Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1866860ybz; Thu, 30 Apr 2020 06:56:29 -0700 (PDT) X-Google-Smtp-Source: APiQypI0D1bhfJyh3adwjrwHFN33J/XcZ9KD7RmnyeidX45L65krykkeMIz0kfXiVs92Wimml/vN X-Received: by 2002:a17:906:c7c5:: with SMTP id dc5mr2835728ejb.50.1588254989445; Thu, 30 Apr 2020 06:56:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588254989; cv=none; d=google.com; s=arc-20160816; b=Rw+lNfRHCw5TQ8UzXpySv/DtuPtMibdL/v/smyJ3PoiSHsSsW1tSDM6jYzxmlbAbXY p237tKLzB7DWuLPBNWU1rw5Ee+2jZetIQOSlXD6X5ESBd1wqd4Dt3qniT8UuWhXybIVC F7eKpLX4DSab2HW3JHbPqJcXYiVeoHPXMWEkqUwN6tWPWvRwSY7ggn5Yjl2nS/ckFw+F OdenMlhRb0hYuHVKVihI2kuSnZhDAGIdEE48cNN+MoXDnHjVxumw6puZgyTjcY3Uni1I /RVB/n/nx0BXACZRVGueMtl+Vtuz2If+3Ir5vkOwtTHKZ+JPwQvtG6zUAlLkRVq5CHyc YXaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=AZ7bKC4gWOB/H4qxQM9crhCvtnaeUzlIHV4c0BHy2zg=; b=ijsYIt9RHtJa3jMYhgv/9yJ2ltoK771BVIC4FE+X6BKTLaXmEjkg0biOzMIGV+rUjN kv0xo7uqHLRC+9kxTQRNEOGhuMpvCrGJ/yzhHfUru5PIU0/4j2hdUi0MWMD4w6sRyTTu jxfibrMVrTf1J7tMoE0M8zvbGhpFhOQ3dYofzKGNyBOm9z4J0WBNNMH6fs3CjOQiaSC/ Lt/39Kgwq8Qq0eNqLWt/7xIIdo/FaQf3ma7Cm3rrRvUiVRB8x3kFqT7Ae+QcfoaH4Rug /oaKskyrSPB85WDjH1/SC893Gj15Le4ff/09ElZD+XoG1xZ9K7w/OHRna/7KFwIFErtt TKVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CCm0d6nR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id f4si6420363ejd.83.2020.04.30.06.56.06; Thu, 30 Apr 2020 06:56:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=CCm0d6nR; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727981AbgD3Nxr (ORCPT + 99 others); Thu, 30 Apr 2020 09:53:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:34738 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728637AbgD3NxJ (ORCPT ); Thu, 30 Apr 2020 09:53:09 -0400 Received: from sasha-vm.mshome.net (c-73-47-72-35.hsd1.nh.comcast.net [73.47.72.35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E3E5024954; Thu, 30 Apr 2020 13:53:07 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588254788; bh=r7xi7xjZ6Fsdw2v6jyWidSzLPNaMqwe4mVlfuLkfu6w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=CCm0d6nR9UYfJIpcYZHq6HnJY2KxZidjTcV5KyQgcTS/aDSl8GGkQWuRqBh8Lulza 5HRTjIq05yVpLNooe38UY0n0FWPb/EzGwBbTY9Lk3Utvt+qfZrdMlpjSD+aHnGeQmr DjkxDUKBH4JtP0ucmZ24IbGttsPGDHGqnt0q8m38= From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Quentin Perret , Chitti Babu Theegala , Peter Zijlstra , Patrick Bellasi , Dietmar Eggemann , Sasha Levin Subject: [PATCH AUTOSEL 5.4 44/57] sched/core: Fix reset-on-fork from RT with uclamp Date: Thu, 30 Apr 2020 09:52:05 -0400 Message-Id: <20200430135218.20372-44-sashal@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200430135218.20372-1-sashal@kernel.org> References: <20200430135218.20372-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Quentin Perret [ Upstream commit eaf5a92ebde5bca3bb2565616115bd6d579486cd ] uclamp_fork() resets the uclamp values to their default when the reset-on-fork flag is set. It also checks whether the task has a RT policy, and sets its uclamp.min to 1024 accordingly. However, during reset-on-fork, the task's policy is lowered to SCHED_NORMAL right after, hence leading to an erroneous uclamp.min setting for the new task if it was forked from RT. Fix this by removing the unnecessary check on rt_task() in uclamp_fork() as this doesn't make sense if the reset-on-fork flag is set. Fixes: 1a00d999971c ("sched/uclamp: Set default clamps for RT tasks") Reported-by: Chitti Babu Theegala Signed-off-by: Quentin Perret Signed-off-by: Peter Zijlstra (Intel) Reviewed-by: Patrick Bellasi Reviewed-by: Dietmar Eggemann Link: https://lkml.kernel.org/r/20200416085956.217587-1-qperret@google.com Signed-off-by: Sasha Levin --- kernel/sched/core.c | 9 ++------- 1 file changed, 2 insertions(+), 7 deletions(-) diff --git a/kernel/sched/core.c b/kernel/sched/core.c index 195d0019e6bb5..e99d326fa5693 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -1233,13 +1233,8 @@ static void uclamp_fork(struct task_struct *p) return; for_each_clamp_id(clamp_id) { - unsigned int clamp_value = uclamp_none(clamp_id); - - /* By default, RT tasks always get 100% boost */ - if (unlikely(rt_task(p) && clamp_id == UCLAMP_MIN)) - clamp_value = uclamp_none(UCLAMP_MAX); - - uclamp_se_set(&p->uclamp_req[clamp_id], clamp_value, false); + uclamp_se_set(&p->uclamp_req[clamp_id], + uclamp_none(clamp_id), false); } } -- 2.20.1