lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 7 Nov 2017 08:43:40 -0800
From:   Linus Torvalds <torvalds@...ux-foundation.org>
To:     Fengguang Wu <fengguang.wu@...el.com>, Borislav Petkov <bp@...e.de>
Cc:     "oprofile-list@...ts.sf.net" <oprofile-list@...ts.sf.net>,
        Robert Richter <rric@...nel.org>,
        Thomas Gleixner <tglx@...utronix.de>,
        Ingo Molnar <mingo@...hat.com>,
        "H. Peter Anvin" <hpa@...or.com>,
        "the arch/x86 maintainers" <x86@...nel.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Subject: Re: [oprofile_arch_init] BUG: using __this_cpu_read() in preemptible
 [00000000] code: swapper/0/1

On Tue, Nov 7, 2017 at 1:35 AM, Fengguang Wu <fengguang.wu@...el.com> wrote:
> Hello,
>
> FYI this happens in v4.14-rc8 -- it's not necessarily a new bug.

No it's not.

It's

        /* Workaround for BIOS bugs in 6/15. Taken from perfmon2 */
        if (eax.split.version_id == 0 && __this_cpu_read(cpu_info.x86) == 6 &&
                __this_cpu_read(cpu_info.x86_model) == 15) {

in the oprofile op_model_ppro.c code.

It really doesn't matter, since those bits really should be the same
on all CPU's, but that just makes me go "why doesn't this code just
use 'boot_cpu' then?"

It's harmless, but probably worth fixing just to avoid the warning.

I'm not sure who cares about that file any more, but the last commit
to it was about 18 months ago by Borislav, for a not too dissimilar
reason (different cpu model testing)..

So I'm adding Borislav to the cc just to maybe annoy him into sending
in a patch for this thing too..

This is the famous "you touched it last, tag you're it" model of
kernel maintainership.

             Linus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ