Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp2333966imm; Fri, 7 Sep 2018 14:52:15 -0700 (PDT) X-Google-Smtp-Source: ANB0VdaBcjIZ2ptziPFbQQAUnAOMAnMeAduM3DQvLzgru9dBbwiv+nBP4qT6k4uJQloSddh+5r9O X-Received: by 2002:a65:4849:: with SMTP id i9-v6mr10199049pgs.350.1536357135751; Fri, 07 Sep 2018 14:52:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1536357135; cv=none; d=google.com; s=arc-20160816; b=peiU0v8AMQAg3O6HGGB7mbYYOvZ+HXi5Ohc1s6sMQnS0ahKd3LvpM1kwy/u4LU+/hs MILeSexLBCZZNsXP9f4yv+9diVzTaaCayqVIUqZMGymwFc0R94Lwd7O167WEikI4qkwC k1qSlqXGasu5NyV4Q2S60/1NwWGZX0FzNEHiPh0cQATQDq+/mnUYXkSIaAF+kmrGDd6k 5zmnQyQjQ9f5IyQz+TS+B9x74ywATZ5fiNid+mULM7cUlSn0Sy2Q9GLdL1bcp5cwjs9b WwuuSH9evXshLU4koP98UXYw8IqUYOC2TOabl5n26CgNGq0/DNsTgOee3DHmnRZ62TXQ q8GA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=/vGj0B19D0H1MdtRjFdlg2C9y+M3DPWRVbChq4yUy9M=; b=ZcU97ySKPAeIYhLxVrLGNtKeurXwtJxXfXj+9cCKLSvI9P+I+TsdmYTst4H/S+wQkR ah6OiMAwY9SaH/X8wRnAqnPNP/5onrtItB3A6uwYYhUk37exscMskCaugTeAKpv0EqLa e8hSPOIYez7zvbds7u4OZE8nvTC2Dd2/mqhwhu3IlDEK1nKCsXlrDbV7OKBJ2Vkh3eU0 TCyuGJV8PLq9z+YLBMTa3Z/zr+p1x9Z25/GRqCXymE4toEpi/5jhTtU6Auo2b4A4p1Wt vVeHtDBLY6WcgQpHnDlt39uckK8tEZYQ6I3j1Y4pybzt1lTtu7dt2QQvDGveo9M0s/65 26lw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=d9oF7+jz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d9-v6si9907147plj.418.2018.09.07.14.52.00; Fri, 07 Sep 2018 14:52:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@amazon.de header.s=amazon201209 header.b=d9oF7+jz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=amazon.de Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730685AbeIHC1H (ORCPT + 99 others); Fri, 7 Sep 2018 22:27:07 -0400 Received: from smtp-fw-4101.amazon.com ([72.21.198.25]:50633 "EHLO smtp-fw-4101.amazon.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730607AbeIHC1G (ORCPT ); Fri, 7 Sep 2018 22:27:06 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.de; i=@amazon.de; q=dns/txt; s=amazon201209; t=1536356651; x=1567892651; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=/vGj0B19D0H1MdtRjFdlg2C9y+M3DPWRVbChq4yUy9M=; b=d9oF7+jziuysG6g5tUU8ABtJLrW6aqLvtzUDVZpBc9z3AeXvoiXcfr0T mwRIGGFER4vLc9Z2B9fSbFyxm7ZNCSoXvLFq7uPUfh8dtAxMuG/L5qVpN XZLT8KwFuD5FWB8NiSKE8xa3BeR/nuUH7sLotLxxUc8628wJIOCekZfr6 Q=; X-IronPort-AV: E=Sophos;i="5.53,343,1531785600"; d="scan'208";a="737530643" Received: from iad6-co-svc-p1-lb1-vlan3.amazon.com (HELO email-inbound-relay-2a-69849ee2.us-west-2.amazon.com) ([10.124.125.6]) by smtp-border-fw-out-4101.iad4.amazon.com with ESMTP/TLS/DHE-RSA-AES256-SHA; 07 Sep 2018 21:44:10 +0000 Received: from u7588a65da6b65f.ant.amazon.com (pdx2-ws-svc-lb17-vlan3.amazon.com [10.247.140.70]) by email-inbound-relay-2a-69849ee2.us-west-2.amazon.com (8.14.7/8.14.7) with ESMTP id w87LfjCS085562 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL); Fri, 7 Sep 2018 21:41:46 GMT Received: from u7588a65da6b65f.ant.amazon.com (localhost [127.0.0.1]) by u7588a65da6b65f.ant.amazon.com (8.15.2/8.15.2/Debian-3) with ESMTPS id w87LfhGC027281 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 7 Sep 2018 23:41:43 +0200 Received: (from jschoenh@localhost) by u7588a65da6b65f.ant.amazon.com (8.15.2/8.15.2/Submit) id w87LfgYA027280; Fri, 7 Sep 2018 23:41:42 +0200 From: =?UTF-8?q?Jan=20H=2E=20Sch=C3=B6nherr?= To: Ingo Molnar , Peter Zijlstra Cc: =?UTF-8?q?Jan=20H=2E=20Sch=C3=B6nherr?= , linux-kernel@vger.kernel.org Subject: [RFC 16/60] sched: Preparatory code movement Date: Fri, 7 Sep 2018 23:40:03 +0200 Message-Id: <20180907214047.26914-17-jschoenh@amazon.de> X-Mailer: git-send-email 2.9.3.1.gcba166c.dirty In-Reply-To: <20180907214047.26914-1-jschoenh@amazon.de> References: <20180907214047.26914-1-jschoenh@amazon.de> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Move struct rq_flags around to keep future commits crisp. Signed-off-by: Jan H. Schönherr --- kernel/sched/sched.h | 26 +++++++++++++------------- 1 file changed, 13 insertions(+), 13 deletions(-) diff --git a/kernel/sched/sched.h b/kernel/sched/sched.h index b8c8dfd0e88d..cd3a32ce8fc6 100644 --- a/kernel/sched/sched.h +++ b/kernel/sched/sched.h @@ -472,6 +472,19 @@ struct cfs_bandwidth { }; #endif /* CONFIG_CGROUP_SCHED */ +struct rq_flags { + unsigned long flags; + struct pin_cookie cookie; +#ifdef CONFIG_SCHED_DEBUG + /* + * A copy of (rq::clock_update_flags & RQCF_UPDATED) for the + * current pin context is stashed here in case it needs to be + * restored in rq_repin_lock(). + */ + unsigned int clock_update_flags; +#endif +}; + /* CFS-related fields in a runqueue */ struct cfs_rq { struct load_weight load; @@ -1031,19 +1044,6 @@ static inline void rq_clock_cancel_skipupdate(struct rq *rq) rq->clock_update_flags &= ~RQCF_REQ_SKIP; } -struct rq_flags { - unsigned long flags; - struct pin_cookie cookie; -#ifdef CONFIG_SCHED_DEBUG - /* - * A copy of (rq::clock_update_flags & RQCF_UPDATED) for the - * current pin context is stashed here in case it needs to be - * restored in rq_repin_lock(). - */ - unsigned int clock_update_flags; -#endif -}; - static inline void rq_pin_lock(struct rq *rq, struct rq_flags *rf) { rf->cookie = lockdep_pin_lock(&rq->lock); -- 2.9.3.1.gcba166c.dirty