lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1470364583.3998.4.camel@gmail.com>
Date:	Fri, 05 Aug 2016 04:36:23 +0200
From:	Mike Galbraith <umgwanakikbuti@...il.com>
To:	yunhong jiang <yunhong.jiang@...ux.intel.com>
Cc:	linux-kernel@...r.kernel.org, linux-rt-users@...r.kernel.org,
	rostedt@...dmis.org
Subject: Re: The timer softirq on the RT kernel

On Thu, 2016-08-04 at 17:36 -0700, yunhong jiang wrote:
> Hi,Mike & Steven
> 	On https://lkml.org/lkml/2015/3/24/1178, the patch of "timers:
> do not raise softirq unconditionally" is reverted. Thanks for
> Steven's
> detailed comments, it's quite clear explained.
> 	I remember Mike has a patch trying to fix it but late
> abandoned. Do you still have any plan to work on this? Otherwise, I
> will have a try.

Sebastian converted the lock to raw in -rt, so nohz_full now works
without any extra hackery.

	-Mike

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ