We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: mm/swapfile: add cond_resched() in get_swap_pages() The softlockup still occurs in get_swap_pages() under memory pressure. 64 CPU cores, 64GB memory, and 28 zram devices, the disksize of each zram device is 50MB with same priority as si. Use the stress-ng tool to increase memory pressure, causing the system to oom frequently. The plist_for_each_entry_safe() loops in get_swap_pages() could reach tens of thousands of times to find available space (extreme case: cond_resched() is not called in scan_swap_map_slots()). Let's add cond_resched() into get_swap_pages() when failed to find available space to avoid softlockup.
Reserved 2024-08-21 | Published 2025-03-27 | Updated 2025-05-04 | Assigner Linuxgit.kernel.org/...c/29f0349c5c76b627fe06b87d4b13fa03a6ce8e64
git.kernel.org/...c/387217b97e99699c34e6d95ce2b91b327fcd853e
git.kernel.org/...c/d49c85a1913385eed46dd16a25ad0928253767f0
git.kernel.org/...c/30187be29052bba9203b0ae2bdd815e0bc2faaab
git.kernel.org/...c/5dbe1ebd56470d03b78fc31491a9e4d433106ef2
git.kernel.org/...c/49178d4d61e78aed8c837dfeea8a450700f196e2
git.kernel.org/...c/7717fc1a12f88701573f9ed897cc4f6699c661e3
Support options