Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1334501ybl; Wed, 28 Aug 2019 13:05:43 -0700 (PDT) X-Google-Smtp-Source: APXvYqxHj5DUdeNoSDnAOXrbe7Z8fhGJogFZnMCOlhxmTIVBdy0nud+qeWh2rhxPL3MBnhYj7sRu X-Received: by 2002:a63:2364:: with SMTP id u36mr4782078pgm.449.1567022743222; Wed, 28 Aug 2019 13:05:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567022743; cv=none; d=google.com; s=arc-20160816; b=vpoX5m/9IX6qVXgAAp1TbmnX9TPrF6QoDwXyz7ZE/JLNfCf6uXJZYOtLdPH+N0jWPy ieM0wmokEhmFtwJuag6vI9CvlF5z+II8YZq1Wm2xCO7VtmsSeNy1f4VIs5/aW3EAEGd0 LsNwCjqOBjvOGlhf9JdAXbnKLrvce/WdRqMsT/Dr/3voM/UsuJOJI038/+ajPh9JaUq3 /iFT/cWJvVrtIEXfhVdczKiFF8Vys6AJH+H8YlCEzvVVyWj6hDpwQzzp4pODzXPolN4b kSPDAYdXI/oyQzDLwm0/+bbRyZcIMePGbCPtyC4e2yC/VuDBAv78PIXYZlH7vCf43cY2 OvCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=wzkV411pf7zjofW+GZBpfOIv838Cue5Dz3c2i54W3Hs=; b=Z5NKYIXVAbn/mq2KzyLFQ8RgHy2B/0V15DsAH9wiD0pq64WHH+sRJ8nG+kHnbI39nn lPw/Lk+2FDfA726tnWoQTtfS3IptrcR6H9/4+9ZFXoQsnss8655yDVJrGG8g1ULRUEa/ d5fD5weEiYn+IBtVFFP4qMET0PIebb5EWFBGaS5QovlJJr9Vfw9ZG+NMzF2JhFcUj80/ FhIpM0huB6u9/TDXiBjPTyA+0if7Yswm2KunAaR5OhWWpTtP85IBi4KFEsUba3nmOXkG NfCnyrlvhrTUxb1kIhGapKRR7J0DLufniDW3W9NtGM0JkDEPesQ6VjnK01B8E3i9Hs+d j9qw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@arista.com header.s=googlenew header.b=TqKrbziv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=REJECT dis=NONE) header.from=arista.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y65si57479pgd.487.2019.08.28.13.05.26; Wed, 28 Aug 2019 13:05:43 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@arista.com header.s=googlenew header.b=TqKrbziv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=REJECT dis=NONE) header.from=arista.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726713AbfH1UEN (ORCPT + 99 others); Wed, 28 Aug 2019 16:04:13 -0400 Received: from mail-io1-f65.google.com ([209.85.166.65]:37758 "EHLO mail-io1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726554AbfH1UEN (ORCPT ); Wed, 28 Aug 2019 16:04:13 -0400 Received: by mail-io1-f65.google.com with SMTP id q12so2119453iog.4 for ; Wed, 28 Aug 2019 13:04:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arista.com; s=googlenew; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wzkV411pf7zjofW+GZBpfOIv838Cue5Dz3c2i54W3Hs=; b=TqKrbzivXqLx4S72W9/Dc/16SjCBEh3vmOYxQ3T+8TpNAQOkEilxhkcInM8KKq9hjh vMLEOnxrv2stuvKcwnG75VkLLYAyHfF6ce0Qy6iyvDw+Zwn+C9vrD6OvIQ7MqyRBhpgM BUId+T7rzLQhHnxLOs08kABS35fqei4e1vddRKPYY87walLPB3nws1UMO1NFJXexc3jy H3W56C9ljLZ9ervxhBEAHBs+RAX5TSb+05DMUHpqe3u8a9F3NJxunHsomOi6Ee3CzYmi OnZzkGQznIAJ32b8g0HEoWPT6HCtV7eO4uvSAc7s4F7HMR/W6+4j+m0axWOP8xwMFeS0 ynUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wzkV411pf7zjofW+GZBpfOIv838Cue5Dz3c2i54W3Hs=; b=FHEv3A4GNNWxaWApxtZqT+st7Td/W7W6puNozSVbRfI5kp+C6wrDkry/yZAB3S46dL xZpmdsy1MTfTvKIDP7lTKNhlKTWsjCXaTh7TXU6kRvhSMVxoos/r5dc1/KYSHK4mDC/Y Xm3VVBitImCPlQ2O2fbcl1RhErg0VFlreVvixOAgmphKwmmcvW+FSLX+VCRq6CG47xJO Cgjs3ZcAglMlSbrhrpHJYP6r+vIEEHNQGjOZUHhMDd1Km27RQVwKYZkG1b5TXFdpbrxX y1YLZ8MZEaPmfLD2YlBAiIbi+T6meAJpqMNVZ1wizQ7dyc14odHTDgo/wf2h5eBhtjYH H4pA== X-Gm-Message-State: APjAAAWsIh+EBVFMfJsn3pw+5iesiTLQkBTjM+8YGlT6j0PQTLuohJnp HX9OZNydsxjZdT8zBY5kBuD8yxTda+U06Zq1X/h31A== X-Received: by 2002:a5e:8e0d:: with SMTP id a13mr6685498ion.28.1567022652649; Wed, 28 Aug 2019 13:04:12 -0700 (PDT) MIME-Version: 1.0 References: <20190826193638.6638-1-echron@arista.com> <1566909632.5576.14.camel@lca.pw> <79FC3DA1-47F0-4FFC-A92B-9A7EBCE3F15F@lca.pw> <2A1D8FFC-9E9E-4D86-9A0E-28F8263CC508@lca.pw> <20190828070845.GC7386@dhcp22.suse.cz> <2e816b05-7b5b-4bc0-8d38-8415daea920d@i-love.sakura.ne.jp> In-Reply-To: <2e816b05-7b5b-4bc0-8d38-8415daea920d@i-love.sakura.ne.jp> From: Edward Chron Date: Wed, 28 Aug 2019 13:04:00 -0700 Message-ID: Subject: Re: [PATCH 00/10] OOM Debug print selection and additional information To: Tetsuo Handa Cc: Michal Hocko , Qian Cai , Andrew Morton , Roman Gushchin , Johannes Weiner , David Rientjes , Shakeel Butt , linux-mm@kvack.org, linux-kernel@vger.kernel.org, Ivan Delalande Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 28, 2019 at 3:12 AM Tetsuo Handa wrote: > > On 2019/08/28 16:08, Michal Hocko wrote: > > On Tue 27-08-19 19:47:22, Edward Chron wrote: > >> For production systems installing and updating EBPF scripts may someday > >> be very common, but I wonder how data center managers feel about it now? > >> Developers are very excited about it and it is a very powerful tool but can I > >> get permission to add or replace an existing EBPF on production systems? > > > > I am not sure I understand. There must be somebody trusted to take care > > of systems, right? > > > > Speak of my cases, those who take care of their systems are not developers. > And they afraid changing code that runs in kernel mode. They unlikely give > permission to install SystemTap/eBPF scripts. As a result, in many cases, > the root cause cannot be identified. +1. Exactly. The only thing we could think of Tetsuo is if Linux OOM Reporting uses a an eBPF script then systems have to load them to get any kind of meaningful report. Frankly, if using eBPF is the route to go than essentially the whole OOM reporting should go there. We can adjust as we need and have precedent for wanting to load the script. That's the best we could come up with. > > Moreover, we are talking about OOM situations, where we can't expect userspace > processes to work properly. We need to dump information we want, without > counting on userspace processes, before sending SIGKILL. +1. We've tried and as you point out and for best results the kernel has to provide the state. Again a full system dump would be wonderful, but taking a full dump for every OOM event on production systems? I am not nearly a good enough salesman to sell that one. So we need an alternate mechanism. If we can't agree on some sort of extensible, configurable approach then put the standard OOM Report in eBPF and make it mandatory to load it so we can justify having to do that. Linux should load it automatically. We'll just make a few changes and additions as needed. Sounds like a plan that we could live with. Would be interested if this works for others as well.