Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1402642pxj; Fri, 21 May 2021 13:23:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwUwwRlZTVA105MhSAE1AiVlcwi509mJ8GtiBz9lFegSIuiEPZPvwAKNxt5ejgLua/FLJIT X-Received: by 2002:a6b:d615:: with SMTP id w21mr651381ioa.74.1621628601202; Fri, 21 May 2021 13:23:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621628601; cv=none; d=google.com; s=arc-20160816; b=Gvg8385wXf0K4MWAUpuRuP0rpEiG1S6ILFy3XV0IJVyyKEqR+n0pLha9Oje03d7pfy X2y4VbVzVmVGCcwKrXgfIKHB0YI6NrD7GUOsidjp8J0RgDSVq6A5iQnlf+s9PToZM5no vXU70tIB9YFSZPHeH9jCtJmF2AINO/JzNgteopmI8kVK2EvSjnzKj2IJv62NfFUWV2KZ 7A/EmM0+qSNS4ucag/lI6JD6TVARnj+yfQrqxYji/YMpfTcA517gDNW070w+kOCuKFJF LoNHYTp1K24tqW5C1t1kkmXdXQ+rqO/sfI+XS0mw78gIbELSt3cDIv9Kd08c2kf76dPC OD0w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=lT1qQTlgI0mgKLNqzFoY2ExD4zRsp4TImS+SlmxdJnI=; b=tOG1oBTduWw5D8ZazYRqs2ZSaqCKG378GXvCNvI9k0sX8wkOpHlrVxAK4Q9cpNbqsE gWM1lkTF5FfaQNUAXMcWXTH0+ynK9109PxEY+mMNRh8uJJBLl/G+UkH3G2O9X0iXIqPV IphSv9AW0X8/k3pNQGa+jehKA1jZ2LVzf5Dtln08vLbyZCXNfHAoy9Ec8qpVZa9WKvGC 1jXh1RM7QpiODd+y0gEHiG2WyrLl/0MtQp7MkPKA8nIDqWwIttU9i+ypvHKWTC49ovmW zstrJ+BWFP4RHyrHAzZzojmOfRvoTokNgBBTAQvtUlp+FEVPCpySB7LtOcwYlVB7H0aq 0Czw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a13si6989176ilf.41.2021.05.21.13.23.08; Fri, 21 May 2021 13:23:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236463AbhEUQmb (ORCPT + 99 others); Fri, 21 May 2021 12:42:31 -0400 Received: from foss.arm.com ([217.140.110.172]:51282 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233011AbhEUQma (ORCPT ); Fri, 21 May 2021 12:42:30 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 869721424; Fri, 21 May 2021 09:41:06 -0700 (PDT) Received: from e107158-lin.cambridge.arm.com (e107158-lin.cambridge.arm.com [10.1.195.57]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 357A53F73B; Fri, 21 May 2021 09:41:04 -0700 (PDT) Date: Fri, 21 May 2021 17:41:01 +0100 From: Qais Yousef To: Will Deacon Cc: linux-arm-kernel@lists.infradead.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, Catalin Marinas , Marc Zyngier , Greg Kroah-Hartman , Peter Zijlstra , Morten Rasmussen , Suren Baghdasaryan , Quentin Perret , Tejun Heo , Li Zefan , Johannes Weiner , Ingo Molnar , Juri Lelli , Vincent Guittot , "Rafael J. Wysocki" , kernel-team@android.com Subject: Re: [PATCH v6 11/21] sched: Split the guts of sched_setaffinity() into a helper function Message-ID: <20210521164101.lwq5wr4mbb32co6l@e107158-lin.cambridge.arm.com> References: <20210518094725.7701-1-will@kernel.org> <20210518094725.7701-12-will@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20210518094725.7701-12-will@kernel.org> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 05/18/21 10:47, Will Deacon wrote: > In preparation for replaying user affinity requests using a saved mask, > split sched_setaffinity() up so that the initial task lookup and > security checks are only performed when the request is coming directly > from userspace. > > Signed-off-by: Will Deacon > --- > kernel/sched/core.c | 110 +++++++++++++++++++++++--------------------- > 1 file changed, 58 insertions(+), 52 deletions(-) > > diff --git a/kernel/sched/core.c b/kernel/sched/core.c > index 9512623d5a60..808bbe669a6d 100644 > --- a/kernel/sched/core.c > +++ b/kernel/sched/core.c > @@ -6788,9 +6788,61 @@ SYSCALL_DEFINE4(sched_getattr, pid_t, pid, struct sched_attr __user *, uattr, > return retval; > } > > -long sched_setaffinity(pid_t pid, const struct cpumask *in_mask) > +static int > +__sched_setaffinity(struct task_struct *p, const struct cpumask *mask) > { > + int retval; > cpumask_var_t cpus_allowed, new_mask; > + > + if (!alloc_cpumask_var(&cpus_allowed, GFP_KERNEL)) > + return -ENOMEM; > + > + if (!alloc_cpumask_var(&new_mask, GFP_KERNEL)) > + return -ENOMEM; Shouldn't we free cpus_allowed first? Cheers -- Qais Yousef > + > + cpuset_cpus_allowed(p, cpus_allowed); > + cpumask_and(new_mask, mask, cpus_allowed); > + > + /* > + * Since bandwidth control happens on root_domain basis, > + * if admission test is enabled, we only admit -deadline > + * tasks allowed to run on all the CPUs in the task's > + * root_domain. > + */ > +#ifdef CONFIG_SMP > + if (task_has_dl_policy(p) && dl_bandwidth_enabled()) { > + rcu_read_lock(); > + if (!cpumask_subset(task_rq(p)->rd->span, new_mask)) { > + retval = -EBUSY; > + rcu_read_unlock(); > + goto out_free_masks; > + } > + rcu_read_unlock(); > + } > +#endif > +again: > + retval = __set_cpus_allowed_ptr(p, new_mask, SCA_CHECK); > + if (retval) > + goto out_free_masks; > + > + cpuset_cpus_allowed(p, cpus_allowed); > + if (!cpumask_subset(new_mask, cpus_allowed)) { > + /* > + * We must have raced with a concurrent cpuset update. > + * Just reset the cpumask to the cpuset's cpus_allowed. > + */ > + cpumask_copy(new_mask, cpus_allowed); > + goto again; > + } > + > +out_free_masks: > + free_cpumask_var(new_mask); > + free_cpumask_var(cpus_allowed); > + return retval; > +} > + > +long sched_setaffinity(pid_t pid, const struct cpumask *in_mask) > +{ > struct task_struct *p; > int retval; > > @@ -6810,68 +6862,22 @@ long sched_setaffinity(pid_t pid, const struct cpumask *in_mask) > retval = -EINVAL; > goto out_put_task; > } > - if (!alloc_cpumask_var(&cpus_allowed, GFP_KERNEL)) { > - retval = -ENOMEM; > - goto out_put_task; > - } > - if (!alloc_cpumask_var(&new_mask, GFP_KERNEL)) { > - retval = -ENOMEM; > - goto out_free_cpus_allowed; > - } > - retval = -EPERM; > + > if (!check_same_owner(p)) { > rcu_read_lock(); > if (!ns_capable(__task_cred(p)->user_ns, CAP_SYS_NICE)) { > rcu_read_unlock(); > - goto out_free_new_mask; > + retval = -EPERM; > + goto out_put_task; > } > rcu_read_unlock(); > } > > retval = security_task_setscheduler(p); > if (retval) > - goto out_free_new_mask; > - > - > - cpuset_cpus_allowed(p, cpus_allowed); > - cpumask_and(new_mask, in_mask, cpus_allowed); > - > - /* > - * Since bandwidth control happens on root_domain basis, > - * if admission test is enabled, we only admit -deadline > - * tasks allowed to run on all the CPUs in the task's > - * root_domain. > - */ > -#ifdef CONFIG_SMP > - if (task_has_dl_policy(p) && dl_bandwidth_enabled()) { > - rcu_read_lock(); > - if (!cpumask_subset(task_rq(p)->rd->span, new_mask)) { > - retval = -EBUSY; > - rcu_read_unlock(); > - goto out_free_new_mask; > - } > - rcu_read_unlock(); > - } > -#endif > -again: > - retval = __set_cpus_allowed_ptr(p, new_mask, SCA_CHECK); > + goto out_put_task; > > - if (!retval) { > - cpuset_cpus_allowed(p, cpus_allowed); > - if (!cpumask_subset(new_mask, cpus_allowed)) { > - /* > - * We must have raced with a concurrent cpuset > - * update. Just reset the cpus_allowed to the > - * cpuset's cpus_allowed > - */ > - cpumask_copy(new_mask, cpus_allowed); > - goto again; > - } > - } > -out_free_new_mask: > - free_cpumask_var(new_mask); > -out_free_cpus_allowed: > - free_cpumask_var(cpus_allowed); > + retval = __sched_setaffinity(p, in_mask); > out_put_task: > put_task_struct(p); > return retval; > -- > 2.31.1.751.gd2f1c929bd-goog >