot satisfy the needs. Hi Paolo Can you help to answer my confusion? I have double checked the code, but still not get your point. Do you think it is necessary to introduce an paravirtual interface to expose single_task_running() to guest?
On 27/06/2017 13:22, Yang Zhang wrote: >>> >>> Regarding the good/bad idea part, KVM's polling is made much more >>> acceptable by single_task_running(). At least you need to integrate it >>> with paravirtualization. If the VM is scheduled out, you shrink the >>> polling period. There is already vcpu_is_preempted for this, it is used >>> by mutexes. >> >> I have considered single_task_running() before. But since there is no >> such paravirtual interface currently and i am not sure whether it is a >> information leak from host if introducing such interface, so i didn't do >> it. Do you mean vcpu_is_preempted can do the same thing? I check the >> code and seems it only tells whether the VCPU is scheduled out or not >> which cannot satisfy the needs. > > Can you help to answer my confusion? I have double checked the code, but > still not get your point. Do you think it is necessary to introduce an > paravirtual interface to expose single_task_running() to guest? I think vcpu_is_preempted is a good enough replacement. Paolo
2017-06-27 20:07 GMT+08:00 Paolo Bonzini <pbonzini@redhat.com>: > > > On 27/06/2017 13:22, Yang Zhang wrote: >>>> >>>> Regarding the good/bad idea part, KVM's polling is made much more >>>> acceptable by single_task_running(). At least you need to integrate it >>>> with paravirtualization. If the VM is scheduled out, you shrink the >>>> polling period. There is already vcpu_is_preempted for this, it is used >>>> by mutexes. >>> >>> I have considered single_task_running() before. But since there is no >>> such paravirtual interface currently and i am not sure whether it is a >>> information leak from host if introducing such interface, so i didn't do >>> it. Do you mean vcpu_is_preempted can do the same thing? I check the >>> code and seems it only tells whether the VCPU is scheduled out or not >>> which cannot satisfy the needs. >> >> Can you help to answer my confusion? I have double checked the code, but >> still not get your point. Do you think it is necessary to introduce an >> paravirtual interface to expose single_task_running() to guest? > > I think vcpu_is_preempted is a good enough replacement. For example, vcpu->arch.st.steal.preempted is 0 when the vCPU is sched in and vmentry, then several tasks are enqueued on the same pCPU and waiting on cfs red-black tree, the guest should avoid to poll in this scenario, however, vcpu_is_preempted returns false and guest decides to poll. Regards, Wanpeng Li
On 27/06/2017 14:23, Wanpeng Li wrote: >>>> I have considered single_task_running() before. But since there is no >>>> such paravirtual interface currently and i am not sure whether it is a >>>> information leak from host if introducing such interface, so i didn't do >>>> it. Do you mean vcpu_is_preempted can do the same thing? I check the >>>> code and seems it only tells whether the VCPU is scheduled out or not >>>> which cannot satisfy the needs. >>> Can you help to answer my confusion? I have double checked the code, but >>> still not get your point. Do you think it is necessary to introduce an >>> paravirtual interface to expose single_task_running() to guest? > > I think vcpu_is_preempted is a good enough replacement. > For example, vcpu->arch.st.steal.preempted is 0 when the vCPU is sched > in and vmentry, then several tasks are enqueued on the same pCPU and > waiting on cfs red-black tree, the guest should avoid to poll in this > scenario, however, vcpu_is_preempted returns false and guest decides > to poll. ... which is not necessarily _wrong_. It's just a different heuristic. In the end, the guest could run with "idle=poll" even, and there's little the host scheduler can do about it, except treating it as a CPU bound task. Paolo
2017-06-27 14:28+0200, Paolo Bonzini: > On 27/06/2017 14:23, Wanpeng Li wrote: >>>>> I have considered single_task_running() before. But since there is no >>>>> such paravirtual interface currently and i am not sure whether it is a >>>>> information leak from host if introducing such interface, so i didn't do >>>>> it. Do you mean vcpu_is_preempted can do the same thing? I check the >>>>> code and seems it only tells whether the VCPU is scheduled out or not >>>>> which cannot satisfy the needs. >>>> Can you help to answer my confusion? I have double checked the code, but >>>> still not get your point. Do you think it is necessary to introduce an >>>> paravirtual interface to expose single_task_running() to guest? >> >> I think vcpu_is_preempted is a good enough replacement. >> For example, vcpu->arch.st.steal.preempted is 0 when the vCPU is sched >> in and vmentry, then several tasks are enqueued on the same pCPU and >> waiting on cfs red-black tree, the guest should avoid to poll in this >> scenario, however, vcpu_is_preempted returns false and guest decides >> to poll. > > ... which is not necessarily _wrong_. It's just a different heuristic. Right, it's just harder to use than host's single_task_running() -- the VCPU calling vcpu_is_preempted() is never preempted, so we have to look at other VCPUs that are not halted, but still preempted. If we see some ratio of preempted VCPUs (> 0?), then we stop polling and yield to the host. Working under the assumption that there is work for this PCPU if other VCPUs have stuff to do. The downside is that it misses information about host's topology, so it would be hard to make it work well.
On 27/06/2017 15:40, Radim Krčmář wrote: >> ... which is not necessarily _wrong_. It's just a different heuristic. > Right, it's just harder to use than host's single_task_running() -- the > VCPU calling vcpu_is_preempted() is never preempted, so we have to look > at other VCPUs that are not halted, but still preempted. > > If we see some ratio of preempted VCPUs (> 0?), then we stop polling and > yield to the host. Working under the assumption that there is work for > this PCPU if other VCPUs have stuff to do. The downside is that it > misses information about host's topology, so it would be hard to make it > work well. I would just use vcpu_is_preempted on the current CPU. From guest POV this option is really a "f*** everyone else" setting just like idle=poll, only a little more polite. If we've been preempted and we were polling, there are two cases. If an interrupt was queued while the guest was preempted, the poll will be treated as successful anyway. If it hasn't, let others run---but really that's not because the guest wants to be polite, it's to avoid that the scheduler penalizes it excessively. So until it's preempted, I think it's okay if the guest doesn't care about others. You wouldn't use this option anyway in overcommitted situations. (I'm still not very convinced about the idea). Paolo
2017-06-27 15:56+0200, Paolo Bonzini: > On 27/06/2017 15:40, Radim Krčmář wrote: >>> ... which is not necessarily _wrong_. It's just a different heuristic. >> Right, it's just harder to use than host's single_task_running() -- the >> VCPU calling vcpu_is_preempted() is never preempted, so we have to look >> at other VCPUs that are not halted, but still preempted. >> >> If we see some ratio of preempted VCPUs (> 0?), then we stop polling and >> yield to the host. Working under the assumption that there is work for >> this PCPU if other VCPUs have stuff to do. The downside is that it >> misses information about host's topology, so it would be hard to make it >> work well. > > I would just use vcpu_is_preempted on the current CPU. From guest POV > this option is really a "f*** everyone else" setting just like > idle=poll, only a little more polite. vcpu_is_preempted() on current cpu cannot return true, AFAIK. > If we've been preempted and we were polling, there are two cases. If an > interrupt was queued while the guest was preempted, the poll will be > treated as successful anyway. I think the poll should be treated as invalid if the window has expired while the VCPU was preempted -- the guest can't tell whether the interrupt arrived still within the poll window (unless we added paravirt for that), so it shouldn't be wasting time waiting for it. > If it hasn't, let others run---but really > that's not because the guest wants to be polite, it's to avoid that the > scheduler penalizes it excessively. This sounds like a VM entry just to do an immediate VM exit, so paravirt seems better here as well ... (the guest telling the host about its window -- which could also be used to rule it out as a target in the pause loop random kick.) > So until it's preempted, I think it's okay if the guest doesn't care > about others. You wouldn't use this option anyway in overcommitted > situations. > > (I'm still not very convinced about the idea). Me neither. (The same mechanism is applicable to bare-metal, but was never used there, so I would rather bring the guest behavior closer to bare-metal.)
On 27/06/2017 16:22, Radim Krčmář wrote:
> vcpu_is_preempted() on current cpu cannot return true, AFAIK.
Of course. I must have been thinking of an older version of the
vcpu_is_preempted patch (at some point the guest was the one that set
preempted to 0).
Paolo
On 2017/6/27 22:22, Radim Krčmář wrote: > 2017-06-27 15:56+0200, Paolo Bonzini: >> On 27/06/2017 15:40, Radim Krčmář wrote: >>>> ... which is not necessarily _wrong_. It's just a different heuristic. >>> Right, it's just harder to use than host's single_task_running() -- the >>> VCPU calling vcpu_is_preempted() is never preempted, so we have to look >>> at other VCPUs that are not halted, but still preempted. >>> >>> If we see some ratio of preempted VCPUs (> 0?), then we stop polling and >>> yield to the host. Working under the assumption that there is work for >>> this PCPU if other VCPUs have stuff to do. The downside is that it >>> misses information about host's topology, so it would be hard to make it >>> work well. >> >> I would just use vcpu_is_preempted on the current CPU. From guest POV >> this option is really a "f*** everyone else" setting just like >> idle=poll, only a little more polite. > > vcpu_is_preempted() on current cpu cannot return true, AFAIK. > >> If we've been preempted and we were polling, there are two cases. If an >> interrupt was queued while the guest was preempted, the poll will be >> treated as successful anyway. > > I think the poll should be treated as invalid if the window has expired > while the VCPU was preempted -- the guest can't tell whether the > interrupt arrived still within the poll window (unless we added paravirt > for that), so it shouldn't be wasting time waiting for it. > >> If it hasn't, let others run---but really >> that's not because the guest wants to be polite, it's to avoid that the >> scheduler penalizes it excessively. > > This sounds like a VM entry just to do an immediate VM exit, so paravirt > seems better here as well ... (the guest telling the host about its > window -- which could also be used to rule it out as a target in the > pause loop random kick.) > >> So until it's preempted, I think it's okay if the guest doesn't care >> about others. You wouldn't use this option anyway in overcommitted >> situations. >> >> (I'm still not very convinced about the idea). > > Me neither. (The same mechanism is applicable to bare-metal, but was > never used there, so I would rather bring the guest behavior closer to > bare-metal.) > The background is that we(Alibaba Cloud) do get more and more complaints from our customers in both KVM and Xen compare to bare-mental.After investigations, the root cause is known to us: big cost in message passing workload(David show it in KVM forum 2015) A typical message workload like below: vcpu 0 vcpu 1 1. send ipi 2. doing hlt 3. go into idle 4. receive ipi and wake up from hlt 5. write APIC time twice 6. write APIC time twice to to stop sched timer reprogram sched timer 7. doing hlt 8. handle task and send ipi to vcpu 0 9. same to 4. 10. same to 3 One transaction will introduce about 12 vmexits(2 hlt and 10 msr write). The cost of such vmexits will degrades performance severely. Linux kernel already provide idle=poll to mitigate the trend. But it only eliminates the IPI and hlt vmexit. It has nothing to do with start/stop sched timer. A compromise would be to turn off NOHZ kernel, but it is not the default config for new distributions. Same for halt-poll in KVM, it only solve the cost from schedule in/out in host and can not help such workload much. The purpose of this patch we want to improve current idle=poll mechanism to use dynamic polling and do poll before touch sched timer. It should not be a virtualization specific feature but seems bare mental have low cost to access the MSR. So i want to only enable it in VM. Though the idea below the patch may not so perfect to fit all conditions, it looks no worse than now. How about we keep current implementation and i integrate the patch to para-virtualize part as Paolo suggested? We can continue discuss it and i will continue to refine it if anyone has better suggestions?
On Mon, 3 Jul 2017, Yang Zhang wrote: > The background is that we(Alibaba Cloud) do get more and more complaints from > our customers in both KVM and Xen compare to bare-mental.After investigations, > the root cause is known to us: big cost in message passing workload(David show > it in KVM forum 2015) > > A typical message workload like below: > vcpu 0 vcpu 1 > 1. send ipi 2. doing hlt > 3. go into idle 4. receive ipi and wake up from hlt > 5. write APIC time twice 6. write APIC time twice to > to stop sched timer reprogram sched timer > 7. doing hlt 8. handle task and send ipi to > vcpu 0 > 9. same to 4. 10. same to 3 > > One transaction will introduce about 12 vmexits(2 hlt and 10 msr write). The > cost of such vmexits will degrades performance severely. Linux kernel already > provide idle=poll to mitigate the trend. But it only eliminates the IPI and > hlt vmexit. It has nothing to do with start/stop sched timer. A compromise > would be to turn off NOHZ kernel, but it is not the default config for new > distributions. You still can turn if off on the kernel command line via nohz=off Thanks, tglx
On 2017/7/3 18:06, Thomas Gleixner wrote: > On Mon, 3 Jul 2017, Yang Zhang wrote: >> The background is that we(Alibaba Cloud) do get more and more complaints from >> our customers in both KVM and Xen compare to bare-mental.After investigations, >> the root cause is known to us: big cost in message passing workload(David show >> it in KVM forum 2015) >> >> A typical message workload like below: >> vcpu 0 vcpu 1 >> 1. send ipi 2. doing hlt >> 3. go into idle 4. receive ipi and wake up from hlt >> 5. write APIC time twice 6. write APIC time twice to >> to stop sched timer reprogram sched timer >> 7. doing hlt 8. handle task and send ipi to >> vcpu 0 >> 9. same to 4. 10. same to 3 >> >> One transaction will introduce about 12 vmexits(2 hlt and 10 msr write). The >> cost of such vmexits will degrades performance severely. Linux kernel already >> provide idle=poll to mitigate the trend. But it only eliminates the IPI and >> hlt vmexit. It has nothing to do with start/stop sched timer. A compromise >> would be to turn off NOHZ kernel, but it is not the default config for new >> distributions. > > You still can turn if off on the kernel command line via nohz=off You are right. Senior users will turn off it manually. But it only solve the sched timer. They still have the IPI/hlt problem. Another point is we release the distribution image to customer without any extra configuration to avoid mismatch between VM and bare-metal. To change such configuration needs reboot, but some customer's business cannot be interrupted after they start the service(like online gaming). It would be better if we can provide the sysctl interface to allow run-time modification. By the way, idle=poll seems too heavy to use. > > Thanks, > > tglx >
2017-07-03 17:28+0800, Yang Zhang: > The background is that we(Alibaba Cloud) do get more and more complaints > from our customers in both KVM and Xen compare to bare-mental.After > investigations, the root cause is known to us: big cost in message passing > workload(David show it in KVM forum 2015) > > A typical message workload like below: > vcpu 0 vcpu 1 > 1. send ipi 2. doing hlt > 3. go into idle 4. receive ipi and wake up from hlt > 5. write APIC time twice 6. write APIC time twice to > to stop sched timer reprogram sched timer One write is enough to disable/re-enable the APIC timer -- why does Linux use two? > 7. doing hlt 8. handle task and send ipi to > vcpu 0 > 9. same to 4. 10. same to 3 > > One transaction will introduce about 12 vmexits(2 hlt and 10 msr write). The > cost of such vmexits will degrades performance severely. Yeah, sounds like too much ... I understood that there are IPI from 1 to 2 4 * APIC timer IPI from 2 to 1 which adds to 6 MSR writes -- what are the other 4? > Linux kernel > already provide idle=poll to mitigate the trend. But it only eliminates the > IPI and hlt vmexit. It has nothing to do with start/stop sched timer. A > compromise would be to turn off NOHZ kernel, but it is not the default > config for new distributions. Same for halt-poll in KVM, it only solve the > cost from schedule in/out in host and can not help such workload much. > > The purpose of this patch we want to improve current idle=poll mechanism to Please aim to allow MWAIT instead of idle=poll -- MWAIT doesn't slow down the sibling hyperthread. MWAIT solves the IPI problem, but doesn't get rid of the timer one. > use dynamic polling and do poll before touch sched timer. It should not be a > virtualization specific feature but seems bare mental have low cost to > access the MSR. So i want to only enable it in VM. Though the idea below the > patch may not so perfect to fit all conditions, it looks no worse than now. It adds code to hot-paths (interrupt handlers) while trying to optimize an idle-path, which is suspicious. > How about we keep current implementation and i integrate the patch to > para-virtualize part as Paolo suggested? We can continue discuss it and i > will continue to refine it if anyone has better suggestions? I think there is a nicer solution to avoid the expensive timer rewrite: Linux uses one-shot APIC timers and getting the timer interrupt is about as expensive as programming the timer, so the guest can keep the timer armed, but not re-arm it after the expiration if the CPU is idle. This should also mitigate the problem with short idle periods, but the optimized window is anywhere between 0 to 1ms. Do you see disadvantages of this combined with MWAIT? Thanks.
On Tue, 4 Jul 2017, Radim Krčmář wrote: > I think there is a nicer solution to avoid the expensive timer rewrite: > Linux uses one-shot APIC timers and getting the timer interrupt is about > as expensive as programming the timer, so the guest can keep the timer > armed, but not re-arm it after the expiration if the CPU is idle. So much for the theory. The NOHZ logic has to reprogram the timer when the next expiry is farther away than the next tick. Otherwise you wake up on every idle entry once for nothing, which defeats the whole purpose of NOHZ to not do that. Thanks, tglx
2017-07-03 17:28 GMT+08:00 Yang Zhang <yang.zhang.wz@gmail.com>: > On 2017/6/27 22:22, Radim Krčmář wrote: >> >> 2017-06-27 15:56+0200, Paolo Bonzini: >>> >>> On 27/06/2017 15:40, Radim Krčmář wrote: >>>>> >>>>> ... which is not necessarily _wrong_. It's just a different heuristic. >>>> >>>> Right, it's just harder to use than host's single_task_running() -- the >>>> VCPU calling vcpu_is_preempted() is never preempted, so we have to look >>>> at other VCPUs that are not halted, but still preempted. >>>> >>>> If we see some ratio of preempted VCPUs (> 0?), then we stop polling and >>>> yield to the host. Working under the assumption that there is work for >>>> this PCPU if other VCPUs have stuff to do. The downside is that it >>>> misses information about host's topology, so it would be hard to make it >>>> work well. >>> >>> >>> I would just use vcpu_is_preempted on the current CPU. From guest POV >>> this option is really a "f*** everyone else" setting just like >>> idle=poll, only a little more polite. >> >> >> vcpu_is_preempted() on current cpu cannot return true, AFAIK. >> >>> If we've been preempted and we were polling, there are two cases. If an >>> interrupt was queued while the guest was preempted, the poll will be >>> treated as successful anyway. >> >> >> I think the poll should be treated as invalid if the window has expired >> while the VCPU was preempted -- the guest can't tell whether the >> interrupt arrived still within the poll window (unless we added paravirt >> for that), so it shouldn't be wasting time waiting for it. >> >>> If it hasn't, let others run---but really >>> that's not because the guest wants to be polite, it's to avoid that the >>> scheduler penalizes it excessively. >> >> >> This sounds like a VM entry just to do an immediate VM exit, so paravirt >> seems better here as well ... (the guest telling the host about its >> window -- which could also be used to rule it out as a target in the >> pause loop random kick.) >> >>> So until it's preempted, I think it's okay if the guest doesn't care >>> about others. You wouldn't use this option anyway in overcommitted >>> situations. >>> >>> (I'm still not very convinced about the idea). >> >> >> Me neither. (The same mechanism is applicable to bare-metal, but was >> never used there, so I would rather bring the guest behavior closer to >> bare-metal.) >> > > The background is that we(Alibaba Cloud) do get more and more complaints > from our customers in both KVM and Xen compare to bare-mental.After > investigations, the root cause is known to us: big cost in message passing > workload(David show it in KVM forum 2015) > > A typical message workload like below: > vcpu 0 vcpu 1 > 1. send ipi 2. doing hlt > 3. go into idle 4. receive ipi and wake up from hlt > 5. write APIC time twice 6. write APIC time twice to > to stop sched timer reprogram sched timer I didn't find these two scenarios will program APIC timer twice separately instead of once separately, could you point out the codes? Regards, Wanpeng Li > 7. doing hlt 8. handle task and send ipi to > vcpu 0 > 9. same to 4. 10. same to 3 > > One transaction will introduce about 12 vmexits(2 hlt and 10 msr write). The > cost of such vmexits will degrades performance severely. Linux kernel > already provide idle=poll to mitigate the trend. But it only eliminates the > IPI and hlt vmexit. It has nothing to do with start/stop sched timer. A > compromise would be to turn off NOHZ kernel, but it is not the default > config for new distributions. Same for halt-poll in KVM, it only solve the > cost from schedule in/out in host and can not help such workload much. > > The purpose of this patch we want to improve current idle=poll mechanism to > use dynamic polling and do poll before touch sched timer. It should not be a > virtualization specific feature but seems bare mental have low cost to > access the MSR. So i want to only enable it in VM. Though the idea below the > patch may not so perfect to fit all conditions, it looks no worse than now. > How about we keep current implementation and i integrate the patch to > para-virtualize part as Paolo suggested? We can continue discuss it and i > will continue to refine it if anyone has better suggestions? > > > > -- > Yang > Alibaba Cloud Computing
On 2017/7/4 22:13, Radim Krčmář wrote: > 2017-07-03 17:28+0800, Yang Zhang: >> The background is that we(Alibaba Cloud) do get more and more complaints >> from our customers in both KVM and Xen compare to bare-mental.After >> investigations, the root cause is known to us: big cost in message passing >> workload(David show it in KVM forum 2015) >> >> A typical message workload like below: >> vcpu 0 vcpu 1 >> 1. send ipi 2. doing hlt >> 3. go into idle 4. receive ipi and wake up from hlt >> 5. write APIC time twice 6. write APIC time twice to >> to stop sched timer reprogram sched timer > > One write is enough to disable/re-enable the APIC timer -- why does > Linux use two? One is to remove the timer and another one is to reprogram the timer. Normally, only one write to remove the timer.But in some cases, it will reprogram it. > >> 7. doing hlt 8. handle task and send ipi to >> vcpu 0 >> 9. same to 4. 10. same to 3 >> >> One transaction will introduce about 12 vmexits(2 hlt and 10 msr write). The >> cost of such vmexits will degrades performance severely. > > Yeah, sounds like too much ... I understood that there are > > IPI from 1 to 2 > 4 * APIC timer > IPI from 2 to 1 > > which adds to 6 MSR writes -- what are the other 4? In the worst case, each timer will touch APIC timer twice.So it will add additional 4 msr writse. But this is not always true. > >> Linux kernel >> already provide idle=poll to mitigate the trend. But it only eliminates the >> IPI and hlt vmexit. It has nothing to do with start/stop sched timer. A >> compromise would be to turn off NOHZ kernel, but it is not the default >> config for new distributions. Same for halt-poll in KVM, it only solve the >> cost from schedule in/out in host and can not help such workload much. >> >> The purpose of this patch we want to improve current idle=poll mechanism to > > Please aim to allow MWAIT instead of idle=poll -- MWAIT doesn't slow > down the sibling hyperthread. MWAIT solves the IPI problem, but doesn't > get rid of the timer one. Yes, i can try it. But MWAIT will not yield CPU, it only helps the sibling hyperthread as you mentioned. > >> use dynamic polling and do poll before touch sched timer. It should not be a >> virtualization specific feature but seems bare mental have low cost to >> access the MSR. So i want to only enable it in VM. Though the idea below the >> patch may not so perfect to fit all conditions, it looks no worse than now. > > It adds code to hot-paths (interrupt handlers) while trying to optimize > an idle-path, which is suspicious. > >> How about we keep current implementation and i integrate the patch to >> para-virtualize part as Paolo suggested? We can continue discuss it and i >> will continue to refine it if anyone has better suggestions? > > I think there is a nicer solution to avoid the expensive timer rewrite: > Linux uses one-shot APIC timers and getting the timer interrupt is about > as expensive as programming the timer, so the guest can keep the timer > armed, but not re-arm it after the expiration if the CPU is idle. > > This should also mitigate the problem with short idle periods, but the > optimized window is anywhere between 0 to 1ms. > > Do you see disadvantages of this combined with MWAIT? > > Thanks. >
On 13.07.17 13:49, Yang Zhang wrote: > On 2017/7/4 22:13, Radim Krčmář wrote: >> 2017-07-03 17:28+0800, Yang Zhang: >>> The background is that we(Alibaba Cloud) do get more and more complaints >>> from our customers in both KVM and Xen compare to bare-mental.After >>> investigations, the root cause is known to us: big cost in message >>> passing >>> workload(David show it in KVM forum 2015) >>> >>> A typical message workload like below: >>> vcpu 0 vcpu 1 >>> 1. send ipi 2. doing hlt >>> 3. go into idle 4. receive ipi and wake up from hlt >>> 5. write APIC time twice 6. write APIC time twice to >>> to stop sched timer reprogram sched timer >> >> One write is enough to disable/re-enable the APIC timer -- why does >> Linux use two? > > One is to remove the timer and another one is to reprogram the timer. > Normally, only one write to remove the timer.But in some cases, it will > reprogram it. > >> >>> 7. doing hlt 8. handle task and send ipi to >>> vcpu 0 >>> 9. same to 4. 10. same to 3 >>> >>> One transaction will introduce about 12 vmexits(2 hlt and 10 msr >>> write). The >>> cost of such vmexits will degrades performance severely. >> >> Yeah, sounds like too much ... I understood that there are >> >> IPI from 1 to 2 >> 4 * APIC timer >> IPI from 2 to 1 >> >> which adds to 6 MSR writes -- what are the other 4? > > In the worst case, each timer will touch APIC timer twice.So it will add > additional 4 msr writse. But this is not always true. > >> >>> Linux kernel >>> already provide idle=poll to mitigate the trend. But it only >>> eliminates the >>> IPI and hlt vmexit. It has nothing to do with start/stop sched timer. A >>> compromise would be to turn off NOHZ kernel, but it is not the default >>> config for new distributions. Same for halt-poll in KVM, it only >>> solve the >>> cost from schedule in/out in host and can not help such workload much. >>> >>> The purpose of this patch we want to improve current idle=poll >>> mechanism to >> >> Please aim to allow MWAIT instead of idle=poll -- MWAIT doesn't slow >> down the sibling hyperthread. MWAIT solves the IPI problem, but doesn't >> get rid of the timer one. > > Yes, i can try it. But MWAIT will not yield CPU, it only helps the > sibling hyperthread as you mentioned. If you implement proper MWAIT emulation that conditionally gets en- or disabled depending on the same halt poll dynamics that we already have for in-host HLT handling, it will also yield the CPU. As for the timer - are you sure the problem is really the overhead of the timer configuration, not the latency that it takes to actually fire the guest timer? One major problem I see is that we configure the host hrtimer to fire at the point in time when the guest wants to see a timer event. But in a virtual environment, the point in time when we have to start switching to the VM really should be a bit *before* the guest wants to be woken up, as it takes quite some time to switch back into the VM context. Alex
On 2017/7/14 17:37, Alexander Graf wrote: > > > On 13.07.17 13:49, Yang Zhang wrote: >> On 2017/7/4 22:13, Radim Krčmář wrote: >>> 2017-07-03 17:28+0800, Yang Zhang: >>>> The background is that we(Alibaba Cloud) do get more and more >>>> complaints >>>> from our customers in both KVM and Xen compare to bare-mental.After >>>> investigations, the root cause is known to us: big cost in message >>>> passing >>>> workload(David show it in KVM forum 2015) >>>> >>>> A typical message workload like below: >>>> vcpu 0 vcpu 1 >>>> 1. send ipi 2. doing hlt >>>> 3. go into idle 4. receive ipi and wake up from hlt >>>> 5. write APIC time twice 6. write APIC time twice to >>>> to stop sched timer reprogram sched timer >>> >>> One write is enough to disable/re-enable the APIC timer -- why does >>> Linux use two? >> >> One is to remove the timer and another one is to reprogram the timer. >> Normally, only one write to remove the timer.But in some cases, it >> will reprogram it. >> >>> >>>> 7. doing hlt 8. handle task and send ipi to >>>> vcpu 0 >>>> 9. same to 4. 10. same to 3 >>>> >>>> One transaction will introduce about 12 vmexits(2 hlt and 10 msr >>>> write). The >>>> cost of such vmexits will degrades performance severely. >>> >>> Yeah, sounds like too much ... I understood that there are >>> >>> IPI from 1 to 2 >>> 4 * APIC timer >>> IPI from 2 to 1 >>> >>> which adds to 6 MSR writes -- what are the other 4? >> >> In the worst case, each timer will touch APIC timer twice.So it will >> add additional 4 msr writse. But this is not always true. >> >>> >>>> Linux kernel >>>> already provide idle=poll to mitigate the trend. But it only >>>> eliminates the >>>> IPI and hlt vmexit. It has nothing to do with start/stop sched timer. A >>>> compromise would be to turn off NOHZ kernel, but it is not the default >>>> config for new distributions. Same for halt-poll in KVM, it only >>>> solve the >>>> cost from schedule in/out in host and can not help such workload much. >>>> >>>> The purpose of this patch we want to improve current idle=poll >>>> mechanism to >>> >>> Please aim to allow MWAIT instead of idle=poll -- MWAIT doesn't slow >>> down the sibling hyperthread. MWAIT solves the IPI problem, but doesn't >>> get rid of the timer one. >> >> Yes, i can try it. But MWAIT will not yield CPU, it only helps the >> sibling hyperthread as you mentioned. > > If you implement proper MWAIT emulation that conditionally gets en- or > disabled depending on the same halt poll dynamics that we already have > for in-host HLT handling, it will also yield the CPU. It is hard to do . If we not intercept MWAIT instruction, there is no chance to wake up the CPU unless an interrupt arrived or a store to the address armed by MONITOR which is the same with idle=polling. > > As for the timer - are you sure the problem is really the overhead of > the timer configuration, not the latency that it takes to actually fire > the guest timer? No, the main cost is introduced by vmexit, includes IPIs, Timer program, HLT. David detailed it in KVM forum, you can search "Message Passing Workloads in KVM" in google and the first link give the whole analysis of the problem. > > One major problem I see is that we configure the host hrtimer to fire at > the point in time when the guest wants to see a timer event. But in a > virtual environment, the point in time when we have to start switching > to the VM really should be a bit *before* the guest wants to be woken > up, as it takes quite some time to switch back into the VM context. > > > Alex
On 17.07.17 11:26, Yang Zhang wrote: > On 2017/7/14 17:37, Alexander Graf wrote: >> >> >> On 13.07.17 13:49, Yang Zhang wrote: >>> On 2017/7/4 22:13, Radim Krčmář wrote: >>>> 2017-07-03 17:28+0800, Yang Zhang: >>>>> The background is that we(Alibaba Cloud) do get more and more >>>>> complaints >>>>> from our customers in both KVM and Xen compare to bare-mental.After >>>>> investigations, the root cause is known to us: big cost in message >>>>> passing >>>>> workload(David show it in KVM forum 2015) >>>>> >>>>> A typical message workload like below: >>>>> vcpu 0 vcpu 1 >>>>> 1. send ipi 2. doing hlt >>>>> 3. go into idle 4. receive ipi and wake up from hlt >>>>> 5. write APIC time twice 6. write APIC time twice to >>>>> to stop sched timer reprogram sched timer >>>> >>>> One write is enough to disable/re-enable the APIC timer -- why does >>>> Linux use two? >>> >>> One is to remove the timer and another one is to reprogram the timer. >>> Normally, only one write to remove the timer.But in some cases, it >>> will reprogram it. >>> >>>> >>>>> 7. doing hlt 8. handle task and send ipi to >>>>> vcpu 0 >>>>> 9. same to 4. 10. same to 3 >>>>> >>>>> One transaction will introduce about 12 vmexits(2 hlt and 10 msr >>>>> write). The >>>>> cost of such vmexits will degrades performance severely. >>>> >>>> Yeah, sounds like too much ... I understood that there are >>>> >>>> IPI from 1 to 2 >>>> 4 * APIC timer >>>> IPI from 2 to 1 >>>> >>>> which adds to 6 MSR writes -- what are the other 4? >>> >>> In the worst case, each timer will touch APIC timer twice.So it will >>> add additional 4 msr writse. But this is not always true. >>> >>>> >>>>> Linux kernel >>>>> already provide idle=poll to mitigate the trend. But it only >>>>> eliminates the >>>>> IPI and hlt vmexit. It has nothing to do with start/stop sched >>>>> timer. A >>>>> compromise would be to turn off NOHZ kernel, but it is not the default >>>>> config for new distributions. Same for halt-poll in KVM, it only >>>>> solve the >>>>> cost from schedule in/out in host and can not help such workload much. >>>>> >>>>> The purpose of this patch we want to improve current idle=poll >>>>> mechanism to >>>> >>>> Please aim to allow MWAIT instead of idle=poll -- MWAIT doesn't slow >>>> down the sibling hyperthread. MWAIT solves the IPI problem, but >>>> doesn't >>>> get rid of the timer one. >>> >>> Yes, i can try it. But MWAIT will not yield CPU, it only helps the >>> sibling hyperthread as you mentioned. >> >> If you implement proper MWAIT emulation that conditionally gets en- or >> disabled depending on the same halt poll dynamics that we already have >> for in-host HLT handling, it will also yield the CPU. > > It is hard to do . If we not intercept MWAIT instruction, there is no > chance to wake up the CPU unless an interrupt arrived or a store to the > address armed by MONITOR which is the same with idle=polling. Yes, but you can reconfigure the VMCS/VMCB to trap on MWAIT or not trap on it. That's something that idle=polling does not give you at all - a guest vcpu will always use 100% CPU. The only really tricky part is how to limit the effect of MONITOR on nested page table maintenance. But if we just set the MONITOR cache size to 4k, well behaved guests should ideally always give us the one same page for wakeup - which we can then leave marked as trapping. > >> >> As for the timer - are you sure the problem is really the overhead of >> the timer configuration, not the latency that it takes to actually fire >> the guest timer? > > No, the main cost is introduced by vmexit, includes IPIs, Timer program, > HLT. David detailed it in KVM forum, you can search "Message Passing > Workloads in KVM" in google and the first link give the whole analysis > of the problem. During time critical message passing you want to keep both vCPUs inside the guest, yes. That again is something that guest exposed MWAIT would buy you. The problem is that overcommitting CPU is very expensive with anything that does not set the guests idle at all. And not everyone can afford to throw more CPUs at problems :). Alex
On 2017/7/17 17:54, Alexander Graf wrote: > > > On 17.07.17 11:26, Yang Zhang wrote: >> On 2017/7/14 17:37, Alexander Graf wrote: >>> >>> >>> On 13.07.17 13:49, Yang Zhang wrote: >>>> On 2017/7/4 22:13, Radim Krčmář wrote: >>>>> 2017-07-03 17:28+0800, Yang Zhang: >>>>>> The background is that we(Alibaba Cloud) do get more and more >>>>>> complaints >>>>>> from our customers in both KVM and Xen compare to bare-mental.After >>>>>> investigations, the root cause is known to us: big cost in message >>>>>> passing >>>>>> workload(David show it in KVM forum 2015) >>>>>> >>>>>> A typical message workload like below: >>>>>> vcpu 0 vcpu 1 >>>>>> 1. send ipi 2. doing hlt >>>>>> 3. go into idle 4. receive ipi and wake up from hlt >>>>>> 5. write APIC time twice 6. write APIC time twice to >>>>>> to stop sched timer reprogram sched timer >>>>> >>>>> One write is enough to disable/re-enable the APIC timer -- why does >>>>> Linux use two? >>>> >>>> One is to remove the timer and another one is to reprogram the timer. >>>> Normally, only one write to remove the timer.But in some cases, it >>>> will reprogram it. >>>> >>>>> >>>>>> 7. doing hlt 8. handle task and send ipi to >>>>>> vcpu 0 >>>>>> 9. same to 4. 10. same to 3 >>>>>> >>>>>> One transaction will introduce about 12 vmexits(2 hlt and 10 msr >>>>>> write). The >>>>>> cost of such vmexits will degrades performance severely. >>>>> >>>>> Yeah, sounds like too much ... I understood that there are >>>>> >>>>> IPI from 1 to 2 >>>>> 4 * APIC timer >>>>> IPI from 2 to 1 >>>>> >>>>> which adds to 6 MSR writes -- what are the other 4? >>>> >>>> In the worst case, each timer will touch APIC timer twice.So it will >>>> add additional 4 msr writse. But this is not always true. >>>> >>>>> >>>>>> Linux kernel >>>>>> already provide idle=poll to mitigate the trend. But it only >>>>>> eliminates the >>>>>> IPI and hlt vmexit. It has nothing to do with start/stop sched >>>>>> timer. A >>>>>> compromise would be to turn off NOHZ kernel, but it is not the >>>>>> default >>>>>> config for new distributions. Same for halt-poll in KVM, it only >>>>>> solve the >>>>>> cost from schedule in/out in host and can not help such workload >>>>>> much. >>>>>> >>>>>> The purpose of this patch we want to improve current idle=poll >>>>>> mechanism to >>>>> >>>>> Please aim to allow MWAIT instead of idle=poll -- MWAIT doesn't slow >>>>> down the sibling hyperthread. MWAIT solves the IPI problem, but >>>>> doesn't >>>>> get rid of the timer one. >>>> >>>> Yes, i can try it. But MWAIT will not yield CPU, it only helps the >>>> sibling hyperthread as you mentioned. >>> >>> If you implement proper MWAIT emulation that conditionally gets en- or >>> disabled depending on the same halt poll dynamics that we already have >>> for in-host HLT handling, it will also yield the CPU. >> >> It is hard to do . If we not intercept MWAIT instruction, there is no >> chance to wake up the CPU unless an interrupt arrived or a store to >> the address armed by MONITOR which is the same with idle=polling. > > Yes, but you can reconfigure the VMCS/VMCB to trap on MWAIT or not trap > on it. That's something that idle=polling does not give you at all - a > guest vcpu will always use 100% CPU. There are two things we need to figure out: 1. How and when to reconfigure the VMCS? Currently, all the knowledge are from guest, we don't know when to reconfigure it. Also, we cannot prevent guest from using MWAIT in other place if it see the feature. 2. If guest execute MWAIT without trap, since there is no way to set timeout for it, that would be a waste of CPU too. > > The only really tricky part is how to limit the effect of MONITOR on > nested page table maintenance. But if we just set the MONITOR cache size > to 4k, well behaved guests should ideally always give us the one same > page for wakeup - which we can then leave marked as trapping. > >> >>> >>> As for the timer - are you sure the problem is really the overhead of >>> the timer configuration, not the latency that it takes to actually fire >>> the guest timer? >> >> No, the main cost is introduced by vmexit, includes IPIs, Timer >> program, HLT. David detailed it in KVM forum, you can search "Message >> Passing Workloads in KVM" in google and the first link give the whole >> analysis of the problem. > > During time critical message passing you want to keep both vCPUs inside > the guest, yes. That again is something that guest exposed MWAIT would > buy you. I think MWAIT only helps sibling hyper-threading case. But in real Cloud, hyper-threading is not always turning on, i.e. most products of Azure and some products of Alibaba Cloud. So it shouldn't be a big problem. > > The problem is that overcommitting CPU is very expensive with anything > that does not set the guests idle at all. And not everyone can afford to > throw more CPUs at problems :). Agree, that's the reason why we choose dynamically halt polling. But on other side, the cloud vendor has the knowledge to control whether turn on it or not. The only problem is that there is no such way for us to do currently. > > > Alex
diff --git a/Documentation/sysctl/kernel.txt b/Documentation/sysctl/kernel.txt index 4e71bfe..76043b4 100644 --- a/Documentation/sysctl/kernel.txt +++ b/Documentation/sysctl/kernel.txt @@ -63,6 +63,8 @@ show up in /proc/sys/kernel: - perf_event_max_stack - perf_event_max_contexts_per_stack - pid_max +- poll_grow [ X86 only ] +- poll_shrink [ X86 only ] - poll_threshold_ns [ X86 only ] - powersave-nap [ PPC only ] - printk @@ -703,6 +705,18 @@ kernel tries to allocate a number starting from this one. ============================================================== +poll_grow: (X86 only) + +This parameter is multiplied in the grow_poll_ns() to increase the poll time. +By default, the values is 2. + +============================================================== +poll_shrink: (X86 only) + +This parameter is divided in the shrink_poll_ns() to reduce the poll time. +By default, the values is 2. + +============================================================== poll_threshold_ns: (X86 only) This parameter used to control the max wait time to poll before going diff --git a/arch/x86/include/asm/processor.h b/arch/x86/include/asm/processor.h index 3cada99..cf952ed 100644 --- a/arch/x86/include/asm/processor.h +++ b/arch/x86/include/asm/processor.h @@ -931,4 +931,10 @@ static inline uint32_t hypervisor_cpuid_base(const char *sig, uint32_t leaves) void stop_this_cpu(void *dummy); void df_debug(struct pt_regs *regs, long error_code); +#ifdef CONFIG_HYPERVISOR_GUEST +extern void check_poll(void); +#else +static inline void check_poll(void) {} +#endif + #endif /* _ASM_X86_PROCESSOR_H */ diff --git a/arch/x86/kernel/apic/apic.c b/arch/x86/kernel/apic/apic.c index 2d75faf..37b16b6 100644 --- a/arch/x86/kernel/apic/apic.c +++ b/arch/x86/kernel/apic/apic.c @@ -962,6 +962,7 @@ __visible void __irq_entry smp_apic_timer_interrupt(struct pt_regs *regs) * interrupt lock, which is the WrongThing (tm) to do. */ entering_ack_irq(); + check_poll(); local_apic_timer_interrupt(); exiting_irq(); @@ -981,6 +982,7 @@ __visible void __irq_entry smp_trace_apic_timer_interrupt(struct pt_regs *regs) * interrupt lock, which is the WrongThing (tm) to do. */ entering_ack_irq(); + check_poll(); trace_local_timer_entry(LOCAL_TIMER_VECTOR); local_apic_timer_interrupt(); trace_local_timer_exit(LOCAL_TIMER_VECTOR); @@ -1863,6 +1865,7 @@ static void __smp_spurious_interrupt(u8 vector) __visible void __irq_entry smp_spurious_interrupt(struct pt_regs *regs) { entering_irq(); + check_poll(); __smp_spurious_interrupt(~regs->orig_ax); exiting_irq(); } @@ -1872,6 +1875,7 @@ __visible void __irq_entry smp_trace_spurious_interrupt(struct pt_regs *regs) u8 vector = ~regs->orig_ax; entering_irq(); + check_poll(); trace_spurious_apic_entry(vector); __smp_spurious_interrupt(vector); trace_spurious_apic_exit(vector); @@ -1921,6 +1925,7 @@ static void __smp_error_interrupt(struct pt_regs *regs) __visible void __irq_entry smp_error_interrupt(struct pt_regs *regs) { entering_irq(); + check_poll(); __smp_error_interrupt(regs); exiting_irq(); } @@ -1928,6 +1933,7 @@ __visible void __irq_entry smp_error_interrupt(struct pt_regs *regs) __visible void __irq_entry smp_trace_error_interrupt(struct pt_regs *regs) { entering_irq(); + check_poll(); trace_error_apic_entry(ERROR_APIC_VECTOR); __smp_error_interrupt(regs); trace_error_apic_exit(ERROR_APIC_VECTOR); diff --git a/arch/x86/kernel/apic/vector.c b/arch/x86/kernel/apic/vector.c index f3557a1..77fc6ed 100644 --- a/arch/x86/kernel/apic/vector.c +++ b/arch/x86/kernel/apic/vector.c @@ -564,6 +564,7 @@ asmlinkage __visible void __irq_entry smp_irq_move_cleanup_interrupt(void) unsigned vector, me; entering_ack_irq(); + check_poll(); /* Prevent vectors vanishing under us */ raw_spin_lock(&vector_lock); diff --git a/arch/x86/kernel/cpu/mcheck/mce_amd.c b/arch/x86/kernel/cpu/mcheck/mce_amd.c index 6e4a047..7f984d6 100644 --- a/arch/x86/kernel/cpu/mcheck/mce_amd.c +++ b/arch/x86/kernel/cpu/mcheck/mce_amd.c @@ -819,6 +819,7 @@ static inline void __smp_deferred_error_interrupt(void) asmlinkage __visible void __irq_entry smp_deferred_error_interrupt(void) { entering_irq(); + check_poll(); __smp_deferred_error_interrupt(); exiting_ack_irq(); } @@ -826,6 +827,7 @@ asmlinkage __visible void __irq_entry smp_deferred_error_interrupt(void) asmlinkage __visible void __irq_entry smp_trace_deferred_error_interrupt(void) { entering_irq(); + check_poll(); trace_deferred_error_apic_entry(DEFERRED_ERROR_VECTOR); __smp_deferred_error_interrupt(); trace_deferred_error_apic_exit(DEFERRED_ERROR_VECTOR); diff --git a/arch/x86/kernel/cpu/mcheck/therm_throt.c b/arch/x86/kernel/cpu/mcheck/therm_throt.c index d7cc190..d420b42 100644 --- a/arch/x86/kernel/cpu/mcheck/therm_throt.c +++ b/arch/x86/kernel/cpu/mcheck/therm_throt.c @@ -400,6 +400,7 @@ static inline void __smp_thermal_interrupt(void) smp_thermal_interrupt(struct pt_regs *regs) { entering_irq(); + check_poll(); __smp_thermal_interrupt(); exiting_ack_irq(); } @@ -408,6 +409,7 @@ static inline void __smp_thermal_interrupt(void) smp_trace_thermal_interrupt(struct pt_regs *regs) { entering_irq(); + check_poll(); trace_thermal_apic_entry(THERMAL_APIC_VECTOR); __smp_thermal_interrupt(); trace_thermal_apic_exit(THERMAL_APIC_VECTOR); diff --git a/arch/x86/kernel/cpu/mcheck/threshold.c b/arch/x86/kernel/cpu/mcheck/threshold.c index bb0e75ee..77858ba 100644 --- a/arch/x86/kernel/cpu/mcheck/threshold.c +++ b/arch/x86/kernel/cpu/mcheck/threshold.c @@ -26,6 +26,7 @@ static inline void __smp_threshold_interrupt(void) asmlinkage __visible void __irq_entry smp_threshold_interrupt(void) { entering_irq(); + check_poll(); __smp_threshold_interrupt(); exiting_ack_irq(); } @@ -33,6 +34,7 @@ asmlinkage __visible void __irq_entry smp_threshold_interrupt(void) asmlinkage __visible void __irq_entry smp_trace_threshold_interrupt(void) { entering_irq(); + check_poll(); trace_threshold_apic_entry(THRESHOLD_APIC_VECTOR); __smp_threshold_interrupt(); trace_threshold_apic_exit(THRESHOLD_APIC_VECTOR); diff --git a/arch/x86/kernel/irq.c b/arch/x86/kernel/irq.c index f34fe74..65ff260 100644 --- a/arch/x86/kernel/irq.c +++ b/arch/x86/kernel/irq.c @@ -230,6 +230,7 @@ __visible unsigned int __irq_entry do_IRQ(struct pt_regs *regs) entering_irq(); + check_poll(); /* entering_irq() tells RCU that we're not quiescent. Check it. */ RCU_LOCKDEP_WARN(!rcu_is_watching(), "IRQ failed to wake up RCU"); @@ -269,6 +270,7 @@ __visible void __irq_entry smp_x86_platform_ipi(struct pt_regs *regs) struct pt_regs *old_regs = set_irq_regs(regs); entering_ack_irq(); + check_poll(); __smp_x86_platform_ipi(); exiting_irq(); set_irq_regs(old_regs); @@ -295,6 +297,7 @@ __visible void smp_kvm_posted_intr_ipi(struct pt_regs *regs) struct pt_regs *old_regs = set_irq_regs(regs); entering_ack_irq(); + check_poll(); inc_irq_stat(kvm_posted_intr_ipis); exiting_irq(); set_irq_regs(old_regs); @@ -308,6 +311,7 @@ __visible void smp_kvm_posted_intr_wakeup_ipi(struct pt_regs *regs) struct pt_regs *old_regs = set_irq_regs(regs); entering_ack_irq(); + check_poll(); inc_irq_stat(kvm_posted_intr_wakeup_ipis); kvm_posted_intr_wakeup_handler(); exiting_irq(); @@ -320,6 +324,7 @@ __visible void __irq_entry smp_trace_x86_platform_ipi(struct pt_regs *regs) struct pt_regs *old_regs = set_irq_regs(regs); entering_ack_irq(); + check_poll(); trace_x86_platform_ipi_entry(X86_PLATFORM_IPI_VECTOR); __smp_x86_platform_ipi(); trace_x86_platform_ipi_exit(X86_PLATFORM_IPI_VECTOR); diff --git a/arch/x86/kernel/irq_work.c b/arch/x86/kernel/irq_work.c index 2754878..2c4b6cd 100644 --- a/arch/x86/kernel/irq_work.c +++ b/arch/x86/kernel/irq_work.c @@ -20,6 +20,7 @@ static inline void __smp_irq_work_interrupt(void) __visible void __irq_entry smp_irq_work_interrupt(struct pt_regs *regs) { ipi_entering_ack_irq(); + check_poll(); __smp_irq_work_interrupt(); exiting_irq(); } @@ -27,6 +28,7 @@ __visible void __irq_entry smp_irq_work_interrupt(struct pt_regs *regs) __visible void __irq_entry smp_trace_irq_work_interrupt(struct pt_regs *regs) { ipi_entering_ack_irq(); + check_poll(); trace_irq_work_entry(IRQ_WORK_VECTOR); __smp_irq_work_interrupt(); trace_irq_work_exit(IRQ_WORK_VECTOR); diff --git a/arch/x86/kernel/process.c b/arch/x86/kernel/process.c index 6361783..e5238a8 100644 --- a/arch/x86/kernel/process.c +++ b/arch/x86/kernel/process.c @@ -41,6 +41,10 @@ #ifdef CONFIG_HYPERVISOR_GUEST unsigned long poll_threshold_ns; +unsigned int poll_shrink = 2; +unsigned int poll_grow = 2; +DEFINE_PER_CPU(unsigned long, poll_begin_ns); +DEFINE_PER_CPU(unsigned long, poll_ns); #endif /* @@ -318,6 +322,57 @@ static inline void play_dead(void) #endif #ifdef CONFIG_HYPERVISOR_GUEST +static unsigned int grow_poll_ns(unsigned int old, unsigned int grow, + unsigned int max) +{ + unsigned int val; + + /* 10us as base poll duration */ + if (old == 0 && grow) + return 10000; + + val = old * grow; + if (val > max) + val = max; + + return val; +} + +static unsigned int shrink_poll_ns(unsigned int old, unsigned int shrink) +{ + if (shrink == 0) + return 0; + + return old / shrink; +} + +void check_poll(void) +{ + unsigned int val, poll_duration; + unsigned long begin_ns, now_ns; + + if (!poll_threshold_ns) + return; + + begin_ns = this_cpu_read(poll_begin_ns); + /* Not from halt state */ + if (!begin_ns) + return; + + now_ns = ktime_to_ns(ktime_get()); + poll_duration = this_cpu_read(poll_ns); + + if (poll_duration && now_ns - begin_ns > poll_threshold_ns) + val = shrink_poll_ns(poll_duration, poll_shrink); + else if (poll_duration < poll_threshold_ns && + now_ns - begin_ns < poll_threshold_ns) + val = grow_poll_ns(poll_duration, poll_grow, poll_threshold_ns); + + this_cpu_write(poll_ns, val); + this_cpu_write(poll_begin_ns, 0); + +} + void arch_cpu_idle_poll(void) { ktime_t start, cur, stop; @@ -359,6 +414,10 @@ void arch_cpu_idle(void) void __cpuidle default_idle(void) { trace_cpu_idle_rcuidle(1, smp_processor_id()); +#ifdef CONFIG_HYPERVISOR_GUEST + if (poll_threshold_ns) + this_cpu_write(poll_begin_ns, ktime_to_ns(ktime_get())); +#endif safe_halt(); trace_cpu_idle_rcuidle(PWR_EVENT_EXIT, smp_processor_id()); } diff --git a/arch/x86/kernel/smp.c b/arch/x86/kernel/smp.c index d798c0d..81a3961 100644 --- a/arch/x86/kernel/smp.c +++ b/arch/x86/kernel/smp.c @@ -265,6 +265,7 @@ static inline void __smp_reschedule_interrupt(void) __visible void __irq_entry smp_reschedule_interrupt(struct pt_regs *regs) { ack_APIC_irq(); + check_poll(); __smp_reschedule_interrupt(); /* * KVM uses this interrupt to force a cpu out of guest mode @@ -280,6 +281,7 @@ __visible void __irq_entry smp_trace_reschedule_interrupt(struct pt_regs *regs) * to nest. */ ipi_entering_ack_irq(); + check_poll(); trace_reschedule_entry(RESCHEDULE_VECTOR); __smp_reschedule_interrupt(); trace_reschedule_exit(RESCHEDULE_VECTOR); @@ -298,6 +300,7 @@ static inline void __smp_call_function_interrupt(void) __visible void __irq_entry smp_call_function_interrupt(struct pt_regs *regs) { ipi_entering_ack_irq(); + check_poll(); __smp_call_function_interrupt(); exiting_irq(); } @@ -306,6 +309,7 @@ __visible void __irq_entry smp_call_function_interrupt(struct pt_regs *regs) smp_trace_call_function_interrupt(struct pt_regs *regs) { ipi_entering_ack_irq(); + check_poll(); trace_call_function_entry(CALL_FUNCTION_VECTOR); __smp_call_function_interrupt(); trace_call_function_exit(CALL_FUNCTION_VECTOR); @@ -322,6 +326,7 @@ static inline void __smp_call_function_single_interrupt(void) smp_call_function_single_interrupt(struct pt_regs *regs) { ipi_entering_ack_irq(); + check_poll(); __smp_call_function_single_interrupt(); exiting_irq(); } @@ -330,6 +335,7 @@ static inline void __smp_call_function_single_interrupt(void) smp_trace_call_function_single_interrupt(struct pt_regs *regs) { ipi_entering_ack_irq(); + check_poll(); trace_call_function_single_entry(CALL_FUNCTION_SINGLE_VECTOR); __smp_call_function_single_interrupt(); trace_call_function_single_exit(CALL_FUNCTION_SINGLE_VECTOR); diff --git a/include/linux/kernel.h b/include/linux/kernel.h index 04cf774..e901b26 100644 --- a/include/linux/kernel.h +++ b/include/linux/kernel.h @@ -462,6 +462,8 @@ extern __scanf(2, 0) extern bool crash_kexec_post_notifiers; #ifdef CONFIG_HYPERVISOR_GUEST extern unsigned long poll_threshold_ns; +extern unsigned int poll_shrink; +extern unsigned int poll_grow; #endif /* diff --git a/kernel/sysctl.c b/kernel/sysctl.c index 9174d57..82776eb 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -1211,6 +1211,20 @@ static int sysrq_sysctl_handler(struct ctl_table *table, int write, .mode = 0644, .proc_handler = proc_dointvec, }, + { + .procname = "halt_poll_grow", + .data = &poll_grow, + .maxlen = sizeof(unsigned int), + .mode = 0644, + .proc_handler = proc_dointvec, + }, + { + .procname = "halt_poll_shrink", + .data = &poll_shrink, + .maxlen = sizeof(unsigned int), + .mode = 0644, + .proc_handler = proc_dointvec, + }, #endif { } };