lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 27 Jun 2013 12:49:25 +0400
From:	Roman Gushchin <klamm@...dex-team.ru>
To:	David Rientjes <rientjes@...gle.com>
CC:	Michal Hocko <mhocko@...e.cz>, Christoph Lameter <cl@...two.org>,
	penberg@...nel.org, mpm@...enic.com, akpm@...ux-foundation.org,
	mgorman@...e.de, glommer@...allels.com, hannes@...xchg.org,
	minchan@...nel.org, jiang.liu@...wei.com, linux-mm@...ck.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] slub: Avoid direct compaction if possible

On 18.06.2013 01:44, David Rientjes wrote:
> On Mon, 17 Jun 2013, Roman Gushchin wrote:

> They certainly aren't enough, the kernel you're running suffers from a
> couple different memory compaction issues that were fixed in 3.7.  I
> couldn't sympathize with your situation more, I faced the same issue
> because of thp and not slub (we use slab).
>
>> I'll try to reproduce the issue on raw 3.9.
>>

I can't reproduce the issue on 3.9.
It seems that compaction fixes in 3.7 solve the problem.

>
> Thanks.  If you need to go back to 3.4, try using these, they
> significantly helped our issues:
>
> bb13ffeb9f6bfeb301443994dfbf29f91117dfb3
> 627260595ca6abcb16d68a3732bac6b547e112d6
> c89511ab2f8fe2b47585e60da8af7fd213ec877e
> 62997027ca5b3d4618198ed8b1aba40b61b1137b
> a9aacbccf3145355190d87f0df1731fb84fdd8c8

Thank you!

Regards,
Roman


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ