Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp1427306rdb; Wed, 20 Sep 2023 08:50:41 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEnFqx+zxzlKb4WB9PizaZGTwHjDoV1IzzD/IxrOdGuSsx3T5FYU8udvc3GEc+dcSKHFaTA X-Received: by 2002:a05:6358:6f12:b0:139:e7db:3f3f with SMTP id r18-20020a0563586f1200b00139e7db3f3fmr3226344rwn.10.1695225040795; Wed, 20 Sep 2023 08:50:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695225040; cv=none; d=google.com; s=arc-20160816; b=HI7Vqfqu87UPFYTXkNSCF0eGoiValbaso4Ikjc4lVXVO2z45ukR4GoemhYe/K6ymJo ql/fR4DawvuFzwA1g5NHvLJ2bZyu1z4v8cJIyxm/lnjvyZa/eYhwjWE5rGDh/aOr9qdU 9K8ejz7DmIWS2qkgd6UlXfuUxfBDY4/ryOrr5RUtyPR8/HeLeveLrObnnw65r6UPCfB1 zQ09Qh8yt69Q+10zYoiAypxUH9esZ722PWHjqI9kE0AmHZ0yvtiNRcCOSSNkSS/kq7rN bv2wnkbV/NCldNjXfP0tG5GuS6/UtErv5aBTE9WrfjuSdrgZLbEianZNzQoFv1dGB59y kb3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=S/snCuZpEV/rtAoiDV8eTkiFsU9tul7/5xeWIzs69P4=; fh=3Ga6HZ/b3RhyvIfucVDfyhujmpgS1wIwNaoQioLCgN4=; b=MLNb+KfPwJWoWr/RDtyAyXCE/C6FU5rCunSJYj+fsyuNj2d6L3T/0Kvnek5Q/feWOP OgUdoRuHXv4AZTR3+SJw0LlaJqJ+ysfAoDXJZtxhg0CytIgngM3tRlcW4Zhib72DNv6m HEnmOVtmcbHcd4Y9yp8ufnTe2X20aIQ+Dw5ml4CieuW2Y/kqOEc29uBZbTzhQosgO0R6 +o99Ur0zdP4Q5djL9uGhMaTVyFqg52LWNa8VhkhjPNOKX7bGMH79usSOOsbTtpw//uJL NXPzca46fC6Z3Dy6yfZk8jEkpcSGI5y0ifhZlFP5PJskQA0NdOw0193rahWLQPE+GVTj 03Hw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=SieMIAki; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id b26-20020a6567da000000b00577f59c8a12si11958951pgs.847.2023.09.20.08.50.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Sep 2023 08:50:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.com header.s=susede1 header.b=SieMIAki; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=suse.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 1A01381904D9; Wed, 20 Sep 2023 06:47:50 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234961AbjITNru (ORCPT + 99 others); Wed, 20 Sep 2023 09:47:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54770 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234565AbjITNrs (ORCPT ); Wed, 20 Sep 2023 09:47:48 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [IPv6:2001:67c:2178:6::1d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3AD1DAD; Wed, 20 Sep 2023 06:47:39 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id D8C71200A3; Wed, 20 Sep 2023 13:47:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.com; s=susede1; t=1695217657; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=S/snCuZpEV/rtAoiDV8eTkiFsU9tul7/5xeWIzs69P4=; b=SieMIAkivNWy3EVUvOjPG5/PORQlkKhXDFby+/Llv1MT4g5OqJjZL+SnRmLeRk5vzysjdf wg8/6w1A5jKCofvAFHe8UMJaBGMF4YlAWwKFVeAWKQZtcUNErEikKd/i0mpm6rl3gF5NU4 waD4aVwTbnXNUjHh/k0mM5kmMD99RRM= Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id B50D71333E; Wed, 20 Sep 2023 13:47:37 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id p93hKfn3CmVNCwAAMHmgww (envelope-from ); Wed, 20 Sep 2023 13:47:37 +0000 Date: Wed, 20 Sep 2023 15:47:37 +0200 From: Michal Hocko To: Jeremi Piotrowski , Shakeel Butt , Johannes Weiner , Roman Gushchin , Muchun Song Cc: Greg Kroah-Hartman , stable@vger.kernel.org, patches@lists.linux.dev, Tejun Heo , Andrew Morton , linux-kernel@vger.kernel.org, regressions@lists.linux.dev, mathieu.tortuyaux@gmail.com Subject: Re: [REGRESSION] Re: [PATCH 6.1 033/219] memcg: drop kmem.limit_in_bytes Message-ID: References: <20230917191040.964416434@linuxfoundation.org> <20230917191042.204185566@linuxfoundation.org> <20230920081101.GA12096@linuxonhyperv3.guj3yctzbm1etfxqx2vob5hsef.xx.internal.cloudapp.net> <101987a1-b1ab-429d-af03-b6bdf6216474@linux.microsoft.com> <4eb47d6a-b127-4aad-af30-896c3b9505b4@linux.microsoft.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4eb47d6a-b127-4aad-af30-896c3b9505b4@linux.microsoft.com> X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Wed, 20 Sep 2023 06:47:50 -0700 (PDT) On Wed 20-09-23 15:25:23, Jeremi Piotrowski wrote: > On 9/20/2023 1:07 PM, Michal Hocko wrote: [...] > > I mean, normally I would be just fine reverting this API change because > > it is disruptive but the only way to have the file available and not > > break somebody is to revert 58056f77502f ("memcg, kmem: further > > deprecate kmem.limit_in_bytes") as well. Or to ignore any value written > > there but that sounds rather dubious. Although one could argue this > > would mimic nokmem kernel option. > > > > I just want to make sure we don't introduce yet another new behavior in this legacy > system. I have not seen breakage due to 58056f77502f. Mimicing nokmem sounds good but > does this mean "don't enforce limits" (that should be fine) or "ignore writes to the limit" > (=don't event store the written limit). The latter might have unintended consequences. Yes it would mean that the limit is never enforced. Bad as it is the thing is that the hard limit on kernel memory is broken by design and unfixable. This causes all sorts of unexpected kernel allocation failures that this is simply unsafe to use. All that being said I can see the following options 1) keep the current upstream status and not export the file 2) revert both 58056f77502f and 86327e8eb94 and make it clear that kmem.limit_in_bytes is unsupported so failures or misbehavior as a result of the limit being hit are likely not going to be investigated or fixed. 3) reverting like in 2) but never inforce the limit (so basically nokmem semantic) Shakeel, Johannes, Roman, Muchun Song what do you think? -- Michal Hocko SUSE Labs