lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9312d41b-9d84-4ff1-a33c-e4c2b496bd10@suse.cz>
Date: Mon, 14 Oct 2024 09:23:41 +0200
From: Vlastimil Babka <vbabka@...e.cz>
To: Julia Lawall <Julia.Lawall@...ia.fr>, linux-nfs@...r.kernel.org
Cc: kernel-janitors@...r.kernel.org, paulmck@...nel.org,
 Tom Talpey <tom@...pey.com>, Dai Ngo <Dai.Ngo@...cle.com>,
 Olga Kornievskaia <okorniev@...hat.com>, Neil Brown <neilb@...e.de>,
 linux-can@...r.kernel.org, bridge@...ts.linux.dev,
 b.a.t.m.a.n@...ts.open-mesh.org, linux-kernel@...r.kernel.org,
 wireguard@...ts.zx2c4.com, netdev@...r.kernel.org, ecryptfs@...r.kernel.org,
 linux-block@...r.kernel.org, Nicholas Piggin <npiggin@...il.com>,
 Christophe Leroy <christophe.leroy@...roup.eu>,
 Naveen N Rao <naveen@...nel.org>, Madhavan Srinivasan <maddy@...ux.ibm.com>,
 linuxppc-dev@...ts.ozlabs.org, kvm@...r.kernel.org,
 netfilter-devel@...r.kernel.org, coreteam@...filter.org
Subject: Re: [PATCH 00/17] replace call_rcu by kfree_rcu for simple
 kmem_cache_free callback

On 10/13/24 22:16, Julia Lawall wrote:
> Since SLOB was removed and since
> commit 6c6c47b063b5 ("mm, slab: call kvfree_rcu_barrier() from kmem_cache_destroy()"),
> it is not necessary to use call_rcu when the callback only performs
> kmem_cache_free. Use kfree_rcu() directly.
> 
> The changes were done using the following Coccinelle semantic patch.
> This semantic patch is designed to ignore cases where the callback
> function is used in another way.

Thanks, LGTM!

For the series:

Acked-by: Vlastimil Babka <vbabka@...e.cz>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ