Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4009519rdb; Mon, 11 Dec 2023 06:33:27 -0800 (PST) X-Google-Smtp-Source: AGHT+IHgWO2CFdxd3B57LAobV79copX5b51E24NxifpQZSJZW6aIghtY/gnfzeDDlJxgTF1e0+VB X-Received: by 2002:a17:902:ea11:b0:1d1:cdd8:61ae with SMTP id s17-20020a170902ea1100b001d1cdd861aemr2043047plg.102.1702305207298; Mon, 11 Dec 2023 06:33:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702305207; cv=none; d=google.com; s=arc-20160816; b=Hp2CuvvDYdnwgdGbvpGVEHp+gQCFj2pIFsOJ7hm60x27OnoYPlY03xSP+3S2JCr3Gg VMrQGFwor0Ln49RvZub30PFjxO4svhjtkARS4h++X3XcMA7v6KemfCoD18ce4hOsapQL hf242hi0v3x4TnnJpDpq94EE9oBwyETd7LIJQMr6Te46cF0sG+lTyK9LNd+TXzQ0xDe/ 6VxVc+D4FBpVTcospD3IlU32BeGOUACO2LMM27DnQH0fcZ+TOh59I8UjsX2AgPpiBo0q b4PGqTBDV92hjEsO4naV2S9yghkfa5NVtyVavJhEKTunmmamfLVl/jUa/pGfeX0UwH1a I3Dw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=pDWlLhPt4C0mCjGjTh1biJYxjD4F+REeoStqEtuQ0mk=; fh=YpvYMw+VI0OL1Ou122JtBOwwJ5W2/u02Q26838nCscM=; b=gKw9Wl4P/B70Pkj94zGar4LZeVf5MI7nUiMEeU3vZvBK+z/icswz3JE35Bn8TtDJut jf4sx1FwlUAnoxCrOes668rKgsO1UO2GwxqZ/ZvqAeEMpl1jDNNPQzpTxDgc81L80aBQ XIxXniAZOaXS/kIiWsl4mepqd3F5fA/JpXz1weokZuFzCpnE0595NVitOIWq/ti4M9sz dfYczefxRxqv6tI9K2tT2+F1aQxaybwb6XSPn5TkmYcAHAM2SkFFVZLLOV0krmUwS9cy 53eU1o3yEGu1B3DW4q4o0eaA1TUDubkvvm3twJj2smFPuafNwN9LgxAUe30942fPYzv3 CHbg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id iz4-20020a170902ef8400b001d2fe5efe5fsi4044970plb.615.2023.12.11.06.33.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 11 Dec 2023 06:33:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id BB95080613A4; Mon, 11 Dec 2023 06:33:23 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343747AbjLKOdJ (ORCPT + 99 others); Mon, 11 Dec 2023 09:33:09 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42122 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343710AbjLKOdI (ORCPT ); Mon, 11 Dec 2023 09:33:08 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 14992C3 for ; Mon, 11 Dec 2023 06:33:15 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 49D43FEC; Mon, 11 Dec 2023 06:34:01 -0800 (PST) Received: from [10.1.197.60] (eglon.cambridge.arm.com [10.1.197.60]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 3E6943F738; Mon, 11 Dec 2023 06:33:12 -0800 (PST) Message-ID: <27ddb859-a67e-9a9d-7135-c4829c5b27db@arm.com> Date: Mon, 11 Dec 2023 14:33:06 +0000 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux aarch64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [EXT] [PATCH v7 06/24] x86/resctrl: Access per-rmid structures by index Content-Language: en-GB To: Amit Singh Tomar , "x86@kernel.org" , "linux-kernel@vger.kernel.org" Cc: Fenghua Yu , Reinette Chatre , Thomas Gleixner , Ingo Molnar , Borislav Petkov , H Peter Anvin , Babu Moger , "shameerali.kolothum.thodi@huawei.com" , D Scott Phillips OS , "carl@os.amperecomputing.com" , Linu Cherian , "bobo.shaobowang@huawei.com" , "tan.shaopeng@fujitsu.com" , "baolin.wang@linux.alibaba.com" , Jamie Iles , Xin Hao , "peternewman@google.com" , "dfustini@baylibre.com" , "muhammad.zahid@nokia.com" References: <20231025180345.28061-1-james.morse@arm.com> <20231025180345.28061-7-james.morse@arm.com> From: James Morse In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-3.3 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Mon, 11 Dec 2023 06:33:23 -0800 (PST) Hi Amit, On 31/10/2023 07:43, Amit Singh Tomar wrote: > -----Original Message----- > From: James Morse > Sent: Wednesday, October 25, 2023 11:33 PM > Subject: [EXT] [PATCH v7 06/24] x86/resctrl: Access per-rmid structures by index Looks like you are afflicted with outlook - let me know if I didn't find all the changes you made to the original message ... [..] > diff --git a/arch/x86/kernel/cpu/resctrl/monitor.c b/arch/x86/kernel/cpu/resctrl/monitor.c > index 2a0233cd0bc9..c02cf32cd17c 100644 > --- a/arch/x86/kernel/cpu/resctrl/monitor.c > +++ b/arch/x86/kernel/cpu/resctrl/monitor.c > @@ -735,19 +768,20 @@ void mbm_setup_overflow_handler(struct rdt_domain *dom, unsigned long delay_ms) > > static int dom_data_init(struct rdt_resource *r) { > + u32 idx_limit = resctrl_arch_system_num_rmid_idx(); > struct rmid_entry *entry = NULL; > - int i, nr_rmids; > + u32 idx; > + int i; > > - nr_rmids = r->num_rmid; > - rmid_ptrs = kcalloc(nr_rmids, sizeof(struct rmid_entry), GFP_KERNEL); > + rmid_ptrs = kcalloc(idx_limit, sizeof(struct rmid_entry), GFP_KERNEL); > > [>>] Is there a chance, it could result in "ZERO_SIZE_PTR", and we should guard it against ZERO_OR_NULL_PTR in the following if condition? > It might be related, while testing the snapshot[1] (and subsequent snapshots has similar change) on x86 platform, Zahid is seeing Kernel panic: > https://git.kernel.org/pub/scm/linux/kernel/git/morse/linux.git/tree/fs/resctrl/monitor.c?h=mpam/snapshot/v6.2#n695 Interesting - I didn't think this could happen. Could you share the full splat? This would imply idx_limit was zero, so boot_cpu_data.x86_cache_max_rmid would be -1. But wouldn't this happen before this patch? idx_limit has the same value as nr_rmids on x86, its only MPAM that needs a different value. Thanks, James