lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 30 Sep 2012 11:52:05 -0700
From:	"H. Peter Anvin" <hpa@...or.com>
To:	Pierre Beck <mail@...rre-beck.de>
CC:	linux-kernel@...r.kernel.org
Subject: Re: 3.6-rc7 32-bit PAE miscalculates dirty page limits

On 09/30/2012 02:38 AM, Pierre Beck wrote:
> Hi,
>
> there seems to be a bug in either ext4 or VM code triggered with 16 GB
> memory when compiled with 32-bit and PAE. dirty_background_ratio
> defaults to 10, dirty_ratio to 20. But in effect, dirty pages are
> strongly limited (zero or negative?). I observed extreme I/O wait states
> and slow disk access. A quick cure was to set dirty_bytes and
> dirty_background_bytes to sane values, overriding the ratios. An
> educated guess: the result of dirty_ratio calculation is stored as an
> unsigned 32-bit integer and overflows?
>

Seriously, why are you running a 32-bit kernel on memory sizes this 
large?  Yes, in theory it should work up to 64 GB but claims are that 
the kernel doesn't even boot if you try...

	-hpa
-- 
H. Peter Anvin, Intel Open Source Technology Center
I work for Intel.  I don't speak on their behalf.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists