From owner-freebsd-bugs@FreeBSD.ORG Wed Mar 10 16:10:13 2004 Return-Path: Delivered-To: freebsd-bugs@hub.freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1DBAC16A4CF for ; Wed, 10 Mar 2004 16:10:13 -0800 (PST) Received: from freefall.freebsd.org (freefall.freebsd.org [216.136.204.21]) by mx1.FreeBSD.org (Postfix) with ESMTP id F02A743D39 for ; Wed, 10 Mar 2004 16:10:12 -0800 (PST) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (gnats@localhost [127.0.0.1]) i2B0ACbv097699 for ; Wed, 10 Mar 2004 16:10:12 -0800 (PST) (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.12.10/8.12.10/Submit) id i2B0AC0d097698; Wed, 10 Mar 2004 16:10:12 -0800 (PST) (envelope-from gnats) Resent-Date: Wed, 10 Mar 2004 16:10:12 -0800 (PST) Resent-Message-Id: <200403110010.i2B0AC0d097698@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Vitaly Markitantov Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id F147116A4D1 for ; Wed, 10 Mar 2004 16:01:23 -0800 (PST) Received: from www.freebsd.org (www.freebsd.org [216.136.204.117]) by mx1.FreeBSD.org (Postfix) with ESMTP id E97B843D2D for ; Wed, 10 Mar 2004 16:01:23 -0800 (PST) (envelope-from nobody@FreeBSD.org) Received: from www.freebsd.org (localhost [127.0.0.1]) by www.freebsd.org (8.12.10/8.12.10) with ESMTP id i2B01N72075273 for ; Wed, 10 Mar 2004 16:01:23 -0800 (PST) (envelope-from nobody@www.freebsd.org) Received: (from nobody@localhost) by www.freebsd.org (8.12.10/8.12.10/Submit) id i2B01NFj075272; Wed, 10 Mar 2004 16:01:23 -0800 (PST) (envelope-from nobody) Message-Id: <200403110001.i2B01NFj075272@www.freebsd.org> Date: Wed, 10 Mar 2004 16:01:23 -0800 (PST) From: Vitaly Markitantov To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-2.3 Subject: kern/64074: vm_swapout.c bug X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Mar 2004 00:10:13 -0000 >Number: 64074 >Category: kern >Synopsis: vm_swapout.c bug >Confidential: no >Severity: critical >Priority: high >Responsible: freebsd-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Wed Mar 10 16:10:12 PST 2004 >Closed-Date: >Last-Modified: >Originator: Vitaly Markitantov >Release: FreeBSD-5_CURRENT >Organization: >Environment: FreeBSD freedo.umc.com.ua 5.2-CURRENT-20040227-JPSNAP FreeBSD 5.2-CURRENT-20040227-JPSNAP #0: Mon Mar 1 11:11:15 EET 2004 vix@freedo.umc.com.ua:/raid/obj/raid/src/sys/DO i386 >Description: When unprivileged user starts lots of processes and they used all of swap space, then kernel kills not only processes of this user. Sometimes it kills even sshd started by root, so you can't anymore connect to remote host. My situation was (from dmesg): swap_pager: out of swap space swap_pager_getswapspace(16): failed pid 446 (oracle), uid 100, was killed: out of swap space swap_pager_getswapspace(16): failed pid 450 (oracle), uid 100, was killed: out of swap space pid 448 (oracle), uid 100, was killed: out of swap space swap_pager_getswapspace(16): failed swap_pager_getswapspace(16): failed swap_pager_getswapspace(16): failed swap_pager_getswapspace(16): failed swap_pager_getswapspace(16): failed swap_pager_getswapspace(16): failed pid 525 (sshd), uid 0, was killed: out of swap space pid 527 (sshd), uid 1001, was killed: out of swap space >How-To-Repeat: Simple shell script can expose this problem #!/bin/sh export M=`expr ${M:-0} + 1` echo check $M JUNK=`cat /boot/kernel/kernel` # this is needed to get more memory $0 Script recursively launches himself, and when swap space is out, kernel begins to kill processes. >Fix: >Release-Note: >Audit-Trail: >Unformatted: