Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp664256ybl; Wed, 28 Aug 2019 03:34:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqzm4yOdKLVuat2V5nMuUq5poJcgwLEEQbnNUls2TZbE7dp1iG5CT4jJAsO/ZyxA3vTU8rUV X-Received: by 2002:a17:90a:800a:: with SMTP id b10mr3438381pjn.23.1566988473662; Wed, 28 Aug 2019 03:34:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1566988473; cv=none; d=google.com; s=arc-20160816; b=l1YaJo5yJPiw9Rti8wCBGfebD1DAqzki9enDk8E4Jsc9r5vSlNZynUnkaXx6/F5Ypv 9ZPMHaNAopT9C4KmEnJjlFSQsrO+FRJcN4bi+f0V8D0FBLJCTBUsgrj9zj5Jh4/CcZtP ktp9JqAORtLo875KemkcmRPald5HOPusxF4mZ+NZUZwOOOb/4CTzUFfdAmDlAmy20xO2 /osaErx12KHgdrB/4GGXuWXRa5K8y2AkP8500dtjA+eJ1TZyzJKHxsljQIjBHfzHdMWY shZe387JDXg/zibuxUBVAqdR9BSeD2OlLZ9Xq2/EIC4Du6wx9w9pH+ZxBMpk9XwhXEwY ZHAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=/mPPAcueQJKWvUi9enAQ90aYy4xHsw4lkhBLtDju3Xs=; b=Zr1xLrl2USvjIYgh3WMqs/BbBgdnMwyhGfKrdiPw85SNc/rHUcofHQdl1LW5DyTw41 Dmj2Vkvu2V2cw+cOp3iGzJ4yGH1ytmxfumTpcA0J77koQ5vkHygDjML5DaTV9BFKlm77 ER4ZYeS8g5uIrb1Y6NxhfapRO+szfDkBRLR0H5MXppGUnGZHKmgaWvj3ua7sGTkoD587 Jvt3kNjxNttLkjlGD+EAHjH/I15w6RO7KVNPI0U04RffowxOqb0ctZrNieYLNfVrYOZ1 nA51E6aUzeVPQNXb9t5QodFzXhUbBN4Zr0PDcXuZebZTs6zvKQ5JBV43EtdaG3GR8rvR DgPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h187si1903473pgc.6.2019.08.28.03.34.17; Wed, 28 Aug 2019 03:34:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726777AbfH1KcP (ORCPT + 99 others); Wed, 28 Aug 2019 06:32:15 -0400 Received: from mx2.suse.de ([195.135.220.15]:40416 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726328AbfH1KcO (ORCPT ); Wed, 28 Aug 2019 06:32:14 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 434A7AFBE; Wed, 28 Aug 2019 10:32:13 +0000 (UTC) Date: Wed, 28 Aug 2019 12:32:11 +0200 From: Michal Hocko To: Tetsuo Handa Cc: Edward Chron , Qian Cai , Andrew Morton , Roman Gushchin , Johannes Weiner , David Rientjes , Shakeel Butt , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Ivan Delalande Subject: Re: [PATCH 00/10] OOM Debug print selection and additional information Message-ID: <20190828103211.GD28313@dhcp22.suse.cz> References: <20190826193638.6638-1-echron@arista.com> <1566909632.5576.14.camel@lca.pw> <79FC3DA1-47F0-4FFC-A92B-9A7EBCE3F15F@lca.pw> <2A1D8FFC-9E9E-4D86-9A0E-28F8263CC508@lca.pw> <20190828070845.GC7386@dhcp22.suse.cz> <2e816b05-7b5b-4bc0-8d38-8415daea920d@i-love.sakura.ne.jp> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <2e816b05-7b5b-4bc0-8d38-8415daea920d@i-love.sakura.ne.jp> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 28-08-19 19:12:41, Tetsuo Handa wrote: > On 2019/08/28 16:08, Michal Hocko wrote: > > On Tue 27-08-19 19:47:22, Edward Chron wrote: > >> For production systems installing and updating EBPF scripts may someday > >> be very common, but I wonder how data center managers feel about it now? > >> Developers are very excited about it and it is a very powerful tool but can I > >> get permission to add or replace an existing EBPF on production systems? > > > > I am not sure I understand. There must be somebody trusted to take care > > of systems, right? > > > > Speak of my cases, those who take care of their systems are not developers. > And they afraid changing code that runs in kernel mode. They unlikely give > permission to install SystemTap/eBPF scripts. As a result, in many cases, > the root cause cannot be identified. Which is something I would call a process problem more than a kernel one. Really if you need to debug a problem you really have to trust those who can debug that for you. We are not going to take tons of code to the kernel just because somebody is afraid to run a diagnostic. > Moreover, we are talking about OOM situations, where we can't expect userspace > processes to work properly. We need to dump information we want, without > counting on userspace processes, before sending SIGKILL. Yes, this is an inherent assumption I was making and that means that whatever dynamic hooks would have to be registered in advance. -- Michal Hocko SUSE Labs