lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEtiSauZg+sqZ01S0qcqEJsmmgTB3cZvnK-pC6NUerb40TB5rA@mail.gmail.com>
Date:	Mon, 14 May 2012 22:33:35 +0530
From:	Aaditya Kumar <aaditya.kumar.30@...il.com>
To:	KOSAKI Motohiro <kosaki.motohiro@...il.com>
Cc:	linux-kernel@...r.kernel.org, frank.rowand@...sony.com,
	tim.bird@...sony.com, takuzo.ohara@...sony.com,
	kan.iibuchi@...sony.com, kosaki.motohiro@...fujitsu.com
Subject: Re: [RFC][PATCH] mm: Update zone->un_reclaimable in direct reclaim path

Dear Kosaki-san,

Konnichiwa,

> Today I don't have a time and I didn't read your patch. but I would say my
> patch
> passed my hotplug test. so can you please tell us your test case and
> reproducer?

My test case is as follows:
 1. Boot the kernel with 4 memory sections of 16MB each and each
belonging to a different NUMA node.
     We use 48MB for non movable memory ('kernelcore='). Also we do
NOT use swap devices.

 2. Execute a program that hogs memory (to be more precise, does
malloc()+ memset() on 70%
    of the total memory) and then sleeps.

 3. Try to offline all the memory sections one by one.

 On my board the kernel hangs in step three. From my debugging, I
found it is due to
 an infinite loop in direct reclaim path because in above test case
condition the
 zone->unreclaimable is not set, even though almost all pages are in
ISOLATED state.

 I am using a board not supported in mainline kernel but since the
code path of the
 problem is arch independent So I thought above test case should
reproduce on other
 architectures too and may be the patch can be helpful.

 Just FYI:
 We are using a modified kernel where we use different NUMA nodes for
different type
 of memory allocation (based on speed, readable-writable ,etc ) on
ARM. But these
 modifications are independent of code path of patch and we believe it
is independent of the
 problem.

Regards,
Aaditya Kumar.
Sony India Software Centre.

On Sat, May 12, 2012 at 2:56 AM, KOSAKI Motohiro
<kosaki.motohiro@...il.com> wrote:
> (5/11/12 4:35 AM), Aaditya Kumar wrote:
>>
>> Dear All,
>>
>>  Commit 929bea7c714220fc76ce3f75bef9056477c28e74 seems to have broken the
>>  OOM invocation during memory hot unplug in low memory conditions. This
>> commit
>>  modifies the 'un-reclaimabilty check'  for  giving up trying to
>> reclaim pages in the
>> direct reclaim path and invoke OOM  killer to be based on
>> zone->unreclaimable.
>
>
> Today I don't have a time and I didn't read your patch. but I would say my
> patch
> passed my hotplug test. so can you please tell us your test case and
> reproducer?
>
> I'll look into closely later.
>
>
>
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ