lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAhV-H4AYtOBtnPp5Y87tfrKNJU2NDM9yqONkKpAHmGNy-xhkg@mail.gmail.com>
Date: Tue, 20 Jan 2026 21:01:31 +0800
From: Huacai Chen <chenhuacai@...nel.org>
To: Tiezhu Yang <yangtiezhu@...ngson.cn>
Cc: loongarch@...ts.linux.dev, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v1 2/4] LoongArch: Handle percpu handler address in bt_address()

On Tue, Jan 20, 2026 at 8:57 PM Tiezhu Yang <yangtiezhu@...ngson.cn> wrote:
>
> On 2026/1/20 下午8:04, Huacai Chen wrote:
> > Hi, Tiezhu,
> >
> > On Tue, Jan 20, 2026 at 5:23 PM Tiezhu Yang <yangtiezhu@...ngson.cn> wrote:
> >>
> >> After commit 4cd641a79e69 ("LoongArch: Remove unnecessary checks for
> >> ORC unwinder"), the system can not boot normally under some configs,
> >> there are many error messages "cannot find unwind pc at".
>
> ...
>
> >> +#if defined(CONFIG_NUMA) && !defined(CONFIG_PREEMPT_RT)
> >> +       for (int cpu = 1; cpu < num_possible_cpus(); cpu++) {
> > Use nr_cpu_ids instead of num_possible_cpus() can improve performance a little.
> >
> >> +               int vec_sz = sizeof(exception_handlers);
> >> +
> > It is better to add "if (!pcpu_handlers[cpu]) continue" here.
>
> If so, it can use for_each_possible_cpu(cpu) directly?
It can, but I remember you want to skip CPU 0?

Huacai

>
> Thanks,
> Tiezhu
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ