lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 18 Oct 2008 09:56:22 +0200
From:	Andi Kleen <andi@...stfloor.org>
To:	"Ani Sinha" <kernel@...rban.org>
Cc:	linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org
Subject: Re: panic() logic

"Ani Sinha" <kernel@...rban.org> writes:

> I noticed an issue with the panic() firing on a back core in SMP
> lately. We are mostly working on mips architectures but it might
> effect other archs as well. Therefore, I am putting forward my
> thoughts and comments to the whole linux community. In the following,
> by front core I mean core#0 and by back core I mean other cores.

Why exactly is the "front core" special? 

> smp_send_stop basically marks all the other cores as 'down' and
> updates the cpu bitmap. One implication of this is that you can not do
> an IPI later on to other cores (smp_send_function() does a
> 'for_earch_online_cpu'). This makes sense since you should not be
> allowed to do anything on a down cpu. But what if a particular
> architecture had logic to do specific things for the front core and
> other things on the back cores as a part of 'graceful reboot' process?

Is that logic in Linux or in the platform?

Normally it's best to not rely on any specific CPU for panic.
What do you do when that CPU is so broken that it cannot
process IPIs anymore?

-Andi

-- 
ak@...ux.intel.com
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ