lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8185.1304347042@localhost>
Date:	Mon, 02 May 2011 10:37:22 -0400
From:	Valdis.Kletnieks@...edu
To:	akpm@...ux-foundation.org
Cc:	linux-kernel@...r.kernel.org, linux-mm@...ck.org
Subject: Re: mmotm 2011-04-29 - wonky VmRSS and VmHWM values after swapping

On Sun, 01 May 2011 20:26:54 EDT, Valdis.Kletnieks@...edu said:
> On Fri, 29 Apr 2011 16:26:16 PDT, akpm@...ux-foundation.org said:
> > The mm-of-the-moment snapshot 2011-04-29-16-25 has been uploaded to
> > 
> >    http://userweb.kernel.org/~akpm/mmotm/
>  
> Dell Latitude E6500 laptop, Core2 Due P8700, 4G RAM, 2G swap.Z86_64 kernel.
> 
> I was running a backup of the system to an external USB hard drive.

Is a red herring.  Am seeing it again, after only 20 minutes of uptime, and so
far I've only gotten 1.2G or so into the 4G ram (2.5G still free), and never
touched swap yet.

Aha! I have a reproducer (found while composing this note).  /bin/su will
reliably trigger it (4 tries out of 4, launching from a bash shell that itself
has sane VmRSS and VmHWM values).  So it's a specific code sequence doing it
(probably one syscall doing something quirky).

Now if I could figure out how to make strace look at the VmRSS after each
syscall, or get gdb to do similar.  Any suggestions?  Am open to perf/other
solutions as well, if anybody has one handy...


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ