Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp559647yba; Thu, 9 May 2019 02:19:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqyf5HYIKZGrp76c1xWr8OahcXOqh2MyMIvFVHlo/og/11oTcQF0hE29IvCRunYUbxr9pkOW X-Received: by 2002:a63:6196:: with SMTP id v144mr4023937pgb.235.1557393575532; Thu, 09 May 2019 02:19:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1557393575; cv=none; d=google.com; s=arc-20160816; b=TqiUOo7epJ40FqtVip3s2OxAZ9HA8ehR2AK0/GVHoDjoMt4qNV/daFmasf75EwSID1 dy3MkjLCWqPWoTx53JfbZq3i9P+KQ0REpyf8H0OeQc9Tiy200mQp9cjYRFxghANnHSxh xkbIhTSb9SXeu8RoqG9jVzuo8rcglsGedNTlmmpibjZA2MFu4tJoLInCsOLTpLMTHy4f aau+zOFN17iaUyE1ChZTMhI8a57QIsAIZRGJzPCxfyYke8AiLTyfXU29bguciOrFS6/S WsbNG+rwr9PGnNV6/7h4cU+RcxD1tkkNL+5IJl4EgTkReZ1sSvsSyFYlEJ9EfIchqRMA 8I1g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=NUtnrI9017dVnZtZgbkupyttZ5hp0d/m8d60MWYzDVY=; b=j2GKcFSfcLzpLbNROeh6rJordTF6drL5z685ZapsTq5QbkVFs0MVVdJgClKgKnRODK GEgcWUmSDFGwRgtuy5CBsHc6LxLr3cHZGGXCUFCTGET/GeTJkkmfn7xTIOX+WXzgZraq QVKh4sHd8+Yb6OCXkwhahfmxHMyuP5Z+gm0pxQUEoTs/Kskkm+Emig6Vfi6sgRHdJGI0 /JeI+qFco0zlDUqNOvUyzAeRajTPMDwRY8A6wjCnxm5rpWkqu6ITqwltUcf3wOTDDtzK NI3FOKchkAjWnAi1yd8N9meAeeg2mTPrf4Fgx7/iBVkkzk1TSo3Ad15zJtB1GacGPLVP 0PzQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b21si2195495pff.35.2019.05.09.02.19.19; Thu, 09 May 2019 02:19:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726700AbfEIJSN (ORCPT + 99 others); Thu, 9 May 2019 05:18:13 -0400 Received: from usa-sjc-mx-foss1.foss.arm.com ([217.140.101.70]:35490 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726084AbfEIJSN (ORCPT ); Thu, 9 May 2019 05:18:13 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id C16C9374; Thu, 9 May 2019 02:18:12 -0700 (PDT) Received: from e110439-lin (e110439-lin.cambridge.arm.com [10.1.194.43]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id CC5FA3F575; Thu, 9 May 2019 02:18:09 -0700 (PDT) Date: Thu, 9 May 2019 10:18:07 +0100 From: Patrick Bellasi To: Peter Zijlstra Cc: linux-kernel@vger.kernel.org, linux-pm@vger.kernel.org, linux-api@vger.kernel.org, Ingo Molnar , Tejun Heo , "Rafael J . Wysocki" , Vincent Guittot , Viresh Kumar , Paul Turner , Quentin Perret , Dietmar Eggemann , Morten Rasmussen , Juri Lelli , Todd Kjos , Joel Fernandes , Steve Muckle , Suren Baghdasaryan Subject: Re: [PATCH v8 05/16] sched/core: Allow sched_setattr() to use the current policy Message-ID: <20190509091807.7d3iykkn3oj4b737@e110439-lin> References: <20190402104153.25404-1-patrick.bellasi@arm.com> <20190402104153.25404-6-patrick.bellasi@arm.com> <20190508192131.GD32547@worktop.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190508192131.GD32547@worktop.programming.kicks-ass.net> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 08-May 21:21, Peter Zijlstra wrote: > On Tue, Apr 02, 2019 at 11:41:41AM +0100, Patrick Bellasi wrote: > > diff --git a/include/uapi/linux/sched.h b/include/uapi/linux/sched.h > > index 22627f80063e..075c610adf45 100644 > > --- a/include/uapi/linux/sched.h > > +++ b/include/uapi/linux/sched.h > > @@ -40,6 +40,8 @@ > > /* SCHED_ISO: reserved but not implemented yet */ > > #define SCHED_IDLE 5 > > #define SCHED_DEADLINE 6 > > +/* Must be the last entry: used to sanity check attr.policy values */ > > +#define SCHED_POLICY_MAX SCHED_DEADLINE > > This is a wee bit sad to put in a uapi header; but yeah, where else :/ > > Another option would be something like: > > enum { > SCHED_NORMAL = 0, > SCHED_FIFO = 1, > SCHED_RR = 2, > SCHED_BATCH = 3, > /* SCHED_ISO = 4, reserved */ > SCHED_IDLE = 5, > SCHED_DEADLINE = 6, > SCHED_POLICY_NR > }; I just wanted to minimize the changes by keeping the same structure... If you prefer the above I can add a refactoring patch just to update existing definitions before adding this patch... > > > /* Can be ORed in to make sure the process is reverted back to SCHED_NORMAL on fork */ > > #define SCHED_RESET_ON_FORK 0x40000000 > > @@ -50,9 +52,11 @@ > > #define SCHED_FLAG_RESET_ON_FORK 0x01 > > #define SCHED_FLAG_RECLAIM 0x02 > > #define SCHED_FLAG_DL_OVERRUN 0x04 > > +#define SCHED_FLAG_KEEP_POLICY 0x08 > > > > #define SCHED_FLAG_ALL (SCHED_FLAG_RESET_ON_FORK | \ > > SCHED_FLAG_RECLAIM | \ > > - SCHED_FLAG_DL_OVERRUN) > > + SCHED_FLAG_DL_OVERRUN | \ > > + SCHED_FLAG_KEEP_POLICY) > > > > #endif /* _UAPI_LINUX_SCHED_H */ > > diff --git a/kernel/sched/core.c b/kernel/sched/core.c > > index d368ac26b8aa..20efb32e1a7e 100644 > > --- a/kernel/sched/core.c > > +++ b/kernel/sched/core.c > > @@ -4907,8 +4907,17 @@ SYSCALL_DEFINE3(sched_setattr, pid_t, pid, struct sched_attr __user *, uattr, > > if (retval) > > return retval; > > > > - if ((int)attr.sched_policy < 0) > > + /* > > + * A valid policy is always required from userspace, unless > > + * SCHED_FLAG_KEEP_POLICY is set and the current policy > > + * is enforced for this call. > > + */ > > + if (attr.sched_policy > SCHED_POLICY_MAX && > > + !(attr.sched_flags & SCHED_FLAG_KEEP_POLICY)) { > > return -EINVAL; > > + } > > And given I just looked at those darn SCHED_* things, I now note the > above does 'funny' things when passed: attr.policy=4. ... and maybe factor in the same refactoring patch a check on SCHED_ISO being not yet supported. > > > + if (attr.sched_flags & SCHED_FLAG_KEEP_POLICY) > > + attr.sched_policy = SETPARAM_POLICY; > > > > rcu_read_lock(); > > retval = -ESRCH; -- #include Patrick Bellasi