From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7118BC48BCF for ; Wed, 9 Jun 2021 21:38:01 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 448F961009 for ; Wed, 9 Jun 2021 21:38:01 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229743AbhFIVi7 (ORCPT ); Wed, 9 Jun 2021 17:38:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48744 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229548AbhFIVi6 (ORCPT ); Wed, 9 Jun 2021 17:38:58 -0400 Received: from mail-ed1-x529.google.com (mail-ed1-x529.google.com [IPv6:2a00:1450:4864:20::529]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 59439C061574 for ; Wed, 9 Jun 2021 14:36:50 -0700 (PDT) Received: by mail-ed1-x529.google.com with SMTP id w21so30159404edv.3 for ; Wed, 09 Jun 2021 14:36:50 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=hTjdamam67na35okFD1d8nEO7/NAMJitaSPOTFgv+V4=; b=L91WyrbPGUtgS7YmW9lG++XXxsYm/0TUhamUhPx2q0KglmWrBnOVqAj21Sdjdbdbxe HWxRHLmpGeVIJufSP+TvHgzvr3VqHeZIrWB7b93wZCAIBMDWsXtAkvkn7o4GexHfmDQ1 soylWfkVRgUVkImDNSs/f+b9ZlavSRdQJqSp4ZukWDCBNX/OJseuxDlMiCEl97ogyKVh 1SGGWmEkqAu66nfzED6o54Xz+39M25NCF9xWYoOwUSEXg9J9th7vkNQnK9M7fMjxdLcW MXWd3/cOzfO/je5N/XIDJ3YyDIMDVg9a2KSOUVJCY3MhzQXbqiCyXHM5aONogtqY4l39 Md+w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=hTjdamam67na35okFD1d8nEO7/NAMJitaSPOTFgv+V4=; b=U1Vf4DMw66I5qWhKiNVR0S1KFRJYOGYgWqtz/VDdPSd1JoX2vPl+YWQP8MUSpzml9t ZTVNzyFSQz+wzDyBkXEGpnl/WvyRaOZ0eTxu7UseEXef9Z3WAZaUm84ZFapTHcIqJNC4 nc9ipd4sVZOpAHdJL4sxogv+iWiPDwKhtypovLNXRZfWze3a9NaAyOnRp8cXh7eJJeRh arxhxDCLburM4tvVkzaWBd8s/xpieWvsDjfgMnpVMwxhSdbRP0WnlfJgz+/lLQ9J6JHP KeRyNpaadHGW6FxiqPrXshiVMAqFr3VGMcrfFIwjcew5twTHO0TZjGsOKz0fDhsIfKiJ +EIA== X-Gm-Message-State: AOAM531VJOPWZsc+hW0VgZ/WhlMfW+ewNXVkMvhSZNoRyeAc3X95lH+a BIyJrvPFCyPuG98IDn7RErCte3T/pymsVA== X-Google-Smtp-Source: ABdhPJy6cSWeJzVAdWAruN6mIB+0k0qqvrfZUMeL4jx2PzgvOhoHV9/wND/Qwbbn6xm11vDJGkvudw== X-Received: by 2002:aa7:d6cc:: with SMTP id x12mr1392140edr.55.1623274608909; Wed, 09 Jun 2021 14:36:48 -0700 (PDT) Received: from mail-wm1-f41.google.com (mail-wm1-f41.google.com. [209.85.128.41]) by smtp.gmail.com with ESMTPSA id kb20sm297651ejc.58.2021.06.09.14.36.47 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 09 Jun 2021 14:36:48 -0700 (PDT) Received: by mail-wm1-f41.google.com with SMTP id g204so4906493wmf.5 for ; Wed, 09 Jun 2021 14:36:47 -0700 (PDT) X-Received: by 2002:a7b:c935:: with SMTP id h21mr11765032wml.183.1623274607426; Wed, 09 Jun 2021 14:36:47 -0700 (PDT) MIME-Version: 1.0 References: <20210526082423.47837-1-mst@redhat.com> In-Reply-To: From: Willem de Bruijn Date: Wed, 9 Jun 2021 17:36:09 -0400 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v3 0/4] virtio net: spurious interrupt related fixes To: Willem de Bruijn Cc: "Michael S. Tsirkin" , linux-kernel , Jakub Kicinski , Wei Wang , David Miller , Network Development , virtualization Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, May 31, 2021 at 10:53 PM Willem de Bruijn wrote: > > On Wed, May 26, 2021 at 11:34 AM Willem de Bruijn > wrote: > > > > On Wed, May 26, 2021 at 4:24 AM Michael S. Tsirkin wrote: > > > > > > > > > With the implementation of napi-tx in virtio driver, we clean tx > > > descriptors from rx napi handler, for the purpose of reducing tx > > > complete interrupts. But this introduces a race where tx complete > > > interrupt has been raised, but the handler finds there is no work to do > > > because we have done the work in the previous rx interrupt handler. > > > A similar issue exists with polling from start_xmit, it is however > > > less common because of the delayed cb optimization of the split ring - > > > but will likely affect the packed ring once that is more common. > > > > > > In particular, this was reported to lead to the following warning msg: > > > [ 3588.010778] irq 38: nobody cared (try booting with the > > > "irqpoll" option) > > > [ 3588.017938] CPU: 4 PID: 0 Comm: swapper/4 Not tainted > > > 5.3.0-19-generic #20~18.04.2-Ubuntu > > > [ 3588.017940] Call Trace: > > > [ 3588.017942] > > > [ 3588.017951] dump_stack+0x63/0x85 > > > [ 3588.017953] __report_bad_irq+0x35/0xc0 > > > [ 3588.017955] note_interrupt+0x24b/0x2a0 > > > [ 3588.017956] handle_irq_event_percpu+0x54/0x80 > > > [ 3588.017957] handle_irq_event+0x3b/0x60 > > > [ 3588.017958] handle_edge_irq+0x83/0x1a0 > > > [ 3588.017961] handle_irq+0x20/0x30 > > > [ 3588.017964] do_IRQ+0x50/0xe0 > > > [ 3588.017966] common_interrupt+0xf/0xf > > > [ 3588.017966] > > > [ 3588.017989] handlers: > > > [ 3588.020374] [<000000001b9f1da8>] vring_interrupt > > > [ 3588.025099] Disabling IRQ #38 > > > > > > This patchset attempts to fix this by cleaning up a bunch of races > > > related to the handling of sq callbacks (aka tx interrupts). > > > Somewhat tested but I couldn't reproduce the original issues > > > reported, sending out for help with testing. > > > > > > Wei, does this address the spurious interrupt issue you are > > > observing? Could you confirm please? > > > > Thanks for working on this, Michael. Wei is on leave. I'll try to reproduce. > > The original report was generated with five GCE virtual machines > sharing a sole-tenant node, together sending up to 160 netperf > tcp_stream connections to 16 other instances. Running Ubuntu 20.04-LTS > with kernel 5.4.0-1034-gcp. > > But the issue can also be reproduced with just two n2-standard-16 > instances, running neper tcp_stream with high parallelism (-T 16 -F > 240). > > It's a bit faster to trigger by reducing the interrupt count threshold > from 99.9K/100K to 9.9K/10K. And I added additional logging to report > the unhandled rate even if lower. > > Unhandled interrupt rate scales with the number of queue pairs > (`ethtool -L $DEV combined $NUM`). It is essentially absent at 8 > queues, at around 90% at 14 queues. By default these GCE instances > have one rx and tx interrupt per core, so 16 each. With the rx and tx > interrupts for a given virtio-queue pinned to the same core. > > Unfortunately, commit 3/4 did not have a significant impact on these > numbers. Have to think a bit more about possible mitigations. At least > I'll be able to test the more easily now. Continuing to experiment with approaches to avoid this interrupt disable. I think it's good to remember that the real bug is the disabling of interrupts, which may cause stalls in absence of receive events. The spurious tx interrupts themselves are no worse than the processing the tx and rx interrupts strictly separately without the optimization. The clean-from-rx optimization just reduces latency. The spurious interrupts indicate a cycle optimization opportunity for sure. I support Jason's suggestion for a single combined interrupt for both tx and rx. That is not feasible as a bugfix for stable, so we need something to mitigate the impact in the short term. For that, I suggest just an approach to maintain most benefit from the opportunistic cleaning, while keeping spurious rate below the threshold. A few variants: 1. In virtnet_poll_cleantx, a uniformly random draw on whether or not to attemp to clean. Not trivial to get a good random source that is essentially free. One example perhaps is sq->vq->num_free & 0x7, but not sure how randomized those bits are. Pro: this can be implemented strictly in virtio_net. Con: a probabilistic method will reduce the incidence rate, but it may still occur at the tail. 2. If also changing virtio_ring, in vring_interrupt count spurious interrupts and report this count through a new interface. Modify virtio_net to query and skip the optimization if above a threshold. 2a. slight variant: in virtio_net count consecutive succesful opportunistic cleaning operations. If 100% hit rate, then probably the tx interrupts are all spurious. Temporarily back off. (virtio_net is not called for interrupts if there is no work on the ring, so cannot count these events independently itself). 3. Modify virtio_ring to explicitly allow opportunistic cleaning and spurious interrupts on a per vring basis. Add a boolean to struct vring_virtqueue. And return IRQ_HANDLED instead of IRQ_NONE for these (only). The first two patches in Michael's series, which ensure that all relevant operations are executed with the tx lock held, perhaps shouldn't wait on additional interrupt suppression / mitigation work.