lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 12 Mar 2019 11:03:55 -0700
From:   Vineet Gupta <vineet.gupta1@...opsys.com>
To:     Valentin Schneider <valentin.schneider@....com>,
        <linux-kernel@...r.kernel.org>
CC:     Julien Thierry <julien.thierry@....com>,
        Ingo Molnar <mingo@...hat.com>,
        Peter Zijlstra <peterz@...radead.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        <linux-xtensa@...ux-xtensa.org>, <x86@...nel.org>,
        <sparclinux@...r.kernel.org>, <linux-sh@...r.kernel.org>,
        <linux-riscv@...ts.infradead.org>, <linuxppc-dev@...ts.ozlabs.org>,
        <linux-mips@...r.kernel.org>,
        <uclinux-h8-devel@...ts.sourceforge.jp>,
        <linux-c6x-dev@...ux-c6x.org>, <linux-ia64@...r.kernel.org>,
        <linux-s390@...r.kernel.org>, <linux-snps-arc@...ts.infradead.org>,
        <linux-m68k@...ts.linux-m68k.org>,
        <nios2-dev@...ts.rocketboards.org>
Subject: Re: [PATCH 00/14] entry: preempt_schedule_irq() callers scrub

On 3/11/19 3:47 PM, Valentin Schneider wrote:
> Hi,
> 
> This is the continuation of [1] where I'm hunting down
> preempt_schedule_irq() callers because of [2].
> 
> I told myself the best way to get this moving forward wouldn't be to write
> doc about it, but to go write some fixes and get some discussions going,
> which is what this patch-set is about.
> 
> I've looked at users of preempt_schedule_irq(), and made sure they didn't
> have one of those useless loops. The list of offenders is:
> 
> $ grep -r -I "preempt_schedule_irq" arch/ | cut -d/ -f2 | sort | uniq
> 
...

> 
> Regarding that loop, archs seem to fall in 3 categories:
> A) Those that don't have the loop

Please clarify that this is the right thing to do (since core code already has the
loop) hence no fixing is required for this "category"

> B) Those that have a small need_resched() loop around the
>    preempt_schedule_irq() callsite
> C) Those that branch to some more generic code further up the entry code
>    and eventually branch back to preempt_schedule_irq()
> 
> arc, m68k, nios2 fall in A)

> sparc, ia64, s390 fall in C)
> all the others fall in B)
> 
> I've written patches for B) and C) EXCEPT for ia64 and s390 because I
> haven't been able to tell if it's actually fine to kill that "long jump"
> (and maybe I'm wrong on sparc). Hopefully folks who understand what goes on
> in there might be able to shed some light.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ