On Fri, 10 Jan 2014, Michal Hocko wrote: > > > --- > > > mm/memcontrol.c | 3 ++- > > > 1 file changed, 2 insertions(+), 1 deletion(-) > > > > > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > > > index b8dfed1b9d87..b86fbb04b7c6 100644 > > > --- a/mm/memcontrol.c > > > +++ b/mm/memcontrol.c > > > @@ -2685,7 +2685,8 @@ static int __mem_cgroup_try_charge(struct mm_struct *mm, > > > * MEMDIE process. > > > */ > > > if (unlikely(test_thread_flag(TIF_MEMDIE) > > > - || fatal_signal_pending(current))) > > > + || fatal_signal_pending(current)) > > > + || current->flags & PF_EXITING) > > > goto bypass; > > > > > > if (unlikely(task_in_memcg_oom(current))) > > > > This would become problematic if significant amount of memory is charged > > in the exit() path. > > But this would hurt also for fatal_signal_pending tasks, wouldn't it? Yes, and as I've said twice now, that should be removed. These bypasses should be given to one thread and one thread only, which would be the oom killed thread if it needs access to memory reserves to either allocate memory or charge memory. If you are suggesting we use the "user" and "oom" top-level memcg hierarchy for allowing memory to be available for userspace system oom handlers, then this has become important when in the past it may have been a minor point. > Besides that I do not see any source of allocation after exit_signals. > That's fine for today but may not be in the future. If memory allocation is done after PF_EXITING in the future, are people going to check memcg bypasses? No. And now we have additional memory bypass to root that will cause our userspace system oom hanlders to be oom themselves with the suggested configuration. Using the "user" and "oom" top-level memcg hierarchy is a double edged sword, we must attempt to prevent all of these bypasses as much as possible. The only relevant bypass here is for TIF_MEMDIE which would be set if necessary for the one thread that needs it. > > I don't know of an egregious amount of memory being > > allocated and charged after PF_EXITING is set, but if it happens in the > > future then this could potentially cause system oom conditions even in > > memcg configurations > > Even if that happens then the global OOM killer would give the exiting > task access to memory reserves and wouldn't kill anything else. > > So I am not sure what problem do you see exactly. > Userspace system oom handlers being able to handle memcg oom conditions in the top-level "user" memcg as proposed by Tejun. If the global oom killer becomes a part of that discussion at all, then the userspace system oom handler never got a chance to handle the "user" oom. > Besides that allocating egregious amount of memory after exit_signals > sounds fundamentally broken to me. > Egregious could be defined as allocating a few bytes multiplied by thousands of threads in PF_EXITING. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>