Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp996609ybi; Fri, 2 Aug 2019 07:41:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqzstPGj7nvvjGFzxN8KnkF1t+ol5qrUF93gSIIGr0mR7kdGhWzolrCDk/1rRY3lsbe2BxBk X-Received: by 2002:a63:593:: with SMTP id 141mr121895810pgf.78.1564756893371; Fri, 02 Aug 2019 07:41:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1564756893; cv=none; d=google.com; s=arc-20160816; b=Tv4nmTbiZM8KJbgMkiWXqPQzATmWW/wuquLkfEwSzpmWrsz6Fx9f7pSvfSkDBXCA6I Bt0+qs98R+uKhbherocWNVlH+UtVS5s1UYCSrmmSI62v7Vrb8Rk185pKymGanOSQC+pF oiAHzL/rK8TnDKJ3Gk0acluAbA5WtA5CU/BX2yO+BASu7NLFZAQMe7cN0dBH/MT8mdUn XBf9nWVw0RhIbe3t7AYTDqtvfdT4tZ9ATnis8Mzw+ZsIJb4PBTdlL5RO8EBOj4pThvXT XO3SrFwMKFkyqNnSOyZlkyHouXtio+HXkrsH5R1Ox7Wht/fcWLiMOJ88o+efLhFyJyj+ 5kzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=aK/2KR8k2VIPNrl6disaRriFhuIBrE7wuJjR+hgwFOI=; b=A/UM0aMozPwgkkxq5tv3IJsJmDp+CEwE5UePXg9Z/9YIZKDH7vN6enJzleJFL9KCcL VIlgCrdUQ+E8dRkfnfWKQQHwpHiNFY3eRclKBGX/lkchMxUjQN7Mdn4cG2r2GUAFsgWg NGkrz48yov1nOEstrJAh8ACBBPBtRXz3goIqsuXQJbfC4K4zm6lYBNWcxbNmuz9gwYwx XKkIt6+dyyfn7rogAT0dO77NFsV+hCJTG6JMiyROaaIDfZQYOSLhEXSUWJpEIHJkc7ik GGbXXbF22As9n/sjttPPcM3r+SpoBqwWria5Iwsmyw5KlMTbZs58ltSU4lJSqOIeZB+w 0h8Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r14si38774601pfc.134.2019.08.02.07.41.17; Fri, 02 Aug 2019 07:41:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2404616AbfHBJJV (ORCPT + 99 others); Fri, 2 Aug 2019 05:09:21 -0400 Received: from foss.arm.com ([217.140.110.172]:47116 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404594AbfHBJJT (ORCPT ); Fri, 2 Aug 2019 05:09:19 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id B53BD344; Fri, 2 Aug 2019 02:09:18 -0700 (PDT) Received: from e110439-lin.cambridge.arm.com (e110439-lin.cambridge.arm.com [10.1.194.43]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 1057E3F575; Fri, 2 Aug 2019 02:09:15 -0700 (PDT) From: Patrick Bellasi To: linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, linux-api@vger.kernel.org, cgroups@vger.kernel.org Cc: Ingo Molnar , Peter Zijlstra , Tejun Heo , "Rafael J . Wysocki" , Vincent Guittot , Viresh Kumar , Paul Turner , Michal Koutny , Quentin Perret , Dietmar Eggemann , Morten Rasmussen , Juri Lelli , Todd Kjos , Joel Fernandes , Steve Muckle , Suren Baghdasaryan , Alessio Balsini Subject: [PATCH v13 4/6] sched/core: uclamp: Use TG's clamps to restrict TASK's clamps Date: Fri, 2 Aug 2019 10:08:51 +0100 Message-Id: <20190802090853.4810-5-patrick.bellasi@arm.com> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190802090853.4810-1-patrick.bellasi@arm.com> References: <20190802090853.4810-1-patrick.bellasi@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When a task specific clamp value is configured via sched_setattr(2), this value is accounted in the corresponding clamp bucket every time the task is {en,de}qeued. However, when cgroups are also in use, the task specific clamp values could be restricted by the task_group (TG) clamp values. Update uclamp_cpu_inc() to aggregate task and TG clamp values. Every time a task is enqueued, it's accounted in the clamp bucket tracking the smaller clamp between the task specific value and its TG effective value. This allows to: 1. ensure cgroup clamps are always used to restrict task specific requests, i.e. boosted not more than its TG effective protection and capped at least as its TG effective limit. 2. implement a "nice-like" policy, where tasks are still allowed to request less than what enforced by their TG effective limits and protections Do this by exploiting the concept of "effective" clamp, which is already used by a TG to track parent enforced restrictions. Apply task group clamp restrictions only to tasks belonging to a child group. While, for tasks in the root group or in an autogroup, system defaults are still enforced. Signed-off-by: Patrick Bellasi Acked-by: Tejun Heo Cc: Ingo Molnar Cc: Peter Zijlstra Cc: Tejun Heo --- kernel/sched/core.c | 28 +++++++++++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) diff --git a/kernel/sched/core.c b/kernel/sched/core.c index 5683c8639b4a..106cf69d70cc 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -873,16 +873,42 @@ unsigned int uclamp_rq_max_value(struct rq *rq, unsigned int clamp_id, return uclamp_idle_value(rq, clamp_id, clamp_value); } +static inline struct uclamp_se +uclamp_tg_restrict(struct task_struct *p, unsigned int clamp_id) +{ + struct uclamp_se uc_req = p->uclamp_req[clamp_id]; +#ifdef CONFIG_UCLAMP_TASK_GROUP + struct uclamp_se uc_max; + + /* + * Tasks in autogroups or root task group will be + * restricted by system defaults. + */ + if (task_group_is_autogroup(task_group(p))) + return uc_req; + if (task_group(p) == &root_task_group) + return uc_req; + + uc_max = task_group(p)->uclamp[clamp_id]; + if (uc_req.value > uc_max.value || !uc_req.user_defined) + return uc_max; +#endif + + return uc_req; +} + /* * The effective clamp bucket index of a task depends on, by increasing * priority: * - the task specific clamp value, when explicitly requested from userspace + * - the task group effective clamp value, for tasks not either in the root + * group or in an autogroup * - the system default clamp value, defined by the sysadmin */ static inline struct uclamp_se uclamp_eff_get(struct task_struct *p, unsigned int clamp_id) { - struct uclamp_se uc_req = p->uclamp_req[clamp_id]; + struct uclamp_se uc_req = uclamp_tg_restrict(p, clamp_id); struct uclamp_se uc_max = uclamp_default[clamp_id]; /* System default restrictions always apply */ -- 2.22.0