Hello Jonathan,


Excerpt from Jonathan Nieder:

>> Version: 3.2.35-2
> [...]
>> As you can see below i got a long list of those
>> "audit: name_count maxed, losing inode data:" messages.
> 
> Thanks for reporting.  Compare <http://bugs.debian.org/631799>.

Yes, looks like the same thing.

>> I assume the patch that fixes this bug is this one included in v3.3-rc1:
>>
>> commit 5195d8e217a78697152d64fc09a16e063a022465
>> Author: Eric Paris <epa...@redhat.com>
>> Date:   Tue Jan 3 14:23:05 2012 -0500
>>
>>     audit: dynamically allocate audit_names when not enough space is in the 
>> names array
> 
> Please test the attached patch series against a 3.2.y kernel, for
> example by following instructions from [1].

I'll try to look into this. But don't expect that to happen soon. My time budget
is running out.


> [...]
>> [    7.844458] audit: name_count maxed, losing inode data: dev=00:06, 
>> inode=5738
>> [    7.844462] audit: name_count maxed, losing inode data: dev=00:06, 
>> inode=5625
>> [    7.844466] audit: name_count maxed, losing inode data: dev=00:06, 
>> inode=5743
>> [    7.844470] audit: name_count maxed, losing inode data: dev=00:06, 
>> inode=5743
> 
> That's pretty frequent --- I don't think this much log noise is
> acceptable.  Any idea how high name_count is when it happens?

No. Speaking openly i do not know what it is telling me at all. But reading
"losing inode data" got my attention so to say.
Those messages happended during boot btw.
Can you tell me where i can look up the value of 'name_count' maybe in sysctl?


> [...]
>> [    8.842433] The scan_unevictable_pages sysctl/node-interface has been
>> disabled for lack of a legitimate use case.  If you have one, please send an
>> email to linux...@kvack.org.
> 
> Do you know what program triggers this?

No. Lately i set some non standard sysctl settings. I attach those sysctl
settings in case they are relevant.


-- 
Regards,
Thilo

4096R/0xC70B1A8F
721B 1BA0 095C 1ABA 3FC6  7C18 89A4 A2A0 C70B 1A8F

#
# Disable IPv6
net.ipv6.conf.all.disable_ipv6=1

# This sysctl sets the default value of the IPV6_V6ONLY socket option.
#
# When disabled, IPv6 sockets will also be able to send and receive IPv4
# traffic with addresses in the form ::ffff:192.0.2.1 and daemons listening
# on IPv6 sockets will also accept IPv4 connections.
#
# When IPV6_V6ONLY is enabled, daemons interested in both IPv4 and IPv6
# connections must open two listening sockets.
# This is the default behaviour of almost all modern operating systems.

net.ipv6.bindv6only = 1

# Increase inotify availability
fs.inotify.max_user_watches = 524288

# protect bottom 64k of memory from mmap to prevent NULL-dereference
# attacks against potential future kernel security vulnerabilities.
# (Added in kernel 2.6.23.)
vm.mmap_min_addr = 65536

# default: /proc/sys/vm/dirty_ratio = 20
# Higher values allow the small writes to stack up in memory.
# They'll go to the disk in bigger chunks.
vm.dirty_ratio = 32

# swappiness default = 60
# the higher the vm.swappiness value, the more the system will swap
vm.swappiness = 10

Reply via email to