Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp1192513ybf; Thu, 27 Feb 2020 06:35:50 -0800 (PST) X-Google-Smtp-Source: APXvYqyque3smOvpIclnnbGXGBH7pfzBJiltPhG+q+vEg1BGeqNoWjIp7qi6rgHQIgqE6XrI/RIP X-Received: by 2002:a05:6830:1081:: with SMTP id y1mr169777oto.367.1582814150510; Thu, 27 Feb 2020 06:35:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582814150; cv=none; d=google.com; s=arc-20160816; b=xO+/iOSW/H+pgTu+eqXlehT1E+5Wn54zCwywOc5O9IiclbpiV1xTgFvPOYSl5KKgeE fUeLSpf7/+z9gHtK+OFn+P5WY924KamtRvirGKveY8uD1mWfgdIiCkIt3KJYPC4X+J2o MQyou+pWSEX/3RMz8GnP4hZTJuNVU07GjHFiPKXfB2iQ71tMx8KsprjOy6vaC2E4XfIA OB221uQ9EDrw3esZkB5Dd7hjaFWhFyjaYX1OdxaRM1Pj5LGhYHZ2IT9CMVOn4hHwGbxb mAddQXHsY3OBSkmKRGj8i1gVXLTOP8R90PfeI37zu0Vyn6f0t2cNCOo9HHzdQ4YWPIo0 nFzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:references :in-reply-to:message-id:date:subject:to:from:dkim-signature; bh=wje6Pf988gVWIRhc+5LVNPjn3i2C5p/lHZA25Y3ZsJU=; b=phHf+q6zHm8mbgk2SkJhH1iqpnT1QLqBLCGMgb2a2YlDv0ZEdg53KX0nX5WWqbDo3X MpTTFUB73l22IasOvJrRfy1vSX/lb/JwA8fAM+VVVk7qaGF2J/99hNreZe3cwR9JBUZr 4enB2z2JB5M1An/rtD6GJkLxOQCCloGfOI4iWxijLWYqDsDoPzXUG2ietGG2cWd+Gj++ cOfUdWl2Y1cDzcSQ+L5nCxg0XT3zS8kJgrYWpCacIIX+KsjlsqGMKpZ0bgYArANZzL+g +Fa1vg46WSfqlFU/KLs9pF6/y00wHZ0hgVbarYerxkHW8ieb6W6wi1S5Ec0E6iBD4jo+ x+bQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="x0B0/y/z"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e1si1624534otr.8.2020.02.27.06.35.38; Thu, 27 Feb 2020 06:35:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="x0B0/y/z"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387977AbgB0OeO (ORCPT + 99 others); Thu, 27 Feb 2020 09:34:14 -0500 Received: from mail.kernel.org ([198.145.29.99]:45086 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387434AbgB0OeF (ORCPT ); Thu, 27 Feb 2020 09:34:05 -0500 Received: from localhost.localdomain (c-98-220-238-81.hsd1.il.comcast.net [98.220.238.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EA247246B1; Thu, 27 Feb 2020 14:34:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582814044; bh=XC+WPtSkfTm5ePQdr+PHvKYb9iGLo7xCq4HxNroYENU=; h=From:To:Subject:Date:In-Reply-To:References:In-Reply-To: References:From; b=x0B0/y/zBgjCbMsNzn4PMOOwaNeQLcJaRag7kp/vzs+l3GS1X4A9B/5asiEHb349p tta1we1QLW7MGZOK7myu04khcQWUaSNjRzGw6yMxDPFDS4W4I6LxALtBIhRv3I+iRu 4D2NC+WYK/OcBRsH7RocNrOt+wRBm/f88GtNHV4M= From: zanussi@kernel.org To: LKML , linux-rt-users , Steven Rostedt , Thomas Gleixner , Carsten Emde , John Kacur , Sebastian Andrzej Siewior , Daniel Wagner , Tom Zanussi Subject: [PATCH RT 09/23] lib/smp_processor_id: Don't use cpumask_equal() Date: Thu, 27 Feb 2020 08:33:20 -0600 Message-Id: X-Mailer: git-send-email 2.14.1 In-Reply-To: References: In-Reply-To: References: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Waiman Long v4.14.170-rt75-rc2 stable review patch. If anyone has any objections, please let me know. ----------- [ Upstream commit 659252061477862f45b79e1de169e6030f5c8918 ] The check_preemption_disabled() function uses cpumask_equal() to see if the task is bounded to the current CPU only. cpumask_equal() calls memcmp() to do the comparison. As x86 doesn't have __HAVE_ARCH_MEMCMP, the slow memcmp() function in lib/string.c is used. On a RT kernel that call check_preemption_disabled() very frequently, below is the perf-record output of a certain microbenchmark: 42.75% 2.45% testpmd [kernel.kallsyms] [k] check_preemption_disabled 40.01% 39.97% testpmd [kernel.kallsyms] [k] memcmp We should avoid calling memcmp() in performance critical path. So the cpumask_equal() call is now replaced with an equivalent simpler check. Signed-off-by: Waiman Long Signed-off-by: Sebastian Andrzej Siewior Signed-off-by: Tom Zanussi --- lib/smp_processor_id.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/smp_processor_id.c b/lib/smp_processor_id.c index 6f4a4ae881c8..9f3c8bb62e57 100644 --- a/lib/smp_processor_id.c +++ b/lib/smp_processor_id.c @@ -23,7 +23,7 @@ notrace static unsigned int check_preemption_disabled(const char *what1, * Kernel threads bound to a single CPU can safely use * smp_processor_id(): */ - if (cpumask_equal(current->cpus_ptr, cpumask_of(this_cpu))) + if (current->nr_cpus_allowed == 1) goto out; /* -- 2.14.1