lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 11 Mar 2008 04:07:10 -0800
From:	Daniel Phillips <phillips@...nq.net>
To:	"Ph. Marek" <philipp.marek@...v.gv.at>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: [RFC] Stacking bio support

On Tuesday 11 March 2008 04:33, Ph. Marek wrote:
> Win32 has IRP stacks, which do mostly the same AFAIU.
> 	http://msdn2.microsoft.com/en-us/library/ms796144.aspx

That seems to be filling a similar need all right, though it looks
like a fancier (read: clunkier) solution.

> How do you handle the reallocation?
> - If you don't do it (but rely on the fact that the initial allocation is
>   enough), you might end up with NO_MORE_IRP_STACK_LOCATIONS
>     http://msdn2.microsoft.com/en-us/library/ms793675.aspx
> - If you do reallocate, the allocations have to register themselves in
>   the emergency pool (see the current thread about swapping over NFS)

Yes, I reallocate.  I do not currently register these with the
emergency pool, good spotting.  I intend to do all such reallocations
with GFP_MEMALLOC (out of tree deadlock-prevention allocation flag) and
rely on (out of tree) bio throttling to prevent the memalloc reserve
from being exhausted.  Hopefully these things will be in-tree in due
course.

Incidentally, the bio stack should make the bio throttling somewhat
more elegant, a nice circular effect.

> I don't say that it's impossible ... just that some "interesting" things will 
> await you. 

Tell me about it :-)

> That's different from the Win32 way AFAIK - there it's defined that every 
> layer *has* to use its own stack location. (But it's been some time since I 
> needed that, so I might be wrong.)

I think you are right.  In fact, I thought about this for a couple of
years, always getting hung up at exactly that point.  When I stopped
trying to see the stack as a fixed size object with preassigned frames,
the rest fell into place.  One obvious problem with the pre-assigned
approach: you don't always know the path ahead of time that a bio
will take to a physical device.
 
> But I sure hope you succeed!

Thankyou for your useful comments.  I do need to present a solution
complete with deadlock prevention.  I guess the bio code will end up
simpler there too, because with the memalloc anti-deadlock approach,
the array of bio mempools can go away.

Regards,

Daniel
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ