Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp3980563imm; Mon, 11 Jun 2018 05:11:00 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIvUfZPeC42Uqgeyu4ppb8fJDudBPersuxTWmcvQGoQ5Uc+qUiBnEubVkq5X9AicXPHcZ34 X-Received: by 2002:a17:902:2702:: with SMTP id c2-v6mr18121478plb.297.1528719060351; Mon, 11 Jun 2018 05:11:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528719060; cv=none; d=google.com; s=arc-20160816; b=ganyE4Kv0mb5rWIU3YIVPWktCNOzKCXILpnJft+qjS8gjbQzNfMHkAEgnMInIrJYOy J6Kcu0XJciW3n+HkFJHb0KJNHZkH0HfYIZHnuFkyyYtkIBMLtIPslcweA5G3vMrW3GwL Tp0l1xJ07CKjbkG+FoXfM3n5j+RQ43bl6lAncYo0O2EbwHmh+bxEwfmd2JWxfdE0ACHe KmoDX4nYHyUkfeKyXPtcXA9WXaKkQ0qBmHPU5OWq6U58MRw4BDQbYbwsGJoFdF1ESLYH 0Ftwc4f3GaLcOLiXyED2NhZA2TkjDeN105ZZAQqZPSIyuardlncJtDV+BvmPr6WGGZlM sQ9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:user-agent:in-reply-to :content-disposition:mime-version:references:subject:cc:to:from:date :arc-authentication-results; bh=TiES1RHrKF6p5GME/qXpW3jeiEsGpbFgZ+dCyQbjPiQ=; b=czUWuOhStBDGyUx/IyfLuWVCiDFH588F/pQHkd7G9v9c21KBDIhAGyh+zKB5eUg6qd l9AcgUqEMuVvtZsH30J8Gpb38zr38m6wsR/woG1pRl36hyj7czrlX2dzEUnh10uLmaEr ROhRm7Oz3/VEa5tVGT7DICWbOqF6SdDdN644v5M17+VtmhS7CJbSnnfUpXdrLFG7+3zp aWGZrjxYNkDLnHF6DENATxtmKVvbKeGp0d4I1vKvDqlYp8Ax2n6xitSd5eCZgT07841j PF1TNE1ulSdLkrb5eiyiGS7obVcZH5/nkdocj/TLRMCaOlRUJAf4VEGQCTKtTWeI424M SzAw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g67-v6si14138101plb.73.2018.06.11.05.10.46; Mon, 11 Jun 2018 05:11:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933025AbeFKMKU (ORCPT + 99 others); Mon, 11 Jun 2018 08:10:20 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:36042 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932658AbeFKMKR (ORCPT ); Mon, 11 Jun 2018 08:10:17 -0400 Received: from pps.filterd (m0098420.ppops.net [127.0.0.1]) by mx0b-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5BC567D145085 for ; Mon, 11 Jun 2018 08:10:17 -0400 Received: from e06smtp07.uk.ibm.com (e06smtp07.uk.ibm.com [195.75.94.103]) by mx0b-001b2d01.pphosted.com with ESMTP id 2jhp7pxswa-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Mon, 11 Jun 2018 08:10:16 -0400 Received: from localhost by e06smtp07.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Mon, 11 Jun 2018 13:10:14 +0100 Received: from b06cxnps3075.portsmouth.uk.ibm.com (9.149.109.195) by e06smtp07.uk.ibm.com (192.168.101.137) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Mon, 11 Jun 2018 13:10:10 +0100 Received: from d06av25.portsmouth.uk.ibm.com (d06av25.portsmouth.uk.ibm.com [9.149.105.61]) by b06cxnps3075.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w5BCA9kT33751088 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 11 Jun 2018 12:10:09 GMT Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id CFD0311C054; Mon, 11 Jun 2018 13:00:46 +0100 (BST) Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id D23BA11C050; Mon, 11 Jun 2018 13:00:45 +0100 (BST) Received: from rapoport-lnx (unknown [9.148.8.218]) by d06av25.portsmouth.uk.ibm.com (Postfix) with ESMTPS; Mon, 11 Jun 2018 13:00:45 +0100 (BST) Date: Mon, 11 Jun 2018 15:10:06 +0300 From: Mike Rapoport To: ufo19890607@gmail.com Cc: akpm@linux-foundation.org, mhocko@suse.com, rientjes@google.com, kirill.shutemov@linux.intel.com, aarcange@redhat.com, penguin-kernel@I-love.SAKURA.ne.jp, guro@fb.com, yang.s@alibaba-inc.com, yuzhoujian@didichuxing.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v8 1/1] Refactor part of the oom report in dump_header References: <1528462178-29250-1-git-send-email-ufo19890607@gmail.com> <1528462178-29250-2-git-send-email-ufo19890607@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1528462178-29250-2-git-send-email-ufo19890607@gmail.com> User-Agent: Mutt/1.5.24 (2015-08-30) X-TM-AS-GCONF: 00 x-cbid: 18061112-0028-0000-0000-000002CF8401 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18061112-0029-0000-0000-000023869A70 Message-Id: <20180611121005.GA19680@rapoport-lnx> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-06-11_05:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=3 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1805220000 definitions=main-1806110143 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 08, 2018 at 08:49:38PM +0800, ufo19890607@gmail.com wrote: > From: ufo19890607 > > The dump_header does not print the memcg's name when the system > oom happened, so users cannot locate the certain container which > contains the task that has been killed by the oom killer. > > I follow the advices of David Rientjes and Michal Hocko, and refactor > part of the oom report. After this patch, users can get the memcg's > path from the oom report and check the certain container more quickly. > > Below is the part of the oom report in the dmesg > ... > [ 142.158316] panic cpuset=/ mems_allowed=0-1 > [ 142.158983] CPU: 15 PID: 8682 Comm: panic Not tainted 4.17.0-rc6+ #13 > [ 142.159659] Hardware name: Inspur SA5212M4/YZMB-00370-107, BIOS 4.1.10 11/14/2016 > [ 142.160342] Call Trace: > [ 142.161037] dump_stack+0x78/0xb3 > [ 142.161734] dump_header+0x7d/0x334 > [ 142.162433] oom_kill_process+0x228/0x490 > [ 142.163126] ? oom_badness+0x2a/0x130 > [ 142.163821] out_of_memory+0xf0/0x280 > [ 142.164532] __alloc_pages_slowpath+0x711/0xa07 > [ 142.165241] __alloc_pages_nodemask+0x23f/0x260 > [ 142.165947] alloc_pages_vma+0x73/0x180 > [ 142.166665] do_anonymous_page+0xed/0x4e0 > [ 142.167388] __handle_mm_fault+0xbd2/0xe00 > [ 142.168114] handle_mm_fault+0x116/0x250 > [ 142.168841] __do_page_fault+0x233/0x4d0 > [ 142.169567] do_page_fault+0x32/0x130 > [ 142.170303] ? page_fault+0x8/0x30 > [ 142.171036] page_fault+0x1e/0x30 > [ 142.171764] RIP: 0033:0x7f403000a860 > [ 142.172517] RSP: 002b:00007ffc9f745c28 EFLAGS: 00010206 > [ 142.173268] RAX: 00007f3f6fd7d000 RBX: 0000000000000000 RCX: 00007f3f7f5cd000 > [ 142.174040] RDX: 00007f3fafd7d000 RSI: 0000000000000000 RDI: 00007f3f6fd7d000 > [ 142.174806] RBP: 00007ffc9f745c50 R08: ffffffffffffffff R09: 0000000000000000 > [ 142.175623] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000400490 > [ 142.176542] R13: 00007ffc9f745d30 R14: 0000000000000000 R15: 0000000000000000 > [ 142.177709] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),origin_memcg=(null),kill_memcg=/test/test1/test2,task=panic,pid= 8622,uid= 0 > ... > > Changes since v7: > - add the constraint parameter to dump_header and oom_kill_process. > - remove the static char array in the mem_cgroup_print_oom_context, and > invoke pr_cont_cgroup_path to print memcg' name. > - combine the patchset v6 into one. > > Changes since v6: > - divide the patch v5 into two parts. One part is to add an array of const char and > put enum oom_constraint into the memcontrol.h; the other is will refactor the output > in the dump_header. > - limit the memory usage for the static char array by using NAME_MAX in the mem_cgroup_print_oom_context. > - eliminate the spurious spaces in the oom's output and fix the spelling of "constrain". > > Changes since v5: > - add an array of const char for each constraint. > - replace all of the pr_cont with a single line print of the pr_info. > - put enum oom_constraint into the memcontrol.c file for printing oom constraint. > > Changes since v4: > - rename the helper's name to mem_cgroup_print_oom_context. > - rename the mem_cgroup_print_oom_info to mem_cgroup_print_oom_meminfo. > - add the constrain info in the dump_header. > > Changes since v3: > - rename the helper's name to mem_cgroup_print_oom_memcg_name. > - add the rcu lock held to the helper. > - remove the print info of memcg's name in mem_cgroup_print_oom_info. > > Changes since v2: > - add the mem_cgroup_print_memcg_name helper to print the memcg's > name which contains the task that will be killed by the oom-killer. > > Changes since v1: > - replace adding mem_cgroup_print_oom_info with printing the memcg's > name only. > > Signed-off-by: ufo19890607 > --- > include/linux/memcontrol.h | 29 ++++++++++++++++++++++++++--- > mm/memcontrol.c | 43 ++++++++++++++++++++++++++++++++----------- > mm/oom_kill.c | 26 +++++++++++--------------- > 3 files changed, 69 insertions(+), 29 deletions(-) > > diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h > index 4f52ec755725..034c0db2623d 100644 > --- a/include/linux/memcontrol.h > +++ b/include/linux/memcontrol.h > @@ -70,6 +70,20 @@ struct mem_cgroup_reclaim_cookie { > unsigned int generation; > }; > > +enum oom_constraint { > + CONSTRAINT_NONE, > + CONSTRAINT_CPUSET, > + CONSTRAINT_MEMORY_POLICY, > + CONSTRAINT_MEMCG, > +}; > + > +static const char * const oom_constraint_text[] = { > + [CONSTRAINT_NONE] = "CONSTRAINT_NONE", > + [CONSTRAINT_CPUSET] = "CONSTRAINT_CPUSET", > + [CONSTRAINT_MEMORY_POLICY] = "CONSTRAINT_MEMORY_POLICY", > + [CONSTRAINT_MEMCG] = "CONSTRAINT_MEMCG", > +}; > + > #ifdef CONFIG_MEMCG > > #define MEM_CGROUP_ID_SHIFT 16 > @@ -490,8 +504,11 @@ void mem_cgroup_handle_over_high(void); > > unsigned long mem_cgroup_get_max(struct mem_cgroup *memcg); > > -void mem_cgroup_print_oom_info(struct mem_cgroup *memcg, > - struct task_struct *p); > +void mem_cgroup_print_oom_context(struct mem_cgroup *memcg, > + struct task_struct *p, enum oom_constraint constraint, > + nodemask_t *nodemask); > + > +void mem_cgroup_print_oom_meminfo(struct mem_cgroup *memcg); > > static inline void mem_cgroup_oom_enable(void) > { > @@ -885,7 +902,13 @@ static inline unsigned long mem_cgroup_get_max(struct mem_cgroup *memcg) > } > > static inline void > -mem_cgroup_print_oom_info(struct mem_cgroup *memcg, struct task_struct *p) > +mem_cgroup_print_oom_context(struct mem_cgroup *memcg, struct task_struct *p, > + enum oom_constraint constraint, nodemask_t *nodemask) > +{ > +} > + > +static inline void > +mem_cgroup_print_oom_meminfo(struct mem_cgroup *memcg) > { > } > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > index c1e64d60ed02..bb5a16bf7fe2 100644 > --- a/mm/memcontrol.c > +++ b/mm/memcontrol.c > @@ -1119,32 +1119,53 @@ static const char *const memcg1_stat_names[] = { > > #define K(x) ((x) << (PAGE_SHIFT-10)) > /** > - * mem_cgroup_print_oom_info: Print OOM information relevant to memory controller. > - * @memcg: The memory cgroup that went over limit > + * mem_cgroup_print_oom_context: Print OOM context information relevant to > + * memory controller, which includes allocation constraint, nodemask, origin > + * memcg that has reached its limit, kill memcg that contains the killed > + * process, killed process's command, pid and uid. Please don't explode brief function description. Most of this text should be moved below the parameters. See Documentation/doc-guide/kernel-doc.rst. > + * @memcg: The origin memory cgroup that went over limit > * @p: Task that is going to be killed > + * @constraint: The allocation constraint > + * @nodemask: The allocation nodemask > * > * NOTE: @memcg and @p's mem_cgroup can be different when hierarchy is > * enabled > */ > -void mem_cgroup_print_oom_info(struct mem_cgroup *memcg, struct task_struct *p) > +void mem_cgroup_print_oom_context(struct mem_cgroup *memcg, struct task_struct *p, > + enum oom_constraint constraint, nodemask_t *nodemask) > { > - struct mem_cgroup *iter; > - unsigned int i; > + struct cgroup *origin_cgrp, *kill_cgrp; > > rcu_read_lock(); > > + pr_info("oom-kill:constraint=%s,nodemask=%*pbl,origin_memcg=", > + oom_constraint_text[constraint], nodemask_pr_args(nodemask)); > + > + if (memcg) > + pr_cont_cgroup_path(memcg->css.cgroup); > + else > + pr_cont("(null)"); > + > if (p) { > - pr_info("Task in "); > + pr_cont(",kill_memcg="); > pr_cont_cgroup_path(task_cgroup(p, memory_cgrp_id)); > - pr_cont(" killed as a result of limit of "); > - } else { > - pr_info("Memory limit reached of cgroup "); > + pr_cont(",task=%s,pid=%5d,uid=%5d", > + p->comm, p->pid, from_kuid(&init_user_ns, task_uid(p))); > } > - > - pr_cont_cgroup_path(memcg->css.cgroup); > pr_cont("\n"); > > rcu_read_unlock(); > +} > + > +/** > + * mem_cgroup_print_oom_info: Print OOM memory information relevant to > + * memory controller. > + * @memcg: The memory cgroup that went over limit > + */ > +void mem_cgroup_print_oom_meminfo(struct mem_cgroup *memcg) > +{ > + struct mem_cgroup *iter; > + unsigned int i; > > pr_info("memory: usage %llukB, limit %llukB, failcnt %lu\n", > K((u64)page_counter_read(&memcg->memory)), > diff --git a/mm/oom_kill.c b/mm/oom_kill.c > index 6694348b27e9..c4744e2ecd65 100644 > --- a/mm/oom_kill.c > +++ b/mm/oom_kill.c > @@ -237,13 +237,6 @@ unsigned long oom_badness(struct task_struct *p, struct mem_cgroup *memcg, > return points > 0 ? points : 1; > } > > -enum oom_constraint { > - CONSTRAINT_NONE, > - CONSTRAINT_CPUSET, > - CONSTRAINT_MEMORY_POLICY, > - CONSTRAINT_MEMCG, > -}; > - > /* > * Determine the type of allocation constraint. > */ > @@ -419,7 +412,8 @@ static void dump_tasks(struct mem_cgroup *memcg, const nodemask_t *nodemask) > rcu_read_unlock(); > } > > -static void dump_header(struct oom_control *oc, struct task_struct *p) > +static void dump_header(struct oom_control *oc, struct task_struct *p, > + enum oom_constraint constraint) > { > pr_warn("%s invoked oom-killer: gfp_mask=%#x(%pGg), nodemask=%*pbl, order=%d, oom_score_adj=%hd\n", > current->comm, oc->gfp_mask, &oc->gfp_mask, > @@ -430,8 +424,9 @@ static void dump_header(struct oom_control *oc, struct task_struct *p) > > cpuset_print_current_mems_allowed(); > dump_stack(); > + mem_cgroup_print_oom_context(oc->memcg, p, constraint, oc->nodemask); > if (is_memcg_oom(oc)) > - mem_cgroup_print_oom_info(oc->memcg, p); > + mem_cgroup_print_oom_meminfo(oc->memcg); > else { > show_mem(SHOW_MEM_FILTER_NODES, oc->nodemask); > if (is_dump_unreclaim_slabs()) > @@ -835,7 +830,8 @@ static bool task_will_free_mem(struct task_struct *task) > return ret; > } > > -static void oom_kill_process(struct oom_control *oc, const char *message) > +static void oom_kill_process(struct oom_control *oc, enum oom_constraint constraint, > + const char *message) > { > struct task_struct *p = oc->chosen; > unsigned int points = oc->chosen_points; > @@ -864,7 +860,7 @@ static void oom_kill_process(struct oom_control *oc, const char *message) > task_unlock(p); > > if (__ratelimit(&oom_rs)) > - dump_header(oc, p); > + dump_header(oc, p, constraint); > > pr_err("%s: Kill process %d (%s) score %u or sacrifice child\n", > message, task_pid_nr(p), p->comm, points); > @@ -990,7 +986,7 @@ static void check_panic_on_oom(struct oom_control *oc, > /* Do not panic for oom kills triggered by sysrq */ > if (is_sysrq_oom(oc)) > return; > - dump_header(oc, NULL); > + dump_header(oc, NULL, constraint); > panic("Out of memory: %s panic_on_oom is enabled\n", > sysctl_panic_on_oom == 2 ? "compulsory" : "system-wide"); > } > @@ -1067,18 +1063,18 @@ bool out_of_memory(struct oom_control *oc) > current->signal->oom_score_adj != OOM_SCORE_ADJ_MIN) { > get_task_struct(current); > oc->chosen = current; > - oom_kill_process(oc, "Out of memory (oom_kill_allocating_task)"); > + oom_kill_process(oc, constraint, "Out of memory (oom_kill_allocating_task)"); > return true; > } > > select_bad_process(oc); > /* Found nothing?!?! Either we hang forever, or we panic. */ > if (!oc->chosen && !is_sysrq_oom(oc) && !is_memcg_oom(oc)) { > - dump_header(oc, NULL); > + dump_header(oc, NULL, constraint); > panic("Out of memory and no killable processes...\n"); > } > if (oc->chosen && oc->chosen != (void *)-1UL) { > - oom_kill_process(oc, !is_memcg_oom(oc) ? "Out of memory" : > + oom_kill_process(oc, constraint, !is_memcg_oom(oc) ? "Out of memory" : > "Memory cgroup out of memory"); > /* > * Give the killed process a good chance to exit before trying > -- > 2.14.1 > -- Sincerely yours, Mike.