lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <50C135EA.2030308@gmail.com>
Date:	Fri, 07 Dec 2012 08:18:50 +0800
From:	Jiang Liu <liuj97@...il.com>
To:	"H. Peter Anvin" <hpa@...or.com>
CC:	Wen Congyang <wency@...fujitsu.com>,
	Tang Chen <tangchen@...fujitsu.com>,
	wujianguo <wujianguo106@...il.com>, akpm@...ux-foundation.org,
	rob@...dley.net, isimatu.yasuaki@...fujitsu.com,
	laijs@...fujitsu.com, linfeng@...fujitsu.com, jiang.liu@...wei.com,
	yinghai@...nel.org, kosaki.motohiro@...fujitsu.com,
	minchan.kim@...il.com, mgorman@...e.de, rientjes@...gle.com,
	rusty@...tcorp.com.au, linux-kernel@...r.kernel.org,
	linux-mm@...ck.org, linux-doc@...r.kernel.org,
	wujianguo@...wei.com, qiuxishi@...wei.com
Subject: Re: [PATCH v2 5/5] page_alloc: Bootmem limit with movablecore_map

On 12/07/2012 01:41 AM, H. Peter Anvin wrote:
> On 12/06/2012 09:28 AM, Jiang Liu wrote:
>> Hi hpa and Tang,
>> 	How do you think about the attached patches, which reserves memory
>> for hotplug from memblock/bootmem allocator at early booting stages?
> 
> I don't see any attached patches?
> 
> 	-hpa
> 
Sorry, I was a little sleepy and missed the attachment.



View attachment "0001-memblock-introduce-interfaces-to-assoicate-tag-and-d.patch" of type "text/x-patch" (5499 bytes)

View attachment "0002-x86-memhotplug-reserve-memory-from-bootmem-allocator.patch" of type "text/x-patch" (6076 bytes)

View attachment "0003-CMA-use-new-memblock-interfaces-to-simplify-implemen.patch" of type "text/x-patch" (3923 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ