Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp540994ybz; Wed, 29 Apr 2020 05:04:08 -0700 (PDT) X-Google-Smtp-Source: APiQypJmfWY7yzlK1Pjtc4ZSqqkuOHRnM5Y9gSqfTMXV6u6YyOkdGS554eS0IoqKmj3BwnktdQX1 X-Received: by 2002:a05:6402:22d5:: with SMTP id dm21mr1817896edb.275.1588161848236; Wed, 29 Apr 2020 05:04:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588161848; cv=none; d=google.com; s=arc-20160816; b=laFYaOKdrY0Kic9/QmYYt1CLJOYqefHVHu2au/NTDYjcPz5W4qJ/FtxSal3RH/pH2M unEkEUMwpEJyh5ag7JGzBkV1jB8vQeCLKD6V29ayu84q6ARCoYjX9LgGdhr5TUOFIMEz l5C/MCqETz2ksm0wGPOmuJwW9sCvFXoHs//SnVhNuKUPzB9Kgyuu61gwA0iWv08Kq2Ty 6vEH9/SMLA48KaKG28ltg6/NjZxu+YJU4S2qf4AfAG/yYPdLDVnXj2E4vYLS2ajpbOE8 BK2Qtzbnbu1JvObx070sdreQCGM+mO9/YcCOrYCefQfi0YV1n8Z3tkFsYhIMwD6VKpnz s2Tw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:date:in-reply-to:message-id :subject:cc:to:from:user-agent:references; bh=EO6HdU2kgen6dRZOwbgNQiN9pGQ0jRttNTN3eOqMBvI=; b=cllCHjtCU7CeV3ziwtQi5bu39Zty4bBz6kTPwPf4PG7cO5oUqNmJsEA7uzNp3h0wwY fJrGzczPZvKvbEUlbOefOTWHWG/yx13FxvVE0zshSA55KjSZY2G6jwOiXNinXODWw/ch qHmIziPvtw/dEl9T3+nZqBALMqWefWiHBfkVfMOQ67JNZFTxHmrxLKhAlpg4MK964RAZ eyQ4/2LPaxHkhLH6QY8K6QOOJMK9fE0xI8Lddbny14vbhQc/xDZ/kS9tja85qrB1c4Vs CCouIXA4dLErNGO5G3upb74Nm/DwndpBXs3uUGaBYg8Zjvr74+d0mESiaKrkiasZUMQO sh9Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e16si3679982ejr.309.2020.04.29.05.03.40; Wed, 29 Apr 2020 05:04:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726783AbgD2MBG (ORCPT + 99 others); Wed, 29 Apr 2020 08:01:06 -0400 Received: from foss.arm.com ([217.140.110.172]:37838 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726426AbgD2MBG (ORCPT ); Wed, 29 Apr 2020 08:01:06 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id CCB321063; Wed, 29 Apr 2020 05:01:05 -0700 (PDT) Received: from e113632-lin (e113632-lin.cambridge.arm.com [10.1.194.46]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 7B6583F73D; Wed, 29 Apr 2020 05:01:04 -0700 (PDT) References: <20200428050242.17717-1-swood@redhat.com> <20200428050242.17717-2-swood@redhat.com> <2a30101cc0adb63ee7ce7b32119579d78de24b71.camel@redhat.com> User-agent: mu4e 0.9.17; emacs 26.3 From: Valentin Schneider To: Scott Wood Cc: Steven Rostedt , Ingo Molnar , Peter Zijlstra , Vincent Guittot , Dietmar Eggemann , Rik van Riel , Mel Gorman , linux-kernel@vger.kernel.org, linux-rt-users Subject: Re: [RFC PATCH 1/3] sched/fair: Call newidle_balance() from finish_task_switch() Message-ID: In-reply-to: <2a30101cc0adb63ee7ce7b32119579d78de24b71.camel@redhat.com> Date: Wed, 29 Apr 2020 13:00:58 +0100 MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 28/04/20 23:33, Scott Wood wrote: > On Tue, 2020-04-28 at 22:37 +0100, Valentin Schneider wrote: >> On 28/04/20 06:02, Scott Wood wrote: >> > Thus, newidle_balance() is entered with interrupts enabled, which allows >> > (in the next patch) enabling interrupts when the lock is dropped. >> > >> > Signed-off-by: Scott Wood >> > --- >> > kernel/sched/core.c | 7 ++++--- >> > kernel/sched/fair.c | 45 ++++++++++++++++---------------------------- >> > kernel/sched/sched.h | 6 ++---- >> > 3 files changed, 22 insertions(+), 36 deletions(-) >> > >> > diff --git a/kernel/sched/core.c b/kernel/sched/core.c >> > index 9a2fbf98fd6f..0294beb8d16c 100644 >> > --- a/kernel/sched/core.c >> > +++ b/kernel/sched/core.c >> > @@ -3241,6 +3241,10 @@ static struct rq *finish_task_switch(struct >> > task_struct *prev) >> > } >> > >> > tick_nohz_task_switch(); >> > + >> > + if (is_idle_task(current)) >> > + newidle_balance(); >> > + >> >> This means we must go through a switch_to(idle) before figuring out we >> could've switched to a CFS task, and do it then. I'm curious to see the >> performance impact of that. > > Any particular benchmark I should try? > I'm going to be very original and suggest hackbench :-) That would just be the first stop however, you would also want to try something less wakeup-intensive, maybe sysbench and the like - I'm thinking if you spawn ~1.5*nr_cpu_ids CPU-hogs, you'll hit that double switch fairly easily. And then there's always the big boys benchmarks like specjbb and co - I'd suggest having a look at Mel's mmtests.