lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <YrO+uap429yrLKD6@magnolia>
Date:   Wed, 22 Jun 2022 18:15:37 -0700
From:   "Darrick J. Wong" <djwong@...nel.org>
To:     Stephen Zhang <starzhangzsd@...il.com>
Cc:     dchinner@...hat.com, zhangshida <zhangshida@...inos.cn>,
        linux-kernel@...r.kernel.org, linux-xfs@...r.kernel.org
Subject: Re: [PATCH v3] xfs: add check before calling xfs_mod_fdblocks

On Wed, Jun 22, 2022 at 01:57:31PM +0800, Stephen Zhang wrote:
> > I understand that calling __xfs_ag_resv_init on an AG with a maximally
> > sized data structure can result in @hidden_space being zero here, but
> > why does that matter enough to change the code?  Are you experiencing
> > problems when this happens?  Unnecessary slowdowns at mount time?
> > Something else?
> >
> > This is v3 of a patch and I still can't tell why I should care ...?
> 
> After applying this patch, we can avoid to call xfs_mod_fdblocks when
> delta equals 0. So we can reduce unnecessary operations here.

Yeah, I get that, but what is the real world impact of those unnecessary
operations?  Have you run fstests to make sure this change doesn't trip
over some weird subtlety in the code?  Do the anticipated benefits
justify diverting my time to figuring out if we've really covered all
the corner cases?

IOWS: don't waste our time on theoretical improvements.  There are
/plenty/ of things in 5.19 that need real attention, like generic/522
corrupting things and recoveryloop tests that trip over log recovery.

--D

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ