lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Tue, 12 Dec 2017 14:52:26 +0800
From:   zhong jiang <zhongjiang@...wei.com>
To:     Michal Hocko <mhocko@...nel.org>
CC:     <iamjoonsoo.kim@....com>, <mgorman@...hsingularity.net>,
        <minchan@...nel.org>, <vbabka@...e.cz>,
        <akpm@...ux-foundation.org>, <linux-kernel@...r.kernel.org>,
        <linux-mm@...ck.org>
Subject: Re: [RESEND] x86/numa: move setting parsed numa node to num_add_memblk

On 2017/12/11 21:45, Michal Hocko wrote:
> On Mon 11-12-17 20:59:29, zhong jiang wrote:
>> On 2017/12/11 20:03, Michal Hocko wrote:
>>> On Fri 01-12-17 18:13:52, zhong jiang wrote:
>>>> The acpi table are very much like user input. it is likely to
>>>> introduce some unreasonable node in some architecture. but
>>>> they do not ingore the node and bail out in time. it will result
>>>> in unnecessary print.
>>>> e.g  x86:  start is equal to end is a unreasonable node.
>>>> numa_blk_memblk will fails but return 0.
>>>>
>>>> meanwhile, Arm64 node will double set it to "numa_node_parsed"
>>>> after NUMA adds a memblk successfully.  but X86 is not. because
>>>> numa_add_memblk is not set in X86.
>>> I am sorry but I still fail to understand wht the actual problem is.
>>> You said that x86 will print a message. Alright at least you know that
>>> the platform provides a nonsense ACPI/SRAT? tables and you can complain.
>>> But does the kernel misbehave? In what way?
>>   From the view of  the following code , we should expect that the node is reasonable.
>>   otherwise, if we only want to complain,  it should bail out in time after printing the
>>   unreasonable message.
>>
>>           node_set(node, numa_nodes_parsed);
>>
>>         pr_info("SRAT: Node %u PXM %u [mem %#010Lx-%#010Lx]%s%s\n",
>>                 node, pxm,
>>                 (unsigned long long) start, (unsigned long long) end - 1,
>>                 hotpluggable ? " hotplug" : "",
>>                 ma->flags & ACPI_SRAT_MEM_NON_VOLATILE ? " non-volatile" : "");
>>
>>         /* Mark hotplug range in memblock. */
>>         if (hotpluggable && memblock_mark_hotplug(start, ma->length))
>>                 pr_warn("SRAT: Failed to mark hotplug range [mem %#010Lx-%#010Lx] in memblock\n",
>>                         (unsigned long long)start, (unsigned long long)end - 1);
>>
>>         max_possible_pfn = max(max_possible_pfn, PFN_UP(end - 1));
>>
>>         return 0;
>> out_err_bad_srat:
>>         bad_srat();
>>
>>  In addition.  Arm64  will double set node to numa_nodes_parsed after add a memblk
>> successfully.  Because numa_add_memblk will perform node_set(*, *).
>>
>>          if (numa_add_memblk(node, start, end) < 0) {
>>                 pr_err("SRAT: Failed to add memblk to node %u [mem %#010Lx-%#010Lx]\n",
>>                        node, (unsigned long long) start,
>>                        (unsigned long long) end - 1);
>>                 goto out_err_bad_srat;
>>         }
>>
>>         node_set(node, numa_nodes_parsed);
> I am sorry but I _do not_ understand how this answers my simple
> question. You are describing the code flow which doesn't really explain
> what is the _user_ or a _runtime_ visible effect. Anybody reading this
> changelog will have to scratch his head to understand what the heck does
> this fix and whether the patch needs to be considered for backporting.
> See my point?
 There  is not any visible effect to the user.  IMO,  it is  a better optimization.
 Maybe I put more words  to explain  how  the patch works.  :-[

 I found the code is messy when reading it without a real issue. 

 Thanks
 zhong jiang
 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ