lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 4 Jan 2017 09:06:40 +0100
From:   Michal Hocko <mhocko@...nel.org>
To:     Klaus Ethgen <Klaus+lkml@...gen.de>
Cc:     linux-kernel@...r.kernel.org, linux-mm@...ck.org
Subject: Re: [KERNEL] Re: Bug 4.9 and memorymanagement

On Fri 30-12-16 18:23:58, Michal Hocko wrote:
> On Fri 30-12-16 17:52:30, Klaus Ethgen wrote:
> > Sorry, did reply only you..
> > 
> > Am Fr den 30. Dez 2016 um 12:11 schrieb Michal Hocko:
> > > > If this turns out to be memory cgroup related then the patch from
> > > > http://lkml.kernel.org/r/20161226124839.GB20715@dhcp22.suse.cz might
> > > > help.
> > >
> > > Did you get chance to test the above patch? I would like to send it for
> > > merging and having it tested on another system would be really helpeful
> > > and much appreciated.
> > 
> > Sorry, no, I was a bit busy when coming back from X-mass. ;-)
> > 
> > Maybe I can do so today.
> > 
> > The only think is, how can I find out if the bug is fixed? Is 7 days
> > enough? Or is there a change to force the bug to happen (or not)...?
> 
> Just try to run with the patch and do what you do normally. If you do
> not see any OOMs in few days it should be sufficient evidence. From your
> previous logs it seems you hit the problem quite early after few hours
> as far as I remember.

Did you have chance to run with the patch? I would like to post it for
inclusion and feedback from you is really useful.

Thanks!
-- 
Michal Hocko
SUSE Labs

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ