lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 27 Feb 2014 10:48:19 +0100 (CET) From: Jiri Kosina <jkosina@...e.cz> To: Or Gerlitz <or.gerlitz@...il.com> cc: Roland Dreier <roland@...nel.org>, Amir Vadai <amirv@...lanox.com>, Eli Cohen <eli@....mellanox.co.il>, Or Gerlitz <ogerlitz@...lanox.com>, Eugenia Emantayev <eugenia@...lanox.com>, "David S. Miller" <davem@...emloft.net>, Mel Gorman <mgorman@...e.de>, "netdev@...r.kernel.org" <netdev@...r.kernel.org>, linux-kernel <linux-kernel@...r.kernel.org> Subject: Re: [PATCH] mlx4: Use GFP_NOFS calls during the ipoib TX path when creating the QP On Wed, 26 Feb 2014, Or Gerlitz wrote: > > But let's make sure that we don't diverge from the original problem too > > much. Simple fact is that the deadlock is there when using connected mode, > > and there is nothing preventing users from using it this way, therefore I > > believe it should be fixed one way or another. > > the patch is titled with "mlx4:" -- do you expect the problem to come > into play only when ipoib connected mode runs over the mlx4 driver? > what's about mlx5 or other upstream IB drivers? Honestly, I have no idea. I am pretty sure that Mellanox folks have much better understanding of the mlx* driver internals than I do. I tried to figure out where mlx5 is standing in this respect, but I don't even see where ipoib_cm_tx->tx_ring is being allocated there. > I'll be looking on the details of the problem/solution, Awesome, thanks a lot, that's highly appreciated. > Do we have a way to tell a net-device instance they should do their > memory allocations in a NOFS manner? if not, shouldn't we come up with > more general injection method? I don't think we have, and it indeed should be rather easy to add. The more challenging part of the problem is where (and based on which data) the flag would actually be set up on the netdevice so that it's not horrible layering violation. -- Jiri Kosina SUSE Labs -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists