From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-wi0-f182.google.com (mail-wi0-f182.google.com [209.85.212.182]) by kanga.kvack.org (Postfix) with ESMTP id 8FCA46B0253 for ; Sun, 9 Aug 2015 06:51:53 -0400 (EDT) Received: by wibxm9 with SMTP id xm9so115760258wib.1 for ; Sun, 09 Aug 2015 03:51:53 -0700 (PDT) Received: from mail-wi0-x229.google.com (mail-wi0-x229.google.com. [2a00:1450:400c:c05::229]) by mx.google.com with ESMTPS id ot4si31451976wjc.143.2015.08.09.03.51.51 for (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 09 Aug 2015 03:51:52 -0700 (PDT) Received: by wibxm9 with SMTP id xm9so115759918wib.1 for ; Sun, 09 Aug 2015 03:51:51 -0700 (PDT) Message-ID: <1439117508.21378.8.camel@gmail.com> Subject: Re: [hack] sched: create PREEMPT_VOLUNTARY_RT and some RT specific resched points From: Mike Galbraith Date: Sun, 09 Aug 2015 12:51:48 +0200 In-Reply-To: <1439112337.5906.43.camel@gmail.com> References: <1437688476-3399-3-git-send-email-sbaugh@catern.com> <20150724070420.GF4103@dhcp22.suse.cz> <20150724165627.GA3458@Sligo.logfs.org> <20150727070840.GB11317@dhcp22.suse.cz> <20150727151814.GR9641@Sligo.logfs.org> <20150728133254.GI24972@dhcp22.suse.cz> <20150728170844.GY9641@Sligo.logfs.org> <20150729095439.GD15801@dhcp22.suse.cz> <1438269775.23663.58.camel@gmail.com> <20150730165803.GA17882@Sligo.logfs.org> <1438282521.6432.53.camel@gmail.com> <1439112337.5906.43.camel@gmail.com> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: owner-linux-mm@kvack.org List-ID: To: =?ISO-8859-1?Q?J=F6rn?= Engel Cc: Michal Hocko , Spencer Baugh , Toshi Kani , Andrew Morton , Fengguang Wu , Joern Engel , "Kirill A. Shutemov" , Mel Gorman , Johannes Weiner , Shachar Raindel , Boaz Harrosh , Andy Lutomirski , Joonsoo Kim , Andrey Ryabinin , Roman Pen , Andrey Konovalov , Eric Dumazet , Dmitry Vyukov , Rob Jones , WANG Chao , open list , "open list:MEMORY MANAGEMENT" , Spencer Baugh , Peter Zijlstra Damn, the hunk below was supposed to go away before hack escaped. The whole thing is just a "could we maybe...", but just in case anybody plays with it, that hunk proved to be a bad idea, kill it. > --- a/kernel/softirq.c > +++ b/kernel/softirq.c > @@ -280,6 +280,8 @@ asmlinkage __visible void __do_softirq(v > } > h++; > pending >>= softirq_bit; > + if (need_resched_rt() && current != this_cpu_ksoftirqd()) > + break; -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org