lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 25 Nov 2014 22:31:36 +0100
From:	Toralf Förster <toralf.foerster@....de>
To:	Theodore Ts'o <tytso@....edu>
CC:	linux-ext4@...r.kernel.org
Subject: Re: fuzz testing a KVM machine (x86) with ext4fs forces much more
 often the oom killer than btrfs

On 11/25/2014 04:15 AM, Theodore Ts'o wrote:
> No idea; can you grab /proc/slabinfo and /proc/meminfo every minute or
> so until it oom kills trinity?  Maybe that will give us a hint of at
> least where the memory is getting consumed.

Tried to collect it (started trinity at 21:11), but the virtual machine crashed before at 21:55., nothing was logged BTW. 
But I'm pretty sure the free memory was gone, b/c the value LowFree was drastically reduced (7 files attached)


-- 
Toralf
pgp key: 0076 E94E


View attachment "meminfo.141125_211143" of type "text/plain" (1120 bytes)

View attachment "meminfo.141125_215545" of type "text/plain" (1120 bytes)

View attachment "meminfo.141125_215645" of type "text/plain" (1120 bytes)

View attachment "messages.log" of type "text/x-log" (8933 bytes)

View attachment "slabinfo.141125_211143" of type "text/plain" (9641 bytes)

View attachment "slabinfo.141125_215545" of type "text/plain" (9748 bytes)

View attachment "slabinfo.141125_215645" of type "text/plain" (9748 bytes)

Powered by blists - more mailing lists