lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 24 Oct 2016 10:16:32 -0700
From:   Dave Hansen <dave.hansen@...el.com>
To:     Anshuman Khandual <khandual@...ux.vnet.ibm.com>,
        linux-kernel@...r.kernel.org, linux-mm@...ck.org
Cc:     mhocko@...e.com, js1304@...il.com, vbabka@...e.cz, mgorman@...e.de,
        minchan@...nel.org, akpm@...ux-foundation.org,
        aneesh.kumar@...ux.vnet.ibm.com, bsingharora@...il.com
Subject: Re: [RFC 3/8] mm: Isolate coherent device memory nodes from HugeTLB
 allocation paths

On 10/23/2016 09:31 PM, Anshuman Khandual wrote:
> This change is part of the isolation requiring coherent device memory nodes
> implementation.
> 
> Isolation seeking coherent device memory node requires allocation isolation
> from implicit memory allocations from user space. Towards that effect, the
> memory should not be used for generic HugeTLB page pool allocations. This
> modifies relevant functions to skip all coherent memory nodes present on
> the system during allocation, freeing and auditing for HugeTLB pages.

This seems really fragile.  You had to hit, what, 18 call sites?  What
are the odds that this is going to stay working?

> @@ -2666,6 +2688,10 @@ static void __init hugetlb_register_all_nodes(void)
>  
>  	for_each_node_state(nid, N_MEMORY) {
>  		struct node *node = node_devices[nid];
> +
> +		if (isolated_cdm_node(nid))
> +			continue;
> +
>  		if (node->dev.id == nid)
>  			hugetlb_register_node(node);
>  	}

This looks to be completely kneecapping hugetlbfs on these cdm nodes.
Is that really what you want?

> @@ -2819,8 +2845,12 @@ static unsigned int cpuset_mems_nr(unsigned int *array)
>  	int node;
>  	unsigned int nr = 0;
>  
> -	for_each_node_mask(node, cpuset_current_mems_allowed)
> +	for_each_node_mask(node, cpuset_current_mems_allowed) {
> +		if (isolated_cdm_node(node))
> +			continue;
> +
>  		nr += array[node];
> +	}
>  
>  	return nr;
>  }
> @@ -2940,7 +2970,10 @@ void hugetlb_show_meminfo(void)
>  	if (!hugepages_supported())
>  		return;
>  
> -	for_each_node_state(nid, N_MEMORY)
> +	for_each_node_state(nid, N_MEMORY) {
> +		if (isolated_cdm_node(nid))
> +			continue;
> +
>  		for_each_hstate(h)
>  			pr_info("Node %d hugepages_total=%u hugepages_free=%u hugepages_surp=%u hugepages_size=%lukB\n",
>  				nid,
> @@ -2948,6 +2981,7 @@ void hugetlb_show_meminfo(void)
>  				h->free_huge_pages_node[nid],
>  				h->surplus_huge_pages_node[nid],
>  				1UL << (huge_page_order(h) + PAGE_SHIFT - 10));
> +	}
>  }

Your patch description talks about removing *implicit* memory
allocations.  But, this removes even the ability to gather *stats* about
huge pages sitting on one of these nodes.  That's a lot more drastic
than just changing implicit policies.

Is that patch description accurate?

It looks to me like you just went through all the for_each_node*() loops
in hugetlb.c and hacked your node check into them indiscriminately.
This totally removes the ability to *do* hugetlb on this nodes.

Isn't there some simpler way to do all this, like maybe changing the
root cpuset to disallow allocations to these nodes?

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ