lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <9748c07c-4e59-89d0-f425-c57f778d1b42@linux.intel.com> Date: Tue, 10 Aug 2021 11:30:55 -0700 From: Andi Kleen <ak@...ux.intel.com> To: Dave Hansen <dave.hansen@...el.com>, "Kirill A. Shutemov" <kirill@...temov.name>, Borislav Petkov <bp@...en8.de>, Andy Lutomirski <luto@...nel.org>, Sean Christopherson <seanjc@...gle.com>, Andrew Morton <akpm@...ux-foundation.org>, Joerg Roedel <jroedel@...e.de> Cc: Kuppuswamy Sathyanarayanan <sathyanarayanan.kuppuswamy@...ux.intel.com>, David Rientjes <rientjes@...gle.com>, Vlastimil Babka <vbabka@...e.cz>, Tom Lendacky <thomas.lendacky@....com>, Thomas Gleixner <tglx@...utronix.de>, Peter Zijlstra <peterz@...radead.org>, Paolo Bonzini <pbonzini@...hat.com>, Ingo Molnar <mingo@...hat.com>, Varad Gautam <varad.gautam@...e.com>, Dario Faggioli <dfaggioli@...e.com>, x86@...nel.org, linux-mm@...ck.org, linux-coco@...ts.linux.dev, linux-kernel@...r.kernel.org, "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com> Subject: Re: [PATCH 1/5] mm: Add support for unaccepted memory > So, this is right in the fast path of the page allocator. It's a > one-time thing per 2M page, so it's not permanent. > > *But* there's both a global spinlock and a firmware call hidden in > clear_page_offline(). That's *GOT* to hurt if you were, for instance, > running a benchmark while this code path is being tickled. Not just to > > That could be just downright catastrophic for scalability, albeit > temporarily This would be only a short blib at initialization until the system reaches steady state. So yes it would be temporary, but very short at that. -Andi
Powered by blists - more mailing lists