[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.10.1509281526080.13657@chino.kir.corp.google.com>
Date: Mon, 28 Sep 2015 15:28:48 -0700 (PDT)
From: David Rientjes <rientjes@...gle.com>
To: Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>
cc: mhocko@...nel.org, oleg@...hat.com, torvalds@...ux-foundation.org,
kwalker@...hat.com, cl@...ux.com, akpm@...ux-foundation.org,
hannes@...xchg.org, vdavydov@...allels.com, linux-mm@...ck.org,
linux-kernel@...r.kernel.org, skozina@...hat.com
Subject: Re: can't oom-kill zap the victim's memory?
On Tue, 29 Sep 2015, Tetsuo Handa wrote:
> > The point I've tried to made is that oom unmapper running in a detached
> > context (e.g. kernel thread) vs. directly in the oom context doesn't
> > make any difference wrt. lock because the holders of the lock would loop
> > inside the allocator anyway because we do not fail small allocations.
>
> We tried to allow small allocations to fail. It resulted in unstable system
> with obscure bugs.
>
These are helpful to identify regardless of the outcome of this
discussion. I'm not sure where the best place to report them would be,
or whether its even feasible to dig through looking for possibilities, but
I think it would be interesting to see which callers are relying on
internal page allocator implementation to work properly since it may
uncover bugs that would occur later if it were changed.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists