Received: by 10.223.176.46 with SMTP id f43csp507663wra; Wed, 24 Jan 2018 01:30:05 -0800 (PST) X-Google-Smtp-Source: AH8x224+uYocn1JQhlHfJlKFP1VuHEpIi3xyyUzUAGXqDnxJWuHK1BNpO/dYVibiKiJ/21gGAPop X-Received: by 10.99.174.15 with SMTP id q15mr10165823pgf.265.1516786205294; Wed, 24 Jan 2018 01:30:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516786205; cv=none; d=google.com; s=arc-20160816; b=fKzuipOmslgkq4mHk1A1Prf3/HmFzFbOxxgHpVLyGxuPAY4QIGRb7x8cDuy6R2JWtW U8PMDWWwNwbdliYuUw+aKt9Ovc/S0OXiH58LT3pATNXCeOtgCQhYnPi7kp1u0VPk/Pv4 GLZzXkVJqX/QaPpMYIhNux/fP9HIzOHBwR+CpNS9ym1DdZSl6cpFthhHNTUXu+sTfjqQ FqC+92tpfA1Y03SqzwV1abRFVrmjvcVWf2W+g8noKQmZ8zEY1Z3tS9SpxUZuOspSHAlM 9Q0z3QCPLgQxM11XKWJjvzacGUEIhASE3BpCeRn+GPzRwOByYp3VSmh6IksXxxye2FIe dfGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=C8UXvsLajHy6thjuVGQZKz57ZGmoHpWZYaeYJe+kROg=; b=TMykI91Dqb0BjtG4DAkrF1jrgPyFK97dO8WV9LTNMFAv349fDeFHzOHWKxcwc+MTZg Fl3Pj3ToVc7hedNW1FQHEeRI1Yv9G64gnZSIQSMMNQzbP75a4ItiHyKE6ESjflXfeqBV 2D4FeuGv5hBFl6kOeWe6MDejLP3j8WjhbH80oAhVRBDeXaLQUSYvdXA5w7CrJ/z6f9ma A+8N9+xpp5rMjvf1UFN5EEuR0x02+fgsl8b8hvqRUm+C8EHwz+PcZ4PsKSl+OissY2Bo rYZdhao4+mxl5d59P18ORBLonwpdzLmhDYIu5kHSpBLKx4Q1NrhgKslyJDwXV2/Lika0 xzzw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f2si15549311pgv.244.2018.01.24.01.29.51; Wed, 24 Jan 2018 01:30:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932890AbeAXJ2x (ORCPT + 99 others); Wed, 24 Jan 2018 04:28:53 -0500 Received: from mx2.suse.de ([195.135.220.15]:41501 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932863AbeAXJ2u (ORCPT ); Wed, 24 Jan 2018 04:28:50 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 77063AE5D; Wed, 24 Jan 2018 09:28:48 +0000 (UTC) Date: Wed, 24 Jan 2018 10:28:47 +0100 From: Michal Hocko To: Michel =?iso-8859-1?Q?D=E4nzer?= Cc: Roman Gushchin , Andrey Grodzovsky , linux-kernel@vger.kernel.org, amd-gfx@lists.freedesktop.org, linux-mm@kvack.org, dri-devel@lists.freedesktop.org, Christian.Koenig@amd.com Subject: Re: [RFC] Per file OOM badness Message-ID: <20180124092847.GI1526@dhcp22.suse.cz> References: <1516294072-17841-1-git-send-email-andrey.grodzovsky@amd.com> <20180118170006.GG6584@dhcp22.suse.cz> <20180123152659.GA21817@castle.DHCP.thefacebook.com> <20180123153631.GR1526@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: Mutt/1.9.2 (2017-12-15) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 23-01-18 17:39:19, Michel D?nzer wrote: > On 2018-01-23 04:36 PM, Michal Hocko wrote: > > On Tue 23-01-18 15:27:00, Roman Gushchin wrote: > >> On Thu, Jan 18, 2018 at 06:00:06PM +0100, Michal Hocko wrote: > >>> On Thu 18-01-18 11:47:48, Andrey Grodzovsky wrote: > >>>> Hi, this series is a revised version of an RFC sent by Christian K?nig > >>>> a few years ago. The original RFC can be found at > >>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.freedesktop.org_archives_dri-2Ddevel_2015-2DSeptember_089778.html&d=DwIDAw&c=5VD0RTtNlTh3ycd41b3MUw&r=jJYgtDM7QT-W-Fz_d29HYQ&m=R-JIQjy8rqmH5qD581_VYL0Q7cpWSITKOnBCE-3LI8U&s=QZGqKpKuJ2BtioFGSy8_721owcWJ0J6c6d4jywOwN4w& > >>> Here is the origin cover letter text > >>> : I'm currently working on the issue that when device drivers allocate memory on > >>> : behalf of an application the OOM killer usually doesn't knew about that unless > >>> : the application also get this memory mapped into their address space. > >>> : > >>> : This is especially annoying for graphics drivers where a lot of the VRAM > >>> : usually isn't CPU accessible and so doesn't make sense to map into the > >>> : address space of the process using it. > >>> : > >>> : The problem now is that when an application starts to use a lot of VRAM those > >>> : buffers objects sooner or later get swapped out to system memory, but when we > >>> : now run into an out of memory situation the OOM killer obviously doesn't knew > >>> : anything about that memory and so usually kills the wrong process. > >>> : > >>> : The following set of patches tries to address this problem by introducing a per > >>> : file OOM badness score, which device drivers can use to give the OOM killer a > >>> : hint how many resources are bound to a file descriptor so that it can make > >>> : better decisions which process to kill. > >>> : > >>> : So question at every one: What do you think about this approach? > >>> : > >>> : My biggest concern right now is the patches are messing with a core kernel > >>> : structure (adding a field to struct file). Any better idea? I'm considering > >>> : to put a callback into file_ops instead. > >> > >> Hello! > >> > >> I wonder if groupoom (aka cgroup-aware OOM killer) can work for you? > > > > I do not think so. The problem is that the allocating context is not > > identical with the end consumer. > > That's actually not really true. Even in cases where a BO is shared with > a different process, it is still used at least occasionally in the > process which allocated it as well. Otherwise there would be no point in > sharing it between processes. OK, but somebody has to be made responsible. Otherwise you are just killing a process which doesn't really release any memory. > There should be no problem if the memory of a shared BO is accounted for > in each process sharing it. It might be nice to scale each process' > "debt" by 1 / (number of processes sharing it) if possible, but in the > worst case accounting it fully in each process should be fine. So how exactly then helps to kill one of those processes? The memory stays pinned behind or do I still misunderstand? -- Michal Hocko SUSE Labs