Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3399360imm; Tue, 17 Jul 2018 04:19:16 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdEsfQKhz8ZdS9lKfq5XJI8Fd9ydoSgD78DN8JmRw5S/TMAVcUhn4trfO3J+LAESgp/atp6 X-Received: by 2002:a63:4c56:: with SMTP id m22-v6mr1146153pgl.299.1531826356799; Tue, 17 Jul 2018 04:19:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531826356; cv=none; d=google.com; s=arc-20160816; b=TSAL7Df5OpUh0uYsMChFbsxomYto3uf2fFzVQQrNowipH5EE4d2jn1R3NPFo25vfEL xfz6xeTX7C6JKrf96Xa+QRxjMUFsvAfAZQ/8FtiyHoDKEiicaatZitcCWHKQvSwLQotO Te1KhFmTC402oYSiHZIi9PYjQZWvcO4SZ39bapfUJaCZOmg3UJ2obm9hTVLKd3XXBqoZ oQZsJ79ntIYehIHHR55XEm/e9dSL3ikIBjTXKPaf25YP1gAd02OOSNsnSnbawDsTvFdQ /2VOK5qZ0whyWhLMpuqUrlWuuGuTDUL/tUhbMqvjjrhrmVu+5wJ2L/7o2TUpjG2wkadC KOKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=1lfpd+HcJIpJHXUAOibgjHYcjg5nF0bCCVjGdsryvds=; b=gnKGhhePWGEv8c7wAOXacbpLMyPmjjYhqEUxp5+1hgjil9i7/XJcr7yHQd0zKyVP6A IG7hXk+1XxcYEGxCIdcJaRy6ZkuhGSiMG9jQkuJBWvzqkwrDp0uElOZfL1/cfC4PbFLH ePgs+weGmygRHO2nxCEjECmBxO+Q/PkfYj6fOwkVhf/mKPfno7X4n1z4kwzUt06tw6BP DIJDzSdXCq+jvwQ0nvFynviXE+zDO1RVz0tK58qrYvxLGcoirJqLKovMofucmh6JBNW7 U6KDewz5+g36Zi0ncOLI7kCS1Q3aSwlvG4KrdgIXRAAFhWx32v89V+s/KCHGWe7uCGIp dFLw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q8-v6si616334pfh.353.2018.07.17.04.19.02; Tue, 17 Jul 2018 04:19:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731431AbeGQLtA (ORCPT + 99 others); Tue, 17 Jul 2018 07:49:00 -0400 Received: from mx2.suse.de ([195.135.220.15]:36540 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730180AbeGQLtA (ORCPT ); Tue, 17 Jul 2018 07:49:00 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 322A2AEE3; Tue, 17 Jul 2018 11:16:51 +0000 (UTC) Date: Tue, 17 Jul 2018 13:16:49 +0200 From: Michal Hocko To: ufo19890607@gmail.com Cc: akpm@linux-foundation.org, rientjes@google.com, kirill.shutemov@linux.intel.com, aarcange@redhat.com, penguin-kernel@i-love.sakura.ne.jp, guro@fb.com, yang.s@alibaba-inc.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, yuzhoujian@didichuxing.com Subject: Re: [PATCH v14 2/2] Add oom victim's memcg to the oom context information Message-ID: <20180717111649.GD7193@dhcp22.suse.cz> References: <1531825548-27761-1-git-send-email-ufo19890607@gmail.com> <1531825548-27761-2-git-send-email-ufo19890607@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1531825548-27761-2-git-send-email-ufo19890607@gmail.com> User-Agent: Mutt/1.10.0 (2018-05-17) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 17-07-18 19:05:48, ufo19890607@gmail.com wrote: > From: yuzhoujian > > The current oom report doesn't display victim's memcg context during the > global OOM situation. While this information is not strictly needed, it > can be really helpful for containerized environments to locate which > container has lost a process. Now that we have a single line for the oom > context, we can trivially add both the oom memcg (this can be either > global_oom or a specific memcg which hits its hard limits) and task_memcg > which is the victim's memcg. > > Below is the single line output in the oom report after this patch. > - global oom context information: > oom-kill:constraint=,nodemask=,cpuset=,mems_allowed=,global_oom,task_memcg=,task=,pid=,uid= > - memcg oom context information: > oom-kill:constraint=,nodemask=,cpuset=,mems_allowed=,oom_memcg=,task_memcg=,task=,pid=,uid= > > Signed-off-by: yuzhoujian Acked-by: Michal Hocko still applies. > --- > include/linux/memcontrol.h | 14 +++++++++++--- > mm/memcontrol.c | 36 ++++++++++++++++++++++-------------- > mm/oom_kill.c | 3 ++- > 3 files changed, 35 insertions(+), 18 deletions(-) > > diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h > index 6c6fb116e925..96a73f989101 100644 > --- a/include/linux/memcontrol.h > +++ b/include/linux/memcontrol.h > @@ -491,8 +491,10 @@ void mem_cgroup_handle_over_high(void); > > unsigned long mem_cgroup_get_max(struct mem_cgroup *memcg); > > -void mem_cgroup_print_oom_info(struct mem_cgroup *memcg, > - struct task_struct *p); > +void mem_cgroup_print_oom_context(struct mem_cgroup *memcg, > + struct task_struct *p); > + > +void mem_cgroup_print_oom_meminfo(struct mem_cgroup *memcg); > > static inline void mem_cgroup_oom_enable(void) > { > @@ -903,7 +905,13 @@ static inline unsigned long mem_cgroup_get_max(struct mem_cgroup *memcg) > } > > static inline void > -mem_cgroup_print_oom_info(struct mem_cgroup *memcg, struct task_struct *p) > +mem_cgroup_print_oom_context(struct mem_cgroup *memcg, > + struct task_struct *p) > +{ > +} > + > +static inline void > +mem_cgroup_print_oom_meminfo(struct mem_cgroup *memcg) > { > } > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > index e6f0d5ef320a..18deea974cfd 100644 > --- a/mm/memcontrol.c > +++ b/mm/memcontrol.c > @@ -1119,32 +1119,40 @@ static const char *const memcg1_stat_names[] = { > > #define K(x) ((x) << (PAGE_SHIFT-10)) > /** > - * mem_cgroup_print_oom_info: Print OOM information relevant to memory controller. > - * @memcg: The memory cgroup that went over limit > + * mem_cgroup_print_oom_context: Print OOM context information relevant to > + * memory controller. > + * @memcg: The origin memory cgroup that went over limit > * @p: Task that is going to be killed > * > * NOTE: @memcg and @p's mem_cgroup can be different when hierarchy is > * enabled > */ > -void mem_cgroup_print_oom_info(struct mem_cgroup *memcg, struct task_struct *p) > +void mem_cgroup_print_oom_context(struct mem_cgroup *memcg, struct task_struct *p) > { > - struct mem_cgroup *iter; > - unsigned int i; > + struct cgroup *origin_cgrp, *kill_cgrp; > > rcu_read_lock(); > - > + if (memcg) { > + pr_cont(",oom_memcg="); > + pr_cont_cgroup_path(memcg->css.cgroup); > + } else > + pr_cont(",global_oom"); > if (p) { > - pr_info("Task in "); > + pr_cont(",task_memcg="); > pr_cont_cgroup_path(task_cgroup(p, memory_cgrp_id)); > - pr_cont(" killed as a result of limit of "); > - } else { > - pr_info("Memory limit reached of cgroup "); > } > - > - pr_cont_cgroup_path(memcg->css.cgroup); > - pr_cont("\n"); > - > rcu_read_unlock(); > +} > + > +/** > + * mem_cgroup_print_oom_meminfo: Print OOM memory information relevant to > + * memory controller. > + * @memcg: The memory cgroup that went over limit > + */ > +void mem_cgroup_print_oom_meminfo(struct mem_cgroup *memcg) > +{ > + struct mem_cgroup *iter; > + unsigned int i; > > pr_info("memory: usage %llukB, limit %llukB, failcnt %lu\n", > K((u64)page_counter_read(&memcg->memory)), > diff --git a/mm/oom_kill.c b/mm/oom_kill.c > index 4e18b69fd464..4f3e4382900f 100644 > --- a/mm/oom_kill.c > +++ b/mm/oom_kill.c > @@ -434,10 +434,11 @@ static void dump_header(struct oom_control *oc, struct task_struct *p) > oom_constraint_text[oc->constraint], > nodemask_pr_args(oc->nodemask)); > cpuset_print_current_mems_allowed(); > + mem_cgroup_print_oom_context(oc->memcg, p); > pr_cont(",task=%s,pid=%d,uid=%d\n", p->comm, p->pid, > from_kuid(&init_user_ns, task_uid(p))); > if (is_memcg_oom(oc)) > - mem_cgroup_print_oom_info(oc->memcg, p); > + mem_cgroup_print_oom_meminfo(oc->memcg); > else { > show_mem(SHOW_MEM_FILTER_NODES, oc->nodemask); > if (is_dump_unreclaim_slabs()) > -- > 2.14.1 > -- Michal Hocko SUSE Labs