Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp873284rwd; Thu, 1 Jun 2023 07:37:55 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5/fVv5PlibCri4N/VRDy7H5H+HGH/FhMeAc39Rtqv6Y5idMid3XkOxSSz8zEOU8nFAseY6 X-Received: by 2002:a05:6358:7202:b0:122:5de6:d8fc with SMTP id h2-20020a056358720200b001225de6d8fcmr3744894rwa.4.1685630274560; Thu, 01 Jun 2023 07:37:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685630274; cv=none; d=google.com; s=arc-20160816; b=hToJKWHrizsWijcmn+SV/OftUT/Zn929GjIfKejuffkYT9JGajIuEjEnPheEOMPpH2 87KskDVV5E3gIwhn6YTe405mKxYdrCcNuIRXI3955CvDKPUXXk1/kYN4SE3eN7ejO+VS hqE8H+ObLTgLHRq5lMYSWcxXESSe/B87pdV4wanfQzxyqUDXffUGYLW2/oC5WVUQO3Jv XeFcwn6Cp2Lk/7UAPKg4JWtRo6IlEpLDWsercy3bVA2EBzn9fGc4wr0W58JUEzu9KNzj 796asZ6f2Dv+IaVBNuTmtfbIii+hZ/YeiHDfaaTlBMPn/ePX7GocFjLLl5GgIxHG99IJ g/mA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=D6Xva540adjpWQRbN/xATqfS/7MPtf/rgJet2SYrj2c=; b=j2exVmHqd68TKUlLDdH20t1IboFH45DNxr2icXDwkVVYjDVA+NMgS7irJisEV7TRbt I90wjxWVwuuX92701pJp6T4GyRrmYQp+/T6nQ++icQc0esMKyw/D0HAbmlvNpb8A93bo gqCPzfjHO1Shwy/IL0xzthbiN9O9aWAFdjND6Zgvjr7NAqz5kxAWOxCr4A4kfpIaSrab bS/e53iMOui9beYmQAiRy82buYya1f2rGIvtPilKUx4G1MHDwZc8RXqgQDamtHTDqdyl F5RxPMA3b+PgUdBIhZS8A08M88ReG3cZdCUZQxQmtoqI6rOy0y1jUsP632/QfeXKYR4k /DcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=bwpGGbbs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id pm15-20020a17090b3c4f00b0024799a3324dsi1186784pjb.162.2023.06.01.07.37.43; Thu, 01 Jun 2023 07:37:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=bwpGGbbs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234244AbjFAOee (ORCPT + 99 others); Thu, 1 Jun 2023 10:34:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49338 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234233AbjFAOea (ORCPT ); Thu, 1 Jun 2023 10:34:30 -0400 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BD1CA132 for ; Thu, 1 Jun 2023 07:34:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1685630067; x=1717166067; h=date:from:to:cc:subject:message-id:references: mime-version:in-reply-to; bh=fRenJspaG74aDvty6hO7rOUYLNjoZ4GclMdOBLtLUDE=; b=bwpGGbbsawc9YbUJPRRK0SvHlxKLtv/98D9EKUczurSp7vfRsjx46YOm dwjy9WvKYoCkKpvL+BnYtgtEjXwhl+p2q4Hui6DGtREWRdbGCO02vCiKC y8CmW3Tu/8XaveW+27MXkg1uGFfoCzuNnIJ1t+U6V5evSrpdDd4lr/7qd bQ6Ym/kyMqtE6dhDBL8W2OsjGB9Fr9pMKscyEyvKLBEKA5V9rGTVvrvZ/ OiwZd2OKI0ZZ0Z0QyVQ+BFJP2diPsTi3NE/MD5/YJfYr7zS3E9LT1CdBc lJuAtDRrey84lLr4O28eVYizvWby3lmyvFyG9vAgz1h2ekzReODnGcbtX Q==; X-IronPort-AV: E=McAfee;i="6600,9927,10728"; a="355585947" X-IronPort-AV: E=Sophos;i="6.00,210,1681196400"; d="scan'208";a="355585947" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Jun 2023 07:34:27 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10728"; a="737123547" X-IronPort-AV: E=Sophos;i="6.00,210,1681196400"; d="scan'208";a="737123547" Received: from lkp-server01.sh.intel.com (HELO fb1ced2c09fb) ([10.239.97.150]) by orsmga008.jf.intel.com with ESMTP; 01 Jun 2023 07:34:22 -0700 Received: from kbuild by fb1ced2c09fb with local (Exim 4.96) (envelope-from ) id 1q4jNd-0002NA-2n; Thu, 01 Jun 2023 14:34:21 +0000 Date: Thu, 1 Jun 2023 22:33:52 +0800 From: kernel test robot To: John Stultz , LKML Cc: oe-kbuild-all@lists.linux.dev, Connor O'Brien , Joel Fernandes , Qais Yousef , Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Valentin Schneider , Steven Rostedt , Ben Segall , Zimuzo Ezeozue , Youssef Esmat , Mel Gorman , Daniel Bristot de Oliveira , Will Deacon , Waiman Long , Boqun Feng , "Paul E . McKenney" , kernel-team@android.com, John Stultz Subject: Re: [PATCH v4 12/13] sched: Attempt to fix rt/dl load balancing via chain level balance Message-ID: <202306011909.NWNswVmf-lkp@intel.com> References: <20230601055846.2349566-13-jstultz@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20230601055846.2349566-13-jstultz@google.com> X-Spam-Status: No, score=-4.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi John, kernel test robot noticed the following build errors: [auto build test ERROR on tip/sched/core] [also build test ERROR on tip/locking/core tip/master tip/auto-latest linus/master v6.4-rc4 next-20230601] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting patch, we suggest to use '--base' as documented in https://git-scm.com/docs/git-format-patch#_base_tree_information] url: https://github.com/intel-lab-lkp/linux/commits/John-Stultz/sched-Unify-runtime-accounting-across-classes/20230601-140200 base: tip/sched/core patch link: https://lore.kernel.org/r/20230601055846.2349566-13-jstultz%40google.com patch subject: [PATCH v4 12/13] sched: Attempt to fix rt/dl load balancing via chain level balance config: csky-randconfig-r016-20230531 (https://download.01.org/0day-ci/archive/20230601/202306011909.NWNswVmf-lkp@intel.com/config) compiler: csky-linux-gcc (GCC) 12.3.0 reproduce (this is a W=1 build): mkdir -p ~/bin wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross chmod +x ~/bin/make.cross # https://github.com/intel-lab-lkp/linux/commit/82593266398c6feaed3ed5ec458986d8e16b6b74 git remote add linux-review https://github.com/intel-lab-lkp/linux git fetch --no-tags linux-review John-Stultz/sched-Unify-runtime-accounting-across-classes/20230601-140200 git checkout 82593266398c6feaed3ed5ec458986d8e16b6b74 # save the config file mkdir build_dir && cp config build_dir/.config COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.3.0 ~/bin/make.cross W=1 O=build_dir ARCH=csky olddefconfig COMPILER_INSTALL_PATH=$HOME/0day COMPILER=gcc-12.3.0 ~/bin/make.cross W=1 O=build_dir ARCH=csky SHELL=/bin/bash kernel/sched/ If you fix the issue, kindly add following tag where applicable | Reported-by: kernel test robot | Closes: https://lore.kernel.org/oe-kbuild-all/202306011909.NWNswVmf-lkp@intel.com/ All error/warnings (new ones prefixed by >>): >> kernel/sched/core.c:3838:6: warning: no previous prototype for 'push_task_chain' [-Wmissing-prototypes] 3838 | void push_task_chain(struct rq *rq, struct rq *dst_rq, struct task_struct *task) | ^~~~~~~~~~~~~~~ kernel/sched/core.c: In function 'push_task_chain': >> kernel/sched/core.c:3858:42: error: 'struct rq' has no member named 'cpu' 3858 | set_task_cpu(task, dst_rq->cpu); | ^~ kernel/sched/core.c: At top level: >> kernel/sched/core.c:3870:21: warning: no previous prototype for 'find_exec_ctx' [-Wmissing-prototypes] 3870 | struct task_struct *find_exec_ctx(struct rq *rq, struct task_struct *p) | ^~~~~~~~~~~~~ >> kernel/sched/core.c:3898:5: warning: no previous prototype for 'pushable_chain' [-Wmissing-prototypes] 3898 | int pushable_chain(struct rq *rq, struct task_struct *p, int cpu) | ^~~~~~~~~~~~~~ vim +3858 kernel/sched/core.c 3837 > 3838 void push_task_chain(struct rq *rq, struct rq *dst_rq, struct task_struct *task) 3839 { 3840 struct task_struct *owner; 3841 3842 lockdep_assert_rq_held(rq); 3843 lockdep_assert_rq_held(dst_rq); 3844 3845 BUG_ON(!task_queued_on_rq(rq, task)); 3846 BUG_ON(task_current_selected(rq, task)); 3847 3848 while (task) { 3849 if (!task_queued_on_rq(rq, task) || task_current_selected(rq, task)) 3850 break; 3851 3852 if (task_is_blocked(task)) 3853 owner = __mutex_owner(task->blocked_on); 3854 else 3855 owner = NULL; 3856 3857 deactivate_task(rq, task, 0); > 3858 set_task_cpu(task, dst_rq->cpu); 3859 activate_task(dst_rq, task, 0); 3860 if (task == owner) 3861 break; 3862 task = owner; 3863 } 3864 } 3865 3866 /* 3867 * Returns the unblocked task at the end of the blocked chain starting with p 3868 * if that chain is composed entirely of tasks enqueued on rq, or NULL otherwise. 3869 */ > 3870 struct task_struct *find_exec_ctx(struct rq *rq, struct task_struct *p) 3871 { 3872 struct task_struct *exec_ctx, *owner; 3873 struct mutex *mutex; 3874 3875 lockdep_assert_rq_held(rq); 3876 3877 for (exec_ctx = p; task_is_blocked(exec_ctx) && !task_on_cpu(rq, exec_ctx); 3878 exec_ctx = owner) { 3879 mutex = exec_ctx->blocked_on; 3880 owner = __mutex_owner(mutex); 3881 if (owner == exec_ctx) 3882 break; 3883 3884 if (!task_queued_on_rq(rq, owner) || task_current_selected(rq, owner)) { 3885 exec_ctx = NULL; 3886 break; 3887 } 3888 } 3889 return exec_ctx; 3890 } 3891 3892 /* 3893 * Returns: 3894 * 1 if chain is pushable and affinity does not prevent pushing to cpu 3895 * 0 if chain is unpushable 3896 * -1 if chain is pushable but affinity blocks running on cpu. 3897 */ > 3898 int pushable_chain(struct rq *rq, struct task_struct *p, int cpu) 3899 { 3900 struct task_struct *exec_ctx; 3901 3902 lockdep_assert_rq_held(rq); 3903 3904 if (task_rq(p) != rq || !task_on_rq_queued(p)) 3905 return 0; 3906 3907 exec_ctx = find_exec_ctx(rq, p); 3908 /* 3909 * Chain leads off the rq, we're free to push it anywhere. 3910 * 3911 * One wrinkle with relying on find_exec_ctx is that when the chain 3912 * leads to a task currently migrating to rq, we see the chain as 3913 * pushable & push everything prior to the migrating task. Even if 3914 * we checked explicitly for this case, we could still race with a 3915 * migration after the check. 3916 * This shouldn't permanently produce a bad state though, as proxy() 3917 * will send the chain back to rq and by that point the migration 3918 * should be complete & a proper push can occur. 3919 */ 3920 if (!exec_ctx) 3921 return 1; 3922 3923 if (task_on_cpu(rq, exec_ctx) || exec_ctx->nr_cpus_allowed <= 1) 3924 return 0; 3925 3926 return cpumask_test_cpu(cpu, &exec_ctx->cpus_mask) ? 1 : -1; 3927 } 3928 -- 0-DAY CI Kernel Test Service https://github.com/intel/lkp-tests/wiki