lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230926140922.GA6538@workstation.local>
Date:   Tue, 26 Sep 2023 23:09:22 +0900
From:   Takashi Sakamoto <o-takashi@...amocchi.jp>
To:     Jiri Slaby <jirislaby@...nel.org>
Cc:     linux-kernel@...r.kernel.org
Subject: Re: [GIT PULL] firewire updates for 6.5-rc1

Hi,

Thanks for your report, and I apologize to trouble you and your
reporter.

On Tue, Sep 26, 2023 at 11:11:23AM +0200, Jiri Slaby wrote:
> Hi,
> 
> On 04. 07. 23, 14:18, Takashi Sakamoto wrote:
> > Please pull firewire updates for v6.5-rc1.
> > 
> > The following changes since commit 44c026a73be8038f03dbdeef028b642880cf1511:
> > 
> >    Linux 6.4-rc3 (2023-05-21 14:05:48 -0700)
> 
> Likely some of the below commits causes an instant reboot during boot as was
> reported in:
>   https://bugzilla.suse.com/show_bug.cgi?id=1215436
> 
> 6.4.* was fine, 6.5.4 or 6.6-rc1 fails.
> 
> module_blacklist=firewire_ohci fixes the issue on 6.5.4.
> 
> Any ideas what can cause this? I fail to see an issue in the commits...

In my opinion, the series of patches to optimize 1394 OHCI driver to
devicves managed resources would bring the issue in the environmennt,
therefore:

> FWIW I see "obsolete usage of GFP_ATOMIC" was reverted in 6.5.5 and 6.6-rc2,
> I asked the reporter to test those.
>
> > Takashi Sakamoto (24):
> >        firewire: add KUnit test to check layout of UAPI structures
> >        firewire: cdev: add new version of ABI to notify time stamp at request/response subaction of transaction
> >        firewire: cdev: add new event to notify request subaction with time stamp
> >        firewire: cdev: implement new event to notify request subaction with time stamp
> >        firewire: core: use union for callback of transaction completion
> >        firewire: core: implement variations to send request and wait for response with time stamp
> >        firewire: cdev: code refactoring to operate event of response
> >        firewire: cdev: add new event to notify response subaction with time stamp
> >        firewire: cdev: implement new event to notify response subaction with time stamp
> >        firewire: cdev: code refactoring to dispatch event for phy packet
> >        firewire: cdev: add new event to notify phy packet with time stamp
> >        firewire: cdev: implement new event relevant to phy packet with time stamp
> >        firewire: fix build failure due to missing module license
> >        firewire: fix warnings to generate UAPI documentation

here

> >        firewire: ohci: use devres for memory object of ohci structure
> >        firewire: ohci: use devres for PCI-related resources
> >        firewire: ohci: use devres for MMIO region mapping
> >        firewire: ohci: use devres for misc DMA buffer
> >        firewire: ohci: use devres for requested IRQ
> >        firewire: ohci: use devres for list of isochronous contexts
> >        firewire: ohci: use devres for IT, IR, AT/receive, and AT/request contexts
> >        firewire: ohci: use devres for content of configuration ROM
> >        firewire: ohci: release buffer for AR req/resp contexts when managed resource is released

to here.

> >        firewire: core: obsolete usage of GFP_ATOMIC at building node tree
> > 
> > Zhang Shurong (1):
> >        firewire: net: fix use after free in fwnet_finish_incoming_packet()
> 
> thanks,
> -- 
> js
> suse labs

Although, usage of device managed resource is itself preferable, thus I
would like you to help me to fix the issue. I test these patches in v6.2
kernel by module backporting and I have no issue in my environment. For
example, with 'acpi=noirq':

```
kernel: firewire_ohci 0000:0b:00.0: enabling device (0000 -> 0002)
kernel: firewire_ohci 0000:0b:00.0: using bridge 0000:03:00.2 INT D to get INT A
kernel: firewire_ohci 0000:0b:00.0: added OHCI v1.10 device as card 0, 8 IR + 8 IT contexts, quirks 0x2
kernel: firewire_core 0000:0b:00.0: created device fw0: GUID 080028510100014a, S800
```

But in the reporter's environment:

```
kernel: firewire_ohci 0000:22:00.0: enabling device (0080 -> 0083)
kernel: firewire_ohci 0000:22:00.0: can't find IRQ for PCI INT A; please try using pci=biosirq
kernel: genirq: Flags mismatch irq 0. 00000080 (firewire_ohci) vs. 00015a00 (timer)
kernel: firewire_ohci 0000:22:00.0: failed to allocate interrupt 0
kernel: firewire_ohci: probe of 0000:22:00.0 failed with error -16
kernel: firewire_ohci 0000:22:00.0: removed fw-ohci device
```

For my information, would you please ask your reporter to tell what kind
of 1394 OHCI hardware to use? Once the Linux system booted, you can
retrieve information about it by lspci(8). My hardware includes
PCIe-to-PCI bridge as well as PCI-to-1394-bus bridge (1394 OHCI) and I
would like to check the reporter uses the similar hardware or not.

For example, in the market, we have direct PCIe-to-1394-bus bridge. It
appears that the reporter would uses the kind of hardware. If so, I
install the similar hardware in my system and check the patchset. Else,
I'll investigate the other causes; e.g. installing openSUSE Tumbleweed
to regenerate the issue.


Thanks

Takashi Sakamoto

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ