Re: OOM triggered with plenty of memory free

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Feb 13, 2013 at 07:14:50AM -0800, Dave Hansen wrote:
> On 02/12/2013 08:25 PM, Jonathan Woithe wrote:
> >> > Better yet would be to try to upgrade these machines to a more recent 
> >> > kernel to see if it is already fixed.  Are we allowed to upgrade or at 
> >> > least enable kmemleak?
> > Upgrading to a recent kernel would be a possibility if it was proven to fix
> > the problem; doing it "just to check" will be impossible I fear, at least on
> > the production systems.  Enabling KMEMLEAK on 2.6.35.x may be doable.
> > 
> > I will see whether I can gain access to a test system and if so, try a more
> > recent kernel to see if it makes any difference.
> > 
> > I'll advise which of these options proves practical as soon as possible and
> > report any findings which come out of them.

I am currently running a test using the 3.7.9 kernel (the latest stable
release at the time of downloading).  I am not yet convinced that the
problem is showing itself under this kernel; while the relevant kmalloc
statistics did climb over the first day or so, they seem to have settled for
the moment (which is more or less what I'd expect).  I intend to keep the
test running over the coming weekend and evaluate the slabinfo after that
(I've been taking daily snapshots of it).

My intention after this is to return to the kernel which has shown the
problem (2.6.35.11), compile it with kmemleak enabled and see if it shows up
anything interesting.

This 3.7.9 does have kmemleak enabled and it has thrown two reports.  Both
are tiny and insignificant, and both seem to relate to code which runs only
at boot time.  However, someone might be interested in them so I'll include
them at the end of this mail.

Regards
  jonathan

unreferenced object 0xf415f290 (size 8):
  comm "swapper/0", pid 1, jiffies 4294668872 (age 170230.022s)
  hex dump (first 8 bytes):
    68 6f 73 74 30 00 00 00                          host0...
  backtrace:
    [<c1a86f3c>] kmemleak_alloc+0x2c/0x60
    [<c111d11d>] __kmalloc_track_caller+0xbd/0x180
    [<c1539993>] kvasprintf+0x33/0x60
    [<c152eb42>] kobject_set_name_vargs+0x32/0x70
    [<c15db8c9>] dev_set_name+0x19/0x20
    [<c16182ee>] scsi_host_alloc+0x22e/0x2d0
    [<c16183a8>] scsi_register+0x18/0x80
    [<c1e4092d>] aha1542_detect+0x100/0x7c0
    [<c1e4104c>] init_this_scsi_driver+0x5f/0xc4
    [<c1001124>] do_one_initcall+0x34/0x170
    [<c1e0b55e>] kernel_init_freeable+0x118/0x1b3
    [<c1a856f0>] kernel_init+0x10/0xe0
    [<c1aba577>] ret_from_kernel_thread+0x1b/0x28
    [<ffffffff>] 0xffffffff
unreferenced object 0xf415f298 (size 8):
  comm "swapper/0", pid 1, jiffies 4294668873 (age 170230.021s)
  hex dump (first 8 bytes):
    68 6f 73 74 31 00 00 00                          host1...
  backtrace:
    [<c1a86f3c>] kmemleak_alloc+0x2c/0x60
    [<c111d11d>] __kmalloc_track_caller+0xbd/0x180
    [<c1539993>] kvasprintf+0x33/0x60
    [<c152eb42>] kobject_set_name_vargs+0x32/0x70
    [<c15db8c9>] dev_set_name+0x19/0x20
    [<c16182ee>] scsi_host_alloc+0x22e/0x2d0
    [<c16183a8>] scsi_register+0x18/0x80
    [<c1e4092d>] aha1542_detect+0x100/0x7c0
    [<c1e4104c>] init_this_scsi_driver+0x5f/0xc4
    [<c1001124>] do_one_initcall+0x34/0x170
    [<c1e0b55e>] kernel_init_freeable+0x118/0x1b3
    [<c1a856f0>] kernel_init+0x10/0xe0
    [<c1aba577>] ret_from_kernel_thread+0x1b/0x28
    [<ffffffff>] 0xffffffff

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>


[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]