Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp36044imm; Tue, 7 Aug 2018 13:25:22 -0700 (PDT) X-Google-Smtp-Source: AAOMgpftjzesP7Ez8xYnDjbaxTQK/cwzn6XlpYsVTtZGHg0XIeNnCvITAtfk3ehvX9qccbPk+Zzd X-Received: by 2002:a62:5984:: with SMTP id k4-v6mr23201407pfj.116.1533673522244; Tue, 07 Aug 2018 13:25:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533673522; cv=none; d=google.com; s=arc-20160816; b=sI4DhJG/y0PsdLRZBec+m3IEboXYq6IrN1CQzLg8Vyk+XnFh7uO/78uwJnzBzMztDI TnBuQgutLAzToYRST5u3sLkrDd5ICMPAqrtiAs184QDXnVI/uUu6ZC1ZoswHCrToueia N88xL9ccw9NN4i0g7I9IWRgr6ww8uAVXUdmeJyqkN7eLyUyvQxto107NCA9iIKLPTULq GH3xISef3yqsda3j1HOlsf+Oj+br20ar1fI5WEi/h1AHqyT+dECuGDCDmYFWHsEcjpbI ZnEtbCM+ovAAf6dG8JX1yLpkn5lSzD62OrYhYoCgEjtKiqrS3QyPtkUPkP8kbmbyX9Fg e7yA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=msBsYowwZMHN6y5aMMAgIMu/xNVmmOJO3L6gn5cJcvs=; b=neTbY+noeoFp4ZtfOiJZQJfuv2Jdz9wjw4UhotO21BH5CMv4E+chPciuCC7vr6VVsl wmVKhnssadSBfn9DudUztGMpN4vbvvMhPZfmCt4l3pb0gAT3FXvOdL8XI9+LTZecjjTV dGzo59wsf3ORk3n53UeqD5VWsp6PNtbQehmULEiMMODoK0fobVgSU+eFNxLFcEy+2/Rr Gb40j92JbGy8m39NeB9C+CbyPuWFy2+dXT5uW5uwvgoCFrrp9GnD4bpuM8WGOtWusa2R y/qSUrN3g8DKOBUbKylDLkg9fLfLsq7kC9SIyveShOnAaPVRfNxc0Hy/QRhSnfIuZK51 GWKg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n1-v6si1623670plp.166.2018.08.07.13.25.06; Tue, 07 Aug 2018 13:25:22 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727198AbeHGWjp (ORCPT + 99 others); Tue, 7 Aug 2018 18:39:45 -0400 Received: from mx2.suse.de ([195.135.220.15]:44578 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725881AbeHGWjo (ORCPT ); Tue, 7 Aug 2018 18:39:44 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2C33CAE70; Tue, 7 Aug 2018 20:23:35 +0000 (UTC) Date: Tue, 7 Aug 2018 22:23:32 +0200 From: Michal Hocko To: Johannes Weiner Cc: Andrew Morton , Vladimir Davydov , linux-mm@kvack.org, Greg Thelen , Tetsuo Handa , Dmitry Vyukov , LKML Subject: Re: [PATCH] memcg, oom: be careful about races when warning about no reclaimable task Message-ID: <20180807202332.GK10003@dhcp22.suse.cz> References: <20180807072553.14941-1-mhocko@kernel.org> <20180807200247.GA4251@cmpxchg.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20180807200247.GA4251@cmpxchg.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue 07-08-18 16:02:47, Johannes Weiner wrote: > On Tue, Aug 07, 2018 at 09:25:53AM +0200, Michal Hocko wrote: > > From: Michal Hocko > > > > "memcg, oom: move out_of_memory back to the charge path" has added a > > warning triggered when the oom killer cannot find any eligible task > > and so there is no way to reclaim the oom memcg under its hard limit. > > Further charges for such a memcg are forced and therefore the hard limit > > isolation is weakened. > > > > The current warning is however too eager to trigger even when we are not > > really hitting the above condition. Syzbot[1] and Greg Thelen have noticed > > that we can hit this condition even when there is still oom victim > > pending. E.g. the following race is possible: > > > > memcg has two tasks taskA, taskB. > > > > CPU1 (taskA) CPU2 CPU3 (taskB) > > try_charge > > mem_cgroup_out_of_memory try_charge > > select_bad_process(taskB) > > oom_kill_process oom_reap_task > > # No real memory reaped > > mem_cgroup_out_of_memory > > # set taskB -> MMF_OOM_SKIP > > # retry charge > > mem_cgroup_out_of_memory > > oom_lock oom_lock > > select_bad_process(self) > > oom_kill_process(self) > > oom_unlock > > # no eligible task > > > > In fact syzbot test triggered this situation by placing multiple tasks > > into a memcg with hard limit set to 0. So no task really had any memory > > charged to the memcg > > > > : Memory cgroup stats for /ile0: cache:0KB rss:0KB rss_huge:0KB shmem:0KB mapped_file:0KB dirty:0KB writeback:0KB swap:0KB inactive_anon:0KB active_anon:0KB inactive_file:0KB active_file:0KB unevictable:0KB > > : Tasks state (memory values in pages): > > : [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name > > : [ 6569] 0 6562 9427 1 53248 0 0 syz-executor0 > > : [ 6576] 0 6576 9426 0 61440 0 0 syz-executor6 > > : [ 6578] 0 6578 9426 534 61440 0 0 syz-executor4 > > : [ 6579] 0 6579 9426 0 57344 0 0 syz-executor5 > > : [ 6582] 0 6582 9426 0 61440 0 0 syz-executor7 > > : [ 6584] 0 6584 9426 0 57344 0 0 syz-executor1 > > > > so in principle there is indeed nothing reclaimable in this memcg and > > this looks like a misconfiguration. On the other hand we can clearly > > kill all those tasks so it is a bit early to warn and scare users. Do > > that by checking that the current is the oom victim and bypass the > > warning then. The victim is allowed to force charge and terminate to > > release its temporal charge along the way. > > > > [1] http://lkml.kernel.org/r/0000000000005e979605729c1564@google.com > > Fixes: "memcg, oom: move out_of_memory back to the charge path" > > Noticed-by: Greg Thelen > > Reported-and-tested-by: syzbot+bab151e82a4e973fa325@syzkaller.appspotmail.com > > Signed-off-by: Michal Hocko > > --- > > mm/memcontrol.c | 3 ++- > > 1 file changed, 2 insertions(+), 1 deletion(-) > > > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > > index 4603ad75c9a9..1b6eed1bc404 100644 > > --- a/mm/memcontrol.c > > +++ b/mm/memcontrol.c > > @@ -1703,7 +1703,8 @@ static enum oom_status mem_cgroup_oom(struct mem_cgroup *memcg, gfp_t mask, int > > return OOM_ASYNC; > > } > > > > - if (mem_cgroup_out_of_memory(memcg, mask, order)) > > + if (mem_cgroup_out_of_memory(memcg, mask, order) || > > + tsk_is_oom_victim(current)) > > return OOM_SUCCESS; > > > > WARN(1,"Memory cgroup charge failed because of no reclaimable memory! " > > This is really ugly. :( > > If that check is only there to suppress the warning when the limit is > 0, this should really be a separate branch around the warning, with a > fat comment that this is a ridiculous cornercase, and not look like it > is an essential part of the memcg reclaim/oom process. I do not mind having it in a separate branch. Btw. this is not just about hard limit set to 0. Similar can happen anytime we are getting out of oom victims. The likelihood goes up with the remote memcg charging merged recently. > Personally, I really don't get the point of this message. What is the > user to do with this information? What are we to do with it if people > report it? It conveys zero information on what the problem could be, > because it asserts a really vague high-level thing. Shouldn't such > debugging happen inside the OOM killer? What are the conceivable > scenarios in which this triggers other than obvious misconfigs? > > What would we lose by just deleting it? We know that _something_ bad is going on because we have no way to reclaim down to the hard limit. And that is the primary tool for the workload isolation. I am all for a better information to tell us more. I do not know what that would be right now, though. My primary motivation for this warning was to catch potential issues after we have moved oom handling back to the charge path. If we just remove it then we have no information at all. I wouldn't mind removing it if it generated more false possitives but that hasn't happened so far. -- Michal Hocko SUSE Labs