Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754748AbbDHTV1 (ORCPT ); Wed, 8 Apr 2015 15:21:27 -0400 Received: from mail-am1on0092.outbound.protection.outlook.com ([157.56.112.92]:37312 "EHLO emea01-am1-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753400AbbDHTVY (ORCPT ); Wed, 8 Apr 2015 15:21:24 -0400 Message-ID: <55257F9C.3050105@ezchip.com> Date: Wed, 8 Apr 2015 15:21:00 -0400 From: Chris Metcalf User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.6.0 MIME-Version: 1.0 To: Frederic Weisbecker CC: Don Zickus , Ingo Molnar , Andrew Morton , Andrew Jones , chai wen , Ulrich Obergfell , Fabian Frederick , Aaron Tomlin , Ben Zhang , Christoph Lameter , Gilad Ben-Yossef , Steven Rostedt , , Jonathan Corbet , , Thomas Gleixner , Peter Zijlstra Subject: Re: [PATCH v5 2/2] watchdog: add watchdog_exclude sysctl to assist nohz References: <1258649504.12464273.1428252407339.JavaMail.zimbra@redhat.com> <1428349556-21873-1-git-send-email-cmetcalf@ezchip.com> <1428349556-21873-3-git-send-email-cmetcalf@ezchip.com> <20150408140108.GB13227@lerouge> In-Reply-To: <20150408140108.GB13227@lerouge> Content-Type: text/plain; charset="windows-1252"; format=flowed Content-Transfer-Encoding: 7bit X-Originating-IP: [12.216.194.146] X-ClientProxiedBy: BN1PR12CA0022.namprd12.prod.outlook.com (25.160.77.32) To HE1PR02MB0778.eurprd02.prod.outlook.com (25.161.118.142) Authentication-Results: infradead.org; dkim=none (message not signed) header.d=none; X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:HE1PR02MB0778; X-Forefront-Antispam-Report: BMV:1;SFV:NSPM;SFS:(10009020)(6009001)(6049001)(24454002)(76104003)(479174004)(377454003)(50466002)(40100003)(87976001)(62966003)(59896002)(76176999)(77156002)(36756003)(50986999)(87266999)(122386002)(2950100001)(54356999)(77096005)(1411001)(15975445007)(65816999)(110136001)(33656002)(86362001)(47776003)(23746002)(83506001)(19580395003)(46102003)(92566002)(66066001)(65956001)(64126003)(42186005)(18886065003);DIR:OUT;SFP:1101;SCL:1;SRVR:HE1PR02MB0778;H:[10.7.0.41];FPR:;SPF:None;MLV:sfv;LANG:en; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(601004)(5002010)(5005006);SRVR:HE1PR02MB0778;BCL:0;PCL:0;RULEID:;SRVR:HE1PR02MB0778; X-Forefront-PRVS: 0540846A1D X-OriginatorOrg: ezchip.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Apr 2015 19:21:17.4890 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR02MB0778 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 830 Lines: 19 On 04/08/2015 10:01 AM, Frederic Weisbecker wrote: > How about creating smpboot_update_mask_percpu_thread() and handle it from smpboot, > this way future evolutions of smpboot won't overlook this cpumask live change? It seemed like your proposed approach was actually a bit heavier-weight from the perspective of generic smp_hotplug_thread, so instead I just modified the proposed API to have a simple "valid_cpu()" callback, which I think is clear and won't be damaged by smpboot evolution. Let me know what you think. -- Chris Metcalf, EZChip Semiconductor http://www.ezchip.com -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/