lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20160524142723.178148277@infradead.org> Date: Tue, 24 May 2016 16:27:23 +0200 From: Peter Zijlstra <peterz@...radead.org> To: linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org, manfred@...orfullife.com, dave@...olabs.net, paulmck@...ux.vnet.ibm.com, will.deacon@....com Cc: boqun.feng@...il.com, Waiman.Long@....com, tj@...nel.org, pablo@...filter.org, kaber@...sh.net, davem@...emloft.net, oleg@...hat.com, netfilter-devel@...r.kernel.org, sasha.levin@...cle.com, hofrat@...dl.org Subject: [RFC][PATCH 0/3] spin_unlock_wait and assorted borkage As per recent discussions spin_unlock_wait() has an unintuitive 'feature'. lkml.kernel.org/r/20160520053926.GC31084@...ux-uzut.site These patches pull the existing solution into generic code; annotate all spin_unlock_wait() users and fix nf_conntrack more. The alternative -- putting smp_acquire__after_ctrl_dep() into spin_unlock_wait() can be done later if desired, now that al users are audited and corrected. Please (very) carefully consider.
Powered by blists - more mailing lists