lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <19415767029b479a508378abaf8c6c5a1d048add.camel@xry111.site>
Date:   Sun, 09 Oct 2022 18:37:28 +0800
From:   Xi Ruoyao <xry111@...111.site>
To:     Huacai Chen <chenhuacai@...nel.org>, Rui Wang <wangrui@...ngson.cn>
Cc:     loongarch@...ts.linux.dev, WANG Xuerui <kernel@...0n.name>,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH] LoongArch: mm: Refactor TLB handlers

On Sun, 2022-10-09 at 14:13 +0800, Huacai Chen wrote:
> Queued for loongarch-next, thanks.

> And fixes the concurrent modification issue of fast path for huge
> pages.
> This issue will occur in the following steps:
> 
>    CPU-1 (In TLB exception)         CPU-2 (In THP)
> 1: Load PMD entry (HUGE=1)
> 2: Goto huge path
> 3:                                  Store PMD entry (HUGE=0)
> 4: Reload PMD entry (HUGE=0)
> 5: Fill TLB entry (PA is incorrect)

Is this issue causing problems in practice?  If true should we pick this
for loongarch-fixes and backport into 5.19 & 6.0 too?

-- 
Xi Ruoyao <xry111@...111.site>
School of Aerospace Science and Technology, Xidian University

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ