Re: [RFC][PATCH] sysrq: ensure manual invocation of the OOM killerunder OOM livelock
From: Michal Hocko
Date: Wed Jan 06 2016 - 08:18:06 EST
On Wed 06-01-16 20:49:23, Tetsuo Handa wrote:
> Michal Hocko wrote:
> > On Tue 05-01-16 17:22:46, Michal Hocko wrote:
> > > On Wed 30-12-15 15:33:47, Tetsuo Handa wrote:
> > [...]
> > > > I wish for a kernel thread that does OOM-kill operation.
> > > > Maybe we can change the OOM reaper kernel thread to do it.
> > > > What do you think?
> > >
> > > I do no think a separate kernel thread would help much if the
> > > allocations have to keep looping in the allocator. oom_reaper is a
> > > separate kernel thread only due to locking required for the exit_mmap
> > > path.
> >
> > Let me clarify what I've meant here. What you actually want is to do
> > select_bad_process and oom_kill_process (including oom_reap_vmas) in
> > the kernel thread context, right?
>
> Right.
It still seems we were not on the same page. I thought you wanted to
make _all_ oom killer handling to be done from the kernel thread while
you only cared about the sysrq+f case. Your patch below sounds like a
reasonable compromise to me. It conflates two different things together
but they are not that different in principle so I guess this could be
acceptable. Maybe s@oom_reaper@async_oom_killer@ would be more
appropriate to reflect that fact.
[...]
> While testing above patch, I once hit depletion of memory reserves.
[...]
> Complete log is at http://I-love.SAKURA.ne.jp/tmp/serial-20160106.txt.xz .
>
> I don't think this depletion was caused by above patch because the last
> invocation was not SysRq-f.
Yes I agree this is not related to the patch.
> I believe we should add a workaround for
> the worst case now. It is impossible to add it after we made the code
> more and more difficult to test.
>
> > We would have to handle queuing of the
> > oom requests because multiple oom killers might be active in different
> > allocation domains (cpusets, memcgs) so I am not so sure this would be a
> > great win in the end. But I haven't tried to do it so I might be wrong
> > and it will turn up being much more easier than I expect.
>
> I could not catch what you want to say.
I was contemplating about all the OOM killer handling from within the
kernel thread as that was my understanding of what you were proposing.
> If you are worrying about failing
> to call oom_reap_vmas() for second victim due to invoking the OOM killer
> again before mm_to_reap is updated from first victim to NULL, we can walk
> on the process list.
[...]
Thanks!
--
Michal Hocko
SUSE Labs
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/