lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 7 Sep 2022 06:18:09 -1000 From: Tejun Heo <tj@...nel.org> To: Alexei Starovoitov <alexei.starovoitov@...il.com> Cc: Yafang Shao <laoar.shao@...il.com>, Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, Andrii Nakryiko <andrii@...nel.org>, Martin KaFai Lau <kafai@...com>, Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>, John Fastabend <john.fastabend@...il.com>, KP Singh <kpsingh@...nel.org>, Stanislav Fomichev <sdf@...gle.com>, Hao Luo <haoluo@...gle.com>, Jiri Olsa <jolsa@...nel.org>, Johannes Weiner <hannes@...xchg.org>, Michal Hocko <mhocko@...nel.org>, Roman Gushchin <roman.gushchin@...ux.dev>, Shakeel Butt <shakeelb@...gle.com>, Muchun Song <songmuchun@...edance.com>, Andrew Morton <akpm@...ux-foundation.org>, Zefan Li <lizefan.x@...edance.com>, "open list:CONTROL GROUP (CGROUP)" <cgroups@...r.kernel.org>, Network Development <netdev@...r.kernel.org>, bpf <bpf@...r.kernel.org>, linux-mm <linux-mm@...ck.org> Subject: Re: [PATCH bpf-next v3 00/13] bpf: Introduce selectable memcg for bpf map Hello, On Wed, Sep 07, 2022 at 09:13:09AM -0700, Alexei Starovoitov wrote: > Hmm. We discussed this option already. We definitely don't want > to introduce an uapi knob that will allow anyone to skip memcg > accounting today and in the future. cgroup.memory boot parameter is how memcg provides last-resort workarounds for this sort of problems / regressions while they're being addressed. It's not a dynamically changeable or programmable thing. Just a boot time opt-out. That said, if you don't want it, you don't want it. Thanks. -- tejun
Powered by blists - more mailing lists