On Sat, Oct 07, 2017 at 11:21:26AM +0900, Tetsuo Handa wrote: > On 2017/10/05 19:36, Tetsuo Handa wrote: > > I don't want this patch backported. If you want to backport, > > "s/fatal_signal_pending/tsk_is_oom_victim/" is the safer way. > > If you backport this patch, you will see "complete depletion of memory reserves" > and "extra OOM kills due to depletion of memory reserves" using below reproducer. > > ---------- > #include <linux/module.h> > #include <linux/slab.h> > #include <linux/oom.h> > > static char *buffer; > > static int __init test_init(void) > { > set_current_oom_origin(); > buffer = vmalloc((1UL << 32) - 480 * 1048576); That's not a reproducer, that's a kernel module. It's not hard to crash the kernel from within the kernel. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>