lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 11 Feb 2016 19:49:20 +0100 (CET)
From:	Thomas Gleixner <tglx@...utronix.de>
To:	Linus Torvalds <torvalds@...ux-foundation.org>
cc:	Tejun Heo <tj@...nel.org>,
	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [GIT PULL] workqueue fixes for v4.5-rc3

Linus,

On Thu, 11 Feb 2016, Linus Torvalds wrote:

> On Thu, Feb 11, 2016 at 12:18 AM, Thomas Gleixner <tglx@...utronix.de> wrote:
> >
> > That certainly makes sense. So we should use a common debug option to force
> > the 'schedule remote' machinery for all interesting subsystems instead of
> > creating an extra option for each.
> 
> Yeah, let's make it easy to use and enable.
> 
> If it was split, the options would likely interact anyway (ie any
> option that enables "add_timer()" to run on arbitrary cpu's wouldl
> automatically also affect "queue_delayed_work()"), so it's not like it
> would really be truly independent issues anyway.
> 
> And if it does show an oops or other problem due to some broken
> expectations, I'd hope the oops should be enough to show what the
> problem is. It did for the vmstat case.

while playing around with it and wondering where to put the command line
option, I wondered whether it makes sense to tie this to debugobjects.

If stuff goes bad, then state corruptions of the involved objects (timers,
work ..) are likely to happen, so having debugobjects enabled along with that
force RR scheme makes a lot of sense.

Thoughts?

Thanks,

	tglx

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ