lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20140619131322.1ab89e3380bf2eed477f9030@linux-foundation.org>
Date:	Thu, 19 Jun 2014 13:13:22 -0700
From:	Andrew Morton <akpm@...ux-foundation.org>
To:	Minchan Kim <minchan@...nel.org>
Cc:	Chen Yucong <slaoub@...il.com>, mgorman@...e.de,
	hannes@...xchg.org, mhocko@...e.cz, riel@...hat.com,
	linux-mm@...ck.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] mm/vmscan.c: fix an implementation flaw in proportional
 scanning

On Thu, 19 Jun 2014 10:02:39 +0900 Minchan Kim <minchan@...nel.org> wrote:

> > > @@ -2057,8 +2057,7 @@ out:
> > >  static void shrink_lruvec(struct lruvec *lruvec, struct scan_control
> > > *sc)
> > >  {
> > >         unsigned long nr[NR_LRU_LISTS];
> > > -       unsigned long targets[NR_LRU_LISTS];
> > > -       unsigned long nr_to_scan;
> > > +       unsigned long file_target, anon_target;
> > > 
> > > >From the above snippet, we can know that the "percent" locals come from
> > > targets[NR_LRU_LISTS]. So this fix does not increase the stack.
> > 
> > OK.  But I expect the stack use could be decreased by using more
> > complex expressions.
> 
> I didn't look at this patch yet but want to say.
> 
> The expression is not easy to follow since several people already
> confused/discuss/fixed a bit so I'd like to put more concern to clarity
> rather than stack footprint.

That code is absolutely awful :( It's terribly difficult to work out
what the design is - what the code is actually setting out to achieve. 
One is reduced to trying to reverse-engineer the intent from the
implementation and that becomes near impossible when the
implementation has bugs!

Look at this miserable comment:

		/*
		 * For kswapd and memcg, reclaim at least the number of pages
		 * requested. Ensure that the anon and file LRUs are scanned
		 * proportionally what was requested by get_scan_count(). We
		 * stop reclaiming one LRU and reduce the amount scanning
		 * proportional to the original scan target.
		 */


> For kswapd and memcg, reclaim at least the number of pages
> requested.

*why*?

> Ensure that the anon and file LRUs are scanned
> proportionally what was requested by get_scan_count().

Ungramattical.  Lacks specificity.  Fails to explain *why*.

> We stop reclaiming one LRU and reduce the amount scanning
> proportional to the original scan target.

Ungramattical.  Lacks specificity.  Fails to explain *why*.


The only way we're going to fix all this up is to stop looking at the
code altogether.  Write down the design and the intentions in English. 
Review that.  Then implement that design in C.

So review and understanding of this code then is a two-stage thing. 
First, we review and understand the *design*, as written in English. 
Secondly, we check that the code faithfully implements that design. 
This second step becomes quite trivial.


That may all sound excessively long-winded and formal, but
shrink_lruvec() of all places needs such treatment.  I am completely
fed up with peering at the code trying to work out what on earth people
were thinking when they typed it in :(


So my suggestion is: let's stop fiddling with the code.  Someone please
prepare a patch which fully documents the design and let's get down and
review that.  Once that patch is complete, let's then start looking at
the implementation.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ