Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 29 Nov 2024 15:27:05 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 282994] Repeated kernel panics
Message-ID:  <bug-282994-227-FebNjmd2yI@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-282994-227@https.bugs.freebsd.org/bugzilla/>

index | next in thread | previous in thread | raw e-mail

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=282994

Mark Johnston <markj@FreeBSD.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|New                         |Open
                 CC|                            |markj@FreeBSD.org

--- Comment #3 from Mark Johnston <markj@FreeBSD.org> ---
> 5. They all use RCTL to control resources used by users.

The problem is that shm_alloc() assumes that object allocation won't fail, but
this is false:
- racct rules which restrict swap usage can cause swap_reserve_by_cred() to
fail;
- some overcommit modes limit swap reservations such that
swap_reserve_by_cred() can fail.

I suspect that changing your racct rules will work around the problem. 
RACCT_SWAP works by limiting the maximum number and size of swap-backed
objects, rather than swap device usage.  In particular, it treats swap object
allocation as a "reservation" and that counts against the limit before swap
space is actually used.  I'm a bit skeptical that this implementation is very
useful.

I wrote a patch which prevents the crash, but note that you'll get shm object
allocation failures instead, which might cause all kinds of problems:
https://reviews.freebsd.org/D47839

(In reply to jSML4ThWwBID69YC from comment #1)
Changing your racct rules might address these problems as well.

-- 
You are receiving this mail because:
You are the assignee for the bug.

home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-282994-227-FebNjmd2yI>