lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 9 Aug 2007 09:30:28 -0400 From: Chris Snook <csnook@...hat.com> To: linux-kernel@...r.kernel.org, linux-arch@...r.kernel.org, torvalds@...ux-foundation.org Cc: netdev@...r.kernel.org, akpm@...ux-foundation.org, ak@...e.de, heiko.carstens@...ibm.com, davem@...emloft.net, schwidefsky@...ibm.com, wensong@...ux-vs.org, horms@...ge.net.au, wjiang@...ilience.com, cfriesen@...tel.com, zlynx@....org, rpjday@...dspring.com, jesper.juhl@...il.com Subject: [PATCH 2/24] make atomic_read() behave consistently on arm From: Chris Snook <csnook@...hat.com> Purify volatile use for atomic_t on arm. Signed-off-by: Chris Snook <csnook@...hat.com> --- linux-2.6.23-rc2-orig/include/asm-arm/atomic.h 2007-07-08 19:32:17.000000000 -0400 +++ linux-2.6.23-rc2/include/asm-arm/atomic.h 2007-08-09 06:30:40.000000000 -0400 @@ -14,13 +14,17 @@ #include <linux/compiler.h> #include <asm/system.h> -typedef struct { volatile int counter; } atomic_t; +typedef struct { int counter; } atomic_t; #define ATOMIC_INIT(i) { (i) } #ifdef __KERNEL__ -#define atomic_read(v) ((v)->counter) +/* + * Casting to volatile here minimizes the need for barriers, + * without having to declare the type itself as volatile. + */ +#define atomic_read(v) (*(volatile int *)&(v)->counter) #if __LINUX_ARM_ARCH__ >= 6 - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists