lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:   Thu, 30 Jan 2020 08:21:39 -0500
From:   Boris Ostrovsky <boris.ostrovsky@...cle.com>
To:     sjpark@...zon.com, jgross@...e.com, roger.pau@...rix.com,
        axboe@...nel.dk
Cc:     konrad.wilk@...cle.com, pdurrant@...zon.com,
        SeongJae Park <sjpark@...zon.de>, linux-kernel@...r.kernel.org,
        linux-block@...r.kernel.org, xen-devel@...ts.xenproject.org
Subject: Re: [Xen-devel] [PATCH v14 0/5] xenbus/backend: Add memory pressure
 handler callback



On 1/27/20 3:18 AM, sjpark@...zon.com wrote:
> From: SeongJae Park <sjpark@...zon.de>
>
> Granting pages consumes backend system memory.  In systems configured
> with insufficient spare memory for those pages, it can cause a memory
> pressure situation.  However, finding the optimal amount of the spare
> memory is challenging for large systems having dynamic resource
> utilization patterns.  Also, such a static configuration might lack
> flexibility.
>
> To mitigate such problems, this patchset adds a memory reclaim callback
> to 'xenbus_driver' (patch 1) and then introduce a lock for race
> condition avoidance (patch 2).  After that, patch 3 applies the callback
> mechanism to mitigate the problem in 'xen-blkback'.  The fourth and
> fifth patches are trivial cleanups; those fix nits we found during the
> development of this patchset.
>
> Note that this patch has only trivial changes from v13.  Please refer to
> below patch history for the changes.
>


Applied to for-linus-5.6.

-boris

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ