lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20221216073640.xjtpsyigoej77v5h@google.com>
Date:   Fri, 16 Dec 2022 07:36:40 +0000
From:   Shakeel Butt <shakeelb@...gle.com>
To:     Haifeng Xu <haifeng.xu@...pee.com>
Cc:     akpm@...ux-foundation.org, roman.gushchin@...ux.dev,
        songmuchun@...edance.com, hannes@...xchg.org, vbabka@...e.cz,
        willy@...radead.org, vasily.averin@...ux.dev,
        linux-kernel@...r.kernel.org
Subject: Re: [PATCH] mm/memcontrol: Skip root memcg in memcg_memory_event_mm

On Fri, Dec 16, 2022 at 03:28:53PM +0800, Haifeng Xu wrote:
> 
> 
> On 2022/12/16 14:42, Shakeel Butt wrote:
> > On Fri, Dec 16, 2022 at 09:43:02AM +0800, Haifeng Xu wrote:
> >>
> >>
> >> On 2022/12/16 02:18, Shakeel Butt wrote:
> >>> On Thu, Dec 15, 2022 at 09:19:07AM +0000, Haifeng Xu wrote:
> >>>> The memory events aren't supported on root cgroup, so there is no need
> >>>> to account MEMCG_OOM_KILL on root memcg.
> >>>>
> >>>
> >>> Can you explain the scenario where this is happening and causing issue
> >>> for you?
> >>>
> >> If the victim selected by oom killer belongs to root memcg, memcg_memory_event_mm
> >> still counts the MEMCG_OOM_KILL event. This behavior is meaningless because the
> >> flag of events/events.local in memory_files is CFTYPE_NOT_ON_ROOT. The root memcg
> >> does not count any memory event.
> >>
> > 
> > What about v1's memory.oom_control?
> >
>  
> The memory.oom_control doesn't set the CFTYPE_NOT_ON_ROOT flag. But oom_kill_disable or
> under_oom actually only support non-root memcg, so the memory_events should be consistent
> with them.

Did you take a look at mem_cgroup_oom_control_read()? It is displaying
MEMCG_OOM_KILL for root memcg. Irrespective it makes sense or not, you
want to change behavior of user visible interface. If you really want to
then propose for the deprecation of that interface.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ