[BUG] dm-crypt broken after 2632e2521769 ("arm64: fpsimd: Implement lazy restore for kernel mode FPSIMD")
Ard Biesheuvel
ardb at kernel.org
Tue May 21 01:55:42 PDT 2024
On Tue, 21 May 2024 at 08:22, Johannes Nixdorf <mixi at shadowice.org> wrote:
>
> Bad news: I hit the bug again with 2632e2521769 ("arm64: fpsimd: Implement
> lazy restore for kernel mode FPSIMD") reverted during prolonged interactive
> usage with the downstream Asahi Linux kernel.
>
> This prompted me to adjust the reproducer to be closer to the desktop use
> case, which then also found aefbab8e77eb ("arm64: fpsimd: Preserve/restore
> kernel mode NEON at context switch"). With the vanilla kernel before the
> commit or that commit reverted on the Asahi Linux kernel the new reproducer
> also sees no bug, and interactive usage seems fine.
>
> The old reproducer used a loop device backed by the initramfs' tmpfs. The
> new reproducer now uses the actual hardware nvme device as backend:
>
> init:
> dev=/dev/nvme0n1p7
> dm_name=test
> dm_dev=/dev/mapper/${dm_name}
> echo test | cryptsetup luksFormat -q ${dev}
> echo test | cryptsetup open ${dev} test
> mkfs.ext4 ${dm_dev}
> mount ${dm_dev} /target
> cd /target
> fio /verify.fio
>
> verify.fio:
> [write-and-verify]
> loops=10
> rw=randwrite
> bs=4k
> direct=1
> ioengine=libaio
> iodepth=16
> verify=crc32c
> size=1G
>
Thanks for these instructions - I am trying to reproduce but no 'luck' yet.
Could you please share your complete kernel config (based on the
vanilla kernel at commit aefbab8e77eb), and a dump of the FIO output
on a failure case?
More information about the linux-arm-kernel
mailing list