lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <517B1153.8000401@valvesoftware.com>
Date:	Fri, 26 Apr 2013 16:44:19 -0700
From:	"Pierre-Loup A. Griffais" <pgriffais@...vesoftware.com>
To:	<hannes@...xchg.org>
CC:	<linux-kernel@...r.kernel.org>, <torvalds@...ux-foundation.org>,
	<riel@...hat.com>, <sonnyrao@...omium.org>,
	<kamezawa.hiroyu@...fujitsu.com>, <akpm@...ux-foundation.org>
Subject: IO regression after ab8fabd46f on x86 kernels with high memory

I initially observed this between kernels 3.2 and 3.5: on 3.2, copying a 
180M shared object on the same ext4 filesystem takes 0.6s. On 3.5, it 
takes between two and three minutes. It looks like a similar throughput 
regression happens on any machine running an i386 PAE kernel with high 
amounts of memory; the threshold seems to be 16G; passing mem=15G to the 
kernel commandline fixes it.

I bisected it to the following change:

commit ab8fabd46f811d5153d8a0cd2fac9a0d41fb593d
Author: Johannes Weiner <jweiner@...hat.com>
Date:   Tue Jan 10 15:07:42 2012 -0800

     mm: exclude reserved pages from dirtyable memory

I realize running x86 kernels against high amounts of memory is not 
advised for various reasons, but I would assume that such a big 
regression in basic functionality to not be part of them. Is that 
accurate, or are these configurations expected to become unusable from 
3.3 onwards?

Also CCing Sonny since it looks like he tried to fix an overflow issue 
related to the same change with commit c8b74c2f66049, but I'm still 
experiencing the problem with a kernel built from master.

Thanks,
  - Pierre-Loup
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ