Bug 236932 - Memory test on large mem systems may fail with undersized swap space
Summary: Memory test on large mem systems may fail with undersized swap space
Status: CLOSED DUPLICATE of bug 237556
Alias: None
Product: Red Hat Hardware Certification Program
Classification: Retired
Component: Test Suite (tests)
Version: 5
Hardware: ia64
OS: Linux
Target Milestone: ---
: ---
Assignee: Greg Nichols
QA Contact:
Depends On:
TreeView+ depends on / blocked
Reported: 2007-04-18 15:16 UTC by Rick Hester
Modified: 2008-07-16 21:56 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Last Closed: 2007-05-01 14:03:32 UTC

Attachments (Terms of Use)

Description Rick Hester 2007-04-18 15:16:17 UTC
Description of problem:
The memory cert test on a system with 192GB of memory failed apparently
due to the oom killer being invoked sometime during the test.   The
system had been installed with the default amount swap space which was
less than the amount of memory in the system.

I increased the swap space to greater than the amount of memory (in this
case it was about 1.5 times as much).   This resolved the oom killer 
problems and the test passed.

I would suggest that the hts documentation include a note about having
swap space greater than the amount of memory available.  (Or better yet
supply some formula for determining the minimum amount of swap required,
since it may not always require that much swap space.   For some systems
it will be a challenge to get that much swap.  The largest memory system
we have currently is 2TB and they are not getting smaller.)

Version-Release number of selected component (if applicable):

How reproducible:

Steps to Reproduce:
1.Run the memory cert on a system with more memory than the default swap
Actual results:
oom killer causes test to fail

Expected results:
test to pass

Additional info:

Comment 1 Greg Nichols 2007-05-01 14:03:32 UTC

*** This bug has been marked as a duplicate of 237556 ***

Note You need to log in before you can comment on or make changes to this bug.