lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.21.1808032155570.1658@nanos.tec.linutronix.de>
Date:   Fri, 3 Aug 2018 22:00:58 +0200 (CEST)
From:   Thomas Gleixner <tglx@...utronix.de>
To:     Heiner Kallweit <hkallweit1@...il.com>
cc:     Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Marc Zyngier <marc.zyngier@....com>
Subject: Re: [PATCH] genirq: Consider domain hierarchy when checking for
 IRQCHIP_ONESHOT_SAFE

On Fri, 3 Aug 2018, Heiner Kallweit wrote:

> In case of a domain hierarchy we may miss the IRQCHIP_ONESHOT_SAFE
> flag because we look at top of the stack only. See also discussion
> here: https://marc.info/?l=linux-kernel&m=153301773524685&w=2

I think you misunderstood:

> I think the top most chip is the key, the rest of the hierarchy is
> irrelevant because the top most chip is the one which is responsible for
> not creating an interrupt storm after the interrupt got acknowledged.

The top most chip in the hierarchy, e.g. the PCI MSI one, is the key. If
that one is badly implemented and starts to resend after ack/eoi then the
interrupt storm happens. The lower layers in the hierarchy down to the
vector domain are just transporting what the top level chip does. So it is
actively wrong to flag the lower layers.

 	 if (desc->irq_data.chip->flags & IRQCHIP_ONESHOT_SAFE)

is the correct check as it looks at the topmost irq chip which is the one
which initiates the interrupt.

Thanks,

	tglx

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ