lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 10 May 2018 18:04:16 +0100
From:   Roman Gushchin <guro@...com>
To:     Shuah Khan <shuah@...nel.org>
CC:     Tejun Heo <tj@...nel.org>, Johannes Weiner <hannes@...xchg.org>,
        "Michal Hocko" <mhocko@...e.com>,
        Mike Rapoport <rppt@...ux.vnet.ibm.com>, <kernel-team@...com>,
        <linux-kselftest@...r.kernel.org>, <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH] selftests/cgroup: memory controller self-tests

On Thu, May 10, 2018 at 08:25:06AM -0600, Shuah Khan wrote:
> On 05/09/2018 01:20 PM, Roman Gushchin wrote:
> > Cgroups are used for controlling the physical resource distribution
> > (memory, CPU, io, etc) and often are used as basic building blocks
> > for large distributed computing systems. Even small differences
> > in the actual behavior may lead to significant incidents.
> > 
> > The codebase is under the active development, which will unlikely
> > stop at any time soon. Also it's scattered over different
> > kernel subsystems, which makes regressions more probable.
> > 
> > Given that, the lack of any tests is crying.
> > 
> > This patch implements some basic tests for the memory controller,
> > as well as a minimal required framework.
> > It doesn't pretend for a very good coverage, but pretends
> > to be a starting point.
> > 
> > Hopefully, any following significant changes will
> > include corresponding tests.
> > 
> > Tests for CPU and io controllers, as well as cgroup core
> > are next in the todo list.
> > 
> 
> Thanks you for the patch.

Hi Shuah!

Thank you for taking a look. I've addressed your comments in v2.

Thanks!

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ