lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Wed, 11 Dec 2019 13:30:02 +0100
From:   Jürgen Groß <jgross@...e.com>
To:     Roger Pau Monné <roger.pau@...rix.com>,
        SeongJae Park <sj38.park@...il.com>
Cc:     axboe@...nel.dk, konrad.wilk@...cle.com,
        SeongJae Park <sjpark@...zon.de>, pdurrant@...zon.com,
        sjpark@...zon.com, xen-devel@...ts.xenproject.org,
        linux-block@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v6 1/3] xenbus/backend: Add memory pressure handler
 callback

On 11.12.19 12:46, Roger Pau Monné wrote:
> On Wed, Dec 11, 2019 at 04:26:57AM +0000, SeongJae Park wrote:
>> +
>>   	return 0;
>>   }
>>   subsys_initcall(xenbus_probe_backend_init);
>> diff --git a/include/xen/xenbus.h b/include/xen/xenbus.h
>> index 869c816d5f8c..196260017666 100644
>> --- a/include/xen/xenbus.h
>> +++ b/include/xen/xenbus.h
>> @@ -104,6 +104,7 @@ struct xenbus_driver {
>>   	struct device_driver driver;
>>   	int (*read_otherend_details)(struct xenbus_device *dev);
>>   	int (*is_ready)(struct xenbus_device *dev);
>> +	void (*reclaim)(struct xenbus_device *dev);
> 
> reclaim_memory (if Juergen agrees).

I do agree.


Juergen

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ