Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp917805ybb; Fri, 20 Mar 2020 10:11:34 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvXIr9cRludkPTrkbNNcFmvwwntEv8ybHBC+GbYXtJPJae+EBbDktfpc+icEhARa152J1XG X-Received: by 2002:aca:47c8:: with SMTP id u191mr7697953oia.170.1584724294248; Fri, 20 Mar 2020 10:11:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584724294; cv=none; d=google.com; s=arc-20160816; b=l42wUHsRkbHrW7t0OYnyhRa2LY1y++M9yB+dSSXmmHkcLoiiLLD3fPDMubeslvpIKg mFBa4hMI+Csq6CUDsKXFH/N+bNZjDYDujzU0EdW9ap7+Xm5MPttuhH0swJkotC0LjInW 6v3GDoTf8SORdgp0NbtmyKm1mojqqSSEE6pfpGbr98GA/+C31cthNBMu87DZCH96pq7n r57XeiK34yAe+9NwrKk9QcTBg6qO+oFKuKCJ6H24+o1RM2pHz1Iq0tMjY1irjNVaZ5tj e+bEkMaZyFch0PR4Mtdq0JqoDWQ2R1+4oSRYZQKyvM09US0mBISeOLFHsmvbnlT2vWfT lltg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=ub0duY9YvmmlefU1HY28DeQ2DsT9GEu2HNx4C/SLMAI=; b=0wdG0LOb0VO+3yfrFirkS9S4fib+kTR6M0IJao/VZjGuIvATbmwZycCTlf1277rEFg Yb1UM4Lp3M45SBHaZanTycmmNXYqYdoTodlLJUIyoeC2x4zoxw4o+cAhYhBsA5zs5eUe +zXPz2oURJqLrm3CXtwWj1eD59M67+DF42vWdmGPj8uTNkSswmxxLKp+0Q8NojVAmihA PBQ5SU8y5pPezzFglHxl9sfBkPMrqadxeKiXac7pzI0XiEsg5DvYnW3DgRzoACG/kag5 cGWPOx6Qv0qbEJK1OkjuJCF2GOYYkXLD6O+kAh53A9dQJgZUiBJ4gM6hqsmV2nwKuetg Bd8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n3si3089512oib.163.2020.03.20.10.11.12; Fri, 20 Mar 2020 10:11:34 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727259AbgCTRKE (ORCPT + 99 others); Fri, 20 Mar 2020 13:10:04 -0400 Received: from mx2.suse.de ([195.135.220.15]:35886 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726973AbgCTRKE (ORCPT ); Fri, 20 Mar 2020 13:10:04 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 75934B00D; Fri, 20 Mar 2020 17:10:02 +0000 (UTC) Date: Fri, 20 Mar 2020 10:09:02 -0700 From: Davidlohr Bueso To: dhowells@redhat.com Cc: linux-security-module@vger.kernel.org, linux-kernel@vger.kernel.org, Davidlohr Bueso Subject: Re: [PATCH] security, keys: Optimize barrier usage for Rmw atomic bitops Message-ID: <20200320170902.ilwugh33co3poqm3@linux-p48b> References: <20200129180625.24486-1-dave@stgolabs.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20200129180625.24486-1-dave@stgolabs.net> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ping? On Wed, 29 Jan 2020, Davidlohr Bueso wrote: >For both set and clear_bit, we can avoid the unnecessary barriers >on non LL/SC architectures, such as x86. Instead, use the >smp_mb__{before,after}_atomic() calls. > >Signed-off-by: Davidlohr Bueso >--- > security/keys/gc.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > >diff --git a/security/keys/gc.c b/security/keys/gc.c >index 671dd730ecfc..ce7b4c22e3c4 100644 >--- a/security/keys/gc.c >+++ b/security/keys/gc.c >@@ -102,7 +102,7 @@ void key_gc_keytype(struct key_type *ktype) > > key_gc_dead_keytype = ktype; > set_bit(KEY_GC_REAPING_KEYTYPE, &key_gc_flags); >- smp_mb(); >+ smp_mb__after_atomic(); > set_bit(KEY_GC_REAP_KEYTYPE, &key_gc_flags); > > kdebug("schedule"); >@@ -308,7 +308,7 @@ static void key_garbage_collector(struct work_struct *work) > > if (unlikely(gc_state & KEY_GC_REAPING_DEAD_3)) { > kdebug("dead wake"); >- smp_mb(); >+ smp_mb__before_atomic(); > clear_bit(KEY_GC_REAPING_KEYTYPE, &key_gc_flags); > wake_up_bit(&key_gc_flags, KEY_GC_REAPING_KEYTYPE); > } >-- >2.16.4 >