Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1262952ybl; Thu, 22 Aug 2019 11:47:29 -0700 (PDT) X-Google-Smtp-Source: APXvYqwVcK+V27f922zmGjwgb8Ue7wTuor/M1tkqmUoQZrGgtTTPB/WlN9yy95NVxmTWnRJQHOET X-Received: by 2002:a63:c304:: with SMTP id c4mr586611pgd.126.1566499649406; Thu, 22 Aug 2019 11:47:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566499649; cv=none; d=google.com; s=arc-20160816; b=oOjTmKggdDPuVLpJekHX80wcZrMYQqIgCiS/5bqtm2ZI7uEAw+oKA6ks/aJz2OvNZ2 934EVZnGwMbWQxwqtSSlL5dNGwG/8fiV6HIyVAgoLgpZwEP/ipXChHPrZc6AhUufppvP ujt+tZTHSyPu7x7Jc+R+TymbWkxaUfXRNuJs0voHKs+dCwvClYIvUb75WCsict9ZxgFP Gy9EteXF0P/u8W4q9fCYuQv+hzbFaIZSaFQX2OGj0LP8yC86awuwugUgPvWaoE6n0CQ1 026wrTTY5S6I/1d9Fr+zd5toHt+LoXTUAsTLLEQoCzuA4axdO2Lqvu7pkaHcnNYfgLZa 1V5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=xw5htzILM4XBNHY7GxHLivVQyjOcxGGHLjBZ7MRYVwA=; b=uMXYsOvXg+c0NaYaU/RQRA52xeKx23KHg8+tYyJAgpNTbX6+WsPQMoPABflDxCbp9k nDX0jYUx6NxFVbzvB0a5N+ZwIlNmrYnSxD7O8P1qUOLAISk5UrKaySN9rfsIJmtIkoLJ j+ikdhYuW2Aby5L8rcaewJx5r40lRiH+hatVmwju6PYw/0d/8Ngvv17/vkyRMRCc3fml 1dPNn+L9fsSerOoAkqqfbUN18bvn6czhVZgL/q5Xs8G5pFMrT7joccuizPBF5vfvhVCS Pmz9W1/0lTATgirfvfEu5e7fKdvr9ZBr5PnYMe0C6bMBXM9mz1ZOflxuAYQAUqfLArMF 2JZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v24si247139plo.244.2019.08.22.11.47.14; Thu, 22 Aug 2019 11:47:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389109AbfHVN2v (ORCPT + 99 others); Thu, 22 Aug 2019 09:28:51 -0400 Received: from foss.arm.com ([217.140.110.172]:45864 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2389078AbfHVN2g (ORCPT ); Thu, 22 Aug 2019 09:28:36 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9DE5D15A2; Thu, 22 Aug 2019 06:28:35 -0700 (PDT) Received: from e110439-lin.cambridge.arm.com (e110439-lin.cambridge.arm.com [10.1.194.43]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id E5E743F706; Thu, 22 Aug 2019 06:28:32 -0700 (PDT) From: Patrick Bellasi To: linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, linux-api@vger.kernel.org, cgroups@vger.kernel.org Cc: Ingo Molnar , Peter Zijlstra , Tejun Heo , "Rafael J . Wysocki" , Vincent Guittot , Viresh Kumar , Paul Turner , Michal Koutny , Quentin Perret , Dietmar Eggemann , Morten Rasmussen , Juri Lelli , Todd Kjos , Joel Fernandes , Steve Muckle , Suren Baghdasaryan , Alessio Balsini Subject: [PATCH v14 4/6] sched/core: uclamp: Use TG's clamps to restrict TASK's clamps Date: Thu, 22 Aug 2019 14:28:09 +0100 Message-Id: <20190822132811.31294-5-patrick.bellasi@arm.com> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190822132811.31294-1-patrick.bellasi@arm.com> References: <20190822132811.31294-1-patrick.bellasi@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When a task specific clamp value is configured via sched_setattr(2), this value is accounted in the corresponding clamp bucket every time the task is {en,de}qeued. However, when cgroups are also in use, the task specific clamp values could be restricted by the task_group (TG) clamp values. Update uclamp_cpu_inc() to aggregate task and TG clamp values. Every time a task is enqueued, it's accounted in the clamp bucket tracking the smaller clamp between the task specific value and its TG effective value. This allows to: 1. ensure cgroup clamps are always used to restrict task specific requests, i.e. boosted not more than its TG effective protection and capped at least as its TG effective limit. 2. implement a "nice-like" policy, where tasks are still allowed to request less than what enforced by their TG effective limits and protections Do this by exploiting the concept of "effective" clamp, which is already used by a TG to track parent enforced restrictions. Apply task group clamp restrictions only to tasks belonging to a child group. While, for tasks in the root group or in an autogroup, system defaults are still enforced. Signed-off-by: Patrick Bellasi Reviewed-by: Michal Koutny Acked-by: Tejun Heo Cc: Ingo Molnar Cc: Peter Zijlstra Cc: Tejun Heo --- kernel/sched/core.c | 28 +++++++++++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) diff --git a/kernel/sched/core.c b/kernel/sched/core.c index 3ca054ad3f3e..04fc161e4dbe 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -873,16 +873,42 @@ unsigned int uclamp_rq_max_value(struct rq *rq, unsigned int clamp_id, return uclamp_idle_value(rq, clamp_id, clamp_value); } +static inline struct uclamp_se +uclamp_tg_restrict(struct task_struct *p, unsigned int clamp_id) +{ + struct uclamp_se uc_req = p->uclamp_req[clamp_id]; +#ifdef CONFIG_UCLAMP_TASK_GROUP + struct uclamp_se uc_max; + + /* + * Tasks in autogroups or root task group will be + * restricted by system defaults. + */ + if (task_group_is_autogroup(task_group(p))) + return uc_req; + if (task_group(p) == &root_task_group) + return uc_req; + + uc_max = task_group(p)->uclamp[clamp_id]; + if (uc_req.value > uc_max.value || !uc_req.user_defined) + return uc_max; +#endif + + return uc_req; +} + /* * The effective clamp bucket index of a task depends on, by increasing * priority: * - the task specific clamp value, when explicitly requested from userspace + * - the task group effective clamp value, for tasks not either in the root + * group or in an autogroup * - the system default clamp value, defined by the sysadmin */ static inline struct uclamp_se uclamp_eff_get(struct task_struct *p, unsigned int clamp_id) { - struct uclamp_se uc_req = p->uclamp_req[clamp_id]; + struct uclamp_se uc_req = uclamp_tg_restrict(p, clamp_id); struct uclamp_se uc_max = uclamp_default[clamp_id]; /* System default restrictions always apply */ -- 2.22.0