lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9352f410-9dad-ac89-181a-b3cfc86176b8@linux.com>
Date: Mon, 11 Mar 2024 14:07:04 -0700 (PDT)
From: "Christoph Lameter (Ampere)" <cl@...ux.com>
To: Catalin Marinas <catalin.marinas@....com>
cc: Marek Szyprowski <m.szyprowski@...sung.com>, 
    Mark Rutland <mark.rutland@....com>, 
    "linux-pm@...r.kernel.org" <linux-pm@...r.kernel.org>, 
    "Rafael J. Wysocki" <rafael@...nel.org>, Viresh Kumar <vireshk@...nel.org>, 
    Will Deacon <will@...nel.org>, Jonathan.Cameron@...wei.com, 
    Matteo.Carlini@....com, Valentin.Schneider@....com, 
    akpm@...ux-foundation.org, anshuman.khandual@....com, 
    Eric Mackay <eric.mackay@...cle.com>, dave.kleikamp@...cle.com, 
    linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, 
    linux-mm@...ck.org, linux@...linux.org.uk, robin.murphy@....com, 
    vanshikonda@...amperecomputing.com, yang@...amperecomputing.com, 
    Nishanth Menon <nm@...com>, Stephen Boyd <sboyd@...nel.org>
Subject: Re: [PATCH v3] ARM64: Dynamically allocate cpumasks and increase
 supported CPUs to 512

On Mon, 11 Mar 2024, Catalin Marinas wrote:

>> This patch landed in today's linux-next as commit 0499a78369ad ("ARM64:
>> Dynamically allocate cpumasks and increase supported CPUs to 512").
>> Unfortunately it triggers the following warning during boot on most of
>> my ARM64-based test boards. Here is an example from Odroid-N2 board:
>
> I spent a big part of this afternoon going through the code paths but
> there's nothing obvious that triggered this problem. My suspicion is
> some memory corruption, algorithmically I can't see anything that could
> go wrong with CPUMASK_OFFSTACK. Unfortunately I could not reproduce it
> yet to be able to add some debug info.
>
> So I decided to revert this patch. If we get to the bottom of it during
> the merging window, I can still revive it. Otherwise we'll add it to
> linux-next post -rc1.

I also looked through the opp source and I cannot find even anything that
even uses the functionality changed by the OFFSTACK option.

This could be an issue in the ARM64 arch code itself where there maybe 
an assumption elsewhere that a cpumask can always store up to NR_CPU cpus 
and not only nr_cpu_ids as OFFSTACK does.

How can I exercise the opp driver in order to recreate the problem?

I assume the opp driver is ARM specific? x86 defaults to OFFSTACK so if 
there is an issue with OFFSTACK in opp then it should fail with kernel 
default configuration on that platform.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ