lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Thu, 9 Apr 2009 08:05:56 +0200
From:	Ingo Molnar <mingo@...e.hu>
To:	Paul Mackerras <paulus@...ba.org>
Cc:	Peter Zijlstra <a.p.zijlstra@...llo.nl>,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] perf_counter: powerpc: add nmi_enter/nmi_exit calls


* Paul Mackerras <paulus@...ba.org> wrote:

> Ingo Molnar writes:
> 
> > I'm wondering, what was the real impact? Was it a crash or some 
> > other misbehavior? This impact line:
> > 
> > 	Impact: powerpc bug fix
> > 
> > is a bit too generic to be useful in practice. Something like:
> > 
> > 	Impact: fix stuck NMIs on powerpc
> > 	Impact: fix NMI crash on powerpc
> > 
> > would have been more descriptive about the real, hands-on impact of 
> > this patch.
> 
> I was looking at Peter's patches and I noticed he used in_nmi(), 
> and I wondered "what's that?", so I went looking and found it, and 
> realized that I needed to be calling nmi_enter/exit for it to 
> work.  I never actually booted a kernel that had the patch to use 
> in_nmi() but not my patch to call nmi_enter/exit.
> 
> The impact would have been that in_nmi() always returned 0, so I 
> expect that I would have seen deadlocks and/or memory corruption 
> had I booted a kernel without my fix.

thanks, i've amended the commit with:

    Impact: fix potential deadlocks on powerpc

i try to keep the habit of good impact-lines even for development 
branches - they make the -stable tagging effort quite a bit more 
robust once a piece of code is upstream.

They also give good, standard looking feedback about the kinds of 
problems/risks that a given topic has triggered historically.

For example:

earth4:~/tip> git log v2.6.29..v2.6.30-rc1 arch/x86/kernel/apic/  | \
                  grep Impact: | sort | uniq -c | sort -n

      1     Impact: build fix
      1     Impact: build fix, cleanup
      1     Impact: cleanup, paranoia
      1     Impact: cleanup, reduce memory usage for CONFIG_CPUMASK_OFFSTACK=y
      1     Impact: cleanup, remove cpumask from stack
      1     Impact: fix bug with irq-descriptor moving when logical flat
      1     Impact: fix incorrect error message
      1     Impact: fix possible race
      1     Impact: fix spurious IRQs
      1     Impact: get correct smp_affinity as user requested
      1     Impact: interface augmentation (not yet used)
      1     Impact: make kexec work with x2apic
      1     Impact: optimize APIC IPI related barriers
      1     Impact: simplification
     10     Impact: cleanup

Shows that we had 5-6 runtime problems (mostly misbehavior) in the 
APIC code during the last development window.

Or:

earth4:~/tip> git log v2.6.29..v2.6.30-rc1 kernel/sched.c  | grep 
Impact: | sort | uniq -c | sort -n
      1     Impact: cleanup, micro-optimization
      1     Impact: cleanup, new schedstat ABI
      1     Impact: fix boot crash
      1     Impact: fix circular locking
      1     Impact: fix function graph trace hang / drop pointless softirq on UP
      1     Impact: fix to preempt trace triggering lockdep check_flag failure
      1     Impact: more precise avg_overlap metric - better load-balancing
      1     Impact: struct rq size optimization
      2     Impact: micro-optimization
     12     Impact: cleanup

Shows that we had ~4 runtime problems (crashes or lockdep asserts) 
in the schedule during the last development window.

The shortlog tends to clone the patch-submission subject lines and 
tends to be more detailed and differently structured - so it's a lot 
harder to extract this information from it, at a glance.

So the impact line standardizes this kind of risk/impact info - and 
while we are still experimenting with exactly how to shape it (you 
can see several small variants), it's already pretty useful in the 
history too - not just while queueing it up.

	Ingo
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ