Bug 591137
Summary: | server hang with no OOM reaper on memory exhaustion | ||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Product: | Red Hat Enterprise MRG | Reporter: | Jon Thomas <jthomas> | ||||||||
Component: | realtime-kernel | Assignee: | Luis Claudio R. Goncalves <lgoncalv> | ||||||||
Status: | CLOSED CURRENTRELEASE | QA Contact: | David Sommerseth <davids> | ||||||||
Severity: | high | Docs Contact: | |||||||||
Priority: | high | ||||||||||
Version: | 1.2 | CC: | bhu, bugzilla-redhat, fbijlsma, lgoncalv, ovasik, pmorgan, rkhadgar, rrajaram, rruban, williams | ||||||||
Target Milestone: | --- | ||||||||||
Target Release: | --- | ||||||||||
Hardware: | All | ||||||||||
OS: | Linux | ||||||||||
Whiteboard: | |||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||
Doc Text: | Story Points: | --- | |||||||||
Clone Of: | Environment: | ||||||||||
Last Closed: | 2010-12-17 16:07:40 UTC | Type: | --- | ||||||||
Regression: | --- | Mount Type: | --- | ||||||||
Documentation: | --- | CRM: | |||||||||
Verified Versions: | Category: | --- | |||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||
Embargoed: | |||||||||||
Attachments: |
|
Description
Jon Thomas
2010-05-11 14:18:13 UTC
I think there may be two issues here: 1) the reaper is not getting called. I check the oom flags in the sosreport and the oom-killer should be called. 2) the hang. I suspect that this may be a dup of bz 546428. There are 928 processes in shrink_zone which just doesn't seem right. grep -c shrink_zone btall 928 Created attachment 413153 [details]
log from vmcore
Created attachment 413160 [details]
foreach bt dump
I found a patch from RHEL we have been carrying for a long time in the v1 kernel, linux-2.6-rt-oomkill.patch, that (among other things) includes a function called should_oom_kill() that attempts to avoid and OOM frenzy. As there are no comments in the patch, I am right now investigating why the patch was added in the first place and whether we need to remove the should_oom_kill() references or fix the function. I have a test kernel running with the should_oom_kill() bits removed and it is behaving the expected way. I have several instances of three different memory hoggers running and they are being killed right away when an OOM situation happens. As soon as the historical motivation for the inclusion of that patch are clear, I will have a fix added to our latest kernel and test it on bigger systems. Created attachment 426656 [details]
reproducer for 158 crash
Guys, what is the status of this one? Frederik A patch, described below, has been added to kernel -160 in order to enhance the behavior of the oom-killer (speed and accuracy). This patch also includes a new invocation path for the oom-killer (page fault handling). oom-killer: several fixes and enhancements Bugzilla: 589741 591137 This patch contains the backport of portions of upstream commits related to the oom-killer, bringing mrg v1 oom-killer closer to upstream. The following upstream commits have been backported: 1c0fe6e mm: invoke oom-killer from page fault ff0ceb9 oom: serialize out of memory calls 28b83c5 oom: move oom_adj value from task_struct to signal_struct 4365a56 oom-kill: fix NUMA constraint check with nodemask b95c35e oom: fix the unsafe usage of badness() in proc_oom_score() d553ad8 param: fix NULL comparison on oom 1ac0cb5 mm: fix anonymous dirtying 5d863b8 oom: fix oom_adjust_write() input sanity check 6583bb6 mm: avoid endless looping for oom killed tasks 82553a9 oom: invoke oom killer for __GFP_NOFAIL a12888f oom_kill: don't call for int_sqrt(0) 4779280 mm: make get_user_pages() interruptible (partially backported) 7a36a75 get_user_pages(): fix possible page leak on oom a1e0961 relay: nopage e91a810 oom_kill bug 7b1915a mm/oom_kill.c: Use list_for_each_entry instead of list_for_each fyi: As per customer the kernel-rt supplied with MRG 1.3 beta works very good. OOM is done in under 2 seconds. What kind of infos is needed? I'm the customer with the problem. That may be possible. We're not sure yet. but if SELinux is all that is required, will we support 1.3 rt on rhel5.4+seLinux upgrage? Hi, we have SELinux deactivated with selinux=0 in /proc/cmdline. SELinux is not a showstopper. CU Jens aka the Customer ;-) We updated to MRG 1.3 and the bug does not exsist there. Service Ticket is already closed. |