lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3fd74c08-2950-46a9-a191-a635f379a8f7@arm.com>
Date: Tue, 5 Aug 2025 16:06:40 +0100
From: Ada Couprie Diaz <ada.coupriediaz@....com>
To: Jinjie Ruan <ruanjinjie@...wei.com>
Cc: Ada Couprie Diaz <ada.coupriediaz@....com>, will@...nel.org,
 oleg@...hat.com, sstabellini@...nel.org, mark.rutland@....com,
 puranjay@...nel.org, broonie@...nel.org, mbenes@...e.cz,
 ryan.roberts@....com, akpm@...ux-foundation.org, chenl311@...natelecom.cn,
 anshuman.khandual@....com, kristina.martsenko@....com,
 liaochang1@...wei.com, ardb@...nel.org, leitao@...ian.org,
 linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org,
 xen-devel@...ts.xenproject.org, catalin.marinas@....com
Subject: Re: [PATCH -next v7 4/7] arm64: entry: Use preempt_count() and
 need_resched() helper

On 29/07/2025 02:54, Jinjie Ruan wrote:

> The generic entry code uses preempt_count() and need_resched() helpers to
> check if it should do preempt_schedule_irq(). Currently, arm64 use its own
> check logic, that is "READ_ONCE(current_thread_info()->preempt_count == 0",
> which is equivalent to "preempt_count() == 0 && need_resched()".
>
> In preparation for moving arm64 over to the generic entry code, use
> these helpers to replace arm64's own code and move it ahead.
>
> No functional changes.
>
> Signed-off-by: Jinjie Ruan <ruanjinjie@...wei.com>
> ---
Reviewed-by: Ada Couprie Diaz <ada.coupriediaz@....com>


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ