lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20181018163836.00005a45@huawei.com>
Date:   Thu, 18 Oct 2018 16:38:36 +0100
From:   Jonathan Cameron <jonathan.cameron@...wei.com>
To:     Oscar Salvador <osalvador@...hadventures.net>
CC:     <akpm@...ux-foundation.org>, <mhocko@...e.com>,
        <dan.j.williams@...el.com>, <yasu.isimatu@...il.com>,
        <rppt@...ux.vnet.ibm.com>, <malat@...ian.org>,
        <linux-kernel@...r.kernel.org>, <pavel.tatashin@...rosoft.com>,
        <jglisse@...hat.com>, <rafael@...nel.org>, <david@...hat.com>,
        <dave.jiang@...el.com>, <linux-mm@...ck.org>,
        <alexander.h.duyck@...ux.intel.com>,
        Oscar Salvador <osalvador@...e.de>, <linuxarm@...wei.com>
Subject: Re: [PATCH 5/5] mm/memory-hotplug: Rework
 unregister_mem_sect_under_nodes

On Thu, 18 Oct 2018 17:02:21 +0200
Oscar Salvador <osalvador@...hadventures.net> wrote:

> On Thu, Oct 18, 2018 at 03:24:34PM +0100, Jonathan Cameron wrote:
> > Tested-by: Jonathan Cameron <Jonathan.Cameron@...wei.com>  
> 
> Thanks a lot Jonathan for having tested it!
> 
> Did you test the whole serie or only this patch?
> Since you have caught some bugs testing the memory-hotplug code
> on ARM64, I wonder if you could test it with the whole serie
> applied (if you got some free time, of course).
> 
> 
> thanks again!

Sorry I should have said.  Whole series on latest mmotm as of yesterday.
Obviously that only tested some of the code paths as I didn't test
hmm at all.

There are a few more quirks to chase down on my list, but nothing
related to this series and all superficial stuff.

I'm away from my boards (or the remote connection to them anyway) until
the 29th so any other tests will probably have to wait until then.

It's not clear if we'll take the actual arm64 support forwards but
hopefully someone will pick it up in the near future if we don't.
The complexity around pfn_valid on arm64 may take some time to unwind.

Thanks,

Jonathan

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ