Improving control over transparent huge page use

The use of huge pages can significantly increase the performance of many workloads by reducing both memory-management overhead in the kernel and pressure on the system's translation lookaside buffer (TLB). The addition of transparent huge pages (THP) for the 2.6.38 kernel release in 2011 caused the kernel to allocate huge pages automatically to make their benefits available to all workloads without any effort needed on the user-space side. But it turns out that use of huge pages can make some workloads slower as the result of internal memory fragmentation, so the THP feature is often disabled. Two patch sets aimed at better targeting the use of transparent huge pages are currently working their way through the review process.
使用大页可以显著提高许多工作负载的性能,因为它减少了内核中的内存管理开销和系统转换旁路缓冲区(TLB)的压力。在 2011 年的 2.6.38 内核版本中引入了透明大页(THP),使内核能够自动分配大页,从而让所有工作负载无需用户空间的额外操作就能受益。但事实证明,大页的使用会因内部内存碎片化而让某些工作负载变慢,因此 THP 功能经常被禁用。目前,有两个补丁集旨在更精准地使用透明大页,正在进行评审。

Over the years, the kernel has evolved a number of ways to control the use of THP; they are described in Documentation/admin-guide/mm/transhuge.rst. At the global level, the /sys/kernel/mm/transparent_hugepage/enabled knob controls behavior system-wide. It can be set to "always" or "never" with obvious results. This knob also supports the "madvise" setting, which only enables THP for processes that explicitly opt in for specific memory regions with a call to madvise(). The kernel, in other words, allows for the imposition of a system-wide policy, with the possibility of restricting THP usage to places where applications have explicitly enabled it.
多年来,内核逐渐发展出了多种控制 THP 使用的方法,这些方法记录在 Documentation/admin-guide/mm/transhuge.rst 中。在全局层面,/sys/kernel/mm/transparent_hugepage/enabled 控制器可以系统范围内设置行为。它可以被设置为 “always” 或 “never”,含义显而易见。该控制器还支持 “madvise” 设置,仅为显式调用 madvise() 为特定内存区域启用 THP 的进程打开 THP。换句话说,内核允许制定系统范围的策略,并可以将 THP 使用限制在应用程序显式启用的地方。

Tweaking prctl()
调整 prctl()

There are more control points for THP usage, though, including a whole set of knobs for the khugepaged kernel thread (which builds huge pages out of base pages in the background) and a set of kernel command-line options. There is also the PR_SET_THP_DISABLE option to prctl(), which lets a process disa

### Microsoft Defender for Endpoint Version 2.1 Configuration and Usage Guide #### Overview of Microsoft Defender for Endpoint Microsoft Defender for Endpoint provides comprehensive protection against sophisticated attacks by integrating endpoint protection platform capabilities including prevention, detection, investigation, and response[^4]. In version 2.1, several enhancements were introduced to improve security posture management, automated investigations, and remediation. #### Key Features in Version 2.1 The update focuses on strengthening existing functionalities while introducing new ones aimed at improving operational efficiency and enhancing threat defense mechanisms: - **Enhanced Threat & Vulnerability Management**: Provides deeper insights into vulnerabilities within the environment. - **Advanced Hunting Capabilities**: Allows users to proactively search across their data using query-based methods without relying solely on alerts generated from predefined rules or machine learning models. - **Improved Automation Rules**: Facilitates more granular control over automatic actions taken during incident responses such as isolating devices automatically when certain conditions are met. #### Installation Requirements To deploy Microsoft Defender for Endpoint effectively, ensure that prerequisites like supported operating systems (Windows Server 2016+, Windows 10 Pro/Education/Enterprise), network connectivity requirements, and necessary permissions are fulfilled before proceeding with installation steps outlined officially by Microsoft documentation[^5]. #### Deployment Steps For deploying this solution successfully: Install via Intune or SCCM depending upon organizational needs; configure settings through Security Center portal ensuring proper integration between different components involved in protecting endpoints against modern cyber threats. #### Post-deployment Considerations After successful deployment, it’s important to monitor performance regularly, apply updates promptly, adjust policies based on evolving business contexts, educate employees about best practices regarding cybersecurity hygiene, etc., which collectively contribute towards maintaining robust defenses around critical assets protected under MDE umbrella services provided by Microsoft. ```powershell # Example PowerShell script snippet showing how one might interact programmatically with some aspects of MDfE after setup Set-MpPreference -DisableRealtimeMonitoring $false # Enable real-time monitoring if disabled previously Add-MpThreatSubmission -FilePath "C:\SuspiciousFile.exe" -Category PotentiallyUnwantedApplication # Submit suspicious files for analysis ```
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包

打赏作者

mounter625

你的鼓励将是我创作的最大动力

¥1 ¥2 ¥4 ¥6 ¥10 ¥20
扫码支付:¥1
获取中
扫码支付

您的余额不足,请更换扫码支付或充值

打赏作者

实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值