Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp3875410imm; Mon, 25 Jun 2018 06:09:01 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLk1WHwgdbt04Wru0bA8q0s9rNIG8+nyaAVT6NKCVUPtvoZcJbSYkxlaVnfvt5na5Y/NvyJ X-Received: by 2002:a17:902:714e:: with SMTP id u14-v6mr12570581plm.289.1529932141896; Mon, 25 Jun 2018 06:09:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529932141; cv=none; d=google.com; s=arc-20160816; b=Jqa5cEXLJp+BHIbkuBB/1OFPRmaAm/Oxi+vFA/nDkJGKFWioR8CX8ysZ4/7Sgeq08f Y3T4DoHZS7HccIcQV1Mn2CIP05SRfdd9AXEOjn6m8hNa8JUju2AVos7He4ObjfaZNmWi uO0nuZ0pREbgoamn6kCxO5CvU27VUVailr0/5F0AYDFrr+BXSSa0XcVZVPbFKpgIQn28 uj50YCfglw5AWsH/NVg07r4riOTNOPDkg+aFQXSu3KaEOqSDBD8mSz1WNK81g+zPKCRt htHKqs3SmQXpOcBBwDPqBTU1hNMEDrt6N0ODutORRK8yG1d0I7sI8xW4q0qAmb6G1ZIc 7mLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date :arc-authentication-results; bh=zB+d2DkNfi2V4R4ggrtS6DVIcMR49/65Als1l2YJGo0=; b=qM0PCust1UVX31XZHQzW0G1q9LNNLJPHW6FchUcyfjeEdqoMTcqOCruPkB6GlbxdLb 6sLzr9VagDQg3bn+SWPe2HD5C1Z2keloFMZG9bZEWVabiZCih83UFiV5dwrGlj8WWwFE CfHXCiJqUCB1ufQ9UlnLmbZ5+lW4rIrJk6/YaI2A+N88+NI1SS8X3YRdK+eXbiNguHBh Zd4sI+ej/lJM1jR7CbDlQQvtYE4eqgnGvFbgzIRb8zGym69aDTnAHSw8k6+gKhIWYl1e lfcQlD/s/vWZUt4ZVyj0KOu5pdhKwtC3E9jT+C4csKdjWhuAkOpu14rVdQL9e/AdUxN6 fINw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o128-v6si14733149pfg.5.2018.06.25.06.08.46; Mon, 25 Jun 2018 06:09:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755533AbeFYNH7 (ORCPT + 99 others); Mon, 25 Jun 2018 09:07:59 -0400 Received: from mx2.suse.de ([195.135.220.15]:48066 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755221AbeFYNH6 (ORCPT ); Mon, 25 Jun 2018 09:07:58 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext-too.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id E04A0ACF9; Mon, 25 Jun 2018 13:07:56 +0000 (UTC) Date: Mon, 25 Jun 2018 15:07:56 +0200 From: Michal Hocko To: peter enderborg Cc: Tetsuo Handa , linux-mm@kvack.org, rientjes@google.com, akpm@linux-foundation.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] mm,oom: Bring OOM notifier callbacks to outside of OOM killer. Message-ID: <20180625130756.GK28965@dhcp22.suse.cz> References: <1529493638-6389-1-git-send-email-penguin-kernel@I-love.SAKURA.ne.jp> <20180620115531.GL13685@dhcp22.suse.cz> <3d27f26e-68ba-d3c0-9518-cebeb2689aec@sony.com> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <3d27f26e-68ba-d3c0-9518-cebeb2689aec@sony.com> User-Agent: Mutt/1.9.5 (2018-04-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 25-06-18 15:03:40, peter enderborg wrote: > On 06/20/2018 01:55 PM, Michal Hocko wrote: > > On Wed 20-06-18 20:20:38, Tetsuo Handa wrote: > >> Sleeping with oom_lock held can cause AB-BA lockup bug because > >> __alloc_pages_may_oom() does not wait for oom_lock. Since > >> blocking_notifier_call_chain() in out_of_memory() might sleep, sleeping > >> with oom_lock held is currently an unavoidable problem. > > Could you be more specific about the potential deadlock? Sleeping while > > holding oom lock is certainly not nice but I do not see how that would > > result in a deadlock assuming that the sleeping context doesn't sleep on > > the memory allocation obviously. > > It is a mutex you are supposed to be able to sleep.? It's even exported. What do you mean? oom_lock is certainly not exported for general use. It is not local to oom_killer.c just because it is needed in other _mm_ code. > >> As a preparation for not to sleep with oom_lock held, this patch brings > >> OOM notifier callbacks to outside of OOM killer, with two small behavior > >> changes explained below. > > Can we just eliminate this ugliness and remove it altogether? We do not > > have that many notifiers. Is there anything fundamental that would > > prevent us from moving them to shrinkers instead? > > > @Hocko Do you remember the lowmemorykiller from android? Some things > might not be the right thing for shrinkers. Just that lmk did it wrong doesn't mean others have to follow. -- Michal Hocko SUSE Labs