lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 8 Apr 2020 13:05:01 +0200 From: Peter Zijlstra <peterz@...radead.org> To: Ankur Arora <ankur.a.arora@...cle.com> Cc: linux-kernel@...r.kernel.org, x86@...nel.org, hpa@...or.com, jpoimboe@...hat.com, namit@...are.com, mhiramat@...nel.org, jgross@...e.com, bp@...en8.de, vkuznets@...hat.com, pbonzini@...hat.com, boris.ostrovsky@...cle.com, mihai.carabas@...cle.com, kvm@...r.kernel.org, xen-devel@...ts.xenproject.org, virtualization@...ts.linux-foundation.org Subject: Re: [RFC PATCH 09/26] x86/paravirt: Add runtime_patch() On Tue, Apr 07, 2020 at 10:03:06PM -0700, Ankur Arora wrote: > +/* > + * preempt_enable_no_resched() so we don't add any preemption points until > + * after the caller has returned. > + */ > +#define preempt_enable_runtime_patch() preempt_enable_no_resched() > +#define preempt_disable_runtime_patch() preempt_disable() NAK, this is probably a stright preemption bug, also, afaict, there aren't actually any users of this in the patch-set.
Powered by blists - more mailing lists