Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp462639ybi; Wed, 19 Jun 2019 02:31:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqxBvCb/aZTIqE6A2nRM1SAqPdNu2M3nD2RL6B8UqUJzpCW4u3KjpDlKsQxn1Zz5CsBwT8Ds X-Received: by 2002:a62:82c2:: with SMTP id w185mr105631794pfd.202.1560936681727; Wed, 19 Jun 2019 02:31:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560936681; cv=none; d=google.com; s=arc-20160816; b=wCTTPsTY62RJc3cqLCzNTOeSDvWRVlX1f+c8yRH5b+2es+XEqflZDhuZaYnBf9nsoW T0lbd1JYONxWTwVJt9OtiCsOjUzdllQ54TcCNUfxBXe06tL7yaTPSsRHjy9bUhvLS8vy 3XZsN7iVsZ8YqRLjLWLF8a1ghuOVOMAhh6G9dbsm4ZiQhoqsmn18PjjuiuvYBhh0datv vItxZ7fqXcJo90sq9YN385AsXt9BpAu4VM/YtohpRveWQsW4XBK7g7Uzd2fEwZyhOM/6 iDZshx43CkrntjyKfNh3K7Al3lFPJJLWKO3dz9H6E/Zw4PLYg6JXuDhSfaFTYH8qjhUo DXhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=WhZtlMKAVTBseeONRRBbXW5ZM40StDkI/R4mVHoEWls=; b=szfycR2c2OvoPwVd8nUcoxj5LzB3P98aruIlYqxTdPSZvbuzdum1PAObgfc8djdB/J yTrYnk0djf7r2KBIMTSkgfVp5ufWd18KrJzjkEdp8dfr3it0cfoGUngPUs5jo+Zd0glL ngTDh8EEcs5Bx/qkFsQxQrHHse4w21uGf4vqZUj04VjwwooMpnudSHDBtoZvZX9ILQuL BwUEW1tPCgqD+W/D2oi3IuNf8+1W3ZkWFiCanVWIRVC3EC6Y3tAPpZkIYuvPBWSyvYRC AWcfevKnVyNT4iYu0ZRatbY7v8//GSvaq87/Y1XUSnG29+savqcJtsz3ERJJ0SOEI9hf TSqQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g24si2554794pgj.197.2019.06.19.02.31.05; Wed, 19 Jun 2019 02:31:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731440AbfFSJ3J (ORCPT + 99 others); Wed, 19 Jun 2019 05:29:09 -0400 Received: from mx2.suse.de ([195.135.220.15]:36960 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1731267AbfFSJ3J (ORCPT ); Wed, 19 Jun 2019 05:29:09 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 28762ADCF; Wed, 19 Jun 2019 09:29:07 +0000 (UTC) Date: Wed, 19 Jun 2019 11:29:05 +0200 From: Michal =?iso-8859-1?Q?Koutn=FD?= To: Juri Lelli Cc: peterz@infradead.org, mingo@redhat.com, rostedt@goodmis.org, lizefan@huawei.com, tj@kernel.org, bristot@redhat.com, luca.abeni@santannapisa.it, cgroups@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] sched/core: Fix cpu controller for !RT_GROUP_SCHED Message-ID: <20190619092904.GB28937@blackbody.suse.cz> References: <20190605114935.7683-1-juri.lelli@redhat.com> <20190605142003.GD4255@blackbody.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20190605142003.GD4255@blackbody.suse.cz> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Jun 05, 2019 at 04:20:03PM +0200, Michal Koutn? wrote: > I considered relaxing the check to non-root cgroups only, however, as > your example shows, it doesn't prevent reaching the avoided state by > other paths. I'm not that familiar with RT sched to tell whether > RT-priority tasks in different task_groups break any assumptions. So I had another look and the check is bogus. The RT sched with !CONFIG_RT_GROUP_SCHED works only with the struct rt_rq embedded in the generic struct rq -- regardless of the task's membership in the cpu controller hierarchy. Perhaps, the commit message may mention this also prevents enabling cpu controller on unified hierarchy (if there are any (kernel) RT tasks to migrate). Reviewed-by: Michal Koutn?