Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp1163939yba; Tue, 2 Apr 2019 03:43:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqy8QMTsm7SwdX9ZZIskbbB8Znp64Eq7UxzY6yH2Ln4hTIaVpr4LnhL6hCFj92QPH3TpEfTm X-Received: by 2002:a62:1bc7:: with SMTP id b190mr41538767pfb.29.1554201823549; Tue, 02 Apr 2019 03:43:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554201823; cv=none; d=google.com; s=arc-20160816; b=CpDHF91ew1AWk1Xm1bsgHsBdWjZndzhx5MtdCDXma8t2/Oo5a8Ex01lMy6GQAjhviV lr4COi44xKs0dB+5gH25HiJ4Ncfcvep6jyiE6R1WnuJnirUB/gveDeGyVcSeVXQVf+nA GF0itY9fX9GFSfg2Qm5YVx3AILxOjPf8OUb2P34txy+lGwGK5DAwO9Q4vv08EWS7KepT Oesr7WfMxM4lEsgLMTPB7V0zwN548N2HzyCLd/dN++OIoQh32NpVR/Y7nMa0LG8k3mZe 4a/mw0N9S/ehR3uxMqp5/mLYqIp78ng12rYKQL7CdSiSDD9/6MNHoNejjX5Lw2wGCvgy C8+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=yyzsDfAz+mpGvqoazj1n+qWxBX/QPD2A3VNrcIyIzbI=; b=tqN/B6puY8wm1MKKsDUpAVDFR9fJVjpoyQ21iMzXeQhirk2s9KDwYfA0LVpC6tQ8ov ocYLAD/o/hpPativkJNfKOytdMDAxHMbkA3WlMOzMIi1jsIG0BsxCSZicdx/RLkTLmn/ gHySapRMDteReCXzJu0IUu11twZ0WsazvC98dYGZ68vuE3p1Pu0IdfCqSy9DkOBjTfCP uf+Hxn5LHxy9h3aQBVcLq+rlI9TKEjvWxdAbMilSDHfv6BQ3jDFuVlT3eTNzeArkEWgi gTBYr+OFHRWJX/fO5L7S1u9dO77uxuUhD2xQo2zTmolK5LmxWnIR9/9HQSpUS9XP8eWC I+6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f35si5170693pgl.369.2019.04.02.03.43.27; Tue, 02 Apr 2019 03:43:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730017AbfDBKmh (ORCPT + 99 others); Tue, 2 Apr 2019 06:42:37 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:48358 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729935AbfDBKmf (ORCPT ); Tue, 2 Apr 2019 06:42:35 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id D005A168F; Tue, 2 Apr 2019 03:42:34 -0700 (PDT) Received: from e110439-lin.cambridge.arm.com (e110439-lin.cambridge.arm.com [10.1.194.43]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id B88A23F59C; Tue, 2 Apr 2019 03:42:31 -0700 (PDT) From: Patrick Bellasi To: linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, linux-api@vger.kernel.org Cc: Ingo Molnar , Peter Zijlstra , Tejun Heo , "Rafael J . Wysocki" , Vincent Guittot , Viresh Kumar , Paul Turner , Quentin Perret , Dietmar Eggemann , Morten Rasmussen , Juri Lelli , Todd Kjos , Joel Fernandes , Steve Muckle , Suren Baghdasaryan Subject: [PATCH v8 05/16] sched/core: Allow sched_setattr() to use the current policy Date: Tue, 2 Apr 2019 11:41:41 +0100 Message-Id: <20190402104153.25404-6-patrick.bellasi@arm.com> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190402104153.25404-1-patrick.bellasi@arm.com> References: <20190402104153.25404-1-patrick.bellasi@arm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The sched_setattr() syscall mandates that a policy is always specified. This requires to always know which policy a task will have when attributes are configured and this makes it impossible to add more generic task attributes valid across different scheduling policies. Reading the policy before setting generic tasks attributes is racy since we cannot be sure it is not changed concurrently. Introduce the required support to change generic task attributes without affecting the current task policy. This is done by adding an attribute flag (SCHED_FLAG_KEEP_POLICY) to enforce the usage of the current policy. Add support for the SETPARAM_POLICY policy, which is already used by the sched_setparam() POSIX syscall, to the sched_setattr() non-POSIX syscall. Signed-off-by: Patrick Bellasi Cc: Ingo Molnar Cc: Peter Zijlstra --- include/uapi/linux/sched.h | 6 +++++- kernel/sched/core.c | 11 ++++++++++- 2 files changed, 15 insertions(+), 2 deletions(-) diff --git a/include/uapi/linux/sched.h b/include/uapi/linux/sched.h index 22627f80063e..075c610adf45 100644 --- a/include/uapi/linux/sched.h +++ b/include/uapi/linux/sched.h @@ -40,6 +40,8 @@ /* SCHED_ISO: reserved but not implemented yet */ #define SCHED_IDLE 5 #define SCHED_DEADLINE 6 +/* Must be the last entry: used to sanity check attr.policy values */ +#define SCHED_POLICY_MAX SCHED_DEADLINE /* Can be ORed in to make sure the process is reverted back to SCHED_NORMAL on fork */ #define SCHED_RESET_ON_FORK 0x40000000 @@ -50,9 +52,11 @@ #define SCHED_FLAG_RESET_ON_FORK 0x01 #define SCHED_FLAG_RECLAIM 0x02 #define SCHED_FLAG_DL_OVERRUN 0x04 +#define SCHED_FLAG_KEEP_POLICY 0x08 #define SCHED_FLAG_ALL (SCHED_FLAG_RESET_ON_FORK | \ SCHED_FLAG_RECLAIM | \ - SCHED_FLAG_DL_OVERRUN) + SCHED_FLAG_DL_OVERRUN | \ + SCHED_FLAG_KEEP_POLICY) #endif /* _UAPI_LINUX_SCHED_H */ diff --git a/kernel/sched/core.c b/kernel/sched/core.c index d368ac26b8aa..20efb32e1a7e 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -4907,8 +4907,17 @@ SYSCALL_DEFINE3(sched_setattr, pid_t, pid, struct sched_attr __user *, uattr, if (retval) return retval; - if ((int)attr.sched_policy < 0) + /* + * A valid policy is always required from userspace, unless + * SCHED_FLAG_KEEP_POLICY is set and the current policy + * is enforced for this call. + */ + if (attr.sched_policy > SCHED_POLICY_MAX && + !(attr.sched_flags & SCHED_FLAG_KEEP_POLICY)) { return -EINVAL; + } + if (attr.sched_flags & SCHED_FLAG_KEEP_POLICY) + attr.sched_policy = SETPARAM_POLICY; rcu_read_lock(); retval = -ESRCH; -- 2.20.1