lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 Mar 2013 17:10:51 -0400 From: Vivek Goyal <vgoyal@...hat.com> To: "H. Peter Anvin" <hpa@...or.com> Cc: "Eric W. Biederman" <ebiederm@...ssion.com>, Yinghai Lu <yinghai@...nel.org>, Konrad Rzeszutek Wilk <konrad.wilk@...cle.com>, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...nel.org>, WANG Chao <chaowang@...hat.com>, linux-kernel@...r.kernel.org Subject: Re: [PATCH] x86, kdump: Set crashkernel_low automatically On Mon, Mar 11, 2013 at 01:42:37PM -0700, H. Peter Anvin wrote: > On 03/11/2013 01:38 PM, Eric W. Biederman wrote: > > > > I totally makes sense to figure out how to load a kernel high. I am not > > convinced kexec on panic is the best use of that ability. I would argue > > that it might be better to figure out how to use a small memory > > foot-print and try to keep that foot-print from growing. > > > > I could not agree more with this. The whole reason this is a problem is > because we are talking about hundreds of megabytes of crashkernel. If > we can fix *that* problem, we are much better off. This kind of goal is achievable only if we also restrict how much memory first kernel can use. Then all the dependent component will be aware of how severe boot requirements are. And there is no such requirement. It is just a goal that keep memory bloat to the minimum. But bloat does not mean that booting is not allowed. To me kdump environment requirement should be no different. Otherwise enforcing them becomes a challenge. Thanks Vivek -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists