Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp645702ybz; Wed, 15 Apr 2020 15:51:55 -0700 (PDT) X-Google-Smtp-Source: APiQypKy/F5tzA5x+V09wo8VxjE2wSjhdKXhM8HOL+XZtLYiQkFP6qqAXqOjheccEQ/v/14sRqbY X-Received: by 2002:aa7:cd7b:: with SMTP id ca27mr20586896edb.104.1586991115827; Wed, 15 Apr 2020 15:51:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586991115; cv=none; d=google.com; s=arc-20160816; b=DobgTvY6xgcivY4LCJLS+nRR1k5Atd9ssMRvG34AdxaW0+fx8kvfF2Wa9Odgdd+on+ hvzSKnvawjTvPPi8daJRcKOJkWmT1hmcKBq/vcJqYuukW2GbYmJfCzcmdMeHrie+eLFj K5thy3cYoBrQWBPzV+FTGr5M4Xu3ZdWWj1PQMJ9QzRkHrrzeOFOTwYF0DY/xMDA63hgm x0ijuU6TyULYnn1uS4/OSBvGp67zs4E2y2vQ+68ujmYW7Y2UXvR7aGQyN4HvJbBNDtKr rauDxam0FkRdmYyrys5/A/J8qx/Dkbs0Z+267/ZqTQbcVahM05ONDstcsigUQvt1tDhT bW9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=gzpmZPmtxEm/2WaOlqs6ZzLJj6vb3mNUa4I7Dm8/uDM=; b=ONm7j60umZzsWRE39PxHdN0N0izYRbmGz6sZ7TIMuVmfCiSPI971CMag9PO6ZqnLYn hq4/SSbMZPCaCWxuzAZNCDYeedjgVyzakyQaSqUPqQzw/ZZIhESrB3D2YgAsgsx5gAyq Sz5Wj/2hfXnxo76M847ZmxM8pLxAyyYJSdqJCsLczEb2eZpMlkJW92V7Iv9bXfmGv/4w N0PV8qSbVy/OcOG0jhvpzkiv6sjzmZRLaFgAVg8hWYiriv5f9+oxIThF07UBK+I5V5Wt 5YB7mDxvA+5jR6FLtyDJuI1JUKKL/moJMifmUPOyf7RH2EEbOhsf2rNjrO2hNsfnzFSR PEoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=edX3pPAo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z6si11690602edp.213.2020.04.15.15.51.32; Wed, 15 Apr 2020 15:51:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@infradead.org header.s=bombadil.20170209 header.b=edX3pPAo; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2895688AbgDOJgf (ORCPT + 99 others); Wed, 15 Apr 2020 05:36:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49810 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S2895655AbgDOJgc (ORCPT ); Wed, 15 Apr 2020 05:36:32 -0400 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:e::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id ECA34C061A0C for ; Wed, 15 Apr 2020 02:36:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=In-Reply-To:Content-Type:MIME-Version :References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=gzpmZPmtxEm/2WaOlqs6ZzLJj6vb3mNUa4I7Dm8/uDM=; b=edX3pPAoPijTJTeTth2ags5AR0 Y3DrxNVp/qrkW3CQ4Y0cxF3siDEy8nBU3q0CTfayywsYSmkN+JFYjqnzkYlCJVQ5mXvYRdmOZahb4 Jg7Yz9W8HDWiOO7DARnB80lfWjll/ly737+HxaBheLglk7HV6VJoIwZWIqq9NRP5jVXcgxI5W3Zp6 2t1mU2szi32MxsEZIj9hgJXJ5yGEVyTaSeCHHt9pxhU+bSE2p7XDQ+6nTybHeMwsYApgXbu4ovANn lzIrS3WoHFQ/C5XuJTXT2/ta4L3/i3lhXdEVucDOrD8OyGjIsZYtUjIes3JVxh9mJCk6ZCFrfW0IV 7d6OV96Q==; Received: from j217100.upc-j.chello.nl ([24.132.217.100] helo=noisy.programming.kicks-ass.net) by bombadil.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1jOeSx-0007Zs-7M; Wed, 15 Apr 2020 09:36:19 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id 333B2305EEC; Wed, 15 Apr 2020 11:36:17 +0200 (CEST) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id 10E2F2BC6F2D6; Wed, 15 Apr 2020 11:36:17 +0200 (CEST) Date: Wed, 15 Apr 2020 11:36:17 +0200 From: Peter Zijlstra To: Steven Rostedt Cc: Qais Yousef , Ingo Molnar , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Ben Segall , Mel Gorman , Andrew Morton , Thomas Gleixner , Yury Norov , Paul Turner , Alexey Dobriyan , Josh Don , Pavan Kondeti , linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/4] cpumask: Make cpumask_any() truly random Message-ID: <20200415093617.GZ20730@hirez.programming.kicks-ass.net> References: <20200414150556.10920-1-qais.yousef@arm.com> <20200414150556.10920-3-qais.yousef@arm.com> <20200414121956.3687d6e9@gandalf.local.home> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200414121956.3687d6e9@gandalf.local.home> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 14, 2020 at 12:19:56PM -0400, Steven Rostedt wrote: > > +/** > > + * cpumask_any - pick a "random" cpu from *srcp > > + * @srcp: the input cpumask > > + * > > + * Returns >= nr_cpu_ids if no cpus set. > > + */ > > +int cpumask_any(const struct cpumask *srcp) > > +{ > > + int next, prev; > > + > > + /* NOTE: our first selection will skip 0. */ > > + prev = __this_cpu_read(distribute_cpu_mask_prev); > > + > > + next = cpumask_next(prev, srcp); > > + if (next >= nr_cpu_ids) > > + next = cpumask_first(srcp); > > + > > + if (next < nr_cpu_ids) > > + __this_cpu_write(distribute_cpu_mask_prev, next); > > Do we care if this gets preempted and migrated to a new CPU where we read > "prev" from one distribute_cpu_mask_prev on one CPU and write it to another > CPU? I don't think we do; that just adds to the randomness ;-), but you do raise a good point in that __this_cpu_*() ops assume preemption is already disabled, which is true of the one exiting cpumask_any_and_distribute() caller, but is no longer true after patch 1, and this patch repeats the mistake. So either we need to disable preemption across the function or transition to this_cpu_*() ops.