Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp3914493yba; Tue, 7 May 2019 09:02:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqy/QpIG3MIJlwALSePixw91Q63Ev+IciJ9ssofHtzdOfFTL9FrIgFP1ANVo4TokB+sf/qbb X-Received: by 2002:a62:41cd:: with SMTP id g74mr42411274pfd.216.1557244923847; Tue, 07 May 2019 09:02:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557244923; cv=none; d=google.com; s=arc-20160816; b=z7rEsvsqHhKqnLbvJLk8vWGspyqbRAHkbZMaXRinkuygDXqsb+tOynsygBYaFrZ/bM 41Zye6dS0I2ieSjXoxQtdgUwhUNxzVewr9JtvbyS5O5rKjuebfdBE42cSAYV8KGOreNB oKh05IZzc228ApXAI616brpolncSTNYPdTdbEMncazoOs/MXe9k2XTIv3W7uANWXIOcg PWcNef3GqYis2z9Lc21FKjHozdpQbOcRdRIgWsPrzGayrJLrktUTP6ch8fxsiMHga95m 4lAk2VT1NaFp6X/ynLByZB80AhXAXSoaasBHrVtpGY7n3iewoq0kK+6utAIece2IE+rW i7VA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=sH1Ng717ycH9TW9IAXXgoF0OSb42iIIMNDzJ2pZJhts=; b=jZ6K+htnwPBS6XiouAQRIdeZ3UmyL+C9iNzfTrykGeZN2cl70FBYm5pn1dtY7Uaqmm WR8ASAe01uX+uk/bbiC0Gx55VEXmYnUB7za7XTFDTOjwDC9ETDo0x23UHmMN3bpKpD4A AxJ3XuKrlgz8yhsutc5WpYdx9SiLDvjQ9jRlTem0X2xCXgCaUTi697TL19sZh2x2gNmp Cg68oOKf+6xaIFlTHxlOHy/JzeY7fTAgApFxoQulpNjCg2pmn2oHlwFuPo/XTWfkgeZm r0Lwz4GbULB51yYI3LYFGsgGcQkcnmxrfQrVu78gswOmjF2cJMT36i4UI3aH4le25RuC KCGw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k14si19556986pgh.437.2019.05.07.09.01.49; Tue, 07 May 2019 09:02:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726896AbfEGQAp (ORCPT + 99 others); Tue, 7 May 2019 12:00:45 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:58380 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726831AbfEGQAn (ORCPT ); Tue, 7 May 2019 12:00:43 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 5A9B9374; Tue, 7 May 2019 09:00:43 -0700 (PDT) Received: from e105550-lin.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.72.51.249]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CDD653F5AF; Tue, 7 May 2019 09:00:40 -0700 (PDT) Date: Tue, 7 May 2019 17:00:38 +0100 From: Morten Rasmussen To: Quentin Perret Cc: Luca Abeni , linux-kernel@vger.kernel.org, Greg Kroah-Hartman , "Rafael J . Wysocki" , Ingo Molnar , Peter Zijlstra , Vincent Guittot , "Paul E . McKenney" , Joel Fernandes , Luc Van Oostenryck , Juri Lelli , Daniel Bristot de Oliveira , Patrick Bellasi , Tommaso Cucinotta Subject: Re: [RFC PATCH 3/6] sched/dl: Try better placement even for deadline tasks that do not block Message-ID: <20190507160038.GF19434@e105550-lin.cambridge.arm.com> References: <20190506044836.2914-1-luca.abeni@santannapisa.it> <20190506044836.2914-4-luca.abeni@santannapisa.it> <20190507141338.tnp62joujcrxyv5j@queper01-lin> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190507141338.tnp62joujcrxyv5j@queper01-lin> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 07, 2019 at 03:13:40PM +0100, Quentin Perret wrote: > On Monday 06 May 2019 at 06:48:33 (+0200), Luca Abeni wrote: > > @@ -1591,6 +1626,7 @@ select_task_rq_dl(struct task_struct *p, int cpu, int sd_flag, int flags) > > > > rcu_read_lock(); > > curr = READ_ONCE(rq->curr); /* unlocked access */ > > + het = static_branch_unlikely(&sched_asym_cpucapacity); > > Nit: not sure how the generated code looks like but I wonder if this > could potentially make you loose the benefit of the static key ? I have to take the blame for this bit :-) I would be surprised the static_key gives us anything here, but that is actually not the point here. It is purely to know whether we have to be capacity aware or not. I don't think we are in a critical path and the variable providing the necessary condition just happened to be a static_key. We might be able to make better use of it if we refactor the code a bit. Morten