lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Y95yhJgNq8lMXPdF@rowland.harvard.edu>
Date:   Sat, 4 Feb 2023 09:58:12 -0500
From:   Alan Stern <stern@...land.harvard.edu>
To:     "Paul E. McKenney" <paulmck@...nel.org>
Cc:     linux-kernel@...r.kernel.org, linux-arch@...r.kernel.org,
        kernel-team@...a.com, mingo@...nel.org, parri.andrea@...il.com,
        will@...nel.org, peterz@...radead.org, boqun.feng@...il.com,
        npiggin@...il.com, dhowells@...hat.com, j.alglave@....ac.uk,
        luc.maranget@...ia.fr, akiyks@...il.com
Subject: Re: Current LKMM patch disposition

On Fri, Feb 03, 2023 at 05:49:41PM -0800, Paul E. McKenney wrote:
> On Fri, Feb 03, 2023 at 08:28:35PM -0500, Alan Stern wrote:
> > On Fri, Feb 03, 2023 at 04:48:43PM -0800, Paul E. McKenney wrote:
> > > Hello!
> > > 
> > > Here is what I currently have for LKMM patches:
> > > 
> > > 289e1c89217d4 ("locking/memory-barriers.txt: Improve documentation for writel() example")
> > > ebd50e2947de9 ("tools: memory-model: Add rmw-sequences to the LKMM")
> > > aae0c8a50d6d3 ("Documentation: Fixed a typo in atomic_t.txt")
> > > 9ba7d3b3b826e ("tools: memory-model: Make plain accesses carry dependencies")
> > > 
> > > 	Queued for the upcoming (v6.3) merge window.
> > > 
> > > c7637e2a8a27 ("tools/memory-model: Update some warning labels")
> > > 7862199d4df2 ("tools/memory-model: Unify UNLOCK+LOCK pairings to po-unlock-lock-")
> > > 
> > > 	Are ready for the next (v6.4) merge window.  If there is some
> > > 	reason that they should instead go into v6.3, please let us
> > > 	all know.
> > > 
> > > a6cd5214b5ba ("tools/memory-model: Document LKMM test procedure")
> > > 
> > > 	This goes onto the lkmm-dev pile because it is documenting how
> > > 	to use those scripts.
> > > 
> > > https://lore.kernel.org/lkml/Y9GPVnK6lQbY6vCK@rowland.harvard.edu/
> > > https://lore.kernel.org/lkml/20230126134604.2160-3-jonas.oberhauser@huaweicloud.com
> > > https://lore.kernel.org/lkml/20230203201913.2555494-1-joel@joelfernandes.org/
> > > 5d871b280e7f ("tools/memory-model: Add smp_mb__after_srcu_read_unlock()")
> > > 
> > > 	These need review and perhaps further adjustment.
> > > 
> > > So, am I missing any?  Are there any that need to be redirected?
> > 
> > The "Provide exact semantics for SRCU" patch should have:
> > 
> > 	Portions suggested by Boqun Feng and Jonas Oberhauser.
> > 
> > added at the end, together with your Reported-by: tag.  With that, I 
> > think it can be queued for 6.4.
> 
> Thank you!  Does the patch shown below work for you?
> 
> (I have tentatively queued this, but can easily adjust or replace it.)

It looks fine.

Alan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ