Received: by 10.213.65.68 with SMTP id h4csp639734imn; Fri, 16 Mar 2018 14:10:45 -0700 (PDT) X-Google-Smtp-Source: AG47ELvO8dZfEdfn3rdfRPGp2dTt4iYk4F4eCopgSZr8KTJVqDvcP89/2ql0GhQOuIfrO00XS8gN X-Received: by 10.101.73.141 with SMTP id r13mr2580338pgs.161.1521234645539; Fri, 16 Mar 2018 14:10:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1521234645; cv=none; d=google.com; s=arc-20160816; b=pMR+wHzpVS8dPBt1i3JBuCsyjrLk0yqL7aYTFuPo5P2gGiZjQPJURQWYr+06Rpo4CZ H7xejEKt9pezITYoqVnlKZumAcrTgEAFigKjP6lBH1CgFHUykJXMl66VWoZb1XC82kJw xu/pUMEUqgWFqkvEF2KjbND5zDmVeZgGbttHYugJqZHfISDtW77WaImZGluhtOtcRQC5 MnOU33o800TBgMlH2F2HBwKmQCLS2jkOtMO6Q7mBqodjRzQizH/8dnxMt43YPZrbbmj6 SE/nr6jo9aazRfRzLYF7daBXZio3+rbjZ1PNCxHaOQlFgJhU7IUYK5twTagvGa+DfBkk ConA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature :arc-authentication-results; bh=+n88kiWd7AcQNtj7MHbfphivQkZ4paw+Ubi+GhSjD3s=; b=PeM+9j8dzrbJRB8DEOwN6m3zhKQzPQ6Md9h8CMykhPtIpd1BPTJpbv9jlAFMt96mkK tlECzy0y5wjQXefIsXlX0lQkg6WYOdL/GWwJr/LihXmBPyoDQplU0wH/QBq4LAJWvXwW yFtqUB6gxjX+1ZFPZhuj5d2Bdmo3vTj0PIn0kqL/v8w+btcc70feJymnd74MDUOsVuDx xeTxIF4ZuTkko9no9OINXNROo2iXTpDd/uSTRcfWvvNWTY9kmNHziH7s2jg0B0H+7OnU sab3q/zwrDcGqJ3YZo/5M9AUaDcL8ZkP3DXZA9BDsIDrcazWX+7VCjGKmn8TZrpVGBqO HN2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=rVyhwxPv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a34-v6si7012558pld.27.2018.03.16.14.10.19; Fri, 16 Mar 2018 14:10:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=rVyhwxPv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751652AbeCPVIy (ORCPT + 99 others); Fri, 16 Mar 2018 17:08:54 -0400 Received: from mail-pg0-f66.google.com ([74.125.83.66]:41559 "EHLO mail-pg0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751562AbeCPVIv (ORCPT ); Fri, 16 Mar 2018 17:08:51 -0400 Received: by mail-pg0-f66.google.com with SMTP id w17so4552021pgq.8 for ; Fri, 16 Mar 2018 14:08:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=+n88kiWd7AcQNtj7MHbfphivQkZ4paw+Ubi+GhSjD3s=; b=rVyhwxPvL7cDmvqdhJV7S4h2N10+OxjAbXBBIWIUj31Zm+ZgpXR/budd44jztCJ8xT 0GJYZKhKDPreiCublpxQ9uDW+tJQZVLZjJqYIKdA0BXd4R9dvC2H+30lUgL4MmyyRWON Rno11RhWQDXo3aJePloGm9KNH+eAzHxQVCGJesYtwYsCODxMaLr+MrXy2NangNmjHXla Ia2nhKqF9Ef3OQCCNTydcUKSkIbuJ+xraxIl8Ek842INrsD9xKA9wQpXPnf/Pre/sFEk fXrKraj2RPuBcy0xBknondoxwBsc5rMu0Nc4+JaQspot7JdpgJ/DWaquBbOnLdhQqjpn DRbQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=+n88kiWd7AcQNtj7MHbfphivQkZ4paw+Ubi+GhSjD3s=; b=jSxPSaMr4zbAxgul8nsz7y8C1a4FT3lYbf+kuoPRXvqGttvRDtUpZC7bU7ba1k4558 WMUNOc0otnKJusz89unRSAsjBUPZZrYZYgwbE+dscWidHgBjWaaV1aqTrvy+80vS9VWy /GyNDF8qsac4cjpkQBi+DgpHGXBhwFzp/q+bDVjB/owkGaHotVyYY4ZKJthAJaSIhr9f R7R6wszNb31h4zkQGK3zBkdYINqjs9ybGrL2aJLqgDNDZAUmTe0PEd+h7kjNORviSjuS zokheWW/Ug9NIalCaZnullvX2Mix6aAQfbIVavP5cPQ67T60svUAb6QTwMiu0oDWVFiJ 4HtA== X-Gm-Message-State: AElRT7ESxlFP/jbo9879Q1eagZa+5qnKybPQg/fLblFToYXIQ0YJZSpo EHnioKQtXcQFT5UkvDZNZv2Tow== X-Received: by 10.101.93.82 with SMTP id e18mr2551772pgt.371.1521234530439; Fri, 16 Mar 2018 14:08:50 -0700 (PDT) Received: from [2620:15c:17:3:3a5:23a7:5e32:4598] ([2620:15c:17:3:3a5:23a7:5e32:4598]) by smtp.gmail.com with ESMTPSA id n74sm10941161pfi.21.2018.03.16.14.08.49 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 16 Mar 2018 14:08:49 -0700 (PDT) Date: Fri, 16 Mar 2018 14:08:49 -0700 (PDT) From: David Rientjes X-X-Sender: rientjes@chino.kir.corp.google.com To: Andrew Morton , Roman Gushchin cc: Michal Hocko , Vladimir Davydov , Johannes Weiner , Tejun Heo , cgroups@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: [patch -mm 1/6] mm, memcg: introduce per-memcg oom policy tunable In-Reply-To: Message-ID: References: User-Agent: Alpine 2.20 (DEB 67 2015-01-07) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The cgroup aware oom killer is needlessly enforced for the entire system by a mount option. It's unnecessary to force the system into a single oom policy: either cgroup aware, or the traditional process aware. This patch introduces a memory.oom_policy tunable for all mem cgroups. It is currently a no-op: it can only be set to "none", which is its default policy. It will be expanded in the next patch to define cgroup aware oom killer behavior for its subtree. This is an extensible interface that can be used to define cgroup aware assessment of mem cgroup subtrees or the traditional process aware assessment. Reading memory.oom_policy will specify the list of available policies. Another benefit of such an approach is that an admin can lock in a certain policy for the system or for a mem cgroup subtree and can delegate the policy decision to the user to determine if the kill should originate from a subcontainer, as indivisible memory consumers themselves, or selection should be done per process. Signed-off-by: David Rientjes --- Documentation/cgroup-v2.txt | 11 +++++++++++ include/linux/memcontrol.h | 11 +++++++++++ mm/memcontrol.c | 35 +++++++++++++++++++++++++++++++++++ 3 files changed, 57 insertions(+) diff --git a/Documentation/cgroup-v2.txt b/Documentation/cgroup-v2.txt --- a/Documentation/cgroup-v2.txt +++ b/Documentation/cgroup-v2.txt @@ -1065,6 +1065,17 @@ PAGE_SIZE multiple when read back. If cgroup-aware OOM killer is not enabled, ENOTSUPP error is returned on attempt to access the file. + memory.oom_policy + + A read-write single string file which exists on all cgroups. The + default value is "none". + + If "none", the OOM killer will use the default policy to choose a + victim; that is, it will choose the single process with the largest + memory footprint adjusted by /proc/pid/oom_score_adj (see + Documentation/filesystems/proc.txt). This is the same policy as if + memory cgroups were not even mounted. + memory.events A read-only flat-keyed file which exists on non-root cgroups. The following entries are defined. Unless specified diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h --- a/include/linux/memcontrol.h +++ b/include/linux/memcontrol.h @@ -58,6 +58,14 @@ enum memcg_event_item { MEMCG_NR_EVENTS, }; +enum memcg_oom_policy { + /* + * No special oom policy, process selection is determined by + * oom_badness() + */ + MEMCG_OOM_POLICY_NONE, +}; + struct mem_cgroup_reclaim_cookie { pg_data_t *pgdat; int priority; @@ -203,6 +211,9 @@ struct mem_cgroup { /* OOM-Killer disable */ int oom_kill_disable; + /* OOM policy for this subtree */ + enum memcg_oom_policy oom_policy; + /* * Treat the sub-tree as an indivisible memory consumer, * kill all belonging tasks if the memory cgroup selected diff --git a/mm/memcontrol.c b/mm/memcontrol.c --- a/mm/memcontrol.c +++ b/mm/memcontrol.c @@ -4430,6 +4430,7 @@ mem_cgroup_css_alloc(struct cgroup_subsys_state *parent_css) if (parent) { memcg->swappiness = mem_cgroup_swappiness(parent); memcg->oom_kill_disable = parent->oom_kill_disable; + memcg->oom_policy = parent->oom_policy; } if (parent && parent->use_hierarchy) { memcg->use_hierarchy = true; @@ -5547,6 +5548,34 @@ static int memory_stat_show(struct seq_file *m, void *v) return 0; } +static int memory_oom_policy_show(struct seq_file *m, void *v) +{ + struct mem_cgroup *memcg = mem_cgroup_from_css(seq_css(m)); + enum memcg_oom_policy policy = READ_ONCE(memcg->oom_policy); + + switch (policy) { + case MEMCG_OOM_POLICY_NONE: + default: + seq_puts(m, "[none]\n"); + }; + return 0; +} + +static ssize_t memory_oom_policy_write(struct kernfs_open_file *of, + char *buf, size_t nbytes, loff_t off) +{ + struct mem_cgroup *memcg = mem_cgroup_from_css(of_css(of)); + ssize_t ret = nbytes; + + buf = strstrip(buf); + if (!memcmp("none", buf, min(sizeof("none")-1, nbytes))) + memcg->oom_policy = MEMCG_OOM_POLICY_NONE; + else + ret = -EINVAL; + + return ret; +} + static struct cftype memory_files[] = { { .name = "current", @@ -5588,6 +5617,12 @@ static struct cftype memory_files[] = { .flags = CFTYPE_NOT_ON_ROOT, .seq_show = memory_stat_show, }, + { + .name = "oom_policy", + .flags = CFTYPE_NS_DELEGATABLE, + .seq_show = memory_oom_policy_show, + .write = memory_oom_policy_write, + }, { } /* terminate */ };