lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250521073548.140307-1-arighi@nvidia.com>
Date: Wed, 21 May 2025 09:34:05 +0200
From: Andrea Righi <arighi@...dia.com>
To: Tejun Heo <tj@...nel.org>,
	David Vernet <void@...ifault.com>,
	Changwoo Min <changwoo@...lia.com>
Cc: linux-kernel@...r.kernel.org
Subject: [PATCHSET sched_ext/for-6.16] sched_ext: Unify idle CPU selection kfuncs

As discussed in [1], consolidate scx_bpf_select_cpu_dfl() and
scx_bpf_select_cpu_and(), allowing them to be called from the same contexts
and update the corresponding kselftest to reflect this change.

[1] https://lore.kernel.org/all/aCl1nq0hUJ7IdtC5@gpd3/

Andrea Righi (2):
      sched_ext: idle: Consolidate default idle CPU selection kfuncs
      selftests/sched_ext: Update test enq_select_cpu_fails

 kernel/sched/ext_idle.c                            | 156 ++++++++++-----------
 tools/testing/selftests/sched_ext/Makefile         |   2 +-
 .../selftests/sched_ext/enq_select_cpu.bpf.c       |  74 ++++++++++
 tools/testing/selftests/sched_ext/enq_select_cpu.c |  88 ++++++++++++
 .../selftests/sched_ext/enq_select_cpu_fails.bpf.c |  43 ------
 .../selftests/sched_ext/enq_select_cpu_fails.c     |  61 --------
 6 files changed, 234 insertions(+), 190 deletions(-)
 create mode 100644 tools/testing/selftests/sched_ext/enq_select_cpu.bpf.c
 create mode 100644 tools/testing/selftests/sched_ext/enq_select_cpu.c
 delete mode 100644 tools/testing/selftests/sched_ext/enq_select_cpu_fails.bpf.c
 delete mode 100644 tools/testing/selftests/sched_ext/enq_select_cpu_fails.c

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ