lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1356731537.21409.1002.camel@edumazet-glaptop>
Date:	Fri, 28 Dec 2012 13:52:17 -0800
From:	Eric Dumazet <eric.dumazet@...il.com>
To:	David Decotigny <decot@...glers.com>
Cc:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	Ben Hutchings <bhutchings@...arflare.com>,
	"David S. Miller" <davem@...emloft.net>,
	Or Gerlitz <ogerlitz@...lanox.com>,
	Amir Vadai <amirv@...lanox.com>,
	"Paul E. McKenney" <paul.mckenney@...aro.org>,
	Thomas Gleixner <tglx@...utronix.de>,
	Andrew Morton <akpm@...ux-foundation.org>,
	Josh Triplett <josh@...htriplett.org>,
	David Howells <dhowells@...hat.com>,
	Paul Gortmaker <paul.gortmaker@...driver.com>
Subject: Re: [PATCH v2] lib: cpu_rmap: avoid flushing all workqueues

On Fri, 2012-12-28 at 13:44 -0800, David Decotigny wrote:
> Thanks,
> 
> Ok for the cpu_rmap_put helper. Will do this in v3 of this patch.
> 
> Your comments suggest more refactoring, which might be better in the
> form of 1 or 2 additional patches that:
>  - rename alloc_cpu_rmap & co according to new conventions (cpu_rmap_*)
>  - remove the cpu_rmap sub-API altogether, keeping only irq_cpu_rmap
> (controversial?)
> 
> I'd rather current patch is integrated in its own as it fixes an actual bug.
> I will send the other patch(es) separately later.

This looks fine to me !


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ