lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <1245681158.15580.91.camel@pc1117.cambridge.arm.com>
Date:	Mon, 22 Jun 2009 15:32:38 +0100
From:	Catalin Marinas <catalin.marinas@....com>
To:	Sudeep K N <sudeepholla.maillist@...il.com>
Cc:	Russell King - ARM Linux <linux@....linux.org.uk>,
	linux-arm-kernel@...ts.arm.linux.org.uk, drzeus-mmc@...eus.cx,
	linux-kernel@...r.kernel.org
Subject: Re: Rootfs in eMMC: Kernel panic ...Attempted to kill init!

On Mon, 2009-06-22 at 15:26 +0100, Catalin Marinas wrote:
> On Mon, 2009-06-22 at 19:43 +0530, Sudeep K N wrote:
> > Thanks for the suggestion.
> > With the logs it is clear that crash is in the userspace.
> > I am getting one of the 2 logs(below) randomly.
> 
> This sounds familiar: SMP -> writealloc cache policy (could be forced by
> hardware) -> cache corruption in user space with ext2.
> 
> Does you driver use the DMA API? If not, does your eMMC driver flush the
> cache (in case you hit one of the long-standing problems with PIO
> drivers).
> 
> It's worth trying this hack:
> 
> http://article.gmane.org/gmane.linux.ports.arm.kernel/51556

To be more precise:

If your system is ARM11MPCore based and your driver uses DMA, try this
patch (in-software DMA cache maintenance operations broadcasting):

http://www.linux-arm.org/git?p=linux-2.6-stable.git;a=commitdiff_plain;h=95298b1792121e7068258de451caec7f3dda0e78

If your driver is a PIO one, try this patch (flush_dcache_page called in
the VFS layer):

http://www.linux-arm.org/git?p=linux-2.6-stable.git;a=commitdiff_plain;h=d763f5815aa21095141c3ba87011906a61505dad

-- 
Catalin

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ