lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20160728072408.GB3942@osiris>
Date:	Thu, 28 Jul 2016 09:24:08 +0200
From:	Heiko Carstens <heiko.carstens@...ibm.com>
To:	"Theodore Ts'o" <tytso@....edu>, linux-next@...r.kernel.org,
	linux-mm@...ck.org, linux-kernel@...r.kernel.org,
	Martin Schwidefsky <schwidefsky@...ibm.com>,
	linux-s390@...r.kernel.org,
	Linus Torvalds <torvalds@...ux-foundation.org>
Subject: Re: [BUG -next] "random: make /dev/urandom scalable for silly
 userspace programs" causes crash

On Thu, Jul 28, 2016 at 07:55:48AM +0200, Heiko Carstens wrote:
> On Wed, Jul 27, 2016 at 11:46:01PM -0400, Theodore Ts'o wrote:
> > On Wed, Jul 27, 2016 at 09:14:00AM +0200, Heiko Carstens wrote:
> > > it looks like your patch "random: make /dev/urandom scalable for silly
> > > userspace programs" within linux-next seems to be a bit broken:
> > > 
> > > It causes this allocation failure and subsequent crash on s390 with fake
> > > NUMA enabled
> > 
> > Thanks for reporting this.  This patch fixes things for you, yes?
> > 
> >        	   	     	    	       	     	    - Ted
> 
> Yes, it does. It's actually the same what I did to fix this ;)

Oh, I just realized that Linus pulled your changes. Actually I was hoping
we could get this fixed before the broken code would be merged.
Could you please make sure the bug fix gets included as soon as possible?

Right now booting a kernel with any defconfig on s390 will crash because of
this.

I will also change the fake NUMA code on s390, since it doesn't make sense
to have possible but not online nodes (in this case).

> > commit 59b8d4f1f5d26e4ca92172ff6dcd1492cdb39613
> > Author: Theodore Ts'o <tytso@....edu>
> > Date:   Wed Jul 27 23:30:25 2016 -0400
> > 
> >     random: use for_each_online_node() to iterate over NUMA nodes
> >     
> >     This fixes a crash on s390 with fake NUMA enabled.
> >     
> >     Reported-by: Heiko Carstens <heiko.carstens@...ibm.com>
> >     Fixes: 1e7f583af67b ("random: make /dev/urandom scalable for silly userspace programs")
> >     Signed-off-by: Theodore Ts'o <tytso@....edu>
> > 
> > diff --git a/drivers/char/random.c b/drivers/char/random.c
> > index 8d0af74..7f06224 100644
> > --- a/drivers/char/random.c
> > +++ b/drivers/char/random.c
> > @@ -1668,13 +1668,12 @@ static int rand_initialize(void)
> >  #ifdef CONFIG_NUMA
> >  	pool = kmalloc(num_nodes * sizeof(void *),
> >  		       GFP_KERNEL|__GFP_NOFAIL|__GFP_ZERO);
> > -	for (i=0; i < num_nodes; i++) {
> > +	for_each_online_node(i) {
> >  		crng = kmalloc_node(sizeof(struct crng_state),
> >  				    GFP_KERNEL | __GFP_NOFAIL, i);
> >  		spin_lock_init(&crng->lock);
> >  		crng_initialize(crng);
> >  		pool[i] = crng;
> > -
> >  	}
> >  	mb();
> >  	crng_node_pool = pool;
> > 
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ