Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp724874pxj; Wed, 2 Jun 2021 09:50:05 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwGQG2OhFnCqMq8ld4VgAfPrF4Bz8UDoz3SfIEv3gHe5ha2my7/N5nlyv3AtIu0nKZYdMhW X-Received: by 2002:a17:906:cc14:: with SMTP id ml20mr13305903ejb.515.1622652604883; Wed, 02 Jun 2021 09:50:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622652604; cv=none; d=google.com; s=arc-20160816; b=lG2aHwbpzmCamnVD0hC0tnrdInStjRlsQR67c9Ee43MiBy7oTsNDP/qHIlMXGy6PLB zRGAXDaunDIq4M7E02G+w+H8Ysi/o61gFZ6qv0ROh/CN2srF4vwmyoTvmToc9uACLbiN xwPYwBtc2zGvVQffaY5mVrVN7q+wiDfYKRtMROV2EKrzyxWJ7yksQCXXdOv4f4StHtn0 vE+/jsZGN+utSnwVx8JhyrXGBhOmEOAccniXXodBanI8uDM5+bhupJvpCl+ZZ2kMke4I nzh14LN3YhofszcMUzcL+uyiAbs62njrfEOQkhl6yq/XMrETXroNJCnByWNDszm8OX8K 11Sg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=UVRS5IT2Uor8R0ElsgXWM6tJpUhxNzVQca3vX4ArDdE=; b=ByerBNufpR0H8n3LFWbEDGsS3ronSJJm+5U8PEMxNEWtpH7IYTGBrfjisCD5gLcB1v PYoc884r1yDalsiOJyAoiZNJ8pR7NXLgqKV7aTn0MUlO7Wfklt8hkGOt99nJyieQQN1m OkgHrgmmWsv5ssSChl1zQrJedqJBfHNkqhecwxk1YJTABk2kucuFHJH/wZvRLpHGDfXS Y35bJtyMx5G8AfYM9bPPa6p2cb7nnZv06P2U1wtPFKFku3PHLh+JYwOwFkuBqt9WdL0X Owiompn/X/ouuIt1K8e8F/uUUZpwig7AzJ7ZHgMvQg6V3aLxXKhB6QQAVQyF5QpSafpy VBJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fo1f3yl3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o13si352445edc.469.2021.06.02.09.49.41; Wed, 02 Jun 2021 09:50:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fo1f3yl3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230475AbhFBQte (ORCPT + 99 others); Wed, 2 Jun 2021 12:49:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:60978 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230398AbhFBQte (ORCPT ); Wed, 2 Jun 2021 12:49:34 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 649BD610A1; Wed, 2 Jun 2021 16:47:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1622652470; bh=kAftZJ0ja9RHrTabnqyvzKHetcqxbF3RTUwCF6r1s5c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fo1f3yl3HXqwsXfgT4LupTivzMk8YzEa7fkTKi7nEbSpvb36KiwGzdFAt8nol+CG3 6OcTo9bjB1HC9XzK1+klTWRonpMpTgVmlYlumInT/ZH0yPv/Zn72ECBBwJU4NERouN V5HBwHZabY4nZlT1XNo1aQu6L+ZPPPisYfHa8zZ6pXpDwvJknh/XeRqrjK/UPLBVEv F8uNj+J40PdDVzYPHFAAr4iHHeFsejvbyMIlikUOZ3rSXyGHdrYKBkDEDM+i4YyAEI FWd4C7Vlwg9E5e87ejrFvlCXk2yxJZM5IvagDazigynps97AscxYoSeGEgfdlHn2SF 00mRsLNQ3+y2Q== From: Will Deacon To: linux-arm-kernel@lists.infradead.org Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, Will Deacon , Catalin Marinas , Marc Zyngier , Greg Kroah-Hartman , Peter Zijlstra , Morten Rasmussen , Qais Yousef , Suren Baghdasaryan , Quentin Perret , Tejun Heo , Johannes Weiner , Ingo Molnar , Juri Lelli , Vincent Guittot , "Rafael J. Wysocki" , Dietmar Eggemann , Daniel Bristot de Oliveira , Valentin Schneider , kernel-team@android.com Subject: [PATCH v8 05/19] sched: Introduce task_cpu_possible_mask() to limit fallback rq selection Date: Wed, 2 Jun 2021 17:47:05 +0100 Message-Id: <20210602164719.31777-6-will@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20210602164719.31777-1-will@kernel.org> References: <20210602164719.31777-1-will@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Asymmetric systems may not offer the same level of userspace ISA support across all CPUs, meaning that some applications cannot be executed by some CPUs. As a concrete example, upcoming arm64 big.LITTLE designs do not feature support for 32-bit applications on both clusters. On such a system, we must take care not to migrate a task to an unsupported CPU when forcefully moving tasks in select_fallback_rq() in response to a CPU hot-unplug operation. Introduce a task_cpu_possible_mask() hook which, given a task argument, allows an architecture to return a cpumask of CPUs that are capable of executing that task. The default implementation returns the cpu_possible_mask, since sane machines do not suffer from per-cpu ISA limitations that affect scheduling. The new mask is used when selecting the fallback runqueue as a last resort before forcing a migration to the first active CPU. Reviewed-by: Quentin Perret Signed-off-by: Will Deacon --- include/linux/mmu_context.h | 11 +++++++++++ kernel/sched/core.c | 5 ++--- 2 files changed, 13 insertions(+), 3 deletions(-) diff --git a/include/linux/mmu_context.h b/include/linux/mmu_context.h index 03dee12d2b61..1a599ba3524f 100644 --- a/include/linux/mmu_context.h +++ b/include/linux/mmu_context.h @@ -14,4 +14,15 @@ static inline void leave_mm(int cpu) { } #endif +/* + * CPUs that are capable of running task @p. By default, we assume a sane, + * homogeneous system. Must contain at least one active CPU. + */ +#ifndef task_cpu_possible_mask +# define task_cpu_possible_mask(p) cpu_possible_mask +# define task_cpu_possible(cpu, p) true +#else +# define task_cpu_possible(cpu, p) cpumask_test_cpu((cpu), task_cpu_possible_mask(p)) +#endif + #endif diff --git a/kernel/sched/core.c b/kernel/sched/core.c index 5226cc26a095..0c1b6f1a6c91 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -1814,7 +1814,7 @@ static inline bool is_cpu_allowed(struct task_struct *p, int cpu) /* Non kernel threads are not allowed during either online or offline. */ if (!(p->flags & PF_KTHREAD)) - return cpu_active(cpu); + return cpu_active(cpu) && task_cpu_possible(cpu, p); /* KTHREAD_IS_PER_CPU is always allowed. */ if (kthread_is_per_cpu(p)) @@ -2792,10 +2792,9 @@ static int select_fallback_rq(int cpu, struct task_struct *p) * * More yuck to audit. */ - do_set_cpus_allowed(p, cpu_possible_mask); + do_set_cpus_allowed(p, task_cpu_possible_mask(p)); state = fail; break; - case fail: BUG(); break; -- 2.32.0.rc0.204.g9fa02ecfa5-goog