lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHk-=whGm0gQhUUK0o+=rwVTNsFDkjz+6=y+NvmcYe=SCW-2JA@mail.gmail.com>
Date:   Mon, 17 Jul 2023 17:27:57 -0700
From:   Linus Torvalds <torvalds@...ux-foundation.org>
To:     Thomas Gleixner <tglx@...utronix.de>
Cc:     LKML <linux-kernel@...r.kernel.org>, x86@...nel.org,
        Andrew Cooper <andrew.cooper3@...rix.com>,
        Tom Lendacky <thomas.lendacky@....com>,
        Paolo Bonzini <pbonzini@...hat.com>,
        Wei Liu <wei.liu@...nel.org>,
        Arjan van de Ven <arjan@...ux.intel.com>,
        Juergen Gross <jgross@...e.com>
Subject: Re: [patch 00/58] x86/apic: Decrapification and static calls

On Mon, 17 Jul 2023 at 16:14, Thomas Gleixner <tglx@...utronix.de> wrote:
>
> But what I really want to do is to make x86 SMP only.

I don't hate the notion, but it would make our UP coverage much worse
for other targets.

We already have weak coverage of UP builds anyway, since no sane
developer uses UP. But if we make UP not even be an option on x86,
then that coverage goes from bad to abysmal.

That said, I already floated dropping i486 support a couple of years
ago. If what you *really* want is "unconditional APIC support", then
that would be it, no?

So I don't like "force SMP" from a coverage standpoint. But if the
pain point is "we support machines that don't even have an APIC at
all", *that* I think we could just decide to do.

Hmm?

Anyway, the series looks good to me. I did have one reaction, but that
is probably due to my own confusion.

              Linus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ