Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp1119853ybe; Thu, 5 Sep 2019 10:34:33 -0700 (PDT) X-Google-Smtp-Source: APXvYqyVTdIGog/pHYqsFJG8IIX1ZH7wqz1rg35fPkchefQWE7RCTWJ1D1w/tlnPqXezT65cVz4E X-Received: by 2002:a17:902:ba89:: with SMTP id k9mr2108409pls.44.1567704873530; Thu, 05 Sep 2019 10:34:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567704873; cv=none; d=google.com; s=arc-20160816; b=qujNjjm4t4tPHSphO0znpjyJlHptl1j6UB/jEHeDmoKrUn3JVnwSaJ+5NHlm13rzIy nI08utRjIR2ihckXr9mNgtSqE22vqkz5FLiir/V3Adb49m6eRv7Z7dBGhR1tnLWK5m8+ aVUottQNoHq/0MDTWhFhcJboSmas2A2ZkT+7D0TSNiLvR2q/FaasnQoOicCUCZDsKhPv ya1/Q5Oh+x4i6ANu5bqcO1MXozJFbPxiqwHmtg0XJanekIkpUAeSL8qaXC2FCNHQbo2d /ypOnetgISlqCVxQMuoMJp+6CIhZ175p+cmD+MDjPZzOUcn5u8wv4Cmv/JKEVlYhABH5 NqKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=rXo1CicgVp/aiS+RyZ3jGbeKuvbS5QmjRDLIGnftgsc=; b=AB6YxX9fNulxgL4F/leLNY60b9/2TSJ2UoK+0eg9mhtoyiPEORmoPzNjwQPoo28Gh2 UBythJSgQQwwYHuprW4f8WLip9e2+ytp3L0J3g0Ze9icSMUU8aOQDS+PaoGn0Eb1CvnS s/0M3NVZHMrnLjOMbDRLllmClYYm7XzGlkSElmH6eotMvfYBOeqwq422mQwW554QtCa8 F6vqY50bCaT5jfpwFtK4Qb0gcH/QddxcvsA+NLLPpbnbRGAUbsMdUb510ecLVR/SFh7d s70e3tQlx600R3WpMdJdqh7yVfZvl8yP/+A4fDkNtodpdhvtkAORk5LWMGd9+Wai3dhs 3AaA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a27si3033345pfg.105.2019.09.05.10.34.16; Thu, 05 Sep 2019 10:34:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730400AbfIENkM (ORCPT + 99 others); Thu, 5 Sep 2019 09:40:12 -0400 Received: from www262.sakura.ne.jp ([202.181.97.72]:57836 "EHLO www262.sakura.ne.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726048AbfIENkM (ORCPT ); Thu, 5 Sep 2019 09:40:12 -0400 Received: from fsav104.sakura.ne.jp (fsav104.sakura.ne.jp [27.133.134.231]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id x85DdvGG088282; Thu, 5 Sep 2019 22:39:57 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav104.sakura.ne.jp (F-Secure/fsigk_smtp/530/fsav104.sakura.ne.jp); Thu, 05 Sep 2019 22:39:57 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/530/fsav104.sakura.ne.jp) Received: from [192.168.1.8] (softbank126227201116.bbtec.net [126.227.201.116]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id x85Ddn6H088212 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NO); Thu, 5 Sep 2019 22:39:57 +0900 (JST) (envelope-from penguin-kernel@i-love.sakura.ne.jp) Subject: Re: [RFC PATCH] mm, oom: disable dump_tasks by default To: David Rientjes , Michal Hocko Cc: linux-mm@kvack.org, Andrew Morton , LKML References: <20190903144512.9374-1-mhocko@kernel.org> <20190904054004.GA3838@dhcp22.suse.cz> From: Tetsuo Handa Message-ID: <12bcade2-4190-5e5e-35c6-7a04485d74b9@i-love.sakura.ne.jp> Date: Thu, 5 Sep 2019 22:39:47 +0900 User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.8.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2019/09/05 5:04, David Rientjes wrote: > On Wed, 4 Sep 2019, Michal Hocko wrote: > >>>> It's primary purpose is >>>> to help analyse oom victim selection decision. >>> >>> I disagree, for I use the process list for understanding what / how many >>> processes are consuming what kind of memory (without crashing the system) >>> for anomaly detection purpose. Although we can't dump memory consumed by >>> e.g. file descriptors, disabling dump_tasks() loose that clue, and is >>> problematic for me. >> >> Does anything really prevent you from enabling this by sysctl though? Or >> do you claim that this is a general usage pattern and therefore the >> default change is not acceptable or do you want a changelog to be >> updated? >> > > I think the motivation is that users don't want to need to reproduce an > oom kill to figure out why: they want to be able to figure out which > process had higher than normal memory usage. Right. Users can't reproduce an OOM kill to figure out why. Those who do failure analysis for users (e.g. technical staff at support center) need to figure out system's state when an OOM kill happened. And installing dynamic hooks like SystemTap / eBPF is hardly acceptable for users. What I don't like is that Michal refuses to solve OOM stalling problem, does not try to understand how difficult to avoid problems caused by thoughtless printk(), and instead recommending to disable oom_dump_tasks. There is nothing that prevents users from enabling oom_dump_tasks by sysctl. But that requires a solution for OOM stalling problem. Since I know how difficult to avoid problems caused by printk() flooding, I insist that we need "mm,oom: Defer dump_tasks() output." patch.