lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3349ee83873c944a4276e4547e78ab1e@suse.de>
Date:   Tue, 04 Aug 2020 10:13:19 +0200
From:   osalvador@...e.de
To:     Qian Cai <cai@....pw>
Cc:     HORIGUCHI NAOYA(堀口 直也) <naoya.horiguchi@....com>,
        nao.horiguchi@...il.com, linux-mm@...ck.org, mhocko@...nel.org,
        akpm@...ux-foundation.org, mike.kravetz@...cle.com,
        tony.luck@...el.com, david@...hat.com,
        aneesh.kumar@...ux.vnet.ibm.com, zeil@...dex-team.ru,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH v5 00/16] HWPOISON: soft offline rework

On 2020-08-04 03:49, Qian Cai wrote:
> 
> Well, each iteration will mmap/munmap, so there should be no leaking.
> 
> https://gitlab.com/cailca/linux-mm/-/blob/master/random.c#L376
> 
> It also seem to me madvise(MADV_SOFT_OFFLINE) does start to fragment 
> memory
> somehow, because after this "madvise: Cannot allocate memory" happened, 
> I
> immediately checked /proc/meminfo and then found no hugepage usage at 
> all.

Unfortunately I will be off for a week, but out of curiosity, could you 
try out with below tree [1] and see if you still see those issues?

Thanks for your time

[1] https://github.com/leberus/linux-mm-1/tree/hwpoison



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ