Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp4491337ybi; Mon, 15 Jul 2019 09:43:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqz16Tw7JvFPsBRoiVvyaDOaqNLZXhx8OylMUPlBQ86eEoff3DJ5wEwWcdUIwl+IIPYf2reb X-Received: by 2002:a17:902:744c:: with SMTP id e12mr29238890plt.287.1563209009011; Mon, 15 Jul 2019 09:43:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563209009; cv=none; d=google.com; s=arc-20160816; b=sGYz62pClkjnjK3p+SywtYs4vuyZqOK3XnqHvDfVz6IQI3eAP0vpUjxreQMypNlYTz 8EUWSZblM3eN6TQcIuazC+O2RruFZ3YuQq2qdPB4EpYsPKGSadbWrllXb9ONRjifIwMb SmYmF4+YNkMB/WlpqaTW30GhcAJR0aSaW6eZo6nZhR779zhp7jQw9cXY+LayZiLk8SQD k/zI3/B3Ead5/XUyM+A8kiCwpAcFdb+pKeFYQxKwMZdO4DSm1FX9iZQKFyHx8ieiirIB ZXmvSICW5zpMiZKl9nE7logIA9jcfbZj+gDP+jnF8IAzDbRQoY6S4hF+Ae2VYoEj8vea ORSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=xG2DSaOPa4Hjx1xNwdModKmFWWTtDVKhZsGSyysgt78=; b=E6eIpqWp+2q7NgZk3PUEp/O2coQdwrnb4RmxV5CzmfEUUk8tg9VZzVdx9OyExKUerE q3uF2mfqwx7XkdDgTKfKLlJYyUIVB09dlxuZPZ/wzX9mMPGjd5Yxh4PfOeqomN2hxUfB vs8Flhm4PImyodv60XWuITxJodbvrCv9dScXzSoNoW/H/8ZWvNZ+Q876z7b5WWpLvo0B RQvFAugMsYLiNohsNwszBGXVI8Ua2LtoBJHfjQd/RIq0dwWfAea6ZfNIthnDsOvOZqBb A5ac5Nu4PoXwZ4JB6+qgLy0nOgxbwpZ/d3tTYiGkxxQa/tH085Vd+nJgvDmLmINcUG/c JXTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f25si14471554pgv.292.2019.07.15.09.43.12; Mon, 15 Jul 2019 09:43:28 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731465AbfGOQmc (ORCPT + 99 others); Mon, 15 Jul 2019 12:42:32 -0400 Received: from mx2.suse.de ([195.135.220.15]:40600 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730503AbfGOQmb (ORCPT ); Mon, 15 Jul 2019 12:42:31 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 56C86AF7A; Mon, 15 Jul 2019 16:42:30 +0000 (UTC) Date: Mon, 15 Jul 2019 18:42:26 +0200 From: Michal =?iso-8859-1?Q?Koutn=FD?= To: Patrick Bellasi Cc: linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, Ingo Molnar , Peter Zijlstra , Tejun Heo , "Rafael J . Wysocki" , Vincent Guittot , Viresh Kumar , Paul Turner , Quentin Perret , Dietmar Eggemann , Morten Rasmussen , Juri Lelli , Todd Kjos , Joel Fernandes , Steve Muckle , Suren Baghdasaryan , Alessio Balsini Subject: Re: [PATCH v11 3/5] sched/core: uclamp: Propagate system defaults to root group Message-ID: <20190715164226.GA30262@blackbody.suse.cz> References: <20190708084357.12944-1-patrick.bellasi@arm.com> <20190708084357.12944-4-patrick.bellasi@arm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190708084357.12944-4-patrick.bellasi@arm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 08, 2019 at 09:43:55AM +0100, Patrick Bellasi wrote: > +static void uclamp_update_root_tg(void) > +{ > + struct task_group *tg = &root_task_group; > + > + uclamp_se_set(&tg->uclamp_req[UCLAMP_MIN], > + sysctl_sched_uclamp_util_min, false); > + uclamp_se_set(&tg->uclamp_req[UCLAMP_MAX], > + sysctl_sched_uclamp_util_max, false); > + > + cpu_util_update_eff(&root_task_group.css); > +} cpu_util_update_eff internally calls css_for_each_descendant_pre() so this should be protected with rcu_read_lock().