lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Tue, 21 Jan 2014 14:12:45 -0800 (PST)
From:	David Rientjes <rientjes@...gle.com>
To:	Wanpeng Li <liwanp@...ux.vnet.ibm.com>
cc:	Christoph Lameter <cl@...ux.com>, Michal Hocko <mhocko@...e.cz>,
	Han Pingtian <hanpt@...ux.vnet.ibm.com>,
	linux-kernel@...r.kernel.org, Pekka Enberg <penberg@...nel.org>,
	linux-mm@...ck.org
Subject: Re: OOM-killer and strange RSS value in 3.9-rc7

On Mon, 6 Jan 2014, Wanpeng Li wrote:

> >Is there any progress against slub's fix?
> >
> >MemTotal:        7760960 kB
> >Slab:            7064448 kB
> >SReclaimable:     143936 kB
> >SUnreclaim:      6920512 kB
> >
> >112084  10550   9%   16.00K   3507       32   1795584K kmalloc-16384
> >2497920  48092   1%    0.50K  19515      128   1248960K kmalloc-512 
> >6058888  89363   1%    0.19K  17768      341   1137152K kmalloc-192
> >114468  13719  11%    4.58K   2082       55    532992K task_struct 
> >
> 
> This machine has 200 CPUs and 8G memory. There is an oom storm, we are
> seeing OOM even in boot process.
> 

Is this still a problem with 3.9 and later kernels?  Please try to 
reproduce it on 3.13.

If it does reproduce, could you try to pinpoint the problem with kmemleak?  
Look into Documentation/kmemleak.txt which should identify where these 
leaks are coming from with your slab allocator of choice.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ