Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3911793imm; Mon, 6 Aug 2018 12:51:20 -0700 (PDT) X-Google-Smtp-Source: AAOMgpc3w9xuXMz4PXT70XxHi7JG8spxBpnd2W3lzA6nfRiC8ViiCho/sB28+j09hDpW6TKmHBoU X-Received: by 2002:a63:1518:: with SMTP id v24-v6mr15693248pgl.162.1533585080769; Mon, 06 Aug 2018 12:51:20 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533585080; cv=none; d=google.com; s=arc-20160816; b=tcmP6/WRa41jcOfGhiWiiIEWHWhYUTX25CMdCuAqEb0xFiOyBJwwahvteCl8pZLAP5 8UHVBZC0raJnOaUmbKk1ga6IEQ2+1wdS7uLA5EQkTUWGEFIPpgpLsf10Sfcw9U6B6Kh4 oxH1YLAbqSbKu6f2KS79Mlvg8oajSu5wdwLilCsYYlaRIAmZuxY8slsBVh2YDoaUSntR 0hCiOLuO0aR1wgZUJ4hOUeunixBVGwVJIE/lnYmM+HorwBVc2HobhdveBz+4botCPTZb XI2rrdqYzPcS32LxsXh4zMvfBXrs8hNSzC0QWo6mIPqeOrcjihIvil+ZiO/4RsEcmPJw ppFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=JO62Xhg3k4RXweRmtAVchUQdiMJPljHH+3MOhCZQ5Og=; b=LrWPwq19peF2VVNfVXBVPCpvC/ZPtAAWrfshPIKiAxVCYpkN8XyJNO10TApg5EuKRj qyR2hYrXmYWT7VfGtgUjhzzmc0mn6mNMbd2NDscjKH8uflSmGFeSeSxRnerILpWzNhwI EC8hX6Zs8p6opAWFkhr82eYP3/4dfIcyYEAcV11phPVp9tRJg4JLYol81TECD4F0XgFw 85l/aSK2myzpLvrVU62kDGYZ0BZlZrU6UBh2ykTZNamzF0MAxFt4diNK+9J1Czk8iISu asXEuC/lzCVYEKJvyJmzyknrYL3VIXKh9hlcGS48TB0VeAiRqX8rJv3EKGAHAnx6D3n1 MB9w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t137-v6si13880887pgb.528.2018.08.06.12.51.05; Mon, 06 Aug 2018 12:51:20 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733007AbeHFTyW (ORCPT + 99 others); Mon, 6 Aug 2018 15:54:22 -0400 Received: from mx2.suse.de ([195.135.220.15]:34822 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730922AbeHFTyW (ORCPT ); Mon, 6 Aug 2018 15:54:22 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2F0F2AE1D; Mon, 6 Aug 2018 17:44:12 +0000 (UTC) Date: Mon, 6 Aug 2018 19:44:10 +0200 From: Michal Hocko To: syzbot Cc: cgroups@vger.kernel.org, dvyukov@google.com, hannes@cmpxchg.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, penguin-kernel@I-love.SAKURA.ne.jp, syzkaller-bugs@googlegroups.com, vdavydov.dev@gmail.com Subject: Re: WARNING in try_charge Message-ID: <20180806174410.GB10003@dhcp22.suse.cz> References: <0000000000006350880572c61e62@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0000000000006350880572c61e62@google.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon 06-08-18 08:42:02, syzbot wrote: > Hello, > > syzbot has tested the proposed patch but the reproducer still triggered > crash: > WARNING in try_charge > > Killed process 6410 (syz-executor5) total-vm:37708kB, anon-rss:2128kB, > file-rss:0kB, shmem-rss:0kB > oom_reaper: reaped process 6410 (syz-executor5), now anon-rss:0kB, > file-rss:0kB, shmem-rss:0kB > task=syz-executor5 pid=6410 invoked memcg oom killer. oom_victim=1 Thank you. This is useful. The full oom picture is this : [ 65.363983] task=syz-executor5 pid=6415 invoked memcg oom killer. oom_victim=0 [...] : [ 65.920355] Task in /ile0 killed as a result of limit of /ile0 : [ 65.926389] memory: usage 0kB, limit 0kB, failcnt 20 : [ 65.931518] memory+swap: usage 0kB, limit 9007199254740988kB, failcnt 0 : [ 65.938296] kmem: usage 0kB, limit 9007199254740988kB, failcnt 0 : [ 65.944467] Memory cgroup stats for /ile0: cache:0KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB : [ 65.963878] Tasks state (memory values in pages): : [ 65.968743] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name : [ 65.977615] [ 6410] 0 6410 9427 532 61440 0 0 syz-executor5 : [ 65.986647] Memory cgroup out of memory: Kill process 6410 (syz-executor5) score 547000 or sacrifice child : [ 65.996474] Killed process 6410 (syz-executor5) total-vm:37708kB, anon-rss:2128kB, file-rss:0kB, shmem-rss:0kB : [ 66.007471] oom_reaper: reaped process 6410 (syz-executor5), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB : [ 66.017652] task=syz-executor5 pid=6410 invoked memcg oom killer. oom_victim=1 : [ 66.025137] ------------[ cut here ]------------ : [ 66.029927] Memory cgroup charge failed because of no reclaimable memory! This looks like a misconfiguration or a kernel bug. : [ 66.030061] WARNING: CPU: 1 PID: 6410 at mm/memcontrol.c:1707 try_charge+0x734/0x1680 So we have only a single task in the memcg and it is this task which triggers the OOM. It gets killed and oom_reaped. This means that out_of_memory should return with true and so we should retry and force the charge as I've already mentioned. For some reason this task has triggered the oom killer path again and then we haven't found any eligible task and resulted in the warning. This shouldn't happen. I will stare to the code some more to see how the heck we get there without passing if (unlikely(tsk_is_oom_victim(current) || fatal_signal_pending(current) || current->flags & PF_EXITING)) goto force; -- Michal Hocko SUSE Labs