lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20250205163303.6f45db37@gandalf.local.home>
Date: Wed, 5 Feb 2025 16:33:03 -0500
From: Steven Rostedt <rostedt@...dmis.org>
To: Prakash Sangappa <prakash.sangappa@...cle.com>
Cc: Joel Fernandes <joel@...lfernandes.org>, Peter Zijlstra
 <peterz@...radead.org>, "linux-kernel@...r.kernel.org"
 <linux-kernel@...r.kernel.org>, "linux-trace-kernel@...r.kernel.org"
 <linux-trace-kernel@...r.kernel.org>, Thomas Gleixner <tglx@...utronix.de>,
 Ankur Arora <ankur.a.arora@...cle.com>, Linus Torvalds
 <torvalds@...ux-foundation.org>, "linux-mm@...ck.org" <linux-mm@...ck.org>,
 "x86@...nel.org" <x86@...nel.org>, Andrew Morton
 <akpm@...ux-foundation.org>, "luto@...nel.org" <luto@...nel.org>,
 "bp@...en8.de" <bp@...en8.de>, "dave.hansen@...ux.intel.com"
 <dave.hansen@...ux.intel.com>, "hpa@...or.com" <hpa@...or.com>,
 "juri.lelli@...hat.com" <juri.lelli@...hat.com>,
 "vincent.guittot@...aro.org" <vincent.guittot@...aro.org>,
 "willy@...radead.org" <willy@...radead.org>, "mgorman@...e.de"
 <mgorman@...e.de>, "jon.grimm@....com" <jon.grimm@....com>,
 "bharata@....com" <bharata@....com>, "raghavendra.kt@....com"
 <raghavendra.kt@....com>, Boris Ostrovsky <boris.ostrovsky@...cle.com>,
 Konrad Wilk <konrad.wilk@...cle.com>, "jgross@...e.com" <jgross@...e.com>,
 "Andrew.Cooper3@...rix.com" <Andrew.Cooper3@...rix.com>, Vineeth Pillai
 <vineethrp@...gle.com>, Suleiman Souhlal <suleiman@...gle.com>, Ingo Molnar
 <mingo@...nel.org>, Mathieu Desnoyers <mathieu.desnoyers@...icios.com>,
 Clark Williams <clark.williams@...il.com>, "bigeasy@...utronix.de"
 <bigeasy@...utronix.de>, "daniel.wagner@...e.com" <daniel.wagner@...e.com>,
 Joseph Salisbury <joseph.salisbury@...cle.com>, "broonie@...il.com"
 <broonie@...il.com>
Subject: Re: [RFC][PATCH 1/2] sched: Extended scheduler time slice

On Wed, 5 Feb 2025 16:19:45 -0500
Steven Rostedt <rostedt@...dmis.org> wrote:

> On Wed, 5 Feb 2025 21:08:47 +0000
> Prakash Sangappa <prakash.sangappa@...cle.com> wrote:
> 
> > The new syscall/API proposed was to provide per thread shared mapped 
> > area(shared structure) that are allocated from memory pages that are pinned. 
> > So the kernel could access it without the need for a copyin/copyout. 
> > 
> > The idea is that it would be helpful in places where we cannot take a page 
> > fault in the kernel codepath.  
> 
> What places do we need to decided this in a critical path? If we follow my
> proposal, where we set NEED_RESCHED_LAZY on sched_tick when it interrupts
> user space, then it should all work out.

Actually, it doesn't need to be pinned for kernel critical paths (like an
interrupt handler). That's because when entering the user critical path, it
writes to the location, which will fault that memory in. If the page isn't
there when the kernel accesses it, it most likely means the task isn't in a
critical section and there's no reason to extend the tick.

-- Steve

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ