lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <ef2af3100711100809p41831ab8y7a53916f920a24d8@mail.gmail.com>
Date:	Sat, 10 Nov 2007 17:09:40 +0100
From:	"Tobias Brox" <tobixen@...il.com>
To:	"Tobias Brox" <tobixen@...il.com>, linux-kernel@...r.kernel.org
Subject: Re: OOM killer problem - how to read the kernel log?

[Tobias Brox]
> > We're running 32 bits linux, maybe it would help to upgrade to 64 bits?

[Johannes Weiner]
> Although you can address up to 64GB of RAM with PAE, the address space
> of directly accessible memory is still at 32bit (4GB) and access to
> higher memory costs low memory and processing overhead for the mapping
> into the 32bit address space.

Point taken.  I've gotten quite some replies on this, also off the
list.  We will upgrade to 64 bits, but I don't know when we will get
that done, so now we're wondering what we can do for short-term
solutions.

[Tobias Brox]
> > I've copied out relevant files on
> > http://oppetid.no/~tobixen/oom_problem/ - it's the complete kernel
> > log, /proc/config.gz, /proc/slabinfo, /proc/meminfo and dmesg.  Those
> > are of course fetched after the reboot.

[Hannes]
> kern.log has wrong permissions, slabinfo and meminfo are empty.

My oh my.  I'm really awfully bad at testing things.  Sorry for that.
Links should work now.  Ok, now it's even tested ;-)
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ