From mboxrd@z Thu Jan 1 00:00:00 1970 From: Peter Zijlstra Subject: Re: RFC for a new Scheduling policy/class in the Linux-kernel Date: Mon, 13 Jul 2009 19:28:22 +0200 Message-ID: <1247506102.7500.41.camel@twins> References: <200907102350.47124.henrik@austad.us> <1247336891.9978.32.camel@laptop> <4A594D2D.3080101@ittc.ku.edu> <1247412708.6704.105.camel@laptop> <1247499843.8107.548.camel@Palantir> Mime-Version: 1.0 Content-Type: text/plain Content-Transfer-Encoding: 7bit Cc: Douglas Niehaus , Henrik Austad , LKML , Ingo Molnar , Bill Huey , Linux RT , Fabio Checconi , "James H. Anderson" , Thomas Gleixner , Ted Baker , Dhaval Giani , Noah Watkins , KUSP Google Group , Tommaso Cucinotta , Giuseppe Lipari To: Raistlin Return-path: Received: from viefep14-int.chello.at ([62.179.121.34]:16460 "EHLO viefep14-int.chello.at" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756438AbZGMR2a (ORCPT ); Mon, 13 Jul 2009 13:28:30 -0400 In-Reply-To: <1247499843.8107.548.camel@Palantir> Sender: linux-rt-users-owner@vger.kernel.org List-ID: On Mon, 2009-07-13 at 17:44 +0200, Raistlin wrote: > What we would like to achieve is some set of rules that, extending the > UP ones, yield a situation which is both: > - analyzable from the real-time theorist's point of view... Which is > (un?)fortunately what we are :-) > - possible to implement... Which is not always (un!)fortunately obvious > here :-) I would very much like a proper theoretical foundation for whatever we end up with ;-) > Very basically: from the analysis point of view one easy and effective > solution would be to have the blocked-running tasks --i.e., the tasks > blocked on some lock that have been left on the rq to proxy-execute the > lock owner-- busy waiting while the lock owner is running. This allows > for retaining a lot of nice properties BWI already has, as far as > analyzability is concerned. Right, practically we cannot do this, since we expose the block graph to userspace and you could in userspace construct a program that would exploit this spinning to DoS the system.