From nobody Sat Apr 11 09:21:58 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id BEE1CC00140 for ; Fri, 12 Aug 2022 20:40:07 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234610AbiHLUkE (ORCPT ); Fri, 12 Aug 2022 16:40:04 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33482 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229617AbiHLUkC (ORCPT ); Fri, 12 Aug 2022 16:40:02 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 4206BB516D for ; Fri, 12 Aug 2022 13:40:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660336800; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=JqyrfeLupdUdlxK6qwPAJTHZA2QeCAteefpYRfYcff4=; b=T/Hu/httlx0idDbn7NQCJyK/4Igzdi2eysGpbBxICOhKtu8WE7FH/0/2rRVEcNCWfWIEy8 wgT1fJlUF0DKdy5NyrTGeFkYUzfN1iGmEtmogCQNEMCl4I/D67Ye1nznVw0RPflYayJEAu 9JdViAuKYRFWFbd3bmm86R61I0QTing= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-637-Pl2ifT6KMtCIKA1plcfuRw-1; Fri, 12 Aug 2022 16:39:59 -0400 X-MC-Unique: Pl2ifT6KMtCIKA1plcfuRw-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 5F2E7185A79C; Fri, 12 Aug 2022 20:39:58 +0000 (UTC) Received: from llong.com (unknown [10.22.32.88]) by smtp.corp.redhat.com (Postfix) with ESMTP id B192FC15BA6; Fri, 12 Aug 2022 20:39:57 +0000 (UTC) From: Waiman Long To: Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Daniel Bristot de Oliveira , Valentin Schneider , Tejun Heo , Zefan Li , Johannes Weiner , Will Deacon Cc: cgroups@vger.kernel.org, linux-kernel@vger.kernel.org, Linus Torvalds , Waiman Long Subject: [PATCH v3 1/3] sched: Use user_cpus_ptr for saving user provided cpumask in sched_setaffinity() Date: Fri, 12 Aug 2022 16:39:27 -0400 Message-Id: <20220812203929.364341-2-longman@redhat.com> In-Reply-To: <20220812203929.364341-1-longman@redhat.com> References: <20220812203929.364341-1-longman@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" The user_cpus_ptr field is added by commit b90ca8badbd1 ("sched: Introduce task_struct::user_cpus_ptr to track requested affinity"). It is currently used only by arm64 arch due to possible asymmetric cpu setup. This patch extends its usage to save user provided cpumask when sched_setaffinity() is called for all arches. To preserve the existing arm64 use case, a new cpus_affinity_set flag is added to differentiate if user_cpus_ptr is set up by sched_setaffinity() or by force_compatible_cpus_allowed_ptr(). user_cpus_ptr set by sched_setaffinity() has priority and won't be overwritten by force_compatible_cpus_allowed_ptr() or relax_compatible_cpus_allowed_ptr(). As a call to sched_setaffinity() will no longer clear user_cpus_ptr but set it instead, the SCA_USER flag is no longer necessary and can be removed. Signed-off-by: Waiman Long --- include/linux/sched.h | 1 + kernel/sched/core.c | 71 +++++++++++++++++++++++++++++++------------ kernel/sched/sched.h | 1 - 3 files changed, 52 insertions(+), 21 deletions(-) diff --git a/include/linux/sched.h b/include/linux/sched.h index e7b2f8a5c711..cf7206a9b29a 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -816,6 +816,7 @@ struct task_struct { =20 unsigned int policy; int nr_cpus_allowed; + int cpus_affinity_set; const cpumask_t *cpus_ptr; cpumask_t *user_cpus_ptr; cpumask_t cpus_mask; diff --git a/kernel/sched/core.c b/kernel/sched/core.c index ee28253c9ac0..7e2576068331 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -2601,6 +2601,7 @@ int dup_user_cpus_ptr(struct task_struct *dst, struct= task_struct *src, return -ENOMEM; =20 cpumask_copy(dst->user_cpus_ptr, src->user_cpus_ptr); + dst->cpus_affinity_set =3D src->cpus_affinity_set; return 0; } =20 @@ -2848,7 +2849,6 @@ static int __set_cpus_allowed_ptr_locked(struct task_= struct *p, const struct cpumask *cpu_allowed_mask =3D task_cpu_possible_mask(p); const struct cpumask *cpu_valid_mask =3D cpu_active_mask; bool kthread =3D p->flags & PF_KTHREAD; - struct cpumask *user_mask =3D NULL; unsigned int dest_cpu; int ret =3D 0; =20 @@ -2907,14 +2907,7 @@ static int __set_cpus_allowed_ptr_locked(struct task= _struct *p, =20 __do_set_cpus_allowed(p, new_mask, flags); =20 - if (flags & SCA_USER) - user_mask =3D clear_user_cpus_ptr(p); - - ret =3D affine_move_task(rq, p, rf, dest_cpu, flags); - - kfree(user_mask); - - return ret; + return affine_move_task(rq, p, rf, dest_cpu, flags); =20 out: task_rq_unlock(rq, p, rf); @@ -2988,19 +2981,24 @@ static int restrict_cpus_allowed_ptr(struct task_st= ruct *p, =20 /* * We're about to butcher the task affinity, so keep track of what - * the user asked for in case we're able to restore it later on. + * the user asked for in case we're able to restore it later on + * unless it has been set before by sched_setaffinity(). */ - if (user_mask) { + if (user_mask && !p->cpus_affinity_set) { cpumask_copy(user_mask, p->cpus_ptr); p->user_cpus_ptr =3D user_mask; + user_mask =3D NULL; } =20 - return __set_cpus_allowed_ptr_locked(p, new_mask, 0, rq, &rf); + err =3D __set_cpus_allowed_ptr_locked(p, new_mask, 0, rq, &rf); =20 -err_unlock: - task_rq_unlock(rq, p, &rf); +free_user_mask: kfree(user_mask); return err; + +err_unlock: + task_rq_unlock(rq, p, &rf); + goto free_user_mask; } =20 /* @@ -3049,7 +3047,7 @@ void force_compatible_cpus_allowed_ptr(struct task_st= ruct *p) } =20 static int -__sched_setaffinity(struct task_struct *p, const struct cpumask *mask); +__sched_setaffinity(struct task_struct *p, const struct cpumask *mask, boo= l save_mask); =20 /* * Restore the affinity of a task @p which was previously restricted by a @@ -3067,9 +3065,10 @@ void relax_compatible_cpus_allowed_ptr(struct task_s= truct *p) /* * Try to restore the old affinity mask. If this fails, then * we free the mask explicitly to avoid it being inherited across - * a subsequent fork(). + * a subsequent fork() unless it is set by sched_setaffinity(). */ - if (!user_mask || !__sched_setaffinity(p, user_mask)) + if (!user_mask || !__sched_setaffinity(p, user_mask, false) || + p->cpus_affinity_set) return; =20 raw_spin_lock_irqsave(&p->pi_lock, flags); @@ -8079,10 +8078,11 @@ int dl_task_check_affinity(struct task_struct *p, c= onst struct cpumask *mask) #endif =20 static int -__sched_setaffinity(struct task_struct *p, const struct cpumask *mask) +__sched_setaffinity(struct task_struct *p, const struct cpumask *mask, boo= l save_mask) { int retval; cpumask_var_t cpus_allowed, new_mask; + struct cpumask *user_mask =3D NULL; =20 if (!alloc_cpumask_var(&cpus_allowed, GFP_KERNEL)) return -ENOMEM; @@ -8098,8 +8098,38 @@ __sched_setaffinity(struct task_struct *p, const str= uct cpumask *mask) retval =3D dl_task_check_affinity(p, new_mask); if (retval) goto out_free_new_mask; + + /* + * Save the user requested mask into user_cpus_ptr + */ + if (save_mask && !p->user_cpus_ptr) { +alloc_again: + user_mask =3D kmalloc(cpumask_size(), GFP_KERNEL); + + if (!user_mask) { + retval =3D -ENOMEM; + goto out_free_new_mask; + } + } + if (save_mask) { + struct rq_flags rf; + struct rq *rq =3D task_rq_lock(p, &rf); + + if (unlikely(!p->user_cpus_ptr && !user_mask)) { + task_rq_unlock(rq, p, &rf); + goto alloc_again; + } + if (!p->user_cpus_ptr) { + p->user_cpus_ptr =3D user_mask; + user_mask =3D NULL; + } + + cpumask_copy(p->user_cpus_ptr, mask); + p->cpus_affinity_set =3D 1; + task_rq_unlock(rq, p, &rf); + } again: - retval =3D __set_cpus_allowed_ptr(p, new_mask, SCA_CHECK | SCA_USER); + retval =3D __set_cpus_allowed_ptr(p, new_mask, SCA_CHECK); if (retval) goto out_free_new_mask; =20 @@ -8113,6 +8143,7 @@ __sched_setaffinity(struct task_struct *p, const stru= ct cpumask *mask) goto again; } =20 + kfree(user_mask); out_free_new_mask: free_cpumask_var(new_mask); out_free_cpus_allowed: @@ -8156,7 +8187,7 @@ long sched_setaffinity(pid_t pid, const struct cpumas= k *in_mask) if (retval) goto out_put_task; =20 - retval =3D __sched_setaffinity(p, in_mask); + retval =3D __sched_setaffinity(p, in_mask, true); out_put_task: put_task_struct(p); return retval; diff --git a/kernel/sched/sched.h b/kernel/sched/sched.h index e26688d387ae..15eefcd65faa 100644 --- a/kernel/sched/sched.h +++ b/kernel/sched/sched.h @@ -2283,7 +2283,6 @@ extern struct task_struct *pick_next_task_idle(struct= rq *rq); #define SCA_CHECK 0x01 #define SCA_MIGRATE_DISABLE 0x02 #define SCA_MIGRATE_ENABLE 0x04 -#define SCA_USER 0x08 =20 #ifdef CONFIG_SMP =20 --=20 2.31.1 From nobody Sat Apr 11 09:21:58 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 916AAC25B08 for ; Fri, 12 Aug 2022 20:40:09 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236043AbiHLUkH (ORCPT ); Fri, 12 Aug 2022 16:40:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33500 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230445AbiHLUkD (ORCPT ); Fri, 12 Aug 2022 16:40:03 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id A40AFB5171 for ; Fri, 12 Aug 2022 13:40:02 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660336801; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=PTybH4D4WwOeqo3rN415vbeLaTvaxhsUDN/KB9esUqw=; b=N2ehBv8M/aSpVdNfbQP+szRN/WIHAAoLqVBZdIT/IVK16W8HmDORXb/NZeDQnQ2+j5IrxW +vFtp0RX/M+xJ8DwUHSl+t/SB2L0/5aBYUoc3avi/aJMeqvpZxf764ZGKveh0L1V+fmdcG Un07iqrqrNPT63Wi/8g2w2ycsLFgSZs= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-596-wpjNd6xdOL6kePHvfDkgYw-1; Fri, 12 Aug 2022 16:39:59 -0400 X-MC-Unique: wpjNd6xdOL6kePHvfDkgYw-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 1D3DB1857F02; Fri, 12 Aug 2022 20:39:59 +0000 (UTC) Received: from llong.com (unknown [10.22.32.88]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6E51CC15BA6; Fri, 12 Aug 2022 20:39:58 +0000 (UTC) From: Waiman Long To: Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Daniel Bristot de Oliveira , Valentin Schneider , Tejun Heo , Zefan Li , Johannes Weiner , Will Deacon Cc: cgroups@vger.kernel.org, linux-kernel@vger.kernel.org, Linus Torvalds , Waiman Long Subject: [PATCH v3 2/3] sched: Provide copy_user_cpus_mask() to copy out user mask Date: Fri, 12 Aug 2022 16:39:28 -0400 Message-Id: <20220812203929.364341-3-longman@redhat.com> In-Reply-To: <20220812203929.364341-1-longman@redhat.com> References: <20220812203929.364341-1-longman@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" Since accessing the content of the user_cpus_ptr requires lock protection to ensure its validity, provide a helper function copy_user_cpus_mask() to facilitate its reading. Signed-off-by: Waiman Long --- include/linux/sched.h | 1 + kernel/sched/core.c | 18 ++++++++++++++++++ 2 files changed, 19 insertions(+) diff --git a/include/linux/sched.h b/include/linux/sched.h index cf7206a9b29a..e06bc1cbccca 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -1831,6 +1831,7 @@ extern int task_can_attach(struct task_struct *p, con= st struct cpumask *cs_effec extern void do_set_cpus_allowed(struct task_struct *p, const struct cpumas= k *new_mask); extern int set_cpus_allowed_ptr(struct task_struct *p, const struct cpumas= k *new_mask); extern int dup_user_cpus_ptr(struct task_struct *dst, struct task_struct *= src, int node); +extern struct cpumask *copy_user_cpus_mask(struct task_struct *p, struct c= pumask *user_mask); extern void release_user_cpus_ptr(struct task_struct *p); extern int dl_task_check_affinity(struct task_struct *p, const struct cpum= ask *mask); extern void force_compatible_cpus_allowed_ptr(struct task_struct *p); diff --git a/kernel/sched/core.c b/kernel/sched/core.c index 7e2576068331..4d3b10e91e1a 100644 --- a/kernel/sched/core.c +++ b/kernel/sched/core.c @@ -2619,6 +2619,24 @@ void release_user_cpus_ptr(struct task_struct *p) kfree(clear_user_cpus_ptr(p)); } =20 +/* + * Return the copied mask pointer or NULL if user mask not available. + */ +struct cpumask *copy_user_cpus_mask(struct task_struct *p, + struct cpumask *user_mask) +{ + struct rq_flags rf; + struct rq *rq =3D task_rq_lock(p, &rf); + struct cpumask *mask =3D NULL; + + if (p->user_cpus_ptr) { + cpumask_copy(user_mask, p->user_cpus_ptr); + mask =3D user_mask; + } + task_rq_unlock(rq, p, &rf); + return mask; +} + /* * This function is wildly self concurrent; here be dragons. * --=20 2.31.1 From nobody Sat Apr 11 09:21:58 2026 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id D9F19C00140 for ; Fri, 12 Aug 2022 20:40:16 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236458AbiHLUkO (ORCPT ); Fri, 12 Aug 2022 16:40:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33544 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235680AbiHLUkF (ORCPT ); Fri, 12 Aug 2022 16:40:05 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 070D5B5172 for ; Fri, 12 Aug 2022 13:40:04 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660336804; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=8DDEyD7Oc6PgrEZHkHqv7mnoGrf2YiFnazEzhrXs74I=; b=T/rxbaAwCPpUjrgpU6BSgvLdEChAnKs/uqyPAEb3P4FYUjFAeNfz+1A52fivNLkGgKnKpA 7eWn/BqlfGWXpSldBbMXhmck0XZIVcH9MfnAGSKR7ZXm3TCO2rhvGQyWOUb0/mhcDzx69e jqEJ3L6NmUg1XGdC1KfoqAeWuRwHrBw= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-348-m_8fjebbOLW7XTRqE0FU_A-1; Fri, 12 Aug 2022 16:40:00 -0400 X-MC-Unique: m_8fjebbOLW7XTRqE0FU_A-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.rdu2.redhat.com [10.11.54.8]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id CE4E2101A586; Fri, 12 Aug 2022 20:39:59 +0000 (UTC) Received: from llong.com (unknown [10.22.32.88]) by smtp.corp.redhat.com (Postfix) with ESMTP id 29D03C15BA6; Fri, 12 Aug 2022 20:39:59 +0000 (UTC) From: Waiman Long To: Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Daniel Bristot de Oliveira , Valentin Schneider , Tejun Heo , Zefan Li , Johannes Weiner , Will Deacon Cc: cgroups@vger.kernel.org, linux-kernel@vger.kernel.org, Linus Torvalds , Waiman Long Subject: [PATCH v3 3/3] cgroup/cpuset: Keep user set cpus affinity Date: Fri, 12 Aug 2022 16:39:29 -0400 Message-Id: <20220812203929.364341-4-longman@redhat.com> In-Reply-To: <20220812203929.364341-1-longman@redhat.com> References: <20220812203929.364341-1-longman@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Scanned-By: MIMEDefang 2.85 on 10.11.54.8 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Type: text/plain; charset="utf-8" It was found that any change to the current cpuset hierarchy may reset the cpumask of the tasks in the affected cpusets to the default cpuset value even if those tasks have cpus affinity explicitly set by the users before. That is especially easy to trigger under a cgroup v2 environment where writing "+cpuset" to the root cgroup's cgroup.subtree_control file will reset the cpus affinity of all the processes in the system. That is problematic in a nohz_full environment where the tasks running in the nohz_full CPUs usually have their cpus affinity explicitly set and will behave incorrectly if cpus affinity changes. Fix this problem by looking at user_cpus_ptr which will be set if cpus affinity have been explicitly set before and use it to restrcit the given cpumask unless there is no overlap. In that case, it will fallback to the given one. With that change in place, it was verified that tasks that have its cpus affinity explicitly set will not be affected by changes made to the v2 cgroup.subtree_control files. Signed-off-by: Waiman Long --- kernel/cgroup/cpuset.c | 28 ++++++++++++++++++++++++++-- 1 file changed, 26 insertions(+), 2 deletions(-) diff --git a/kernel/cgroup/cpuset.c b/kernel/cgroup/cpuset.c index 58aadfda9b8b..cabfac540fd8 100644 --- a/kernel/cgroup/cpuset.c +++ b/kernel/cgroup/cpuset.c @@ -704,6 +704,30 @@ static int validate_change(struct cpuset *cur, struct = cpuset *trial) return ret; } =20 +/* + * Preserve user provided cpumask (if set) as much as possible unless there + * is no overlap with the given mask. + */ +static int cpuset_set_cpus_allowed_ptr(struct task_struct *p, + const struct cpumask *mask) +{ + if (p->user_cpus_ptr) { + cpumask_var_t new_mask; + + if (alloc_cpumask_var(&new_mask, GFP_KERNEL) && + copy_user_cpus_mask(p, new_mask) && + cpumask_and(new_mask, new_mask, mask)) { + int ret =3D set_cpus_allowed_ptr(p, new_mask); + + free_cpumask_var(new_mask); + return ret; + } + free_cpumask_var(new_mask); + } + + return set_cpus_allowed_ptr(p, mask); +} + #ifdef CONFIG_SMP /* * Helper routine for generate_sched_domains(). @@ -1130,7 +1154,7 @@ static void update_tasks_cpumask(struct cpuset *cs) =20 css_task_iter_start(&cs->css, 0, &it); while ((task =3D css_task_iter_next(&it))) - set_cpus_allowed_ptr(task, cs->effective_cpus); + cpuset_set_cpus_allowed_ptr(task, cs->effective_cpus); css_task_iter_end(&it); } =20 @@ -2303,7 +2327,7 @@ static void cpuset_attach(struct cgroup_taskset *tset) * can_attach beforehand should guarantee that this doesn't * fail. TODO: have a better way to handle failure here */ - WARN_ON_ONCE(set_cpus_allowed_ptr(task, cpus_attach)); + WARN_ON_ONCE(cpuset_set_cpus_allowed_ptr(task, cpus_attach)); =20 cpuset_change_task_nodemask(task, &cpuset_attach_nodemask_to); cpuset_update_task_spread_flag(cs, task); --=20 2.31.1