lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230322114241.88118-1-qiuxu.zhuo@intel.com>
Date:   Wed, 22 Mar 2023 19:42:39 +0800
From:   Qiuxu Zhuo <qiuxu.zhuo@...el.com>
To:     paulmck@...nel.org
Cc:     dave@...olabs.net, frederic@...nel.org, jiangshanlai@...il.com,
        joel@...lfernandes.org, josh@...htriplett.org,
        linux-kernel@...r.kernel.org, mathieu.desnoyers@...icios.com,
        qiuxu.zhuo@...el.com, quic_neeraju@...cinc.com,
        rcu@...r.kernel.org, rostedt@...dmis.org
Subject: [PATCH v4 0/2] Stop kfree_scale_thread thread(s) after unloading rcuscale

v1 -> v2:

 - Move rcu_scale_cleanup() after kfree_scale_cleanup() to eliminate the
   declaration of kfree_scale_cleanup().

 - Remove the unnecessary step "modprobe torture" from the commit message.

 - Add the description for why move rcu_scale_cleanup() after
   kfree_scale_cleanup() to the commit message.

v2 -> v3:

 - Split the single v2 patch into two patches.

 - Move the commit message description for why move rcu_scale_cleanup()
   after kfree_scale_cleanup() to Patch 1.

v3 -> v4 (No function changes):

 - Rebased Patch 1 & 2 on top of the rcu "-dev" branch.

 - Added two "Reviewed-by" tags to the commit message of Patch 2.


Qiuxu Zhuo (2):
  rcu/rcuscale: Move rcu_scale_*() after kfree_scale_cleanup()
  rcu/rcuscale: Stop kfree_scale_thread thread(s) after unloading rcuscale

 kernel/rcu/rcuscale.c | 199 ++++++++++++++++++++++--------------------
 1 file changed, 102 insertions(+), 97 deletions(-)


base-commit: 86b3da94693e412ca43d996a7e6ed5766ef7a5f4
-- 
2.17.1

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ