lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 1 Aug 2015 19:18:20 +0200 From: Peter Zijlstra <peterz@...radead.org> To: Andrey Konovalov <andreyknvl@...gle.com> Cc: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, "H. Peter Anvin" <hpa@...or.com>, x86@...nel.org, "David S. Miller" <davem@...emloft.net>, Alexander Duyck <alexander.h.duyck@...hat.com>, Borislav Petkov <bp@...e.de>, linux-kernel@...r.kernel.org, Dmitry Vyukov <dvyukov@...gle.com> Subject: Re: [PATCH] x86: use WRITE_ONCE/READ_ONCE in smp_store_release/smp_load_acquire On Sat, Aug 01, 2015 at 06:45:34PM +0200, Andrey Konovalov wrote: > Replace ACCESS_ONCE() macro in smp_store_release() and smp_load_acquire() > from arch/x86/include/asm/barrier.h with WRITE_ONCE() and READ_ONCE() since > ACCESS_ONCE does not work reliably on non-scalar types. > > WRITE_ONCE() and READ_ONCE() were introduced in the commits 230fa253df63 > ("kernel: Provide READ_ONCE and ASSIGN_ONCE") and 43239cbe79fc ("kernel: > Change ASSIGN_ONCE(val, x) to WRITE_ONCE(x, val)"). Please do all relevant archs. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists