lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <200709301703.32388.ak@suse.de>
Date:	Sun, 30 Sep 2007 17:03:32 +0200
From:	Andi Kleen <ak@...e.de>
To:	Thomas Gleixner <tglx@...utronix.de>
Cc:	Linus Torvalds <torvalds@...ux-foundation.org>,
	"Rafael J. Wysocki" <rjw@...k.pl>,
	Andrew Morton <akpm@...ux-foundation.org>,
	LKML <linux-kernel@...r.kernel.org>, Ingo Molnar <mingo@...e.hu>
Subject: Re: [REGRESSION from 2.6.23-rc8] (was: Re: 2.6.23-rc4-mm1 and -rc6-mm1: boot failure on HP nx6325, related to clockevents)

On Sunday 30 September 2007 16:06:59 Thomas Gleixner wrote:
> On Sun, 30 Sep 2007, Andi Kleen wrote:
> 
> >>> OK, this explains 2) and 3). I just looked into the code and the logic
> >>> vs. noapictimer on SMP is completely broken.
> >
> > noapictimer really doesn't make any sense on non SMP imho with the old
> > timer architecture. That is why I never bothered to implement it.
> > It's purely a UP hack.
> 
> It does not matter whether it makes sense to you or not. It is a command 
> line option which bricks systems. 

A lot of command line options do that -- if not they would be usually
default or automatically used by the kernel.

> There is neither an explanation in  
> Dokumentation/kernel-parameters.txt nor a check in the code, which 
> disables this completely.

Fair enough. I can add a warning in the Documentation.
 
> It makes a lot of sense even with the existing architecture. Trouble 
> shooting a box, where the local apic timer does not work correctly is not 
> an UP only requirement.

It should not be needed with current systems as far as I know
(see my previous mail) 

> I understand the code quite well. I'm just surprised from time to time by 
> interesting hacks in the so clean x8664 tree.

No hack in this area as far as I know.
 
> > [1]  Or let's call it "I trust all my time to the CPU" and no more southrbridge
> > aka put all eggs in one basket. Given the trends in CPU power saving that
> > is a quite dangerous strategy.
> 
> No, it's not dangerous. 

It definitely caused a lot of problems in the single socket multi core world;
but yes you probably worked around all of them that I'm aware of currently.
What I just objected to was that you complained that the current x86-64
time code -- which works much more conservatively and thus needs less workarounds --
doesn't have all of them. You basically tried to apply the special debugging strategies
for clockevents to the old code and then complained that they don't work.

> We spent quite some time to make the clock events  
> layer flexible enough to handle the current problems and the design allows 
> to add more infrastructure when necessary.

Grand words for relatively simple changes. Anyways as far as I know
even for hypothetical future C2+ capable multi socket systems the current
x86-64 time code should work -- it should automatically select broadcasting.
The only thing it relies on that if there are no multi socket C1E systems
with broken APIC timers. Since that could be only future CPUs anyways
and I haven't seen any indication that of the upcomming CPUs will have
such broken C1.

> The maybe new (mis)features of  
> upcoming CPUs need to be addressed with or without clock events and they 
> need to be done careful and not by random hacks.

Not sure what random hacks you refer to.

-Andi
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ