lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20190131080311.qiqi2tj4iromzzap@d104.suse.de>
Date:   Thu, 31 Jan 2019 09:03:14 +0100
From:   Oscar Salvador <osalvador@...e.de>
To:     Michal Hocko <mhocko@...nel.org>
Cc:     linux-mm@...ck.org, dan.j.williams@...el.com,
        Pavel.Tatashin@...rosoft.com, david@...hat.com,
        linux-kernel@...r.kernel.org, dave.hansen@...el.com
Subject: Re: [RFC PATCH v2 0/4] mm, memory_hotplug: allocate memmap from
 hotadded memory

On Thu, Jan 31, 2019 at 08:23:19AM +0100, Michal Hocko wrote:
> On Wed 30-01-19 22:52:04, Oscar Salvador wrote:
> > On Tue, Jan 22, 2019 at 11:37:04AM +0100, Oscar Salvador wrote:
> > > I yet have to check a couple of things like creating an accounting item
> > > like VMEMMAP_PAGES to show in /proc/meminfo to ease to spot the memory that
> > > went in there, testing Hyper-V/Xen to see how they react to the fact that
> > > we are using the beginning of the memory-range for our own purposes, and to
> > > check the thing about gigantic pages + hotplug.
> > > I also have to check that there is no compilation/runtime errors when
> > > CONFIG_SPARSEMEM but !CONFIG_SPARSEMEM_VMEMMAP.
> > > But before that, I would like to get people's feedback about the overall
> > > design, and ideas/suggestions.
> > 
> > just a friendly reminder if some feedback is possible :-)
> 
> I will be off next week and will not get to this this week.

Sure, it can wait.
In the meantime I will take the chance to clean up a couple of things.

Thanks
-- 
Oscar Salvador
SUSE L3

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ