Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757447AbZJ1GWn (ORCPT ); Wed, 28 Oct 2009 02:22:43 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1757417AbZJ1GWm (ORCPT ); Wed, 28 Oct 2009 02:22:42 -0400 Received: from fgwmail6.fujitsu.co.jp ([192.51.44.36]:58353 "EHLO fgwmail6.fujitsu.co.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757416AbZJ1GWl (ORCPT ); Wed, 28 Oct 2009 02:22:41 -0400 X-SecurityPolicyCheck-FJ: OK by FujitsuOutboundMailChecker v1.3.1 Date: Wed, 28 Oct 2009 15:20:15 +0900 From: KAMEZAWA Hiroyuki To: David Rientjes Cc: vedran.furac@gmail.com, Hugh Dickins , linux-mm@kvack.org, linux-kernel@vger.kernel.org, KOSAKI Motohiro , minchan.kim@gmail.com, Andrew Morton , Andrea Arcangeli Subject: Re: Memory overcommit Message-Id: <20091028152015.3d383cd6.kamezawa.hiroyu@jp.fujitsu.com> In-Reply-To: References: <20091013120840.a844052d.kamezawa.hiroyu@jp.fujitsu.com> <20091014135119.e1baa07f.kamezawa.hiroyu@jp.fujitsu.com> <4ADE3121.6090407@gmail.com> <20091026105509.f08eb6a3.kamezawa.hiroyu@jp.fujitsu.com> <4AE5CB4E.4090504@gmail.com> <20091027122213.f3d582b2.kamezawa.hiroyu@jp.fujitsu.com> <4AE78B8F.9050201@gmail.com> <4AE792B8.5020806@gmail.com> <20091028135519.805c4789.kamezawa.hiroyu@jp.fujitsu.com> <20091028150536.674abe68.kamezawa.hiroyu@jp.fujitsu.com> Organization: FUJITSU Co. LTD. X-Mailer: Sylpheed 2.5.0 (GTK+ 2.10.14; i686-pc-mingw32) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1753 Lines: 46 On Tue, 27 Oct 2009 23:17:41 -0700 (PDT) David Rientjes wrote: > On Wed, 28 Oct 2009, KAMEZAWA Hiroyuki wrote: > > > All kernel engineers know "than expected or not" can be never known to the kernel. > > So, oom_adj workaround is used now. (by some special users.) > > OOM Killer itself is also a workaround, too. > > "No kill" is the best thing but we know there are tend to be memory-leaker on bad > > systems and all systems in this world are not perfect. > > > > Right, and historically that has been addressed by considering total_vm > and adjusting it with oom_adj so that we can identify memory leaking tasks > through user-defined criteria. > > > Yes, some more trustable values other than vmsize/rss/time are appriciated. > > I wonder recent memory consumption speed can be an another key value. > > > > Sounds very logical. > > > Anyway, current bahavior of "killing X" is a bad thing. > > We need some fixes. > > > > You can easily protect X with OOM_DISABLE, as you know. I don't think we > need any X-specific heuristics added to the kernel, it looks like the > special cases have already polluted badness() enough. > It's _not_ special to X. Almost all applications which uses many dynamica libraries can be affected by this, total_vm. And, as I explained to Vedran, multi-threaded program like Java can easily increase total_vm without using many anon_rss. And it's the reason I hate overcommit_memory. size of VM doesn't tell anything. Thanks, -Kame -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/