lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 28 Jun 2009 11:36:38 -0700 (PDT)
From:	Linus Torvalds <torvalds@...ux-foundation.org>
To:	Arjan van de Ven <arjan@...radead.org>
cc:	Pavel Machek <pavel@....cz>,
	Andrew Morton <akpm@...ux-foundation.org>,
	penberg@...helsinki.fi, linux-kernel@...r.kernel.org,
	cl@...ux-foundation.org, npiggin@...e.de
Subject: Re: upcoming kerneloops.org item: get_page_from_freelist



On Sun, 28 Jun 2009, Arjan van de Ven wrote:
> > 
> > Almost the _only_ way to run out of memory is to have tons and tons
> > of dirty pages around. Yes, it can happen. But if it happens, you're
> > almost guaranteed to be screwed anyway. The whole VM is designed
> 
> my impression is that when the strict dirty accounting code went in,
> this problem largely went away.

Yes and no.

It's still pretty easy to have lots of dirty anonymous memory, no 
swap-space, and just run out of memory. If you do that, you're screwed. 
The oom killer may or may not help, but even if it works, it's probably 
going to work only after things have gotten pretty painful.

Also, we'll have to be pretty careful when/if we actually use that 
"gfp_allowed_mask" for suspend/resume/hibernate. The SLAB_GFP_BOOT_MASK 
has the __GFP_WAIT bit cleared, for example, which means that the VM won't 
try to free even trivially freeable memory.

So for hibernate, if/when we use this, we should make sure to still allow 
__GFP_WAIT (except, perhaps, during the stage when interrupts are actually 
disabled), but clear __GFP_IO and __GFP_FS.

Or whatever. The devil is in the details.

		Linus
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ