Received: by 10.213.65.68 with SMTP id h4csp3595452imn; Tue, 10 Apr 2018 01:16:13 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/iBoTC7YkqArZ8PAhwBSFxAe90h2gcFMyOCRe92UKcaGJ5fEtHjPJnnBpE0Yr1pvqP6clH X-Received: by 10.101.70.72 with SMTP id k8mr26449195pgr.402.1523348173190; Tue, 10 Apr 2018 01:16:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523348173; cv=none; d=google.com; s=arc-20160816; b=am8iz/Bz11yuQQ0AmkQMdqsAZuVtTH5xGDpST7jk9Uw1//wh7EvxkhqE7qnyIFbCii R59B+4DVOLGwuosETfpLBrY9Er8RCnnDmxcM9EG4yeEhDkMAYBIEI94Yn2EpQ3qs2yLl ZYK2plW1iJEC8KOgO4AzdepyS4ZlDW+iLZrt/X+TcmISBzhxP22iGap7YT8Dj1xqbJNa g0xEk3KssOO5yEGMAEyIZCnld58ouITuJsCnfKwel+Ay2uqHaBnkqK3bpaGYQzSQ8zfr WciqmHzkxXyjL0vKh7VbuFaIGmjrIkHokExpyrM+OAY+IzEKEOjNAsfL34XuuWaJXJsz t9OQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=GSx6lVVIXIzGvqeJYqvOgQorEmoTCaAO+3mWh3L5uU8=; b=E/Zh8DCjpvKaNAA971r1KZ3cvL7D5WPHlVnXgWLzMtfCA5HvftmRNGE1LXh6xh6nEk illQtg7fqTrQDyzmrqDyZAAqbbRpDXU4x6tBq51sh5R3EIMdyk6ujYdX+W5yQfEkD7YV +YRgOMU4f/Li6Gq2cih/H6kKp2uR5P2VItNQ86HBUWYlhEuPTMoBCj7RJjP5hzUKAvo5 8rDNoAptTUVqQGDEQZsXLiNMLt0hvW19xoe9I7z4a+/kk4JCsbzhmtOpvxhMZ6VDZaG9 iaZUM5H90vjmIZK1bVicdtkHH9xz/cGD0kWD7owpj8PI50xMunEOHhg1McGJ3Fh7NcoJ j8YA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c1-v6si2198318plk.611.2018.04.10.01.15.36; Tue, 10 Apr 2018 01:16:13 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752529AbeDJIMf (ORCPT + 99 others); Tue, 10 Apr 2018 04:12:35 -0400 Received: from mx2.suse.de ([195.135.220.15]:42354 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752433AbeDJIMd (ORCPT ); Tue, 10 Apr 2018 04:12:33 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 9FB20ACD2; Tue, 10 Apr 2018 08:12:32 +0000 (UTC) Date: Tue, 10 Apr 2018 10:12:31 +0200 From: Michal Hocko To: Zhaoyang Huang Cc: Steven Rostedt , Ingo Molnar , LKML Subject: Re: [PATCH v1] ringbuffer: Don't choose the process with adj equal OOM_SCORE_ADJ_MIN Message-ID: <20180410081231.GV21835@dhcp22.suse.cz> References: <20180409094944.6399b211@gandalf.local.home> <20180409231230.1ab99e85@vmware.local.home> <20180410061447.GQ21835@dhcp22.suse.cz> <20180410074921.GU21835@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 10-04-18 16:04:40, Zhaoyang Huang wrote: > On Tue, Apr 10, 2018 at 3:49 PM, Michal Hocko wrote: > > On Tue 10-04-18 14:39:35, Zhaoyang Huang wrote: > >> On Tue, Apr 10, 2018 at 2:14 PM, Michal Hocko wrote: [...] > >> > OOM_SCORE_ADJ_MIN means "hide the process from the OOM killer completely". > >> > So what exactly do you want to achieve here? Because from the above it > >> > sounds like opposite things. /me confused... > >> > > >> Steve's patch intend to have the process be OOM's victim when it > >> over-allocating pages for ring buffer. I amend a patch over to protect > >> process with OOM_SCORE_ADJ_MIN from doing so. Because it will make > >> such process to be selected by current OOM's way of > >> selecting.(consider OOM_FLAG_ORIGIN first before the adj) > > > > I just wouldn't really care unless there is an existing and reasonable > > usecase for an application which updates the ring buffer size _and_ it > > is OOM disabled at the same time. > There is indeed such kind of test case on my android system, which is > known as CTS and Monkey etc. Does the test simulate a real workload? I mean we have two things here oom disabled task and an updater of the ftrace ring buffer to a potentially large size. The second can be completely isolated to a different context, no? So why do they run in the single user process context? > Furthermore, I think we should make the > patch to be as safest as possible. Why do we leave a potential risk > here? There is no side effect for my patch. I do not have the full context. Could you point me to your patch? -- Michal Hocko SUSE Labs