Received: by 2002:a05:7412:3b8b:b0:fc:a2b0:25d7 with SMTP id nd11csp2519670rdb; Mon, 12 Feb 2024 07:29:25 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCUQ4O9qurMPTqkuNlX9YQJ6wh3rucuF+yR30lxL7hIfhDgsPYdORsmd1YZodB/TPOk+5EsHF231TfrkR/EbHA5O5VLqbP7HRvECUvM8rg== X-Google-Smtp-Source: AGHT+IFCNvBjo9XUWp242WTFQseqvkK49DLYkeJy2d9ceNch162Wfe8annBhpTpSJez8wtYfYHUx X-Received: by 2002:a17:906:80d9:b0:a38:86dd:40fe with SMTP id a25-20020a17090680d900b00a3886dd40femr5126239ejx.45.1707751765048; Mon, 12 Feb 2024 07:29:25 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1707751765; cv=pass; d=google.com; s=arc-20160816; b=biht3MQL4Y8+oFKI1o/KrI+hLVX1VDuCqfcY45w23xhWh22Rdh7tatCwg10uI6Cbha bET+yD9xyhzL6OYfJ5T6ybUVtgYDJQWRTOtNNK7opX8F+FSw/L6wgLkkKQH8m6oBuIim UD6AireXahPzYIgPhh+ZnYpmwLezf8YHL36axdxHwXPmvEf8Zm/sP/5tWeY2FcsZ7vgZ AU0u8znx2xDCmgBstE/2RuWg3hfUN3A3WnSVFvGB8h2Furyk8CIqI3RpBOf5wfwJA6Jb 9C0WaJrruQIB1V3ETMgLp70ys1jMZSfQzfaUuh5kwlvxLtcvDUce9kRGbi1QUWci7B+a +4dQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=mime-version:list-unsubscribe:list-subscribe:list-id:precedence :message-id:date:references:in-reply-to:subject:cc:to:dkim-signature :dkim-signature:from; bh=Qfa+Vc3Opo+abjgP5jdi0ejQEzHaPAQ8vWcobW8B9C0=; fh=TwAq1OIBeHuw0dvCx1Ep/rLuCdV5h9mBSmwf/Q8WEJI=; b=Hc2QKW6Poyn5XXmFgAVYq6L249/QV/OWyF2J9pUUbfAtXz2h3g39mtsVdkuWbdVHep QQQ7Q/tWgNN5+OgWM7TWMs3YCFSRLQZlNLu90HtGGZtBihKuu+gCW9fVrrZqZS4lm5wt kaaIGWXgMkAqrYEraE9WzcWP4g9PbZmsMUDvWs3g6sqVToWWTc+eeOAsa72lFlc33Feq u9HdptH1/cQFzj3O/C+kMK3bmo1HVCez3KHAQ1RS6majg/htg6xt+lYFMyg4sgoJojcZ EtEtFem2HjnM5iDhkk8jgPoybDNAiSWoqVTToi+YDkTmbqmJdqQ2HkVQGmmQEq2RuvzN DfqA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=sk0chBn7; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e; arc=pass (i=1 spf=pass spfdomain=linutronix.de dkim=pass dkdomain=linutronix.de dmarc=pass fromdomain=linutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-61895-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-61895-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de X-Forwarded-Encrypted: i=2; AJvYcCXuFWUuGbJxtxJ6b3qZl4XFMGGFit1rypCu0MBAzVDsbYehTmLrQVGqyHTN1jSKBaaO7KIn7h6HYbIKxcnigDgz7Lwg6pXxSYXghTVlTw== Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id p17-20020a17090635d100b00a3bc054b5d4si291312ejb.187.2024.02.12.07.29.24 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 12 Feb 2024 07:29:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-61895-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@linutronix.de header.s=2020 header.b=sk0chBn7; dkim=neutral (no key) header.i=@linutronix.de header.s=2020e; arc=pass (i=1 spf=pass spfdomain=linutronix.de dkim=pass dkdomain=linutronix.de dmarc=pass fromdomain=linutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-61895-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-61895-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=linutronix.de Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id 89B101F23287 for ; Mon, 12 Feb 2024 15:29:24 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3A51E3C48F; Mon, 12 Feb 2024 15:29:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="sk0chBn7"; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b="Du8faCBH" Received: from galois.linutronix.de (Galois.linutronix.de [193.142.43.55]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 05F503C46E for ; Mon, 12 Feb 2024 15:29:04 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=193.142.43.55 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707751746; cv=none; b=t/RaL8+w6bM5P2XRYdE/U1S6/Jd4VGNBW+D0q7sEuKtwGVA71TCzJwG2BN4Wm6rZKxd0VC5oPHUs+Io/gu5QVh86IYr5SLwDx7Q7XL1Z3DgWe7z8aeR2EFIZ4zj2C7sBFDUo7WcaKuFa8CE7BrlXj0meYwCP79+F5c64G/DJfC0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1707751746; c=relaxed/simple; bh=nrB0gDKCmX4hhmWjOWSE8Yzd5XrmRW9wIK9Swz1F3gY=; h=From:To:Cc:Subject:In-Reply-To:References:Date:Message-ID: MIME-Version:Content-Type; b=a68XPdyjzNWgc2kS3sRyyOae5kYlXm8F3uVkcJgeZPN5jZ9eMsVtpgrk3al28KEwSk34AXQDqbvPeQdyzGc72XSvFgjCwdRniZEI3oUA8SnjOJv1rNUMaEz0uuac5d7VIuAvJgoFQ25ARH6Wdzoyt6RC52Xd4tqDn8CflnRl3Ts= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de; spf=pass smtp.mailfrom=linutronix.de; dkim=pass (2048-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=sk0chBn7; dkim=permerror (0-bit key) header.d=linutronix.de header.i=@linutronix.de header.b=Du8faCBH; arc=none smtp.client-ip=193.142.43.55 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=linutronix.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=linutronix.de From: Thomas Gleixner DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020; t=1707751743; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Qfa+Vc3Opo+abjgP5jdi0ejQEzHaPAQ8vWcobW8B9C0=; b=sk0chBn7MhvFWWuDx7lrGGqw4N3jw3BQ3yDzRHTo33oscDHkQS9soRZzdu+AMhYSfFpdqe k4AQOIp6eT1+oX4LdzxC6wC/aByQE/Tg/Y3UxszBx5Y6xjjfvYYIZpXeXWIBeKVPawiH+p pTwCR7d98Rt9zaqmY5h18aMVNfPCKv4AtcJ5XiDS+tqvp4LphxGl7qR9d9BvzCmmVgZ9EZ bs84zPUjlrFj34YndxPZ2GQpvdFeqiAhwJhlbRTaNBNWrlZZEPZhotl5P9o3YpIQ7sctxx v+p75tCy3+ji8gP8hxGg1tehpaHaVaF2JTCVY7fJ8zNCB7GjDioK3xYwrChDWw== DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=linutronix.de; s=2020e; t=1707751743; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Qfa+Vc3Opo+abjgP5jdi0ejQEzHaPAQ8vWcobW8B9C0=; b=Du8faCBHRAe9eFDNxHmF6hsN2yqeRIq46phEXwJhMJoERpYoQ7JiLrFGMcOf/43bTlVPaA SlUO+MwYPzb+ZqAA== To: Marcelo Tosatti Cc: linux-kernel@vger.kernel.org, Daniel Bristot de Oliveira , Juri Lelli , Valentin Schneider , Frederic Weisbecker , Leonardo Bras , Peter Zijlstra Subject: Re: [patch 05/12] timekeeping_notify: use stop_machine_fail when appropriate In-Reply-To: References: <20240206184911.248214633@redhat.com> <20240206185709.955049547@redhat.com> <87h6ikmqqo.ffs@tglx> <87zfwbkmi9.ffs@tglx> Date: Mon, 12 Feb 2024 16:29:02 +0100 Message-ID: <87wmr9k8g1.ffs@tglx> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain On Fri, Feb 09 2024 at 12:30, Marcelo Tosatti wrote: > On Thu, Feb 08, 2024 at 04:23:58PM +0100, Thomas Gleixner wrote: > So while I understand your point that root can (and should be) > able to perform any operations on the system, this interface would > be along the lines of: > > "I don't want isolated CPUs to be interrupted, but i am not aware of > which kernel interfaces can result in interruptions to isolated CPUs. > > Lets indicate through this cpumask, which the kernel can consult, > that we'd like userspace operations to fail, if they were going > to interrupt an isolated CPU". > > Its the kernel that knows which operations might interrupt > isolated CPUs, not userspace. Right, but you cannot just throw a CPU mask in and decide that it will work for everything. As I explained to you before, these interfaces cannot be treated in the same way just because they might end up in a SMP function call. You are definining a binary all or nothing policy which is the worst thing you can do, because it prevents any fine grained decision and in case an interface is needed for a particular operation it requires to open up the gates for everything. Works for me and scratches my itch are not really valid engineering principles. Not to talk about the blind replacement of the SMP function call which causes inconsistent state as I pointed out to you. Thanks tglx