lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Thu, 22 Jul 2021 16:48:43 -0500
From:   Bjorn Helgaas <helgaas@...nel.org>
To:     Thomas Gleixner <tglx@...utronix.de>
Cc:     LKML <linux-kernel@...r.kernel.org>,
        Alex Williamson <alex.williamson@...hat.com>,
        "Raj, Ashok" <ashok.raj@...el.com>,
        Bjorn Helgaas <bhelgaas@...gle.com>, linux-pci@...r.kernel.org,
        "David S. Miller" <davem@...emloft.net>,
        Kevin Tian <kevin.tian@...el.com>,
        Marc Zyngier <maz@...nel.org>, Ingo Molnar <mingo@...nel.org>,
        x86@...nel.org
Subject: Re: [patch 4/8] PCI/MSI: Enforce MSI[X] entry updates to be visible

On Wed, Jul 21, 2021 at 09:11:30PM +0200, Thomas Gleixner wrote:
> Nothing enforces the posted writes to be visible when the function
> returns. Flush them even if the flush might be redundant when the entry is
> masked already as the unmask will flush as well. This is either setup or a
> rare affinity change event so the extra flush is not the end of the world.
> 
> While this is more a theoretical issue especially the X86 MSI affinity
> stter mechanism relies on the assumption that the update has reached the

stter?

> hardware when the function returns.
> 
> Again, as this never has been enfocred the Fixes tag refers to a commit in:

s/enfocred/enforced/

>    git://git.kernel.org/pub/scm/linux/kernel/git/tglx/history.git

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ