On 07/29, David Rientjes wrote: > > --- a/kernel/exit.c > +++ b/kernel/exit.c > @@ -455,6 +455,7 @@ static void exit_mm(struct task_struct * tsk) > task_unlock(tsk); > mm_update_next_owner(mm); > mmput(mm); > + clear_thread_flag(TIF_MEMDIE); > } > > /* > diff --git a/mm/oom_kill.c b/mm/oom_kill.c > --- a/mm/oom_kill.c > +++ b/mm/oom_kill.c > @@ -258,8 +258,6 @@ enum oom_scan_t oom_scan_process_thread(struct > task_struct *task, > unsigned long totalpages, const nodemask_t *nodemask, > bool force_kill) > { > - if (task->exit_state) > - return OOM_SCAN_CONTINUE;
IIRC, this check was a workaround, to ensure that a oom-killed zombie can't block oom-killer. I think this patch can equally work. Oleg. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/