lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 08 Jul 2009 08:22:29 -0700
From:	Dave Hansen <dave@...ux.vnet.ibm.com>
To:	Sachin Sant <sachinp@...ibm.com>
Cc:	Stephen Rothwell <sfr@...b.auug.org.au>,
	linux-next@...r.kernel.org, LKML <linux-kernel@...r.kernel.org>
Subject: Re: OOM with hackbench against next 0708

On Wed, 2009-07-08 at 18:35 +0530, Sachin Sant wrote:
> While executing hackbench against today's next on a 4 way
> power6 box (9117 MMA), the machine crawled within few seconds
> with lots of OOM messages. I captured a Crash dump and was
> able to extract the dmesg log which i have attached here.
> 
> This problem started with 0706 next release. 0703 worked fine.
> 
> Kernel is compiled with SLQB and 64K page size.
> 
> .config attached. Let me know what other information i can
> provide to find a solution for this problem.

This doesn't look like a kernel bug at all to me.  You're out of memory,
out of swap, and the thing that got killed was the thing allocating
memory.  You're also down to 65MB of pagecache, which is awfully low for
a 6GB machine.  That tells me it's also been effective in reclaiming
disk cache.

There are a couple of possibilities:
1. hackbench is broken, allocating too much memory and ooming, or it
   has been misconfigured by a user
2. hackbench broke because something the kernel is telling it is wrong
3. The kernel is leaking (or just plain using) some memory more than a
   few releases ago, and that caused the oom.

I'd go back and carefully examine how hackbench is being run and that it
is consistent.  You should also double-check your finding that the
several-day-old -next isn't seeing this issue.

-- Dave

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ