Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp2197549ima; Mon, 22 Oct 2018 06:04:15 -0700 (PDT) X-Google-Smtp-Source: AJdET5cd+O4YQYt/A/x6oLLEG5dI+it7B3qjMPfz48DhGk3F/wp4TfnR4PXCypUR35B7FFeaVgAh X-Received: by 2002:a63:413:: with SMTP id 19mr3825378pge.7.1540213455208; Mon, 22 Oct 2018 06:04:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540213455; cv=none; d=google.com; s=arc-20160816; b=E84rmyL1NZxJCNZEv9w5dhW/FyzMWoPVYLASkuz1OouEBq+6japAyjH22Wjp7L9YLY uMnFxApw6gSydJSWnoJImZcKDRqdPJz7Hw9EMv9PijRywm4bNo3hOofO8QV6AcF7NFcm odrAnwxNbP+b5rAHDeC73XX2AGpUYJ5O/aI65wmz90EkRcCIgAVv4b2AtWKDQpg+Un35 W3KEeMf3qYAXKZBd/YXINzCAkFn/Sr3gLjVA0xBmKbpeCHzwmhCQZrPX8cxGSGJQxW/A n8jp0TLaACpFS1K0ilqfPxx5Z0uOpED2bpDBHjiF3YV2fjS9ovaOwO80Kcphi78Bey1C jqig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=+JQjVT/FmyvOhTzhB9jDaIjg0dE8xA8/N9kJ1onHBnk=; b=MKuK23EiVvVNPgNSaqV5tcGnOqYfXf4jWmrvrQBZxDbnWyLdFNWWkpxYUefXa/AURa 4G8pY4+wQnKO/5hps4jplDm5wa7p3Hh6JDFlkA25viWF2HfkyLVCecssmXCSr+HdO8ft uePDPl7lw6E8pHCgf6pYoPqJvOmhuEe+qZiM+i6SJiyBQIDUdLTrmtiEejEBDU7ThQ/G P7F+kFA0VBtMB7iebyhowNwHeBiRoNGiBDZgdluH0Pd7oxHerJ4gfSutYApZarLl6ySy S+3fguYw/Dp9vNtBfu7+9VqtYoJvbPuoElSUe0Z46g04ettGa55PRSL1YGbUWlgW7Is8 GZKw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w15-v6si33241680pgg.529.2018.10.22.06.03.57; Mon, 22 Oct 2018 06:04:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728340AbeJVTai (ORCPT + 99 others); Mon, 22 Oct 2018 15:30:38 -0400 Received: from mx2.suse.de ([195.135.220.15]:55880 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727700AbeJVTai (ORCPT ); Mon, 22 Oct 2018 15:30:38 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 6D17BAE8F; Mon, 22 Oct 2018 11:12:30 +0000 (UTC) Date: Mon, 22 Oct 2018 13:12:29 +0200 From: Michal Hocko To: Tetsuo Handa Cc: linux-mm@kvack.org, Johannes Weiner , David Rientjes , Andrew Morton , LKML Subject: Re: [RFC PATCH 1/2] mm, oom: marks all killed tasks as oom victims Message-ID: <20181022111229.GZ18839@dhcp22.suse.cz> References: <20181022071323.9550-1-mhocko@kernel.org> <20181022071323.9550-2-mhocko@kernel.org> <201810220758.w9M7wojE016890@www262.sakura.ne.jp> <20181022084842.GW18839@dhcp22.suse.cz> <20181022104341.GY18839@dhcp22.suse.cz> <93f99371-cff8-fc31-a594-eecdff299f16@i-love.sakura.ne.jp> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <93f99371-cff8-fc31-a594-eecdff299f16@i-love.sakura.ne.jp> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 22-10-18 19:56:49, Tetsuo Handa wrote: > On 2018/10/22 19:43, Michal Hocko wrote: > > On Mon 22-10-18 18:42:30, Tetsuo Handa wrote: > >> On 2018/10/22 17:48, Michal Hocko wrote: > >>> On Mon 22-10-18 16:58:50, Tetsuo Handa wrote: > >>>> Michal Hocko wrote: > >>>>> --- a/mm/oom_kill.c > >>>>> +++ b/mm/oom_kill.c > >>>>> @@ -898,6 +898,7 @@ static void __oom_kill_process(struct task_struct *victim) > >>>>> if (unlikely(p->flags & PF_KTHREAD)) > >>>>> continue; > >>>>> do_send_sig_info(SIGKILL, SEND_SIG_FORCED, p, PIDTYPE_TGID); > >>>>> + mark_oom_victim(p); > >>>>> } > >>>>> rcu_read_unlock(); > >>>>> > >>>>> -- > >>>> > >>>> Wrong. Either > >>> > >>> You are right. The mm might go away between process_shares_mm and here. > >>> While your find_lock_task_mm would be correct I believe we can do better > >>> by using the existing mm that we already have. I will make it a separate > >>> patch to clarity. > >> > >> Still wrong. p->mm == NULL means that we are too late to set TIF_MEMDIE > >> on that thread. Passing non-NULL mm to mark_oom_victim() won't help. > > > > Why would it be too late? Or in other words why would this be harmful? > > > > Setting TIF_MEMDIE after exit_mm() completed is too late. You are right and I am obviously dense today. I will go with find_lock_task_mm for now and push the "get rid of TIF_MEMDIE" up in the todo list. I hope I will get to it some day. -- Michal Hocko SUSE Labs