Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp2317336ybx; Sat, 2 Nov 2019 16:57:39 -0700 (PDT) X-Google-Smtp-Source: APXvYqwZiK35LkKhRVokvYQy+9Cec33heNF1boRQn9gjgxLwM8yZcruu0NZwCovu4X0oSKP7LySh X-Received: by 2002:a17:906:743:: with SMTP id z3mr16832940ejb.142.1572739059681; Sat, 02 Nov 2019 16:57:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572739059; cv=none; d=google.com; s=arc-20160816; b=xFEWejfly3rGG10ntYItst91wBsgr7XKE2dfVGV28o3KdCYHlDmUKiEoZJ8vQZWYGC QT2cLG7Sp5PuX3faF8pL6SSI0qKk2uFcADza8PKK44D1ERpQ1P+TJOax+rIi9VpmcHAH mVnAWOZHyCUVz6NqbcvcYZcvh48GbNq6LQA27EAS+HofkcMM+32VbH3vsVtAaF6+B1Rd Khos/x9VYMCA+/Zw/Ijml0USNzrGwsMfciehH1wkq/o+Xc/lRNN9dGKQOEik8HWmFWZR s3fvk+EVsioGasLIMFXfoKtuft+gL22ULo3vWm1S/z+YWstc9DpZf2GQjGp+Ia0qNH7q rtfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=z0bgko71g/IEmBKD3Kro6mR4U+O8GKl/Z/Ms7dBzsH4=; b=EnUuyL0TyDnvkIZ7Y17rFGt2IXe8XAUX1rMqJdMkCUxoQJyIh6nCu8PXm5U8bgNEOS OdFxc4zPljpiGI/kOCNMU8YyNyVbxMdoJH8oulBU7fQDYSCxXBg0+7AKFhudX/wJpEpg /xHD7PMvo4d+yRsxUl6wujFeRDEpuTRxiSz1mQYtdUN5c7rtuhs0Y8qu0lCG+I6KfEcU lM4YsND1ejMo+um4b4D/n2jWabDOH5w2zOx5T6P8MRTCVVSobQp8DvhdZiawAa6GQB8f avGQ7P0+Zi8E4GQOqrR3T/pJkb0+iyQgkgmCJNxRgW0BLl1aKnNuHgEq4f59GwE6qrkV QL1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Y0grKuDc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w23si8837706ejb.156.2019.11.02.16.57.16; Sat, 02 Nov 2019 16:57:39 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Y0grKuDc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727367AbfKBXzl (ORCPT + 99 others); Sat, 2 Nov 2019 19:55:41 -0400 Received: from mail-pl1-f194.google.com ([209.85.214.194]:40923 "EHLO mail-pl1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726689AbfKBXzl (ORCPT ); Sat, 2 Nov 2019 19:55:41 -0400 Received: by mail-pl1-f194.google.com with SMTP id e3so3859940plt.7 for ; Sat, 02 Nov 2019 16:55:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=z0bgko71g/IEmBKD3Kro6mR4U+O8GKl/Z/Ms7dBzsH4=; b=Y0grKuDcaYtkpumf209OEt0taRJ7Y6eOtn7rvFJPq1VMFZ+BoXqfMZNRq9rLCrW12u D8VNlbfWEqIKt3A1Wl+k1SxaU9X2kXhZXXesNApA/aYan2qyIkNS8pgyMMfIvkD0w4VS U6msNXpe1KK9KZZGIiGmJNMpwNFaKC+VtlKzW5GbBSjRIjnen7Tk66LtCmd6uh5QJN6G 8oIubEqXAwVIFxaXfQiQrJEYD0VQHXDkafpol8yjZhyMnR0FWJGrB2uvS0BHdLFhgof7 K7QbS5Styk3SYEeVaUYq45g2bzeTAhcNl2Lg/i35OjWCROKCu7YX5GPeBPv+2Rq222E3 dl9g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=z0bgko71g/IEmBKD3Kro6mR4U+O8GKl/Z/Ms7dBzsH4=; b=WRkQf5ZbkQzSnrU+2fO1RP0i4QaqAkIIU+fruhDFUGPUYwtlfAKezype+gvAU5A1ev PMXZimIfK15Dj6aRI9b8vDCB60uT2oyK+cu0nJjlBb1iV0HPYjBf2JG2MYfrJcXjgZB4 0Vl0TES7RQI2+7TlS+i5ufxvQTwAMSbpRPSYN7LXa/1axQAeihuLrw4VG+vrsIK3mVpn Yb5es9mrxTXzmHRX/3V5U25ECKJLIcwM8sc3OjynquiArRyn1SFfjfGQdvWd9IoDEj3Y j/gOVUoe4sukea75+mTCv3HjaEmr5/gFTa7e+Ylp8Mcix4ZY9ttmQNWeePwXMPg1cgC4 SvVg== X-Gm-Message-State: APjAAAU2DMg6u/lyNcb0wI9YzP+HpgclgphRqLK4C9HInQ8cSdKs6d5Z HPZjTaN5XRfsLvQpvJuCk/gS8w== X-Received: by 2002:a17:902:6909:: with SMTP id j9mr19271681plk.276.1572738938992; Sat, 02 Nov 2019 16:55:38 -0700 (PDT) Received: from [2620:15c:17:3:3a5:23a7:5e32:4598] ([2620:15c:17:3:3a5:23a7:5e32:4598]) by smtp.gmail.com with ESMTPSA id c66sm11767706pfb.25.2019.11.02.16.55.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 02 Nov 2019 16:55:38 -0700 (PDT) Date: Sat, 2 Nov 2019 16:55:37 -0700 (PDT) From: David Rientjes X-X-Sender: rientjes@chino.kir.corp.google.com To: Konstantin Khlebnikov cc: linux-mm@kvack.org, Andrew Morton , linux-kernel@vger.kernel.org, cgroups@vger.kernel.org, Michal Hocko Subject: Re: [PATCH] mm/memcontrol: update documentation about invoking oom killer In-Reply-To: <157270779336.1961.6528158720593572480.stgit@buzz> Message-ID: References: <157270779336.1961.6528158720593572480.stgit@buzz> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sat, 2 Nov 2019, Konstantin Khlebnikov wrote: > Since commit 29ef680ae7c2 ("memcg, oom: move out_of_memory back to the > charge path") memcg invokes oom killer not only for user page-faults. > This means 0-order allocation will either succeed or task get killed. > > Fixes: 8e675f7af507 ("mm/oom_kill: count global and memory cgroup oom kills") > Signed-off-by: Konstantin Khlebnikov > --- > Documentation/admin-guide/cgroup-v2.rst | 9 +++++++-- > 1 file changed, 7 insertions(+), 2 deletions(-) > > diff --git a/Documentation/admin-guide/cgroup-v2.rst b/Documentation/admin-guide/cgroup-v2.rst > index 5361ebec3361..eb47815e137b 100644 > --- a/Documentation/admin-guide/cgroup-v2.rst > +++ b/Documentation/admin-guide/cgroup-v2.rst > @@ -1219,8 +1219,13 @@ PAGE_SIZE multiple when read back. > > Failed allocation in its turn could be returned into > userspace as -ENOMEM or silently ignored in cases like > - disk readahead. For now OOM in memory cgroup kills > - tasks iff shortage has happened inside page fault. > + disk readahead. > + > + Before 4.19 OOM in memory cgroup killed tasks iff > + shortage has happened inside page fault, random > + syscall may fail with ENOMEM or EFAULT. Since 4.19 > + failed memory cgroup allocation invokes oom killer and > + keeps retrying until it succeeds. > > This event is not raised if the OOM killer is not > considered as an option, e.g. for failed high-order The previous text is obviously incorrect for today's kernels, but I'm curious if we should be conflating the documentation here by describing the pre-4.19 behavior. OOM killing no longer happens only on page fault so maybe better to document the exact behavior today and not attempt to describe differences with previous versions?