lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20061129235407.7295c31d.akpm@osdl.org>
Date:	Wed, 29 Nov 2006 23:54:07 -0800
From:	Andrew Morton <akpm@...l.org>
To:	Ingo Molnar <mingo@...hat.com>
Cc:	Randy Dunlap <randy.dunlap@...cle.com>,
	lkml <linux-kernel@...r.kernel.org>, ak@...e.de
Subject: Re: [PATCH -mm] x86_64 UP needs smp_call_function_single

On Thu, 30 Nov 2006 08:00:00 +0100
Ingo Molnar <mingo@...hat.com> wrote:

> On Wed, 2006-11-29 at 17:45 -0800, Andrew Morton wrote:
> > No, I think this patch is right - the declaration of the CONFIG_SMP
> > smp_call_function_single() is in linux/smp.h so the !CONFIG_SMP
> > declaration
> > or definition should be there too.
> > 
> > It's still buggy though.  It should disable local interrupts around
> > the
> > call to match the SMP version.  I'll fix that separately. 
> 
> hm, didnt i send an updated patch for that already? See the patch below,
> from many days ago. I sent it after the tsc-sync-rewrite patch.
> 

Might have got lost.

> --------------->
> Subject: x86_64: build fixes
> From: Ingo Molnar <mingo@...e.hu>
> 
> x86_64 does not build cleanly on UP:
> 
> arch/x86_64/kernel/vsyscall.c: In function 'cpu_vsyscall_notifier':
> arch/x86_64/kernel/vsyscall.c:282: warning: implicit declaration of
> function 'smp_call_function_single'
> arch/x86_64/kernel/vsyscall.c: At top level:
> arch/x86_64/kernel/vsyscall.c:279: warning: 'cpu_vsyscall_notifier'
> defined but not used
> 
> this patch fixes it by making smp_call_function_single() globally
> available.
> 
> Signed-off-by: Ingo Molnar <mingo@...e.hu>
> ---
>  include/asm-x86_64/smp.h |   11 ++---------
>  include/linux/smp.h      |   10 +++++++---
>  kernel/sched.c           |   19 +++++++++++++++++++
>  3 files changed, 28 insertions(+), 12 deletions(-)
> 
> Index: linux/include/asm-x86_64/smp.h
> ===================================================================
> --- linux.orig/include/asm-x86_64/smp.h
> +++ linux/include/asm-x86_64/smp.h
> @@ -115,16 +115,9 @@ static __inline int logical_smp_processo
>  }
>  
>  #ifdef CONFIG_SMP
> -#define cpu_physical_id(cpu)		x86_cpu_to_apicid[cpu]
> +# define cpu_physical_id(cpu)		x86_cpu_to_apicid[cpu]
>  #else
> -#define cpu_physical_id(cpu)		boot_cpu_id
> -static inline int smp_call_function_single(int cpuid, void (*func)
> (void *info),

congratulations-your-first-wordwrapped-patch ;)

> --- linux.orig/kernel/sched.c
> +++ linux/kernel/sched.c
> @@ -1110,6 +1110,25 @@ repeat:
>  	task_rq_unlock(rq, &flags);
>  }
>  
> +#ifndef CONFIG_SMP
> +/*
> + * Call a function on a specific CPU (on UP the function gets executed
> + * on the current CPU, immediately):
> + */
> +int smp_call_function_single(int cpuid, void (*func) (void *info), void
> *info,
> +			     int retry, int wait)
> +{
> +	unsigned long flags;
> +
> +	local_irq_save(flags);
> +	func(info);
> +	local_irq_restore(flags);
> +
> +	return 0;
> +}

yes, but a) calling the SMP version with local interrupts disabled is a
bug, so we can use bare local_irq_disable() here and b) only two
archictures call or use this function, so all the others don't want a copy
of it.

So I did:

--- a/include/linux/smp.h~up-smp_call_function_single-should-disable-interrupts
+++ a/include/linux/smp.h
@@ -15,6 +15,7 @@ extern void cpu_idle(void);
 #include <linux/kernel.h>
 #include <linux/compiler.h>
 #include <linux/thread_info.h>
+#include <linux/irqflags.h>
 #include <asm/smp.h>
 
 /*
@@ -102,8 +103,9 @@ static inline void smp_send_reschedule(i
 static inline int smp_call_function_single(int cpuid, void (*func) (void *info),
 				void *info, int retry, int wait)
 {
-	/* Disable interrupts here? */
+	local_irq_disable();	/* Match the SMP call environment */
 	func(info);
+	local_irq_enable();
 	return 0;
 }
 
_

which is somewhat unpleasant.  I added a WARN_ON(irqs_disabled()) to the
out-of-line SMP version.


btw, does anyone know why the SMP versions of this function use
spin_lock_bh(&call_lock)?

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ