lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <460D009E-AC58-4AF2-AF43-A1C38570CDFB@linux.dev>
Date: Thu, 22 Jan 2026 11:53:59 +0800
From: Muchun Song <muchun.song@...ux.dev>
To: Li Zhe <lizhe.67@...edance.com>
Cc: osalvador@...e.de,
 david@...nel.org,
 akpm@...ux-foundation.org,
 linux-mm@...ck.org,
 linux-kernel@...r.kernel.org
Subject: Re: [PATCH] hugetlb: increase hugepage reservations when using
 node-specific "hugepages=" cmdline



> On Jan 22, 2026, at 11:50, Li Zhe <lizhe.67@...edance.com> wrote:
> 
> Commit 3dfd02c90037 ("hugetlb: increase number of reserving hugepages
> via cmdline") raised the number of hugepages that can be reserved
> through the boot-time "hugepages=" parameter for the non-node-specific
> case, but left the node-specific form of the same parameter unchanged.
> 
> This patch extends the same optimization to node-specific reservations.
> When HugeTLB vmemmap optimization (HVO) is enabled and a node cannot
> satisfy the requested hugepages, the code first releases ordinary
> struct-page memory of hugepages obtained from the buddy allocator,
> allowing their struct-page memory to be reclaimed and reused for
> additional hugepage reservations on that node.
> 
> This is particularly beneficial for configurations that require
> identical, large per-node hugepage reservations. On a four-node, 384 GB
> x86 VM, the patch raises the attainable 2 MiB hugepage reservation from
> under 374 GB to more than 379 GB.
> 
> Signed-off-by: Li Zhe <lizhe.67@...edance.com>

Reviewed-by: Muchun Song <muchun.song@...ux.dev>



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ