-
sommerfeld
I guess one question is what the memory map looks like on each node and how you "name" the chunks of memory across the set of cooperating processors.
-
rmustacc
So, first I don't think CPUs can reach remote memory.
-
rmustacc
Certainly, the other stuff suggests that a single system is the coherency domain and that the local CPU can cache the local GPU's memory coherently, but I don't see anything beyond that.
-
rmustacc
It's also not clear to me that the remote GPU stuff is coherent per se, so I think if you were looking for a place to research, I'd go to how does this work with CUDA across multiple GPUs connected via NVLink today.
-
copec
👍
-
sommerfeld
I've seen some indications that perfect coherency was surprisingly unimportant for ML training job communications(!)
-
rmustacc
Coherency is expensive.
-
gitomat
[illumos-gate] 15496 dr: array subscript 3 is above array bounds -- Toomas Soome <tsoome⊙mc>
-
jbk
when upgrading, how does smf determine if it should (re)import a manifest? I thought I found the bits that do that a while ago, but can't find it now, and I can't recall if it's just looking at a timestamp or doing a checksum of some sort on the manifest itself...
-
sommerfeld
jbk: I also vaguely recall finding that recently and don't remember the answer..
-
sommerfeld
comments in /usr/src/cmd/svc/manifest-import strongly imply a hash
-
jbk
yeah, i encountered it somewhere in the past, but can't remember where now, or find it again :)
-
sommerfeld
svccfg -s smf/manifest listprop dumps all the hashes. there's a pair of framework properties for each imported manifest with the pathname and a hash value
-
sommerfeld
usr/src/cmd/svc/common/manifest_hash.c
-
sommerfeld
using (alas) MD5
-
sommerfeld
not because it's a vulnerability, but because it creates the possibility that you might need to prove to people that it's not a vulnerability in this application...
-
sommerfeld
block comments around mhash_test_file() explain what it's looking for...
-
sommerfeld
two hashes - one of file metadata, one of file contents.
-
danmcd
@sommerfeld MD5 as CRC or as something actually secure?
-
richlowe
I think the hash is used for rename detection or something? but it's been ages
-
richlowe
and liane only explained the rename stuff to be very briefly, and in terms centered on it being a shame
-
richlowe
but I thought it was in the same tub of magic as the `cmd/svc/shell/mfsthistory` file
-
richlowe
but I could be 100% wrong
-
sommerfeld
danmcd: used as change detection.
-
sommerfeld
like I said, "use of MD5 creates creates the possibility that you might need to prove to people that it's not a vulnerability in this application.."
-
sommerfeld
used only on files contained in directory hierarchies that ought to be writable only to system administrators.
-
richlowe
sommerfeld: agreed
-
jbk
given an fd that's an open device node (i.e. S_ISCHR(mode) != 0), what would be the easiest way to determine the name of the driver for that (userland)?
-
sommerfeld
get major number of st_rdev, convert to decimal, grep in /etc/name_to_major ?
-
sommerfeld
(spot checking this appears to produce sane results)
-
sommerfeld
(if you need to do this a lot, build an index, but you said "easy"..)
-
richlowe
I had thought there was something in libdevinfo, but I'm not finding it
-
richlowe
(probably to go from a major to a node to a name, but...)
-
richlowe
-
richlowe
(modctl is private, but that is the meat you would grind your interface from)
-
danmcd
It's been long enough where I don't remember --> How do you determine which versions of `gmp`, `mpc`, and `mpfr` to use with a given version of gcc? Asking for a gcc14-curious friend. :)
-
gitomat
[illumos-gate] 16867 gcc 14 needs to use -gstrict-dwarf afterall -- Toomas Soome <tsoome⊙mc>
-
jperkin
I just use the latest, I don't remember having to use specific versions
-
danmcd
Gotcha. Latest it is.
-
neirac
is it possible to pass a virtual serial port using passthrough to bhyve ?, but what happens when that virtual serial port disappears?