Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp2091107iob; Thu, 5 May 2022 15:35:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw1WurYs3ChXp2Kl4yxviIcMFP7o3Mm4rVUlvHpfD14aEI9xR3TvcOiEeNcuYRYufNdW3+X X-Received: by 2002:a17:902:b208:b0:14f:14e8:1e49 with SMTP id t8-20020a170902b20800b0014f14e81e49mr498999plr.35.1651790106500; Thu, 05 May 2022 15:35:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651790106; cv=none; d=google.com; s=arc-20160816; b=csLpjHKwwXywVMDw0qhHQGp2Oq89GvauGlwIZiAxFdhxNWYFCvphdtUD/o6ImMMBa2 3K7xNEu9wjionSXNqc+LHjTpHjZ7XxkqrN4rXXTiqB8GlEgaTXBgePsG9kemkaGBscX4 bRvJUKyZyGbtvpBbRR75YJYUA9BmZnaQkzpeVeG+KOolaur0m1karaP+WMIVpk0cfF1L bQKYkbA9mvePX0D6oWtaKxq/Q2fUb0+Z8drCe+te1MyxYtTiyDQC0HQATOiEWRhpUdn3 1FHufXR7Jtv+axr9hrSuK5EEHeK4U/4RXfSnF+qiZHR74c/wcjqCEDC19Iyt4+6H2/f6 axmQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=YiBiiwcCSzHNfvirY99vzKw3FH2J4awapz9bu4e8hjg=; b=NLQQIcrKS7PC2OPZjwPM0M2zyEEHNnySosPRpeX0LcxLnuVjwoFsD6HWm3fXCkCGTu bSl0pMb89IFwXYja1c8sVqU41mdTVEcykmhZgMMrOX0lMZ0VLNB5WHGk2++1vnibC1rR k0IwhGDTY5HEHKoBu0jW93CEIdpm9ZlPvy0do5Xh3d2jmpolcyuknr8Ot/zjd12qSLP4 yJBgSy1E8HZW2og1qHYJVwbvgqL5242HGievDu9okk9AlYnJK/wvbVsh+4yoQWOuaCQC dM3h9NrjjiDJgctGPpdEoGdW95nAU3zP8tLj5EaHUdSGO9uxuSRYDd0PA1am7KOkKC9x xh8A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q8-20020a631f48000000b003c6290e88e0si2353946pgm.422.2022.05.05.15.34.51; Thu, 05 May 2022 15:35:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1384381AbiEEShG (ORCPT + 99 others); Thu, 5 May 2022 14:37:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37212 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232726AbiEESfZ (ORCPT ); Thu, 5 May 2022 14:35:25 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 6F4401C12D for ; Thu, 5 May 2022 11:26:35 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id BD186106F; Thu, 5 May 2022 11:26:08 -0700 (PDT) Received: from [192.168.178.6] (unknown [172.31.20.19]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 56DAE3FA31; Thu, 5 May 2022 11:26:07 -0700 (PDT) Message-ID: <251d4cd4-7a28-af7b-942e-4e9f762fc05f@arm.com> Date: Thu, 5 May 2022 20:25:56 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.8.1 Subject: Re: [PATCH v8 1/7] sched/fair: Provide u64 read for 32-bits arch helper Content-Language: en-US To: Vincent Donnefort , peterz@infradead.org, mingo@redhat.com, vincent.guittot@linaro.org Cc: linux-kernel@vger.kernel.org, morten.rasmussen@arm.com, chris.redpath@arm.com, qperret@google.com, tao.zhou@linux.dev References: <20220429141148.181816-1-vincent.donnefort@arm.com> <20220429141148.181816-2-vincent.donnefort@arm.com> From: Dietmar Eggemann In-Reply-To: <20220429141148.181816-2-vincent.donnefort@arm.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-9.4 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_HI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 29/04/2022 16:11, Vincent Donnefort wrote: > Introducing macro helpers u64_u32_{store,load}() to factorize lockless > accesses to u64 variables for 32-bits architectures. > > Users are for now cfs_rq.min_vruntime and sched_avg.last_update_time. To > accommodate the later where the copy lies outside of the structure > (cfs_rq.last_udpate_time_copy instead of sched_avg.last_update_time_copy), > use the _copy() version of those helpers. > > Those new helpers encapsulate smp_rmb() and smp_wmb() synchronization and > therefore, have a small penalty in set_task_rq_fair() and init_cfs_rq(). ... but obviously only on 32bit machines. And for set_task_rq_fair() we now do one smp_rmb per cfs_rq (prev and next), like we do one smp_wmb() per cfs_rq in update_cfs_rq_load_avg(). [...] > @@ -3786,8 +3770,9 @@ update_cfs_rq_load_avg(u64 now, struct cfs_rq *cfs_rq) > decayed |= __update_load_avg_cfs_rq(now, cfs_rq); > > #ifndef CONFIG_64BIT Can we not get rid of this last CONFIG_64BIT here? > - smp_wmb(); > - cfs_rq->load_last_update_time_copy = sa->last_update_time; > + u64_u32_store_copy(sa->last_update_time, > + cfs_rq->last_update_time_copy, > + sa->last_update_time); (sa->last_update_time = sa->last_update_time); should dissolve on 64bit. > #endif [...] Reviewed-by: Dietmar Eggemann