[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f8d24892-b05e-73a8-36d5-4fe278f84c44@i-love.sakura.ne.jp>
Date: Sat, 21 Jul 2018 11:47:08 +0900
From: Tetsuo Handa <penguin-kernel@...ove.sakura.ne.jp>
To: David Rientjes <rientjes@...gle.com>
Cc: Andrew Morton <akpm@...ux-foundation.org>,
Michal Hocko <mhocko@...e.com>, linux-kernel@...r.kernel.org,
linux-mm@...ck.org
Subject: Re: [patch v4] mm, oom: fix unnecessary killing of additional
processes
On 2018/07/21 7:13, David Rientjes wrote:
>>> mutex_lock(&oom_lock);
>>> __oom_reap_task_mm(mm);
>>> mutex_unlock(&oom_lock);
>>
>> I don't like holding oom_lock for full teardown of an mm, for an OOM victim's mm
>> might have multiple TB memory which could take long time.
>>
>
> This patch does not involve deltas for oom_lock here, it can certainly be
> changed on top of this patch. I'm not attempting to address any oom_lock
> issue here. It should pose no roadblock for you.
You can't apply "[patch v4] mm, oom: fix unnecessary killing of additional processes"
because Michal's patch which removes oom_lock serialization was added to -mm tree.
>
> I only propose this patch now since it fixes millions of processes being
> oom killed unnecessarily, it was in -mm before a NACK for the most trivial
> fixes that have now been squashed into it, and is actually tested.
>
But I still refuse your patch because you do not test my approach.
>>
>>> -#define MAX_OOM_REAP_RETRIES 10
>>> static void oom_reap_task(struct task_struct *tsk)
>>> {
>>> - int attempts = 0;
>>> struct mm_struct *mm = tsk->signal->oom_mm;
>>>
>>> - /* Retry the down_read_trylock(mmap_sem) a few times */
>>> - while (attempts++ < MAX_OOM_REAP_RETRIES && !oom_reap_task_mm(tsk, mm))
>>> - schedule_timeout_idle(HZ/10);
>>> + /*
>>> + * If this mm has either been fully unmapped, or the oom reaper has
>>> + * given up on it, nothing left to do except drop the refcount.
>>> + */
>>> + if (test_bit(MMF_OOM_SKIP, &mm->flags))
>>> + goto drop;
>>>
>>> - if (attempts <= MAX_OOM_REAP_RETRIES ||
>>> - test_bit(MMF_OOM_SKIP, &mm->flags))
>>> - goto done;
>>> + /*
>>> + * If this mm has already been reaped, doing so again will not likely
>>> + * free additional memory.
>>> + */
>>> + if (!test_bit(MMF_UNSTABLE, &mm->flags))
>>> + oom_reap_task_mm(tsk, mm);
>>
>> This is still wrong. If preempted immediately after set_bit(MMF_UNSTABLE, &mm->flags) from
>> __oom_reap_task_mm() from exit_mmap(), oom_reap_task() can give up before reclaiming any memory.
>
> If there is a single thread holding onto the mm and has reached
> exit_mmap() and is in the process of starting oom reaping itself, there's
> no advantage to the oom reaper trying to oom reap it.
You might worry about situations where __oom_reap_task_mm() is a no-op.
But that is not always true. There is no point with emitting
pr_info("oom_reaper: unable to reap pid:%d (%s)\n", ...);
debug_show_all_locks();
noise and doing
set_bit(MMF_OOM_SKIP, &mm->flags);
because exit_mmap() will not release oom_lock until __oom_reap_task_mm()
completes. That is, except extra noise, there is no difference with
current behavior which sets set_bit(MMF_OOM_SKIP, &mm->flags) after
returning from __oom_reap_task_mm().
> The thread in
> exit_mmap() will take care of it, __oom_reap_task_mm() does not block and
> oom_free_timeout_ms allows for enough time for that memory freeing to
> occur. The oom reaper will not set MMF_OOM_SKIP until the timeout has
> expired.
Again, there is no point with emitting the noise.
And, the oom_lock serialization will be removed before your patch.
>
> As I said before, you could make a case for extending the timeout once
> MMF_UNSTABLE has been set. It practice, we haven't encountered a case
> where that matters. But that's trivial to do if you would prefer.
>
Again, I don't think that
"[patch v4] mm, oom: fix unnecessary killing of additional processes" can be
merged.
On 2018/07/21 7:19, David Rientjes wrote:
> On Sat, 21 Jul 2018, Tetsuo Handa wrote:
>
>> Why [PATCH 2/2] in https://marc.info/?l=linux-mm&m=153119509215026&w=4 does not
>> solve your problem?
>>
>
> Such an invasive patch, and completely rewrites the oom reaper. I now
> fully understand your frustration with the cgroup aware oom killer being
> merged into -mm without any roadmap to actually being merged. I agree
> with you that it should be dropped, not sure why it has not been since
> there is no active review on the proposed patchset from four months ago,
> posted twice, that fixes the issues with it, or those patches being merged
> so the damn thing can actually make progress.
>
I'm not frustrated with the cgroup aware oom killer. I'm frustrated with
the fact that you keep ignoring my approach as "such an invasive patch"
without actually testing it.
At least, you can test up to my [PATCH 1/2] whether the cgroup aware oom killer
can be rebased on top of Michal's patches and my [PATCH 1/2].
Powered by blists - more mailing lists