Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp5275647pxu; Wed, 21 Oct 2020 19:47:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwoo/RQurl/YC5eCmzDUcJD+Gc4GVdNr0lQyJNzruewtOihGeDbiO2/hz4crRBvuiIfcdeA X-Received: by 2002:a17:906:b1d6:: with SMTP id bv22mr344148ejb.60.1603334854389; Wed, 21 Oct 2020 19:47:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1603334854; cv=none; d=google.com; s=arc-20160816; b=CI57Ec0bWAeowt2TFTdLD+VCMZ+Fac9hRalmgyead4/2iS3RTl7Ru+46SMb/PFwbAf qIE6kaOJd+DdEG2YSiuoyp9Vr5mC4VbS5M/q86kfpT//nCQEmHXXitccvIC6nLE6OlDO n8P0yvckbyDViAmBEvpABvlbrNWUxN9bj+j7hyaygjL28hLh1/aB3tUXaImYZ1LlfMmr B+z1Z0DhLwFMOzWG/LWMzuW3/DJZ7Vn/7Esp6hXO8NJGuIYiQ+AVzUEn7qrJ5IdqJ6DL qS9evV4UNdl/XzIRtHz5blul7cRnv8qGfvescaX9hd/k4I/FMogK9fyXg1BbVZAkSv/5 tndg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=YGRCMCpsCsLuVMCruwV7IpKwImxl7f7ZMcZd+fyaHNc=; b=GPr4oLrXFiNolqEZI1nSAQi1WplGWOVgX+0TvWA+ViKlAQ6GeFSSzsKvyAZlJbKFwK Bctsm4SSvtP23eWCdpuvQNjlWSUezYCnqKJ1e14+tet9PWcpal37TvzMXm/NvTIsSIh3 qGprI96af1DEAbIaO9M+6G3MvXx1BPCugFwP2lErM1eqDeEG91b/RiiBLhCShSg4pT/d R734Hyb5fj6BLKYdAa90D6MwRKjnsHH4nmgog4Ee8WLn3eKNN44teyKmuN3I/XpxvrKh iPM2vCfFnnwGq0xvKRpj9h6y8t5B32gFlMd6sYQONivXhn8d0mw7k2g537zvTeb+6NRA qnXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r11si159381edy.18.2020.10.21.19.46.58; Wed, 21 Oct 2020 19:47:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2442495AbgJUOHS (ORCPT + 99 others); Wed, 21 Oct 2020 10:07:18 -0400 Received: from mail.kernel.org ([198.145.29.99]:43488 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2440763AbgJUOHS (ORCPT ); Wed, 21 Oct 2020 10:07:18 -0400 Received: from gandalf.local.home (cpe-66-24-58-225.stny.res.rr.com [66.24.58.225]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6E9AF22248; Wed, 21 Oct 2020 14:07:16 +0000 (UTC) Date: Wed, 21 Oct 2020 10:07:14 -0400 From: Steven Rostedt To: Thomas Gleixner Cc: LKML , Peter Zijlstra , Ingo Molnar , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Ben Segall , Mel Gorman , Daniel Bristot de Oliveira Subject: Re: sched: Reenable interrupts in do sched_yield() Message-ID: <20201021100714.5ba25a96@gandalf.local.home> In-Reply-To: <87h7qo6ntx.fsf@nanos.tec.linutronix.de> References: <87r1pt7y5c.fsf@nanos.tec.linutronix.de> <20201020113830.378b4a4c@gandalf.local.home> <87o8kw93n4.fsf@nanos.tec.linutronix.de> <20201020160732.5f8fc24e@oasis.local.home> <87h7qo6ntx.fsf@nanos.tec.linutronix.de> X-Mailer: Claws Mail 3.17.3 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 21 Oct 2020 09:27:22 +0200 Thomas Gleixner wrote: > On Tue, Oct 20 2020 at 16:07, Steven Rostedt wrote: > > On Tue, 20 Oct 2020 20:02:55 +0200 > > Thomas Gleixner wrote: > > What I wrote wasn't exactly what I meant. What I meant to have: > > > > /* > > * Since we are going to call schedule() anyways, there's > > * no need to do the preemption check when the rq_lock is released. > > */ > > > > That is, to document why we have the preempt_disable() before the unlock: > > which is pretty obvious, but I let Peter decide on that. To us maybe, but I like to have comments that explain why things are done to average people. ;-) If I go to another kernel developer outside the core kernel, would they know why there's a preempt_disable() there? preempt_disable(); rq_unlock_irq(rq, &rf); sched_preempt_enable_no_resched(); schedule(); Not everyone knows that the rq_unlock_irq() would trigger a schedule if an interrupt happened as soon as irqs were enabled again and need_resched was set. -- Steve