lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <Pine.LNX.4.44L0.1709181458420.1806-100000@iolanthe.rowland.org> Date: Mon, 18 Sep 2017 15:04:21 -0400 (EDT) From: Alan Stern <stern@...land.harvard.edu> To: "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com> cc: peterz@...radead.org, <mathieu.desnoyers@...icios.com>, <will.deacon@....com>, <luto@...nel.org>, <mpe@...erman.id.au>, <linux-kernel@...r.kernel.org>, <linux-arch@...r.kernel.org>, <davejwatson@...com>, <maged.michael@...il.com> Subject: Re: Rough notes from sys_membarrier() lightning BoF On Sun, 17 Sep 2017, Paul E. McKenney wrote: > Hello! > > Rough notes from our discussion last Thursday. Please reply to the > group with any needed elaborations or corrections. > > Adding Andy and Michael on CC since this most closely affects their > architectures. Also adding Dave Watson and Maged Michael because > the preferred approach requires that processes wanting to use the > lightweight sys_membarrier() do a registration step. > > Thanx, Paul > > ------------------------------------------------------------------------ > > Problem: > > 1. The current sys_membarrier() introduces an smp_mb() that > is not otherwise required on powerpc. > > 2. The envisioned JIT variant of sys_membarrier() assumes that > the return-to-user instruction sequence handling any change > to the usermode instruction stream, and Andy Lutomirski's > upcoming changes invalidate this assumption. It is believed > that powerpc has a similar issue. > E. Require that threads register before using sys_membarrier() for > private or JIT usage. (The historical implementation using > synchronize_sched() would continue to -not- require registration, > both for compatibility and because there is no need to do so.) > > For x86 and powerpc, this registration would set a TIF flag > on all of the current process's threads. This flag would be > inherited by any later thread creation within that process, and > would be cleared by fork() and exec(). When this TIF flag is set, Why a TIF flag, and why clear it during fork()? If a process registers to use private expedited sys_membarrier, shouldn't that apply to threads it will create in the future just as much as to threads it has already created? > the return-to-user path would execute additional code that would > ensure that ordering and newly JITed code was handled correctly. > We believe that checks for these TIF flags could be combined with > existing checks to avoid adding any overhead in the common case > where the process was not using these sys_membarrier() features. > > For all other architecture, the registration step would be > a no-op. Don't we want to fail private expedited sys_membarrier calls if the process hasn't registered for them? This requires the registration call to set a flag for the process, even on architectures where no additional memory barriers are actually needed. It can't be a no-op. Alan Stern
Powered by blists - more mailing lists