Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1657733ybz; Thu, 30 Apr 2020 03:16:00 -0700 (PDT) X-Google-Smtp-Source: APiQypJtddB/rn9hsltgID+ivzDdSeH7ynFi5G8dCRZoUUpN/RbLroVdotZCFxAX89AzOeaiAZLk X-Received: by 2002:a05:6402:1d1c:: with SMTP id dg28mr1820939edb.315.1588241760652; Thu, 30 Apr 2020 03:16:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588241760; cv=none; d=google.com; s=arc-20160816; b=tZtc4SW/p0jHdCC3Ii97htQjYd1cH/1Wxw6ek5Etmer4Q8Iyim6YgZc6FWDrgGQ4S1 9OCELL72ICaxYczlJ81weTXy1nMcc2F7mPdAm4tzhJq5AUegADqpLHxYnAWz6XqC7936 rgQG3MHq1f+i9SFgLrFZZ6E3vWZDWKiYqjeNUov5RsqIhqSMgHPM98uE+iJvx7O75xAj j8hlPtJQ4+Te7/MUQlBKyjBlHoGBpx2gpSYnQIocqW/CmB1UAUKo/5V/D3dlh88f76hE efV2fJWZU875lRId/OOBzIVXsdWiKrVjR3TV+5kVGZM5EDrIXLs84iX4fH74HBqRkPw8 cU+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:in-reply-to :subject:cc:to:from:user-agent:references; bh=Jid5plsxY2CiRtZ5fkg7iGRvcaF0cHtG8RdaMSuVJ7c=; b=HgtWYL4MWCb9gD0LJ7Ueq3tch4pS3hgsG3Skw771zXGv9llcEdEUQ6NJCoM7W5fkh+ YWWNbwsW+njvIpo5YkpvpgI+IY/I1z7YFgdZ8TbBUeL+HEzLmMP5Gunqm/58gOCj89RE AoPpgysfzeZvDB2BXlP7Ri+vD61QsVS98qXO0NrUkb6/Z8XnYaFV4JFMK5Fl3cSYC/MY rbCEhpfqqyxN7OImw0LVRYsemQ7KX0XaOsGyYdNopgNkhZZUfqqLdbVQbXtOL1NzF3dV moquCKaEmdnxb93Fygchx4gW3r/LnExslPfxOAVW9iIllP4Kkt24ktR6YpcX63ZVfCZC sPxg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dn6si5340528edb.514.2020.04.30.03.15.36; Thu, 30 Apr 2020 03:16:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726549AbgD3KOM (ORCPT + 99 others); Thu, 30 Apr 2020 06:14:12 -0400 Received: from foss.arm.com ([217.140.110.172]:51880 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726127AbgD3KOL (ORCPT ); Thu, 30 Apr 2020 06:14:11 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6B9A61063; Thu, 30 Apr 2020 03:14:11 -0700 (PDT) Received: from e113632-lin (e113632-lin.cambridge.arm.com [10.1.194.46]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 188DE3F68F; Thu, 30 Apr 2020 03:14:09 -0700 (PDT) References: <20200428050242.17717-1-swood@redhat.com> User-agent: mu4e 0.9.17; emacs 26.3 From: Valentin Schneider To: Vincent Guittot Cc: Scott Wood , Steven Rostedt , Ingo Molnar , Peter Zijlstra , Dietmar Eggemann , Rik van Riel , Mel Gorman , linux-kernel , linux-rt-users Subject: Re: [RFC PATCH 0/3] newidle_balance() latency mitigation In-reply-to: Date: Thu, 30 Apr 2020 11:14:05 +0100 Message-ID: MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 30/04/20 08:44, Vincent Guittot wrote: > On Thu, 30 Apr 2020 at 01:13, Valentin Schneider > wrote: >> >> >> On 28/04/20 06:02, Scott Wood wrote: >> > These patches mitigate latency caused by newidle_balance() on large >> > systems, by enabling interrupts when the lock is dropped, and exiting >> > early at various points if an RT task is runnable on the current CPU. >> > >> > When applied to an RT kernel on a 72-core machine (2 threads per core), I >> > saw significant reductions in latency as reported by rteval -- from >> > over 500us to around 160us with hyperthreading disabled, and from >> > over 1400us to around 380us with hyperthreading enabled. >> > >> > This isn't the first time something like this has been tried: >> > https://lore.kernel.org/lkml/20121222003019.433916240@goodmis.org/ >> > That attempt ended up being reverted: >> > https://lore.kernel.org/lkml/5122CD9C.9070702@oracle.com/ >> > >> > The problem in that case was the failure to keep BH disabled, and the >> > difficulty of fixing that when called from the post_schedule() hook. >> > This patchset uses finish_task_switch() to call newidle_balance(), which >> > enters in non-atomic context so we have full control over what we disable >> > and when. >> > >> > There was a note at the end about wanting further discussion on the matter -- >> > does anyone remember if that ever happened and what the conclusion was? >> > Are there any other issues with enabling interrupts here and/or moving >> > the newidle_balance() call? >> > >> >> Random thought that just occurred to me; in the grand scheme of things, >> with something in the same spirit as task-stealing (i.e. don't bother with >> a full fledged balance at newidle, just pick one spare task somewhere), >> none of this would be required. > > newly idle load balance already stops after picking 1 task Mph, I had already forgotten your changes there. Is that really always the case for newidle? In e.g. the busiest->group_type == group_fully_busy case, I think we can pull more than one task. > Now if your proposal is to pick one random task on one random cpu, I'm > clearly not sure that's a good idea > IIRC Steve's implementation was to "simply" pull one task from any CPU within the LLC domain that had > 1 runnable tasks. I quite like this since picking any one task is almost always better than switching to the idle task, but it wasn't a complete newidle_balance() replacement just yet. > >> >> Sadly I don't think anyone has been looking at it any recently.