lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTikGe3D-ujM9jqcOtk1cGmtLtUiV3kMkam1N8fyM@mail.gmail.com>
Date:	Wed, 29 Dec 2010 22:42:36 +0800
From:	Hillf Danton <dhillf@...il.com>
To:	Arnd Bergmann <arnd@...db.de>
Cc:	Daniel Walker <dwalker@...eaurora.org>,
	linux-kernel@...r.kernel.org, Mike Christie <michaelc@...wisc.edu>
Subject: Re: [PATCH v0] add nano semaphore in kernel

On Wed, Dec 29, 2010 at 7:47 PM, Arnd Bergmann <arnd@...db.de> wrote:
> On Tuesday 28 December 2010 16:51:30 Daniel Walker wrote:
>> We for sure don't want new semaphores, or new semaphore usage in the
>> kernel ..

Would you please, Daniel, explain why there are so my file systems under
the fs directory? Would you think the ext file system is better than others?

And why there are in kernel spin lock, read/write lock, mutex, rw_mutex,
rtmutx, and semaphore, timer and hrtimer?

Could timer be removed tonight?

>
> Yes. I once even tried unifying the semaphore and rwsem implementation,
> but gave up on that for a number of reasons.

It looks hard to change rwsem, almost impossible, since it is based upon
asm, at least under the x86 dir.

>
>> It should also be noted that the rtmutex (kernel/rtmutex.c) already has
>> this capability. Although I don't think you can use an rtmutex from
>> inside the kernel.
>
> I wasn't aware we had already grown another one ;-)
>
> AFAICT, you can only use it inside of the kernel, but it's very
> specific and I wouldn't recommend using it unless a regular mutex
> cannot be used for some reason. The only user besides the futex
> code seems to be the i2c layer at this moment.
>
>> If you really want this you should look into the rtmutex, and the
>> regular mutex API's .
>

But greping "struct semaphore" include/linux and fs dirs may tell us
more about semaphore.

> If Hillf relies on counting semaphores, that won't work, but very
> few such users exist in code outside of textbooks.
>

Though capable in rtmutex, why mutex should no longer stay in Kernel?

However mutex could be changed based on hrtimer if needed for some reason.

Thanks
Hillf
---

--- a/kernel/mutex.c	2010-11-01 19:54:12.000000000 +0800
+++ b/kernel/mutex.c	2010-12-29 22:35:40.000000000 +0800
@@ -23,6 +23,7 @@
 #include <linux/spinlock.h>
 #include <linux/interrupt.h>
 #include <linux/debug_locks.h>
+#include <linux/hrtimer.h>

 /*
  * In the DEBUG case we are using the "NULL fastpath" for mutexes,
@@ -248,7 +249,11 @@ __mutex_lock_common(struct mutex *lock,
 		/* didnt get the lock, go to sleep: */
 		spin_unlock_mutex(&lock->wait_lock, flags);
 		preempt_enable_no_resched();
-		schedule();
+		do {
+			/* sleep 10,000 nanoseconds per loop */
+			ktime_t kt = ktime_set(0, 10000);
+			schedule_hrtimeout(&kt, HRTIMER_MODE_REL);
+		} while (0);
 		preempt_disable();
 		spin_lock_mutex(&lock->wait_lock, flags);
 	}
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ