lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20230224183557.GP2948950@paulmck-ThinkPad-P17-Gen-1>
Date:   Fri, 24 Feb 2023 10:35:57 -0800
From:   "Paul E. McKenney" <paulmck@...nel.org>
To:     Davidlohr Bueso <dave@...olabs.net>
Cc:     Zqiang <qiang1.zhang@...el.com>, josh@...htriplett.org,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2] locktorture: Add raw_spinlock* torture tests for
 PREEMPT_RT kernels

On Thu, Feb 23, 2023 at 07:12:32PM -0800, Davidlohr Bueso wrote:
> On Fri, 24 Feb 2023, Zqiang wrote:
> 
> > In PREEMPT_RT kernels, both spin_lock() and spin_lock_irq() are converted
> > to sleepable rt_spin_lock().  This means that the interrupt related suffix
> > for spin_lock/unlock(_irq, irqsave/irqrestore) do not affect the CPU's
> > interrupt state. This commit therefore adds raw spin-lock torture tests.
> > This in turn permits pure spin locks to be tested in PREEMPT_RT kernels.
> > 
> > Suggested-by: Paul E. McKenney <paulmck@...nel.org>
> > Suggested-by: Davidlohr Bueso <dave@...olabs.net>
> > Signed-off-by: Zqiang <qiang1.zhang@...el.com>
> 
> Reviewed-by: Davidlohr Bueso <dave@...olabs.net>

Queued replacing the previous version, thank you both!

							Thanx, Paul

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ