lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 22 Nov 2009 12:05:42 -0500
From:	Mathieu Desnoyers <mathieu.desnoyers@...ymtl.ca>
To:	"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>
Cc:	linux-kernel@...r.kernel.org, mingo@...e.hu, laijs@...fujitsu.com,
	dipankar@...ibm.com, akpm@...ux-foundation.org,
	josh@...htriplett.org, dvhltc@...ibm.com, niv@...ibm.com,
	tglx@...utronix.de, peterz@...radead.org, rostedt@...dmis.org,
	Valdis.Kletnieks@...edu, dhowells@...hat.com
Subject: Re: [PATCH tip/core/rcu 0/3] rcu: resend of grace-period stall and
	cleanup patches

* Paul E. McKenney (paulmck@...ux.vnet.ibm.com) wrote:
> Hello!
> 
> This patch series is a resend of the three RCU patches that are candidates
> for the upcoming 2.6.33 merge window, but that are not yet in -tip.
> These are:
> 
> 1.	A fix for a grace-period-stall bug that occurs on large
> 	machines.
[...]

Hi Paul,

I was thinking about the last bugs you discovered. Some caracteristics
they had in common were that they occur only on large marchines (32+ or
64+ CPUs). This is caused by the fact that some of your code is only
covered by tests when the number of CPUs go over the architecture size
(in bits).

I managed to cover this kind of scenario with smaller state-space in the
LTTng formal models (but it also applies to kernel code) by tweaking the
code, with bitmasks, to ensure that the number of bits the code uses is,
e.g., no more than the minimum amount of required bits. Therefore, you
are ensured to run into overflow scenarios either more quickly or, as in
this case, on decently-sized hardware.

Hope this helps,

Thanks,

Mathieu

-- 
Mathieu Desnoyers
OpenPGP key fingerprint: 8CD5 52C3 8E3C 4140 715F  BA06 3F25 A8FE 3BAE 9A68
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ