Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp8086572imu; Thu, 15 Nov 2018 06:27:10 -0800 (PST) X-Google-Smtp-Source: AJdET5ft/jVRu2LQzEIYxMBXDzOOW0HSGjcBOVnpz0oV9UjcVcGHJgelg2WzFURoHMUZWZi5jDWG X-Received: by 2002:a17:902:1681:: with SMTP id h1-v6mr6395621plh.170.1542292029919; Thu, 15 Nov 2018 06:27:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542292029; cv=none; d=google.com; s=arc-20160816; b=JpAhlT1SG+h2ngQNg/SNElSRrSNrI0hJ0w31eZ1IEQFvaJjFZnum64FkrAGRkdPv/O LVYdOu7QUvs72YCEzDL7tBmfNLUOmVbmvE/wJoWfWqS06x8uLg4Ir2C+sl1XXjPZrVAF R81FGtiUrpW8tEgIf6YCbReRsJD+4n7rV791JL7xi59fgD6awFEr5J4nqDbbhMjnx1O8 ynyOWESY1jZtZkUZ5KBu+Y+0N5qUsBIU1F3InKGPjAU0DAUankhsH5uHRL8gScbg1t3w jPvvMaYghI1GcYtNAALs6JN1zqFIWD4K5JiJSCZU6kmO/Bdap+C7C+yfQaTLvQBSYosz 8m4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=+cNc8gZvgbpbgZYIQsCYuVlWic95ciosrsQdnxKwefo=; b=MdCc5drpi/0U8pUVXWaNiN8W8m5A7CtprNHn6TgfDX7bZEWxNQI/OAj8+wYyLlQIpG EfUL+osSi1annus5N0omuHQAC8pKJnNGPDAihWhBKcVMorMyw8MX8R0vjdAo+xwtbeC3 6y48uG9OS/iSIBEWyAZLmPECmuzhZeOcQuNBdZTW1Cs92gXlWamsrSoLlaQwdWpdNtx2 P3rfmqpOAiajGR8rsIdYQrjAKbFr432yrOJ9gHkRRTNgoP3ObOpiKiPC2ZekeLb7H243 aSyEMmRheoIpsTzwczZ5f5kAAHq6ysnoHVNsNtH5dp6xfzO5FnrzKAmMhtqeK+IVmw+J ADYg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j17-v6si28680386pfn.176.2018.11.15.06.26.54; Thu, 15 Nov 2018 06:27:09 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388354AbeKPAdl (ORCPT + 99 others); Thu, 15 Nov 2018 19:33:41 -0500 Received: from mx2.suse.de ([195.135.220.15]:43594 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2388310AbeKPAdl (ORCPT ); Thu, 15 Nov 2018 19:33:41 -0500 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id DB5F9AEED; Thu, 15 Nov 2018 14:25:37 +0000 (UTC) Date: Thu, 15 Nov 2018 15:25:35 +0100 From: Michal Hocko To: Baoquan He Cc: pifang@redhat.com, David Hildenbrand , linux-mm@kvack.org, linux-kernel@vger.kernel.org, akpm@linux-foundation.org, aarcange@redhat.com Subject: Re: Memory hotplug softlock issue Message-ID: <20181115142535.GU23831@dhcp22.suse.cz> References: <20181114090134.GG23419@dhcp22.suse.cz> <20181114145250.GE2653@MiWiFi-R3L-srv> <20181114150029.GY23419@dhcp22.suse.cz> <20181115051034.GK2653@MiWiFi-R3L-srv> <20181115073052.GA23831@dhcp22.suse.cz> <20181115075349.GL2653@MiWiFi-R3L-srv> <20181115083055.GD23831@dhcp22.suse.cz> <20181115131211.GP2653@MiWiFi-R3L-srv> <20181115131927.GT23831@dhcp22.suse.cz> <20181115132342.GQ2653@MiWiFi-R3L-srv> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181115132342.GQ2653@MiWiFi-R3L-srv> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 15-11-18 21:23:42, Baoquan He wrote: > On 11/15/18 at 02:19pm, Michal Hocko wrote: > > On Thu 15-11-18 21:12:11, Baoquan He wrote: > > > On 11/15/18 at 09:30am, Michal Hocko wrote: > > [...] > > > > It would be also good to find out whether this is fs specific. E.g. does > > > > it make any difference if you use a different one for your stress > > > > testing? > > > > > > Created a ramdisk and put stress bin there, then run stress -m 200, now > > > seems it's stuck in libc-2.28.so migrating. And it's still xfs. So now xfs > > > is a big suspect. At bottom I paste numactl printing, you can see that it's > > > the last 4G. > > > > > > Seems it's trying to migrate libc-2.28.so, but stress program keeps trying to > > > access and activate it. > > > > Is this still with faultaround disabled? I have seen exactly same > > pattern in the bug I am working on. It was ext4 though. > > No, forgot disabling faultround after reboot. Do we need to disable it and > retest? No the faultaround is checked at the time of the fault. The reason why I am suspecting this path is that it can elevate the reference count before taking the lock. Normal page fault path should lock the page first. And we hold the lock while trying to migrate that page. -- Michal Hocko SUSE Labs