lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <159199950433.21782.7922990856385499228.tglx@nanos.tec.linutronix.de>
Date:   Fri, 12 Jun 2020 22:05:04 -0000
From:   Thomas Gleixner <tglx@...utronix.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     linux-kernel@...r.kernel.org, x86@...nel.org,
        "Paul E. McKenney" <paulmck@...nel.org>,
        Stephen Rothwell <sfr@...b.auug.org.au>
Subject: [GIT pull resend] x86/entry and ras/core

[ Resending because it did not make LKML due to header wreckage which my
  sleep deprived and RCU demolished brain did not notice yesterday night and
  my script safety net failed to correct. ]

Linus,

the following two pull requests contain the distangled and rebased
variants of the x86/entry and ras/core branches.

Part 1 is the rebased version of the entry code rework which is based
on

   git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git locking-urgent-2020-06-11

which you merged yesterday. The result is equivalent to the non rebased code
which was in -next up to:

 2823e83a3dc0 ("x86/entry: __always_inline CR2 for noinstr")

On top of that sit 4 smallish fixes for late bug reports including the RCU
mystery which kept Paul and me busy in the last couple of days.

The issue Paul was observing with the latest RCU change in one esoteric
corner case test turned out to be a red herring:

 https://lkml.kernel.org/r/20200612215650.GN4455@paulmck-ThinkPad-P72

Retesting from scratch on the now fully updated x86/entry branch does not
longer show the effect and all tests pass. There is a high propability that
this was a RCU debugging inflicted PEBKAC. Paul claims that this is a
service which RCU provides for free.

Part 2 is the redone ras/core branch which now includes and therefore
depends on x86/entry up to

 f0178fc01fe4 ("x86/entry: Unbreak __irqentry_text_start/end magic")

Omitting the merge was briefly considered, but that would have caused a
tricky merge conflict and a untested rework of

  17fae1294ad9 ("x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned")

which already utilizes the sanitized MCE innards. Basically the same
reasoning on the merge decision as a few weeks ago.

The rebase results have been carefully checked, tested and cross diffed to
the extent possible.

Again thanks for your understanding and the exceptional allowance of
rebasing that late.

Thanks,

	Thomas

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ