lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 11 May 2007 22:56:45 +0100 From: Alan Cox <alan@...rguk.ukuu.org.uk> To: Mathieu Desnoyers <mathieu.desnoyers@...ymtl.ca> Cc: Andi Kleen <ak@....de>, systemtap@...rces.redhat.com, prasanna@...ibm.com, ananth@...ibm.com, anil.s.keshavamurthy@...el.com, akpm@...ux-foundation.org, linux-kernel@...r.kernel.org, hch@...radead.org Subject: Re: [patch 05/10] Linux Kernel Markers - i386 optimized version > The IPI might be fast, but I have seen interrupts being disabled for > quite a long time in some kernel code paths. Having interrupts disabled > on _each cpu_ while running an IPI handler waiting to be synchronized > with other CPUs has this side-effect. Therefore, if I understand well, This can already occur worst case when we spin on an IPI (eg a cross CPU TLB shootdown) If the INT3 is acknowledged as safe by intel either as is or by some specific usage like lock mov then great. If not it isn't too bad a problem. And to be real about this - how many benchmarks do you know that care about mega-kernel-debugs per second ? - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists