lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 10 Aug 2021 11:41:15 -0700 From: "Paul E. McKenney" <paulmck@...nel.org> To: Juri Lelli <juri.lelli@...hat.com> Cc: josh@...htriplett.org, linux-kernel@...r.kernel.org, linux-rt-users@...r.kernel.org, peterz@...radead.org, bigeasy@...utronix.de, tglx@...utronix.de, rostedt@...dmis.org, mathieu.desnoyers@...icios.com, jiangshanlai@...il.com, joel@...lfernandes.org, rcu@...r.kernel.org Subject: Re: [PATCH v2 0/2] rcu: Make rcu_normal_after_boot writable again On Tue, Aug 10, 2021 at 10:48:14AM +0200, Juri Lelli wrote: > Hi, > > v2 of a proposed RCU change to make rcu_normal_after_boot feature usable > on PREEMPT_RT as well, as it turns out it's useful on RT as well on > NO_HZ_FULL configurations. > > v2 gained an additional patch to revise rcu update module parameters > permissions (as suggested during v1 review [1]). Queued and pushed, thank you! Thanx, Paul > Changes wrt v1: > > - Restrict the option to !PREEMPT_RT || NO_HZ_FULL (Paul, Sebastian) > - Change module params permissions (Paul) (02/02) > > Thanks, > Juri > > v1 - https://lore.kernel.org/lkml/20210805080123.16320-1-juri.lelli@redhat.com/ > > Juri Lelli (2): > rcu: Make rcu_normal_after_boot writable again > rcu: Make rcu update module parameters world-readable > > kernel/rcu/tree_exp.h | 1 - > kernel/rcu/update.c | 8 ++++---- > 2 files changed, 4 insertions(+), 5 deletions(-) > > -- > 2.31.1 >
Powered by blists - more mailing lists