lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAM_iQpX2J8E_N0t5bxBVF_rO_FiFujKuXFMLg47fgL580u+gGw@mail.gmail.com> Date: Wed, 13 Aug 2014 17:26:48 -0700 From: Cong Wang <xiyou.wangcong@...il.com> To: Michal Hocko <mhocko@...e.cz> Cc: LKML <linux-kernel@...r.kernel.org>, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, David Rientjes <rientjes@...gle.com>, "Rafael J. Wysocki" <rjw@...ysocki.net>, Tejun Heo <tj@...nel.org>, Andrew Morton <akpm@...ux-foundation.org> Subject: Re: [Patch] x86,mm: check freeze request in page fault handler On Wed, Aug 13, 2014 at 2:36 AM, Michal Hocko <mhocko@...e.cz> wrote: > On Tue 12-08-14 17:47:02, Cong Wang wrote: > [...] >> Does the following updated patch make any sense to you? If not, I will just >> drop it. > > Not really to be honest. I do not see what problem you are trying to fix. > In my case, a page faulted process triggered OOM, kernel kept retrying this fault since without my fix oom killer couldn't kill a frozen process. This led to that this process is always running even after we tried to freeze it, the whole memory cgroup just stayed in FREEZING state. Although with my fix, OOM will kill the frozen process so that the page faulted process could probably stop retrying the fault finally, the question is that is OOM the only case blocks page fault? Looking at the code, there could be other case blocking page fault handler as well, so instead of keep retrying for unknown times with ignoring freeze request, why not just freeze it since this is not dangerous? Or I am missing anything? -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists