Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp1951278ybx; Sat, 2 Nov 2019 09:19:00 -0700 (PDT) X-Google-Smtp-Source: APXvYqzdk8BOX9cRGif38G6OpTyhQ/DtNVYod6HuAsuljVj4s0t3K/QYo8GHXy0/CHAdb3bneJ7H X-Received: by 2002:a17:906:7257:: with SMTP id n23mr15836969ejk.132.1572711540323; Sat, 02 Nov 2019 09:19:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572711540; cv=none; d=google.com; s=arc-20160816; b=PDOLCMcuKQOFuqZEp5jz6ML2u3yVGHEGJIyrgZYCYyacshedB/EiKPF7mgizoumd7N wwcrcD7A6GxjsiGnSqMBgc47YJ8FPLGbDLsi4YCWQHn0oU2g+rDt0PaPWRhZTVawOdbk vXCKgrM0oaVuQzNzDM/LnTfa+EHU+CR+UQawd1ugyZviWRuyIKK8MOIeHItWOKvqKanc i+zydagBvvs7QLVbKrCtN0p/6+QkKlp52izSTAMCI11AhLZeyDNqd3y4zypYGy73Urjb kUfXyxf2FFMoppaCMPgxfshjjQlP18jk9u4quhsWeDB1G8S5tPutvVeC7dgpooUXTCGv 89dQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:to:subject:dkim-signature; bh=Yd0CleJdEZRkBuzs0TYF6lmKdD5XxhQPGhQbqlbh1rs=; b=N6UzvUFbttQQC5eU7TygaYn2YL9Bi+AgY0CowjLocXKTrx0bXZxDuhy1d18tnFAexC YKe5Hq28wGUQZtnQV8JizkejWXB9K+m3XpOzUzoKWCB9xn5MVIjf0Y7G4djYVEybhZLC Ty2uUSJbVC0w8Eo+6CRM8STrUQRq6Vbo6ziiuJJs71SFKRVtU9B2RVCI1Gea6rn5eKs5 q/u4rNPz3YycJ5Rm+w8BRaehf0Nxr1DNGkjm02jKgP+t/rjqV/IiRuJE0dPca4nt5EDl vCZWdo2ffaB+8Vqb4PKDgj1OJs6s8/PrIPxX5e2vv4MzY8rGwV1lmxwGMiFzHiwHZXG2 xE+g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=Hmd1SS8F; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ca10si2984989edb.67.2019.11.02.09.18.35; Sat, 02 Nov 2019 09:19:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@yandex-team.ru header.s=default header.b=Hmd1SS8F; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=yandex-team.ru Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726907AbfKBQO4 (ORCPT + 99 others); Sat, 2 Nov 2019 12:14:56 -0400 Received: from forwardcorp1j.mail.yandex.net ([5.45.199.163]:36588 "EHLO forwardcorp1j.mail.yandex.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726387AbfKBQO4 (ORCPT ); Sat, 2 Nov 2019 12:14:56 -0400 Received: from mxbackcorp1g.mail.yandex.net (mxbackcorp1g.mail.yandex.net [IPv6:2a02:6b8:0:1402::301]) by forwardcorp1j.mail.yandex.net (Yandex) with ESMTP id A459B2E0DDE; Sat, 2 Nov 2019 19:14:52 +0300 (MSK) Received: from vla1-5826f599457c.qloud-c.yandex.net (vla1-5826f599457c.qloud-c.yandex.net [2a02:6b8:c0d:35a1:0:640:5826:f599]) by mxbackcorp1g.mail.yandex.net (nwsmtp/Yandex) with ESMTP id EyUENoXOa7-EqDSob5x; Sat, 02 Nov 2019 19:14:52 +0300 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yandex-team.ru; s=default; t=1572711292; bh=Yd0CleJdEZRkBuzs0TYF6lmKdD5XxhQPGhQbqlbh1rs=; h=In-Reply-To:References:Date:Message-ID:From:To:Subject; b=Hmd1SS8FaLYfXLialvxaRuDNR9z0cBETtPVQqrm55xgu7uifS0HC/9FbkK/S66nMS tdEfmITpnkRcvh1IeWvmV4LHVLiCeitt98Sacehrrtv06CdILIuXHfYN5YP71JEnkV DSJPImoOysWZL0BvYUYmBzfnHJmLy1K01HpixnW8= Authentication-Results: mxbackcorp1g.mail.yandex.net; dkim=pass header.i=@yandex-team.ru Received: from dynamic-red.dhcp.yndx.net (dynamic-red.dhcp.yndx.net [2a02:6b8:0:40c:8554:53c0:3d75:2e8a]) by vla1-5826f599457c.qloud-c.yandex.net (nwsmtp/Yandex) with ESMTPSA id VQiFRucw4e-EqVmg9Qb; Sat, 02 Nov 2019 19:14:52 +0300 (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client certificate not present) Subject: Re: [PATCH] mm/memcontrol: update documentation about invoking oom killer To: linux-mm@kvack.org, Andrew Morton , linux-kernel@vger.kernel.org, cgroups@vger.kernel.org, Michal Hocko References: <157270779336.1961.6528158720593572480.stgit@buzz> <20191102160252.GA19103@freebsd.familie-tometzki.de> From: Konstantin Khlebnikov Message-ID: <5c85a690-4ed7-91bb-30b5-c40174534a27@yandex-team.ru> Date: Sat, 2 Nov 2019 19:14:51 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.0 MIME-Version: 1.0 In-Reply-To: <20191102160252.GA19103@freebsd.familie-tometzki.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-CA Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 02/11/2019 19.02, Damian Tometzki wrote: > On Sat, 02. Nov 18:16, Konstantin Khlebnikov wrote: >> Since commit 29ef680ae7c2 ("memcg, oom: move out_of_memory back to the >> charge path") memcg invokes oom killer not only for user page-faults. >> This means 0-order allocation will either succeed or task get killed. >> >> Fixes: 8e675f7af507 ("mm/oom_kill: count global and memory cgroup oom kills") >> Signed-off-by: Konstantin Khlebnikov >> --- >> Documentation/admin-guide/cgroup-v2.rst | 9 +++++++-- >> 1 file changed, 7 insertions(+), 2 deletions(-) >> >> diff --git a/Documentation/admin-guide/cgroup-v2.rst b/Documentation/admin-guide/cgroup-v2.rst >> index 5361ebec3361..eb47815e137b 100644 >> --- a/Documentation/admin-guide/cgroup-v2.rst >> +++ b/Documentation/admin-guide/cgroup-v2.rst >> @@ -1219,8 +1219,13 @@ PAGE_SIZE multiple when read back. >> >> Failed allocation in its turn could be returned into >> userspace as -ENOMEM or silently ignored in cases like >> - disk readahead. For now OOM in memory cgroup kills >> - tasks iff shortage has happened inside page fault. >> + disk readahead. >> + >> + Before 4.19 OOM in memory cgroup killed tasks iff > Hello Konstantin, > > iff --> if :-) > This "iff" is shortened "if and only if". https://en.wikipedia.org/wiki/If_and_only_if > Best regards > Damian > > >> + shortage has happened inside page fault, random >> + syscall may fail with ENOMEM or EFAULT. Since 4.19 >> + failed memory cgroup allocation invokes oom killer and >> + keeps retrying until it succeeds. >> >> This event is not raised if the OOM killer is not >> considered as an option, e.g. for failed high-order >>