lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20071018063157.GA1694@ff.dom.local> Date: Thu, 18 Oct 2007 08:31:57 +0200 From: Jarek Poplawski <jarkao2@...pl> To: "Maciej W\. Rozycki" <macro@...ux-mips.org> Cc: Andy Fleming <afleming@...escale.com>, Andrew Morton <akpm@...ux-foundation.org>, Jeff Garzik <jgarzik@...ox.com>, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH] PHYLIB: IRQ event workqueue handling fixes On Wed, Oct 17, 2007 at 10:58:09AM +0200, Jarek Poplawski wrote: ... > 8) phy_stop_interrupts(): I'm not sure this additional call from > DEBUG_SHIRQ should be so dangerous, eg.: > > /* > * status == PHY_HALTED && > * interrupts are stopped after phy_stop() > */ > if (cancel_work_sync(...)) > enable_irq(); > > free_irq(...); > /* > * possible schedule_work() from DEBUG_SHIRQ only, > * but proper check for PHY_HALTED is done; > * so, let's flush after this too: > */ > cancel_work_sync(); After rethinking, it looks like this last cancel should be useless. So, if phy_interrupt() schedules only if !PHY_HALTED and phy_change() does enable_irq() with no exeptions, it seems phy_interrupt() even without lock must see PHY_HALTED state before this free_irq() with possible DEBUG_SHIRQ call, then maybe only this safety: WARN_ON(work_pending(&phydev->phy_queue)); Btw, I've read this was considered and not liked, but IMHO, if this really has to be like this, creating phy's own workqueue seems to be resonable, at the very least to reduce latencies to other users of this irq. Jarek P. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists