diff mbox series

[3/3] memcg oom: bail out from the charge path if no victim found

Message ID 20200418151311.7397-4-laoar.shao@gmail.com (mailing list archive)
State New, archived
Headers show
Series memcg oom: bail out from the charge path if no victim found | expand

Commit Message

Yafang Shao April 18, 2020, 3:13 p.m. UTC
Without considering the manually triggered OOM, if no victim found in
system OOM, the system will be deadlocked on memory, however if no
victim found in memcg OOM, it can charge successfully and runs well.
This behavior in memcg oom is not proper because that can prevent the
memcg from being limited.

Take an easy example.
        $ cd /sys/fs/cgroup/foo/
	$ echo $$ > cgroup.procs
	$ echo 200M > memory.max
	$ cat memory.max
	209715200
	$ echo -1000 > /proc/$$/oom_score_adj
Then, let's run a memhog task in memcg foo, which will allocate 1G
memory and keeps running.
	$ /home/yafang/test/memhog &
Then memory.current will be greater than memory.max. Run bellow command
in another shell.
	$ cat /sys/fs/cgroup/foo/memory.current
	1097228288
The tasks which have already allocated memory and won't allocate new
memory still runs well. This behavior makes nonsense.

This patch is to improve it.
If no victim found in memcg oom, we should force the current task to
wait until there's available pages. That is similar with the behavior in
memcg1 when oom_kill_disable is set.

In memcg2, the memcg oom can also be triggered manually - by reducing
memory.max. We should distinguish this manually triggered memcg oom with
other reguler memcg oom, so a magic key "oom_control.order == -2" is set
in this situation. The tasks waiting in memcg oom will be waked up when we
enlarge the memory.max. As these tasks is killable, we can also kill
them directly.

In memcg1, it cooperates well with memory.oom_control(oom_kill_disable).
The tasks waiting in memcg1 oom can be waked up by enlarging
memory.limit_in_bytes or disabling oom_kill_disable. As oom_kill_disable
can be set manually, we should distinguish it with other reguler memcg
oom as well. A member named memcg_oom_wait is introduced in struct
task_struct to handle it.

Signed-off-by: Yafang Shao <laoar.shao@gmail.com>
---
 include/linux/memcontrol.h |  8 ++++++--
 include/linux/sched.h      |  1 +
 mm/memcontrol.c            | 25 +++++++++++++++++++++----
 mm/oom_kill.c              | 22 ++++++++++++++++++++++
 4 files changed, 50 insertions(+), 6 deletions(-)

Comments

Michal Hocko April 20, 2020, 8:13 a.m. UTC | #1
On Sat 18-04-20 11:13:11, Yafang Shao wrote:
> Without considering the manually triggered OOM, if no victim found in
> system OOM, the system will be deadlocked on memory, however if no
> victim found in memcg OOM, it can charge successfully and runs well.
> This behavior in memcg oom is not proper because that can prevent the
> memcg from being limited.
> 
> Take an easy example.
>         $ cd /sys/fs/cgroup/foo/
> 	$ echo $$ > cgroup.procs
> 	$ echo 200M > memory.max
> 	$ cat memory.max
> 	209715200
> 	$ echo -1000 > /proc/$$/oom_score_adj
> Then, let's run a memhog task in memcg foo, which will allocate 1G
> memory and keeps running.
> 	$ /home/yafang/test/memhog &

Well, echo -1000 is a privileged operation. And it has to be used with
an extreme care because you know that you are creating an unkillable
task. So the above test is a clear example of the misconfiguration.

> Then memory.current will be greater than memory.max. Run bellow command
> in another shell.
> 	$ cat /sys/fs/cgroup/foo/memory.current
> 	1097228288
> The tasks which have already allocated memory and won't allocate new
> memory still runs well. This behavior makes nonsense.
> 
> This patch is to improve it.
> If no victim found in memcg oom, we should force the current task to
> wait until there's available pages. That is similar with the behavior in
> memcg1 when oom_kill_disable is set.

The primary reason why we force the charge is because we _cannot_ wait
indefinitely in the charge path because the current call chain might
hold locks or other resources which could block a large part of the
system. You are essentially reintroducing that behavior.

Is the above example a real usecase or you have just tried a test case
that would trigger the problem?
Yafang Shao April 20, 2020, 8:52 a.m. UTC | #2
On Mon, Apr 20, 2020 at 4:13 PM Michal Hocko <mhocko@kernel.org> wrote:
>
> On Sat 18-04-20 11:13:11, Yafang Shao wrote:
> > Without considering the manually triggered OOM, if no victim found in
> > system OOM, the system will be deadlocked on memory, however if no
> > victim found in memcg OOM, it can charge successfully and runs well.
> > This behavior in memcg oom is not proper because that can prevent the
> > memcg from being limited.
> >
> > Take an easy example.
> >         $ cd /sys/fs/cgroup/foo/
> >       $ echo $$ > cgroup.procs
> >       $ echo 200M > memory.max
> >       $ cat memory.max
> >       209715200
> >       $ echo -1000 > /proc/$$/oom_score_adj
> > Then, let's run a memhog task in memcg foo, which will allocate 1G
> > memory and keeps running.
> >       $ /home/yafang/test/memhog &
>
> Well, echo -1000 is a privileged operation. And it has to be used with
> an extreme care because you know that you are creating an unkillable
> task. So the above test is a clear example of the misconfiguration.
>

Right. This issue is really tiggered by the misconfiguration.

> > Then memory.current will be greater than memory.max. Run bellow command
> > in another shell.
> >       $ cat /sys/fs/cgroup/foo/memory.current
> >       1097228288
> > The tasks which have already allocated memory and won't allocate new
> > memory still runs well. This behavior makes nonsense.
> >
> > This patch is to improve it.
> > If no victim found in memcg oom, we should force the current task to
> > wait until there's available pages. That is similar with the behavior in
> > memcg1 when oom_kill_disable is set.
>
> The primary reason why we force the charge is because we _cannot_ wait
> indefinitely in the charge path because the current call chain might
> hold locks or other resources which could block a large part of the
> system. You are essentially reintroducing that behavior.
>

Seems my poor English misleads you ?
The task is NOT waiting in the charge path, while it is really waiting
at the the end of the page fault, so it doesn't hold any locks.
See the comment above mem_cgroup_oom_synchronize()

/*
 *  ...
 * Memcg supports userspace OOM handling where failed allocations must
 * sleep on a waitqueue until the userspace task resolves the
 * situation.  Sleeping directly in the charge context with all kinds
 * of locks held is not a good idea, instead we remember an OOM state
 * in the task and mem_cgroup_oom_synchronize() has to be called at
 * the end of the page fault to complete the OOM handling.
 * ...
 */
bool mem_cgroup_oom_synchronize(bool handle)


> Is the above example a real usecase or you have just tried a test case
> that would trigger the problem?

On my server I found the memory usage of a container was greater than
the limit of it.
From the dmesg I know there's no killable tasks becasue the
oom_score_adj is set with -1000.
Then I tried this test case to produce this issue.
This issue can be triggerer by the misconfiguration of oom_score_adj,
and can also be tiggered by a memoy leak in the task  with
oom_score_adj -1000.


Thanks
Yafang
Michal Hocko April 20, 2020, 9:14 a.m. UTC | #3
On Mon 20-04-20 16:52:05, Yafang Shao wrote:
> On Mon, Apr 20, 2020 at 4:13 PM Michal Hocko <mhocko@kernel.org> wrote:
> >
> > On Sat 18-04-20 11:13:11, Yafang Shao wrote:
[...]
> > > This patch is to improve it.
> > > If no victim found in memcg oom, we should force the current task to
> > > wait until there's available pages. That is similar with the behavior in
> > > memcg1 when oom_kill_disable is set.
> >
> > The primary reason why we force the charge is because we _cannot_ wait
> > indefinitely in the charge path because the current call chain might
> > hold locks or other resources which could block a large part of the
> > system. You are essentially reintroducing that behavior.
> >
> 
> Seems my poor English misleads you ?
> The task is NOT waiting in the charge path, while it is really waiting
> at the the end of the page fault, so it doesn't hold any locks.

How is that supposed to work? Sorry I didn't really study your patch
very closely because it doesn't apply on the current Linus' tree and
your previous 2 patches have reshuffled the code so it is not really
trivial to have a good picture of the overall logic change.

> See the comment above mem_cgroup_oom_synchronize()

Anyway mem_cgroup_oom_synchronize shouldn't really trigger unless the
oom handling is disabled (aka handed over to the userspace). All other
paths should handle the oom in the charge path. Please have a look at 
29ef680ae7c2 ("memcg, oom: move out_of_memory back to the charge path")
for more background and motivation.

mem_cgroup_oom_synchronize was a workaround for deadlocks and the side
effect was that all other charge paths outside of #PF were failing
allocations prematurely and that had an effect to user space.

> > Is the above example a real usecase or you have just tried a test case
> > that would trigger the problem?
> 
> On my server I found the memory usage of a container was greater than
> the limit of it.
> From the dmesg I know there's no killable tasks becasue the
> oom_score_adj is set with -1000.

I would really recommend to address this problem in the userspace
configuration. Either by increasing the memory limit or fixing the
oom disabled userspace to not consume that much of a memory.

> Then I tried this test case to produce this issue.
> This issue can be triggerer by the misconfiguration of oom_score_adj,
> and can also be tiggered by a memoy leak in the task  with
> oom_score_adj -1000.

Please note that there is not much the system can do about oom disabled
tasks that leak memory. Even the global case would slowly kill all other
userspace until it panics due to no eligible tasks. The oom_score_adj
has a very strong consequences. Do not use it without a very careful
consideration.
Yafang Shao April 20, 2020, 9:58 a.m. UTC | #4
On Mon, Apr 20, 2020 at 5:14 PM Michal Hocko <mhocko@kernel.org> wrote:
>
> On Mon 20-04-20 16:52:05, Yafang Shao wrote:
> > On Mon, Apr 20, 2020 at 4:13 PM Michal Hocko <mhocko@kernel.org> wrote:
> > >
> > > On Sat 18-04-20 11:13:11, Yafang Shao wrote:
> [...]
> > > > This patch is to improve it.
> > > > If no victim found in memcg oom, we should force the current task to
> > > > wait until there's available pages. That is similar with the behavior in
> > > > memcg1 when oom_kill_disable is set.
> > >
> > > The primary reason why we force the charge is because we _cannot_ wait
> > > indefinitely in the charge path because the current call chain might
> > > hold locks or other resources which could block a large part of the
> > > system. You are essentially reintroducing that behavior.
> > >
> >
> > Seems my poor English misleads you ?
> > The task is NOT waiting in the charge path, while it is really waiting
> > at the the end of the page fault, so it doesn't hold any locks.
>
> How is that supposed to work? Sorry I didn't really study your patch
> very closely because it doesn't apply on the current Linus' tree and
> your previous 2 patches have reshuffled the code so it is not really
> trivial to have a good picture of the overall logic change.
>

My patch is based on the commit 8632e9b5645b, and I can rebase my
patch for better reviewing.
Here is the overall logic of the patch.
do_page_fault
    mem_cgroup_try_charge
        mem_cgroup_out_of_memory  <<< over the limit of this memcg
            out_of_memory
                  if (!oc->chosen)  <<<< no killable tasks found
                        Set_an_OOM _state_in_the_task <<<< set the oom state
    mm_fault_error
        pagefault_out_of_memory  <<<< VM_FAULT_OOM is returned by the
previously error
            mem_cgroup_oom_synchronize(true)
                 Check_the_OOM_state_and_then_wait_here <<<< check the oom state




> > See the comment above mem_cgroup_oom_synchronize()
>
> Anyway mem_cgroup_oom_synchronize shouldn't really trigger unless the
> oom handling is disabled (aka handed over to the userspace). All other
> paths should handle the oom in the charge path.

Right. Now this patch introduces another patch to enter
mem_cgroup_oom_synchronize().

>  Please have a look at
> 29ef680ae7c2 ("memcg, oom: move out_of_memory back to the charge path")
> for more background and motivation.
>

Before I send this patch, I have read it carefully.

> mem_cgroup_oom_synchronize was a workaround for deadlocks and the side
> effect was that all other charge paths outside of #PF were failing
> allocations prematurely and that had an effect to user space.
>

I guess this side effect is caused by the precision of the page
counter, for example, the page counter isn't modified immdiately after
uncharging the pages - that's the issue we should improve IMHO.

> > > Is the above example a real usecase or you have just tried a test case
> > > that would trigger the problem?
> >
> > On my server I found the memory usage of a container was greater than
> > the limit of it.
> > From the dmesg I know there's no killable tasks becasue the
> > oom_score_adj is set with -1000.
>
> I would really recommend to address this problem in the userspace
> configuration. Either by increasing the memory limit or fixing the
> oom disabled userspace to not consume that much of a memory.
>

This issue can be addressed in the usespace configuration.
But note that there're many containers running on one single host,
what we should do is try to keep the isolation as strong as possible.
If we don't take any action in the kernel, the users will complain to
us that their service is easily effected by the weak isolation of the
container.

> > Then I tried this test case to produce this issue.
> > This issue can be triggerer by the misconfiguration of oom_score_adj,
> > and can also be tiggered by a memoy leak in the task  with
> > oom_score_adj -1000.
>
> Please note that there is not much the system can do about oom disabled
> tasks that leak memory. Even the global case would slowly kill all other
> userspace until it panics due to no eligible tasks. The oom_score_adj
> has a very strong consequences. Do not use it without a very careful
> consideration.

global case -> kill others until the system panic.
container case -> kill others until no tasks can run in the contianer

I think this is the consistent behavior.

Thanks
Yafang
Michal Hocko April 20, 2020, 10:31 a.m. UTC | #5
On Mon 20-04-20 17:58:03, Yafang Shao wrote:
> On Mon, Apr 20, 2020 at 5:14 PM Michal Hocko <mhocko@kernel.org> wrote:
> >
> > On Mon 20-04-20 16:52:05, Yafang Shao wrote:
> > > On Mon, Apr 20, 2020 at 4:13 PM Michal Hocko <mhocko@kernel.org> wrote:
> > > >
> > > > On Sat 18-04-20 11:13:11, Yafang Shao wrote:
> > [...]
> > > > > This patch is to improve it.
> > > > > If no victim found in memcg oom, we should force the current task to
> > > > > wait until there's available pages. That is similar with the behavior in
> > > > > memcg1 when oom_kill_disable is set.
> > > >
> > > > The primary reason why we force the charge is because we _cannot_ wait
> > > > indefinitely in the charge path because the current call chain might
> > > > hold locks or other resources which could block a large part of the
> > > > system. You are essentially reintroducing that behavior.
> > > >
> > >
> > > Seems my poor English misleads you ?
> > > The task is NOT waiting in the charge path, while it is really waiting
> > > at the the end of the page fault, so it doesn't hold any locks.
> >
> > How is that supposed to work? Sorry I didn't really study your patch
> > very closely because it doesn't apply on the current Linus' tree and
> > your previous 2 patches have reshuffled the code so it is not really
> > trivial to have a good picture of the overall logic change.
> >
> 
> My patch is based on the commit 8632e9b5645b, and I can rebase my
> patch for better reviewing.
> Here is the overall logic of the patch.
> do_page_fault
>     mem_cgroup_try_charge
>         mem_cgroup_out_of_memory  <<< over the limit of this memcg
>             out_of_memory
>                   if (!oc->chosen)  <<<< no killable tasks found
>                         Set_an_OOM _state_in_the_task <<<< set the oom state
>     mm_fault_error
>         pagefault_out_of_memory  <<<< VM_FAULT_OOM is returned by the
> previously error
>             mem_cgroup_oom_synchronize(true)
>                  Check_the_OOM_state_and_then_wait_here <<<< check the oom state

OK, I see. So this is a hybrid model. My primary concern would be that
issues seen previously with the #PF based approach will happen again.
It will be in a reduced form. It is hard to judge whether this is good.
A rare error case might be even worse because it is harder to predict.
 
> > > See the comment above mem_cgroup_oom_synchronize()
> >
> > Anyway mem_cgroup_oom_synchronize shouldn't really trigger unless the
> > oom handling is disabled (aka handed over to the userspace). All other
> > paths should handle the oom in the charge path.
> 
> Right. Now this patch introduces another patch to enter
> mem_cgroup_oom_synchronize().
> 
> >  Please have a look at
> > 29ef680ae7c2 ("memcg, oom: move out_of_memory back to the charge path")
> > for more background and motivation.
> >
> 
> Before I send this patch, I have read it carefully.
> 
> > mem_cgroup_oom_synchronize was a workaround for deadlocks and the side
> > effect was that all other charge paths outside of #PF were failing
> > allocations prematurely and that had an effect to user space.
> >
> 
> I guess this side effect is caused by the precision of the page
> counter, for example, the page counter isn't modified immdiately after
> uncharging the pages - that's the issue we should improve IMHO.

No, this is not really the case. If you have a look at gup users or any
kernel memory charged then you can find many places to return ENOMEM
even when it is not really expected. The most notable example was
MAP_POPULATE failures.
 
> > > > Is the above example a real usecase or you have just tried a test case
> > > > that would trigger the problem?
> > >
> > > On my server I found the memory usage of a container was greater than
> > > the limit of it.
> > > From the dmesg I know there's no killable tasks becasue the
> > > oom_score_adj is set with -1000.
> >
> > I would really recommend to address this problem in the userspace
> > configuration. Either by increasing the memory limit or fixing the
> > oom disabled userspace to not consume that much of a memory.
> >
> 
> This issue can be addressed in the usespace configuration.
> But note that there're many containers running on one single host,
> what we should do is try to keep the isolation as strong as possible.

I do agree with this but there is a line between isolation and proper
configuration that this requires. You will never get 100% isolation in
the first place. You have to be careful to not share some resources
which are inherently hard to isolate - e.g. page cache, file system
metadata and many others.

While your example is not the same it is similar. Disabling the oom
killer for a task implies that all the resources held by that task
cannot be reclaimed/rebalanced and so isolation is much harder to
achieve if possible at all. There is only only relieable way to handle
OOM in this situation and that is breaking the contract and kill those
tasks. I am not really convinced this is what we want to do.

> If we don't take any action in the kernel, the users will complain to
> us that their service is easily effected by the weak isolation of the
> container.

Yes I can imagine that and we will carefully explain that disabling oom
for some tasks is a very dangerous thing to do. Maybe we are not
explicit about that in our documentation now and all the consequences
are not really clear.

If this turns out to be infeasible then we should be addressing that
problem for all possible cases and that means to allow breaking the
oom_score_adj contract and kill also hidden tasks.
Yafang Shao April 20, 2020, 10:51 a.m. UTC | #6
On Mon, Apr 20, 2020 at 6:31 PM Michal Hocko <mhocko@kernel.org> wrote:
>
> On Mon 20-04-20 17:58:03, Yafang Shao wrote:
> > On Mon, Apr 20, 2020 at 5:14 PM Michal Hocko <mhocko@kernel.org> wrote:
> > >
> > > On Mon 20-04-20 16:52:05, Yafang Shao wrote:
> > > > On Mon, Apr 20, 2020 at 4:13 PM Michal Hocko <mhocko@kernel.org> wrote:
> > > > >
> > > > > On Sat 18-04-20 11:13:11, Yafang Shao wrote:
> > > [...]
> > > > > > This patch is to improve it.
> > > > > > If no victim found in memcg oom, we should force the current task to
> > > > > > wait until there's available pages. That is similar with the behavior in
> > > > > > memcg1 when oom_kill_disable is set.
> > > > >
> > > > > The primary reason why we force the charge is because we _cannot_ wait
> > > > > indefinitely in the charge path because the current call chain might
> > > > > hold locks or other resources which could block a large part of the
> > > > > system. You are essentially reintroducing that behavior.
> > > > >
> > > >
> > > > Seems my poor English misleads you ?
> > > > The task is NOT waiting in the charge path, while it is really waiting
> > > > at the the end of the page fault, so it doesn't hold any locks.
> > >
> > > How is that supposed to work? Sorry I didn't really study your patch
> > > very closely because it doesn't apply on the current Linus' tree and
> > > your previous 2 patches have reshuffled the code so it is not really
> > > trivial to have a good picture of the overall logic change.
> > >
> >
> > My patch is based on the commit 8632e9b5645b, and I can rebase my
> > patch for better reviewing.
> > Here is the overall logic of the patch.
> > do_page_fault
> >     mem_cgroup_try_charge
> >         mem_cgroup_out_of_memory  <<< over the limit of this memcg
> >             out_of_memory
> >                   if (!oc->chosen)  <<<< no killable tasks found
> >                         Set_an_OOM _state_in_the_task <<<< set the oom state
> >     mm_fault_error
> >         pagefault_out_of_memory  <<<< VM_FAULT_OOM is returned by the
> > previously error
> >             mem_cgroup_oom_synchronize(true)
> >                  Check_the_OOM_state_and_then_wait_here <<<< check the oom state
>
> OK, I see. So this is a hybrid model. My primary concern would be that
> issues seen previously with the #PF based approach will happen again.
> It will be in a reduced form. It is hard to judge whether this is good.
> A rare error case might be even worse because it is harder to predict.
>
> > > > See the comment above mem_cgroup_oom_synchronize()
> > >
> > > Anyway mem_cgroup_oom_synchronize shouldn't really trigger unless the
> > > oom handling is disabled (aka handed over to the userspace). All other
> > > paths should handle the oom in the charge path.
> >
> > Right. Now this patch introduces another patch to enter
> > mem_cgroup_oom_synchronize().
> >
> > >  Please have a look at
> > > 29ef680ae7c2 ("memcg, oom: move out_of_memory back to the charge path")
> > > for more background and motivation.
> > >
> >
> > Before I send this patch, I have read it carefully.
> >
> > > mem_cgroup_oom_synchronize was a workaround for deadlocks and the side
> > > effect was that all other charge paths outside of #PF were failing
> > > allocations prematurely and that had an effect to user space.
> > >
> >
> > I guess this side effect is caused by the precision of the page
> > counter, for example, the page counter isn't modified immdiately after
> > uncharging the pages - that's the issue we should improve IMHO.
>
> No, this is not really the case. If you have a look at gup users or any
> kernel memory charged then you can find many places to return ENOMEM
> even when it is not really expected. The most notable example was
> MAP_POPULATE failures.
>

Thanks for your explanation. I will take a look at these code.

> > > > > Is the above example a real usecase or you have just tried a test case
> > > > > that would trigger the problem?
> > > >
> > > > On my server I found the memory usage of a container was greater than
> > > > the limit of it.
> > > > From the dmesg I know there's no killable tasks becasue the
> > > > oom_score_adj is set with -1000.
> > >
> > > I would really recommend to address this problem in the userspace
> > > configuration. Either by increasing the memory limit or fixing the
> > > oom disabled userspace to not consume that much of a memory.
> > >
> >
> > This issue can be addressed in the usespace configuration.
> > But note that there're many containers running on one single host,
> > what we should do is try to keep the isolation as strong as possible.
>
> I do agree with this but there is a line between isolation and proper
> configuration that this requires. You will never get 100% isolation in
> the first place. You have to be careful to not share some resources
> which are inherently hard to isolate - e.g. page cache, file system
> metadata and many others.
>
> While your example is not the same it is similar. Disabling the oom
> killer for a task implies that all the resources held by that task
> cannot be reclaimed/rebalanced and so isolation is much harder to
> achieve if possible at all. There is only only relieable way to handle
> OOM in this situation and that is breaking the contract and kill those
> tasks. I am not really convinced this is what we want to do.
>
> > If we don't take any action in the kernel, the users will complain to
> > us that their service is easily effected by the weak isolation of the
> > container.
>
> Yes I can imagine that and we will carefully explain that disabling oom
> for some tasks is a very dangerous thing to do. Maybe we are not
> explicit about that in our documentation now and all the consequences
> are not really clear.
>
> If this turns out to be infeasible then we should be addressing that
> problem for all possible cases and that means to allow breaking the
> oom_score_adj contract and kill also hidden tasks.

Breaking the oom_score_adj contract seems another possible way, that
would be accepted by the user - misconfiguration or bugs in user code
should be punished.  IOW this is the fault of the user and the kernel
should tell the user the result of this fault.

Thanks
Yafang
Michal Hocko April 20, 2020, 11:10 a.m. UTC | #7
On Mon 20-04-20 18:51:50, Yafang Shao wrote:
> On Mon, Apr 20, 2020 at 6:31 PM Michal Hocko <mhocko@kernel.org> wrote:
[...]
> > If this turns out to be infeasible then we should be addressing that
> > problem for all possible cases and that means to allow breaking the
> > oom_score_adj contract and kill also hidden tasks.
> 
> Breaking the oom_score_adj contract seems another possible way, that
> would be accepted by the user - misconfiguration or bugs in user code
> should be punished.  IOW this is the fault of the user and the kernel
> should tell the user the result of this fault.

This is not how the kernel behaves in the vast majority of cases. We
allow users to shoot their feet. Especially for root only interfaces.
We simply rely that admins know what they are doing.

So let me repeat there has to be a very strong justification - e.g. it
is impossible to remove oom_score_adj OOM killer disabling for some
reason and this really happens out there in real deployments. We are
surely not going to break the contract based on artificial misconfigured
test cases.
diff mbox series

Patch

diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h
index 767bac135787..5df2c08e2720 100644
--- a/include/linux/memcontrol.h
+++ b/include/linux/memcontrol.h
@@ -569,7 +569,8 @@  static inline bool task_in_memcg_oom(struct task_struct *p)
 static inline enum oom_status task_in_memcg_oom_set(struct task_struct *p,
 						    struct mem_cgroup *memcg,
 						    gfp_t mask,
-						    int order)
+						    int order,
+						    bool force)
 {
 	if (!current->in_user_fault)
 		return OOM_SKIPPED;
@@ -578,6 +579,8 @@  static inline enum oom_status task_in_memcg_oom_set(struct task_struct *p,
 	p->memcg_in_oom = memcg;
 	p->memcg_oom_gfp_mask = mask;
 	p->memcg_oom_order = order;
+	if (force)
+		p->memcg_oom_wait = true;
 
 	return OOM_ASYNC;
 }
@@ -1051,7 +1054,8 @@  static inline bool task_in_memcg_oom(struct task_struct *p)
 static inline enum oom_status task_in_memcg_oom_set(struct task_struct *p,
 						    struct mem_cgroup *memcg,
 						    gfp_t mask,
-						    int order)
+						    int order,
+						    bool force)
 {
 	return OOM_SUCCESS;
 }
diff --git a/include/linux/sched.h b/include/linux/sched.h
index 4418f5cb8324..cc1c7de7c248 100644
--- a/include/linux/sched.h
+++ b/include/linux/sched.h
@@ -774,6 +774,7 @@  struct task_struct {
 #endif
 #ifdef CONFIG_MEMCG
 	unsigned			in_user_fault:1;
+	unsigned			memcg_oom_wait:1;
 #endif
 #ifdef CONFIG_COMPAT_BRK
 	unsigned			brk_randomized:1;
diff --git a/mm/memcontrol.c b/mm/memcontrol.c
index d6cb1b786045..a637e13a4964 100644
--- a/mm/memcontrol.c
+++ b/mm/memcontrol.c
@@ -1801,7 +1801,8 @@  static enum oom_status mem_cgroup_oom(struct mem_cgroup *memcg, gfp_t mask, int
 	 * victim and then we have to bail out from the charge path.
 	 */
 	if (memcg->oom_kill_disable)
-		return task_in_memcg_oom_set(current, memcg, mask, order);
+		return task_in_memcg_oom_set(current, memcg, mask,
+					     order, false);
 
 	mem_cgroup_mark_under_oom(memcg);
 
@@ -1863,7 +1864,8 @@  bool mem_cgroup_oom_synchronize(bool handle)
 	if (locked)
 		mem_cgroup_oom_notify(memcg);
 
-	if (locked && !memcg->oom_kill_disable) {
+	if (locked && !memcg->oom_kill_disable &&
+	    !current->memcg_oom_wait) {
 		mem_cgroup_unmark_under_oom(memcg);
 		finish_wait(&memcg_oom_waitq, &owait.wait);
 		mem_cgroup_out_of_memory(memcg, current->memcg_oom_gfp_mask,
@@ -1883,7 +1885,10 @@  bool mem_cgroup_oom_synchronize(bool handle)
 		 */
 		memcg_oom_recover(memcg);
 	}
+
 cleanup:
+	if (current->memcg_oom_wait)
+		current->memcg_oom_wait = false;
 	current->memcg_in_oom = NULL;
 	css_put(&memcg->css);
 	return true;
@@ -6056,6 +6061,7 @@  static ssize_t memory_max_write(struct kernfs_open_file *of,
 	struct mem_cgroup *memcg = mem_cgroup_from_css(of_css(of));
 	unsigned int nr_reclaims = MEM_CGROUP_RECLAIM_RETRIES;
 	bool drained = false;
+	bool enlarge = false;
 	unsigned long max;
 	int err;
 
@@ -6069,7 +6075,12 @@  static ssize_t memory_max_write(struct kernfs_open_file *of,
 	for (;;) {
 		unsigned long nr_pages = page_counter_read(&memcg->memory);
 
-		if (nr_pages <= max)
+		if (nr_pages < max) {
+			enlarge = true;
+			break;
+		}
+
+		if (nr_pages == max)
 			break;
 
 		if (signal_pending(current))
@@ -6081,6 +6092,9 @@  static ssize_t memory_max_write(struct kernfs_open_file *of,
 			continue;
 		}
 
+		if (memcg->under_oom)
+			break;
+
 		if (nr_reclaims) {
 			if (!try_to_free_mem_cgroup_pages(memcg, nr_pages - max,
 							  GFP_KERNEL, true))
@@ -6089,11 +6103,14 @@  static ssize_t memory_max_write(struct kernfs_open_file *of,
 		}
 
 		memcg_memory_event(memcg, MEMCG_OOM);
-		if (mem_cgroup_out_of_memory(memcg, GFP_KERNEL, 0) !=
+		if (mem_cgroup_out_of_memory(memcg, GFP_KERNEL, -2) !=
 		    OOM_SUCCESS)
 			break;
 	}
 
+	if (enlarge)
+		memcg_oom_recover(memcg);
+
 	memcg_wb_domain_size_changed(memcg);
 	return nbytes;
 }
diff --git a/mm/oom_kill.c b/mm/oom_kill.c
index d5a941bea2d7..df564495c8b2 100644
--- a/mm/oom_kill.c
+++ b/mm/oom_kill.c
@@ -158,6 +158,15 @@  static inline bool is_sysrq_oom(struct oom_control *oc)
 	return oc->order == -1;
 }
 
+/*
+ * order == -2 means the oom kill is triggered by reducing memcg max,
+ * otherwise only for display puerposes.
+ */
+static bool is_max_write_oom(struct oom_control *oc)
+{
+	return oc->order == -2;
+}
+
 /* return true if the task is not adequate as candidate victim task. */
 static bool oom_unkillable_task(struct task_struct *p)
 {
@@ -1108,6 +1117,19 @@  enum oom_status out_of_memory(struct oom_control *oc)
 		 */
 		if (!is_sysrq_oom(oc) && !is_memcg_oom(oc))
 			panic("System is deadlocked on memory\n");
+
+		/* Bail out from the charge path if we can't find a victim. */
+		if (is_memcg_oom(oc)) {
+			if (is_max_write_oom(oc))
+				return OOM_SKIPPED;
+
+			return task_in_memcg_oom_set(current,
+						     oc->memcg,
+						     oc->gfp_mask,
+						     oc->order,
+						     true);
+		}
+
 	}
 	if (oc->chosen && oc->chosen != (void *)-1UL)
 		oom_kill_process(oc, !is_memcg_oom(oc) ? "Out of memory" :