lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Mon, 18 Aug 2008 12:50:01 +0200
From:	Peter Zijlstra <peterz@...radead.org>
To:	Nick Piggin <nickpiggin@...oo.com.au>
Cc:	Stefani Seibold <stefani@...bold.net>,
	linux-kernel@...r.kernel.org, mingo@...hat.com
Subject: Re: SCHED_FIFO and SCHED_RR broken by cfs

On Sun, 2008-08-17 at 23:04 +1000, Nick Piggin wrote:
> On Sunday 17 August 2008 00:53, Peter Zijlstra wrote:

> > Has nothing to do with CFS, but everything to do with the fact that we
> > now have a 95% bandwidth control by default.
> >
> > Does doing:
> >
> > echo -1 > /proc/sys/kernel/sched_rt_runtime_us
> >
> > fix it?
> >
> > So, up to 95% cpu usage (per sched_rt_period_us) FIFO and RR behave like
> > they always did, once they cross that line, they'll be throttled.
> >
> > 95% seemed like a sane default in that it leaves a little room to
> > recover from a run-away rt process (esp handy now that !root users can
> > also use RT scheduling classes), and should be enough for most
> > applications as they usually don't consume all that much time.
> 
> Did it seem sane to break POSIX and backwards compatiblity by default?

Up to a point, yes.

There were quite a few complaints that runaway RT tasks could render a
machine unusable - which made 'desktop' usage of the RT class unsafe.

This 95%/1s default allows most RT tasks to run without having to tinker
with the settings, and for those who do need something else, they can
get it too, but will have to turn a knob.

But I guess we could change the default back to unlimited and default to
unsafe if people feel strongly about this.


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ