lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 30 Apr 2011 16:41:41 +0100
From:	Alan Cox <alan@...rguk.ukuu.org.uk>
To:	Greg KH <gregkh@...e.de>
Cc:	Andrew Morton <akpm@...ux-foundation.org>, Jan Kara <jack@...e.cz>,
	LKML <linux-kernel@...r.kernel.org>
Subject: Re: Allow setting of number of raw devices as a module parameter

> > A large vmalloc array is very antisocial on a 32bit x86 box. It looks
> > like almost all of it would become sane if there was an array of pointers
> > to raw devices and the devices were initially allocated on need (even if
> > for now only recovered on rmmod)
> 
> In practice, we've never seen a problem with this[1].  Machines that
> want thousands of raw devices have plenty of memory to handle this
> situation.
> 
> I doubt adding the complexity of dynamically allocating the devices
> as-needed is worth it for the very few systems that ever use this
> driver, compounded with the fact that we keep saying that this code
> isn't to be used by "normal" people anyway.

That's no excuse for sloppy code. Making it an array populated on demand
is an improvement for everyone, making it vmalloc hurts every access (in
TLB misses for one as well as vmalloc overhead).

I note two of us immediately made the same observation. Doing it
basically right (array of pointers) is easy. Doing the full works with a
hash for the lookups is a bit harder and that I would agree is overkill.

Alan
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ