Re: [PATCH 1/2] mm,oom_reaper: Show trace of unable to reap victim thread.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Michal Hocko wrote:
> On Tue 20-03-18 20:57:55, Tetsuo Handa wrote:
> > I found that it is not difficult to hit "oom_reaper: unable to reap pid:"
> > messages if the victim thread is doing copy_process(). Since I noticed
> > that it is likely helpful to show trace of unable to reap victim thread
> > for finding locations which should use killable wait, this patch does so.
> > 
> > [  226.608508] oom_reaper: unable to reap pid:9261 (a.out)
> > [  226.611971] a.out           D13056  9261   6927 0x00100084
> > [  226.615879] Call Trace:
> > [  226.617926]  ? __schedule+0x25f/0x780
> > [  226.620559]  schedule+0x2d/0x80
> > [  226.623356]  rwsem_down_write_failed+0x2bb/0x440
> > [  226.626426]  ? rwsem_down_write_failed+0x55/0x440
> > [  226.629458]  ? anon_vma_fork+0x124/0x150
> > [  226.632679]  call_rwsem_down_write_failed+0x13/0x20
> > [  226.635884]  down_write+0x49/0x60
> > [  226.638867]  ? copy_process.part.41+0x12f2/0x1fe0
> > [  226.642042]  copy_process.part.41+0x12f2/0x1fe0 /* i_mmap_lock_write() in dup_mmap() */
> > [  226.645087]  ? _do_fork+0xe6/0x560
> > [  226.647991]  _do_fork+0xe6/0x560
> > [  226.650495]  ? syscall_trace_enter+0x1a9/0x240
> > [  226.653443]  ? retint_user+0x18/0x18
> > [  226.656601]  ? page_fault+0x2f/0x50
> > [  226.659159]  ? trace_hardirqs_on_caller+0x11f/0x1b0
> > [  226.662399]  do_syscall_64+0x74/0x230
> > [  226.664989]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
> 
> A single stack trace in the changelog would be sufficient IMHO.
> Appart from that. What do you expect users will do about this trace?
> Sure they will see a path which holds mmap_sem, we will see a bug report
> but we can hardly do anything about that. We simply cannot drop the lock
> from that path in 99% of situations. So _why_ do we want to add more
> information to the log?

This case is blocked at i_mmap_lock_write(). If we can add error handling path
there, we can replace i_mmap_lock_write() with i_mmap_lock_write_killable() and
bail out soon. This patch helps finding such locations.




[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux