lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 4 Apr 2012 20:00:01 +0530
From:	Kautuk Consul <consul.kautuk@...il.com>
To:	David Miller <davem@...emloft.net>
Cc:	paul.gortmaker@...driver.com, mingo@...e.hu, joe@...ches.com,
	a.p.zijlstra@...llo.nl, sparclinux@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH 19/20 v4] sparc/mm/fault_32.c: Port OOM changes to do_sparc_fault

On Tue, Mar 27, 2012 at 3:06 AM, David Miller <davem@...emloft.net> wrote:
> From: Kautuk Consul <consul.kautuk@...il.com>
> Date: Mon, 26 Mar 2012 12:47:54 -0400
>
>> Commit d065bd810b6deb67d4897a14bfe21f8eb526ba99
>> (mm: retry page fault when blocking on disk transfer) and
>> commit 37b23e0525d393d48a7d59f870b3bc061a30ccdb
>> (x86,mm: make pagefault killable)
>>
>> The above commits introduced changes into the x86 pagefault handler
>> for making the page fault handler retryable as well as killable.
>>
>> These changes reduce the mmap_sem hold time, which is crucial
>> during OOM killer invocation.
>>
>> Port these changes to 32-bit sparc.
>>
>> Signed-off-by: Kautuk Consul <consul.kautuk@...il.com>
>
> Acked-by: David S. Miller <davem@...emloft.net>

Thanks David.

Since one or two of my other patches are being taken by the other arch
owners in their branches,
can you take this patch and apply it to your branch also ?

Much obliged if you do !
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ