lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20171212115040.iffj4plu3iow7qoi@gmail.com> Date: Tue, 12 Dec 2017 12:50:40 +0100 From: Ingo Molnar <mingo@...nel.org> To: Claudio Scordino <claudio@...dence.eu.com> Cc: Peter Zijlstra <peterz@...radead.org>, Juri Lelli <juri.lelli@...il.com>, Luca Abeni <luca.abeni@...tannapisa.it>, Tommaso Cucinotta <tommaso.cucinotta@...up.it>, Ingo Molnar <mingo@...hat.com>, Thomas Gleixner <tglx@...utronix.de>, LKML <linux-kernel@...r.kernel.org>, linux-rt-users <linux-rt-users@...r.kernel.org> Subject: Re: [PATCH v3] sched/deadline: runtime overrun signal * Claudio Scordino <claudio@...dence.eu.com> wrote: > From: Juri Lelli <juri.lelli@...il.com> > - ~(SCHED_FLAG_RESET_ON_FORK | SCHED_FLAG_RECLAIM)) > + ~(SCHED_FLAG_RESET_ON_FORK | SCHED_FLAG_RECLAIM | > + SCHED_FLAG_DL_OVERRUN)) > + if (dl_runtime_exceeded(dl_se) && > + (dl_se->flags & SCHED_FLAG_DL_OVERRUN)) > + pr_info("runtime overrun: %s[%d]\n", > + tsk->comm, task_pid_nr(tsk)); Guys, please, don't, break code lines in a hard to read fashion, ok, just to pacify checkpatch.pl ok? :-) Also, I'm not sure that pr_info() debug printout should be in an upstream version, correct? Thanks, Ingo
Powered by blists - more mailing lists