From nobody Wed Oct 02 02:34:17 2024 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4XJJm92zR5z5XmQj for ; Wed, 02 Oct 2024 02:34:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R11" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4XJJm90pbPz4LlQ for ; Wed, 2 Oct 2024 02:34:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1727836457; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=yu3Qy651LsAxUPJNb5mKFOLAx6drHT2TRGEdFdeLmK8=; b=V9Q0t67cW1AR8O1xFhahhvExJt52Ja6bR/IlCPdfX4/E7ceeJzipVio165m6Xci/Kz7J7Z m8a5Z7TUG7asxfxDNeOpjqV2eqkLz4GzebFLTNWd1wY95j2KDqkh1MUON4WbQMuzc/9DHI Yz/sNG7mSZUSM2o04EcctEvm3lT50DYs+DOIrEx8qZSi6bvyRfztmyn5SIbDvWP1JIqNjP x/8isun8zIso7yh6RfoZ6F/hoBKXpIFgJeY5Tw1UJJxvhCvjJ8X8itPx3DyUACl/xbSySQ IXusYzXAucq8AGasijXhdCeQDfDs8LYoJq9VG4At7eeE6c5rYW1dfPqw5oqv8Q== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1727836457; a=rsa-sha256; cv=none; b=h3MUYjpo7F3EBzMDoK9YefA9V0vhX8wxHHKNPlhBIXoWxcDEz5qb6EddJ/fvl/oJmHVQC4 PzSDZuLXjKFmhoskMPKg/IZctFF1XM6BDEWKoQkbQBnqEGCp86pmFApUUDle0LDHJuWMCG xM18WkvKfSUWX0pu6lU7N5E9iIUd/Hq2yOyhvsbVLZ40KqNj9RizOwGOl4iwVuuRuhyPcD embq8Aut1NY3VAKpAa8jrXdkjL+P5XyMqNZSg6Qn2/g1fwrd2VuAwuvIBmir8qoOg1pnfv x7JbRxPCOBHgWLxgWSpXW6QZGQpBRfAUULtObDYnk9WePSWydwoM/LnRGyTtAA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4XJJm90QSfz13F4 for ; Wed, 2 Oct 2024 02:34:17 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 4922YGhA080333 for ; Wed, 2 Oct 2024 02:34:16 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 4922YGDm080332 for bugs@FreeBSD.org; Wed, 2 Oct 2024 02:34:16 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 280846] Low memory freezes / OOM: a thread waited too long to allocate a page Date: Wed, 02 Oct 2024 02:34:17 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 14.1-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: marklmi26-fbsd@yahoo.com X-Bugzilla-Status: Open X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@FreeBSD.org MIME-Version: 1.0 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D280846 --- Comment #22 from Mark Millard --- (In reply to Henrich Hartzer from comment #19) One thing that might provide useful information for such tests is to sample the memory 2 or more times after a kill, with some time between the samples, the first being just after the kill. This might expose if the system is gradually making more RAM visible vs. if things look stable afterwards. --=20 You are receiving this mail because: You are the assignee for the bug.=