Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751755AbdHAXcL (ORCPT ); Tue, 1 Aug 2017 19:32:11 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:50710 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751018AbdHAXcK (ORCPT ); Tue, 1 Aug 2017 19:32:10 -0400 Date: Tue, 1 Aug 2017 16:32:03 -0700 From: "Paul E. McKenney" To: Peter Zijlstra Cc: Nicholas Piggin , Mathieu Desnoyers , Michael Ellerman , linux-kernel , Boqun Feng , Andrew Hunter , maged michael , gromer , Avi Kivity , Benjamin Herrenschmidt , Palmer Dabbelt , Dave Watson Subject: Re: [RFC PATCH v2] membarrier: expedited private command Reply-To: paulmck@linux.vnet.ibm.com References: <20170728115702.5vgnvwhmbbmyrxbf@hirez.programming.kicks-ass.net> <87tw1s4u9w.fsf@concordia.ellerman.id.au> <20170731233731.32e68f6d@roar.ozlabs.ibm.com> <973223324.694.1501551189603.JavaMail.zimbra@efficios.com> <20170801120047.61c59064@roar.ozlabs.ibm.com> <20170801081230.GF6524@worktop.programming.kicks-ass.net> <20170801195717.7a675cc2@roar.ozlabs.ibm.com> <20170801102203.urldoripgbh2ohun@hirez.programming.kicks-ass.net> <20170801132309.GS3730@linux.vnet.ibm.com> <20170801141654.qredbzshlz47lfxy@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20170801141654.qredbzshlz47lfxy@hirez.programming.kicks-ass.net> User-Agent: Mutt/1.5.21 (2010-09-15) X-TM-AS-GCONF: 00 x-cbid: 17080123-0048-0000-0000-000001CD0987 X-IBM-SpamModules-Scores: X-IBM-SpamModules-Versions: BY=3.00007467; HX=3.00000241; KW=3.00000007; PH=3.00000004; SC=3.00000215; SDB=6.00896214; UDB=6.00448312; IPR=6.00676401; BA=6.00005506; NDR=6.00000001; ZLA=6.00000005; ZF=6.00000009; ZB=6.00000000; ZP=6.00000000; ZH=6.00000000; ZU=6.00000002; MB=3.00016487; XFM=3.00000015; UTC=2017-08-01 23:32:07 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17080123-0049-0000-0000-00004216C92B Message-Id: <20170801233203.GO3730@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-08-01_14:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1706020000 definitions=main-1708010377 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 965 Lines: 21 On Tue, Aug 01, 2017 at 04:16:54PM +0200, Peter Zijlstra wrote: > On Tue, Aug 01, 2017 at 06:23:09AM -0700, Paul E. McKenney wrote: > > On Tue, Aug 01, 2017 at 12:22:03PM +0200, Peter Zijlstra wrote: > > > > [ . . . ] > > > > > As to scheduler IPIs, those are limited to the CPUs the user is limited > > > to and are rate limited by the wakeup-latency of the tasks. After all, > > > all the time a task is runnable but not running, wakeups are no-ops. > > > > Can't that wakeup-latency limitation be overcome by a normal user simply > > by having lots of tasks to wake up, which then go back to sleep almost > > immediately? Coupled with very a low-priority CPU-bound task on each CPU? > > Let me put it like this; there is no way to cause more interference > using IPIs then there is simply running while(1) loops ;-) Very good, that does give us some guidance, give or take context switches happening during the IPI latency window. ;-) Thanx, Paul