Re: [RFC][PATCH] sysrq: ensure manual invocation of the OOM killerunder OOM livelock

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed 06-01-16 20:49:23, Tetsuo Handa wrote:
> Michal Hocko wrote:
> > On Tue 05-01-16 17:22:46, Michal Hocko wrote:
> > > On Wed 30-12-15 15:33:47, Tetsuo Handa wrote:
> > [...]
> > > > I wish for a kernel thread that does OOM-kill operation.
> > > > Maybe we can change the OOM reaper kernel thread to do it.
> > > > What do you think?
> > > 
> > > I do no think a separate kernel thread would help much if the
> > > allocations have to keep looping in the allocator. oom_reaper is a
> > > separate kernel thread only due to locking required for the exit_mmap
> > > path.
> > 
> > Let me clarify what I've meant here. What you actually want is to do
> > select_bad_process and oom_kill_process (including oom_reap_vmas) in
> > the kernel thread context, right?
> 
> Right.

It still seems we were not on the same page. I thought you wanted to
make _all_ oom killer handling to be done from the kernel thread while
you only cared about the sysrq+f case. Your patch below sounds like a
reasonable compromise to me. It conflates two different things together
but they are not that different in principle so I guess this could be
acceptable. Maybe s@oom_reaper@async_oom_killer@ would be more
appropriate to reflect that fact.

[...]

> While testing above patch, I once hit depletion of memory reserves.
[...]
> Complete log is at http://I-love.SAKURA.ne.jp/tmp/serial-20160106.txt.xz .
> 
> I don't think this depletion was caused by above patch because the last
> invocation was not SysRq-f.

Yes I agree this is not related to the patch.

> I believe we should add a workaround for
> the worst case now. It is impossible to add it after we made the code
> more and more difficult to test.
> 
> >                               We would have to handle queuing of the
> > oom requests because multiple oom killers might be active in different
> > allocation domains (cpusets, memcgs) so I am not so sure this would be a
> > great win in the end. But I haven't tried to do it so I might be wrong
> > and it will turn up being much more easier than I expect.
> 
> I could not catch what you want to say.

I was contemplating about all the OOM killer handling from within the
kernel thread as that was my understanding of what you were proposing.

> If you are worrying about failing
> to call oom_reap_vmas() for second victim due to invoking the OOM killer
> again before mm_to_reap is updated from first victim to NULL, we can walk
> on the process list.
[...]

Thanks!
-- 
Michal Hocko
SUSE Labs

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>



[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]