Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp1938359ybx; Sat, 2 Nov 2019 09:06:16 -0700 (PDT) X-Google-Smtp-Source: APXvYqxgQP4WPGjAcfXuySahn39wVuV2E8dvidFZ/WhRa5873LCct10gnpGpxLpAbiLc+tVbO6dp X-Received: by 2002:aa7:c155:: with SMTP id r21mr19207502edp.296.1572710776342; Sat, 02 Nov 2019 09:06:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572710776; cv=none; d=google.com; s=arc-20160816; b=ykUyqTTYv6iXlJ8T6t3/rEqJscwf+MAqdOn7624/UdLyeluWZiK0S5vkr0+HwVRT3l sUkpDdkkjbtDJgUknbQCBVuW51CBPDUWUMpZtK62xZ1DPOn1A5PxvLKR8elalIM+129h xN+w7DgnAn5mP54TOMBy2a1SYXTyJ38U7F5zR4bVxpafWPx6tyqDMO2Q9GQyb9+E774D d5qopWk8/C23/lWOCefSPmQSCDgFFhjTms9oI/jxb3em0LX95DpAjHUeibRMspj34Grq nrE3B5let2s5Pd1hkdSBTECzG8Y8WlucElSaR2nwxjbKkxX5CAba+ScAkUfOMzZW27Hc k53w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:mail-followup-to :message-id:subject:cc:to:from:date:dkim-signature; bh=Ef9ou+qj0vagMx1XNPM66HwZ5oa8tbdOa32pNN49rmM=; b=DMh8xtYQTmQf5DodF9wqsLQRXPVfCd8x8tRQkNqiUDtAMjYc7v55Dsc0M6r4UQWOWJ 3Ey1oIOANs/R/rPPqodPBbaZwO6AdakpMcg/bhrfj7vX68OnwymMZClR2jGwSR3YyVIn lhcxh8poFu2vMzwShczQrShUdxNV3R30C3Gh1lb8Tt6reYPGB4KSz3qy+08Xtj2nQBsQ QcIZCW1VXPgp8b3qWd/G5Qh017X05l8pIioZ//Zie+j4s1QLfsseUuyngTu8uN3jOGyk tF6X27IAv+bPLYi6METhChoy/ZpYRNS7JG5dDMnP9qgzmrGyV7DXqvk+piRYc/0L9MsP znvQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@familie-tometzki.de header.s=google header.b=LvJWdLOf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e24si3349504ede.392.2019.11.02.09.05.51; Sat, 02 Nov 2019 09:06:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@familie-tometzki.de header.s=google header.b=LvJWdLOf; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726771AbfKBQC5 (ORCPT + 99 others); Sat, 2 Nov 2019 12:02:57 -0400 Received: from mail-ua1-f101.google.com ([209.85.222.101]:38807 "EHLO mail-ua1-f101.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726450AbfKBQC4 (ORCPT ); Sat, 2 Nov 2019 12:02:56 -0400 Received: by mail-ua1-f101.google.com with SMTP id u99so3792591uau.5 for ; Sat, 02 Nov 2019 09:02:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=familie-tometzki.de; s=google; h=date:from:to:cc:subject:message-id:mail-followup-to:references :mime-version:content-disposition:in-reply-to:user-agent; bh=Ef9ou+qj0vagMx1XNPM66HwZ5oa8tbdOa32pNN49rmM=; b=LvJWdLOfXa28+18z0vfIwt2vXO10BiJMLLj1cghAiBcYuUCfXtVKu+qQDkJuNiIsv2 eg1QR09wz+rMzdgxFRcKQZHEuFmmsjf6ywdbbgGETt88yEgQvC3oFTsM6E2Ex0iCrTv1 QcSSJgi0P+WBF8w8p3kW1exS+wO22ORwxawtc2wMk2xBPZS/Bf64+msLGc/BYX5H+xs8 V7lPow+YCJoRbFlqGt3uBDaIQt9FpU6i4+/vE5m4j4Hd/ajoaeCjlywmBpqxCB+rbjKZ FecRb5+ftAldNmWA7D1jiQftbb2nUm3LlxyP/8W3YTmIe37KgZZqFlAn1lbQI8nlTl4V u6aw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id :mail-followup-to:references:mime-version:content-disposition :in-reply-to:user-agent; bh=Ef9ou+qj0vagMx1XNPM66HwZ5oa8tbdOa32pNN49rmM=; b=RIp8myoo44dYUWnwNhExME1WyM08pDIMHwlm58n5okgWQLWd1mnEHrvgouVt75tN7d XgMuLKXmSzDsEsHJ+uRCMGfyFeFviAk+O3gKt6zuiymw6PpRz9wqdIuuyT3A/0GiwisP U+K9rTzDuoEmiK9vLlvn+oCo7Yf+JWGsQ6Ii7zNf7AI/RTURfkBTQ3lZ6AlPo7wf2hSp s18+h3nnor957+VJtxgx4Y18IyIgC7OVVnKI+vNCR1vrD2AfhPjTfoA9gW4zTY8xpwis 6lXVMM1VZKetR6iEp3Ra/QpMCAJp4PKGOxCecmdtzrp/pyqN0jydZOWr4lDvB8XuvkqF mIYQ== X-Gm-Message-State: APjAAAXgBAXoZUj1QS5H11nOA/SyreQjjCa1ge+zk2bYX+gfXnuOhmBq WD4YBSz2AJVW7Q1Sdkc/jRMqCYA1fDhfdZiatGxVBGnfdzsmIg== X-Received: by 2002:ab0:6044:: with SMTP id o4mr6464044ual.119.1572710574360; Sat, 02 Nov 2019 09:02:54 -0700 (PDT) Received: from familie-tometzki.de (freebsd.familie-tometzki.de. [18.210.29.142]) by smtp-relay.gmail.com with ESMTPS id j184sm1051649vkh.1.2019.11.02.09.02.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 02 Nov 2019 09:02:54 -0700 (PDT) X-Relaying-Domain: familie-tometzki.de Received: from freebsd.familie-tometzki.de (localhost [127.0.0.1]) by freebsd.familie-tometzki.de (Postfix) with ESMTP id 70195278CC; Sat, 2 Nov 2019 17:02:53 +0100 (CET) Date: Sat, 2 Nov 2019 17:02:53 +0100 From: Damian Tometzki To: Konstantin Khlebnikov Cc: linux-mm@kvack.org, Andrew Morton , linux-kernel@vger.kernel.org, cgroups@vger.kernel.org, Michal Hocko Subject: Re: [PATCH] mm/memcontrol: update documentation about invoking oom killer Message-ID: <20191102160252.GA19103@freebsd.familie-tometzki.de> Mail-Followup-To: Konstantin Khlebnikov , linux-mm@kvack.org, Andrew Morton , linux-kernel@vger.kernel.org, cgroups@vger.kernel.org, Michal Hocko References: <157270779336.1961.6528158720593572480.stgit@buzz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <157270779336.1961.6528158720593572480.stgit@buzz> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 02. Nov 18:16, Konstantin Khlebnikov wrote: > Since commit 29ef680ae7c2 ("memcg, oom: move out_of_memory back to the > charge path") memcg invokes oom killer not only for user page-faults. > This means 0-order allocation will either succeed or task get killed. > > Fixes: 8e675f7af507 ("mm/oom_kill: count global and memory cgroup oom kills") > Signed-off-by: Konstantin Khlebnikov > --- > Documentation/admin-guide/cgroup-v2.rst | 9 +++++++-- > 1 file changed, 7 insertions(+), 2 deletions(-) > > diff --git a/Documentation/admin-guide/cgroup-v2.rst b/Documentation/admin-guide/cgroup-v2.rst > index 5361ebec3361..eb47815e137b 100644 > --- a/Documentation/admin-guide/cgroup-v2.rst > +++ b/Documentation/admin-guide/cgroup-v2.rst > @@ -1219,8 +1219,13 @@ PAGE_SIZE multiple when read back. > > Failed allocation in its turn could be returned into > userspace as -ENOMEM or silently ignored in cases like > - disk readahead. For now OOM in memory cgroup kills > - tasks iff shortage has happened inside page fault. > + disk readahead. > + > + Before 4.19 OOM in memory cgroup killed tasks iff Hello Konstantin, iff --> if :-) Best regards Damian > + shortage has happened inside page fault, random > + syscall may fail with ENOMEM or EFAULT. Since 4.19 > + failed memory cgroup allocation invokes oom killer and > + keeps retrying until it succeeds. > > This event is not raised if the OOM killer is not > considered as an option, e.g. for failed high-order >