lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 13 Apr 2012 09:30:34 -0700 From: "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com> To: David Miller <davem@...emloft.net> Cc: mroos@...ux.ee, shemminger@...tta.com, linux-kernel@...r.kernel.org, netdev@...r.kernel.org Subject: Re: suspicious RCU usage warnings in 3.3.0 On Fri, Apr 13, 2012 at 10:55:56AM -0400, David Miller wrote: > From: "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com> > Date: Fri, 13 Apr 2012 06:35:13 -0700 > > DANGER WILL ROBINSON, McKenney is hacking sparc64 assembler! > :-)))) ;-) ;-) ;-) > > My main concern about my patch is my removal of this line: > > > > bne,pn %icc, __handle_softirq > > > > It is quite possible that this should instead change to look as follows: > > > > bne,pn %icc, __handle_preemption > > > > I would say it should not, because the __handle_softirq code path, > if taken, unconditionally branches to the very next instruction > after this branch and it's delay slot. Beginners luck beats skill. Now I just have to be very careful to avoid ever submitting a second sparc64 assembler patch. ;-) > > Anyway, patch with updated changelog below. > > Great work, I'll apply this after I test it out a bit myself. Cool!!! Thanx, Paul > Thanks a lot Paul! > -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists