lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 20 Aug 2007 09:38:13 -0400 From: Chris Snook <csnook@...hat.com> To: Herbert Xu <herbert.xu@...hat.com> CC: Linus Torvalds <torvalds@...ux-foundation.org>, Nick Piggin <piggin@...erone.com.au>, Satyam Sharma <satyam@...radead.org>, Paul Mackerras <paulus@...ba.org>, Christoph Lameter <clameter@....com>, Ilpo Jarvinen <ilpo.jarvinen@...sinki.fi>, "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>, Stefan Richter <stefanr@...6.in-berlin.de>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, linux-arch@...r.kernel.org, Netdev <netdev@...r.kernel.org>, Andrew Morton <akpm@...ux-foundation.org>, ak@...e.de, heiko.carstens@...ibm.com, David Miller <davem@...emloft.net>, schwidefsky@...ibm.com, wensong@...ux-vs.org, horms@...ge.net.au, wjiang@...ilience.com, cfriesen@...tel.com, zlynx@....org, rpjday@...dspring.com, jesper.juhl@...il.com, segher@...nel.crashing.org Subject: Re: [PATCH 0/24] make atomic_read() behave consistently across all architectures Herbert Xu wrote: > On Mon, Aug 20, 2007 at 09:15:11AM -0400, Chris Snook wrote: >> Linus Torvalds wrote: >>> So the only reason to add back "volatile" to the atomic_read() sequence is >>> not to fix bugs, but to _hide_ the bugs better. They're still there, they >>> are just a lot harder to trigger, and tend to be a lot subtler. >> What about barrier removal? With consistent semantics we could optimize a >> fair amount of code. Whether or not that constitutes "premature" >> optimization is open to debate, but there's no question we could reduce our >> register wiping in some places. > > If you've been reading all of Linus's emails you should be > thinking about adding memory barriers, and not removing > compiler barriers. > > He's just told you that code of the kind > > while (!atomic_read(cond)) > ; > > do_something() > > probably needs a memory barrier (not just compiler) so that > do_something() doesn't see stale cache content that occured > before cond flipped. Such code generally doesn't care precisely when it gets the update, just that the update is atomic, and it doesn't loop forever. Regardless, I'm convinced we just need to do it all in assembly. -- Chris - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists