lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 29 Jul 2010 13:27:03 +0900 From: KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com> To: KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com> Cc: Andrew Morton <akpm@...ux-foundation.org>, "linux-mm@...ck.org" <linux-mm@...ck.org>, "nishimura@....nes.nec.co.jp" <nishimura@....nes.nec.co.jp>, "balbir@...ux.vnet.ibm.com" <balbir@...ux.vnet.ibm.com>, gthelen@...gle.com, m-ikeda@...jp.nec.com, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org> Subject: Re: [RFC][PATCH 1/7][memcg] virtually indexed array library. On Thu, 29 Jul 2010 09:32:26 +0900 KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com> wrote: > On Wed, 28 Jul 2010 12:45:13 -0700 > Andrew Morton <akpm@...ux-foundation.org> wrote: > > My gut reaction to this sort of thing is "run away in terror". It > > encourages kernel developers to operate like lackadaisical userspace > > developers and to assume that underlying code can perform heroic and > > immortal feats. But it can't. This is the kernel and the kernel is a > > tough and hostile place and callers should be careful and defensive and > > take great efforts to minimise the strain they put upon other systems. > > > > IOW, can we avoid doing this? > > > I'll use pre-allocated pointer array in the next version. It's simple even if a bit slow. == struct mem_cgroup *mem_cgroups[CONFIG_MAX_MEM_CGROUPS] __read_mostly; #define id_to_memcg(id) mem_cgroups[id]; == But this can use hugepage-mapping-for-kernel...so, can be quick. Thanks, -Kame -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists