linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Michal Hocko <mhocko@suse.cz>
To: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Cc: linux-mm@kvack.org, akpm@linux-foundation.org, oleg@redhat.com,
	vdavydov@virtuozzo.com, rientjes@google.com
Subject: Re: [PATCH] mm, oom: fix for hiding mm which is shared with kthread or global init
Date: Tue, 19 Jul 2016 12:54:41 +0200	[thread overview]
Message-ID: <20160719105440.GF9486@dhcp22.suse.cz> (raw)
In-Reply-To: <201607191936.BEJ82340.OHFOtOFFSQMJVL@I-love.SAKURA.ne.jp>

On Tue 19-07-16 19:36:40, Tetsuo Handa wrote:
> Michal Hocko wrote:
> > On Tue 19-07-16 08:40:48, Michal Hocko wrote:
> > > On Tue 19-07-16 06:30:42, Tetsuo Handa wrote:
> > > > Michal Hocko wrote:
> > > > > I really do not think that this unlikely case really has to be handled
> > > > > now. We are very likely going to move to a different model of oom victim
> > > > > detection soon. So let's do not add new hacks. exit_oom_victim from
> > > > > oom_kill_process just looks like sand in eyes.
> > > > 
> > > > Then, please revert "mm, oom: hide mm which is shared with kthread or global init"
> > > > ( http://lkml.kernel.org/r/1466426628-15074-11-git-send-email-mhocko@kernel.org ).
> > > > I don't like that patch because it is doing pointless find_lock_task_mm() test
> > > > and is telling a lie because it does not guarantee that we won't hit OOM livelock.
> > > 
> > > The above patch doesn't make the situation worse wrt livelock. I
> > > consider it an improvement. It adds find_lock_task_mm into
> > > oom_scan_process_thread but that can hardly be worse than just the
> > > task->signal->oom_victims check because we can catch MMF_OOM_REAPED. If
> > > we are mm loss, which is a less likely case, then we behave the same as
> > > with the previous implementation.
> > > 
> > > So I do not really see a reason to revert that patch for now.
> > 
> > And that being said. If you strongly disagree with the wording then what
> > about the following:
> > "
> >     In order to help a forward progress for the OOM killer, make sure that
> >     this really rare cases will not get into the way and hide the mm from the
> >     oom killer by setting MMF_OOM_REAPED flag for it.  oom_scan_process_thread
> >     will ignore any TIF_MEMDIE task if it has MMF_OOM_REAPED flag set to catch
> >     these oom victims.
> >     
> >     After this patch we should guarantee a forward progress for the OOM killer
> >     even when the selected victim is sharing memory with a kernel thread or
> >     global init as long as the victims mm is still alive.
> > "
> 
> No, I don't like "as long as the victims mm is still alive" exception.

Why? Because of the wording or in principle?

> If you don't like exit_oom_victim() from oom_kill_process(), what about
> alternative shown below?
> 
>  	if (!is_sysrq_oom(oc) && atomic_read(&task->signal->oom_victims)) {
>  		struct task_struct *p = find_lock_task_mm(task);
>  		enum oom_scan_t ret = OOM_SCAN_ABORT;
>  
>  		if (p) {
>  			if (test_bit(MMF_OOM_REAPED, &p->mm->flags))
>  				ret = OOM_SCAN_CONTINUE;
>  			task_unlock(p);
> +#ifdef CONFIG_MMU
> +		} else {
> +			/*
> +			 * MMF_OOM_REAPED was set at oom_kill_process() without
> +			 * waking up the OOM reaper, but this thread group lost
> +			 * its mm. Therefore, pretend as if the OOM reaper lost
> +			 * its mm (i.e. select next OOM victim).
> +			 * But be sure to prevent CONFIG_MMU=n from acting
> +			 * as if exit_oom_victim() in exit_mm() has moved from
> +			 * after mmput() to before mmput().
> +			 */
> +			ret = OOM_SCAN_CONTINUE;
> +#endif
>  		}
>  		return ret;
>  	}
> 
> By using this alternative, we can really guarantee a forward progress for
> the OOM killer even when the selected victim is sharing memory with a kernel
> thread or global init. No "as long as the victims mm is still alive" exception.

I wouldn't complicate the pile which is waiting for the merge window and
risk introducing some last minute bugs.
 
> Also, this alternative (when combined with removal of MMF_OOM_NOT_REAPABLE) has
> a bonus that we no longer need to call exit_oom_victim() from the OOM reaper
> because the OOM killer can move on to next OOM victim after the OOM reaper
> set MMF_OOM_REAPED to that mm. That is, we can immediately disallow
> exit_oom_victim() on remote thread and apply oom_killer_disable() timeout
> patch and revert "oom, suspend: fix oom_reaper vs. oom_killer_disable race".
> 
> If we remember victim's mm via your "oom: keep mm of the killed task available"
> or my "mm,oom: Use list of mm_struct used by OOM victims.", we can force the
> OOM reaper to try to reap by intervening to regular __mmput() from mmput() from
> exit_mm() by purposely taking a reference on mm->mm_users. Then, we can always
> try to reclaim some memory using the OOM reaper before risking exit_aio() from
> __mmput() from mmput() from exit_mm() to stall, for we can keep the OOM killer
> waiting until MMF_OOM_REAPED is set using your or my patch.

Let's discuss these things later on after merge window along with anothe
changes.

-- 
Michal Hocko
SUSE Labs

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

  reply	other threads:[~2016-07-19 10:54 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-07-16  5:30 [PATCH] mm, oom: fix for hiding mm which is shared with kthread or global init Tetsuo Handa
2016-07-18  7:18 ` Michal Hocko
2016-07-18 21:30   ` [PATCH] mm, oom: fix for hiding mm which is shared with kthreador " Tetsuo Handa
2016-07-19  6:40     ` Michal Hocko
2016-07-19  9:37       ` Michal Hocko
2016-07-19 10:36         ` [PATCH] mm, oom: fix for hiding mm which is shared with kthread or " Tetsuo Handa
2016-07-19 10:54           ` Michal Hocko [this message]
2016-07-19 11:43             ` Tetsuo Handa
2016-07-19 11:58               ` Michal Hocko

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20160719105440.GF9486@dhcp22.suse.cz \
    --to=mhocko@suse.cz \
    --cc=akpm@linux-foundation.org \
    --cc=linux-mm@kvack.org \
    --cc=oleg@redhat.com \
    --cc=penguin-kernel@I-love.SAKURA.ne.jp \
    --cc=rientjes@google.com \
    --cc=vdavydov@virtuozzo.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).