lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 4 Nov 2020 10:29:59 -0800
From:   Linus Torvalds <>
To:     kernel test robot <>,
        Jann Horn <>
Cc:     Peter Xu <>, LKML <>,, kernel test robot <>,
        "Huang, Ying" <>,
        Feng Tang <>,
Subject: Re: [mm/gup] a308c71bf1: stress-ng.vm-splice.ops_per_sec -95.6% regression

On Mon, Nov 2, 2020 at 1:15 AM kernel test robot <> wrote:
> Greeting,
> FYI, we noticed a -95.6% regression of stress-ng.vm-splice.ops_per_sec due to commit:
> commit: a308c71bf1e6e19cc2e4ced31853ee0fc7cb439a ("mm/gup: Remove enfornced COW mechanism")
> master

Note that this is just the reverse of the previous 2000% improvement
reported by the test robot here:

and the explanation seems to remain the same:

IOW, this is testing a special case (zero page lookup) that the "force
COW" patches happened to turn into a regular case (COW creating a
regular page from the zero page).

The question is whether we should care about the zero page for gup_fast lookup.

If we do care, then the proper fix is likely simply to allow the zero
page in fast-gup, the same way we already do in slow-gup.


Rong - mind testing this? I don't think the zero-page _should_ be
something that real loads care about, but hey, maybe people do want to
do things like splice zeroes very efficiently..

And note the "untested" part of the patch. It _looks_ fairly obvious,
but maybe I'm missing something.


Download attachment "patch" of type "application/octet-stream" (632 bytes)

Powered by blists - more mailing lists