Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp883390ybh; Wed, 11 Mar 2020 12:47:07 -0700 (PDT) X-Google-Smtp-Source: ADFU+vsh6XT24cIfczbi4yRXF5zBn+9hbGLbkaEq4fzD2OsiW8c/E+J1EBplM6WP9aSJPe+jEYDD X-Received: by 2002:a05:6830:1e4e:: with SMTP id e14mr3641753otj.108.1583956027456; Wed, 11 Mar 2020 12:47:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583956027; cv=none; d=google.com; s=arc-20160816; b=jeR/Nh9/YR2uX7HwdMqF3PEBD5RSRCyiqarGsSJMN93yO0LXLK8mw3C7bqtMvjPv9B H+tRo1Fz85z84+/YZvdGaOh8QLkuuYgChDTnk7ZRMZvkh+CE+1bCeLJvLcb38oR0cgDA udFiXOVP3vsT3m4JAADd89RuiLE8o8oL1zoVbFGEwZOtjSIOW+5cOmgayf/9PR4/WOAS AHbMfht31G+MIkqaA58Jks+tolRooNFSCP5NU3IBuadRWwXiq2CJOIlW+Og73U83JU/5 y7Kf1lFZZE+Yq8/+sLBFfXGq82pgAlHto8yUSHMR5U+H7LLBQXwbd7IXI+vc6K2tO1Xp CV9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=nFRs9bK23pbJQXC6bUj6mkbtL51dUeEnYQnX4EaW7/o=; b=nlAW/1DBv7iavgju0WeeIKjFEt1LdyJCQSXTpGt6nczIc5b1hL5Ar7Z8TV6260A4XO usCFLbXRGNw07jQtpPHsEN+AdE+6xEIZP6aw6GFpPeokIuLM1Pw5JxsqVb/l83s3J58R jfTdobRHrhqmusJNUwmBI+bPCYLw+JmcO1Z5ZW6Xj60BE0OITx1kHNJ8kA9Kr13mTMAe 4tGOW9+Bxo9Oni0f9rwUlfLcnEmfz/x6RzeK1/BSvqanT1ljmLwzgcfPb//Vtf1fnYKu MUBMa6tlnIO4ErJyY1m0n2lH5/sRCzes6r5atuXRCpcaGJyjenttWNtFura5SHLX9cmW FYjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="oYpp36/H"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 127si1446226oig.130.2020.03.11.12.46.55; Wed, 11 Mar 2020 12:47:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b="oYpp36/H"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731173AbgCKTpo (ORCPT + 99 others); Wed, 11 Mar 2020 15:45:44 -0400 Received: from mail-pl1-f194.google.com ([209.85.214.194]:40232 "EHLO mail-pl1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730913AbgCKTpo (ORCPT ); Wed, 11 Mar 2020 15:45:44 -0400 Received: by mail-pl1-f194.google.com with SMTP id h11so1564076plk.7 for ; Wed, 11 Mar 2020 12:45:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=nFRs9bK23pbJQXC6bUj6mkbtL51dUeEnYQnX4EaW7/o=; b=oYpp36/HyX8lIYTEX+wvxIJ0e83Ge2gcbE6GFr5zkNlm4gw0jUtfJ0IpGhGQxHIpcF Yqo2psLJ2Ksv5G42JEowpaGmxcuoJrGVHqUikPBEGqAM67uMLrulwf1wrJ+yjEtVoaar XPWlknhaLrQf7UxdZpnQsQbRc3tllMOhtsPkspavbOGpxC6uaB0KZDB0wtmedoMTEiFR yg+zfAQvWOe/udO2+kRD0J3tFTcjhIfciRb2d0WC3J39Th30tdSQ2JJuBiZmqGJJmXvT KUhvpStha+ELIksu5T7IaC3kZoNVKOJNAdlOF/Yp8zPzfiYaWjUrjZ4Y09kdlomVKQ57 Etbg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=nFRs9bK23pbJQXC6bUj6mkbtL51dUeEnYQnX4EaW7/o=; b=Kjx42jUlWs2NGh8H80gygXuyJ2v+k/XZouvqNAxv4xh534nWM1AbEyyJ3jTKxYeN6b r0Xq9sHzApC3h7Uryo3LRxz2wPqpuTTe8YcFrudwOAITiyck6mXSLZ/XYuGZOSBiHVDs oqACk6WmlQfi7Gxufk2dAy8rknMJwFM4Mi2RwM1Vczloelehb8zJ0xGmDeWmWCaWCWU2 1puyw9vCMyRsQRW0Neq7J70ExWAycQDppQYgf0GsFKXkw9nlTD2XxeEP0LgHZxZILcE2 ByJWek2MoOYouBqFFm5+NuYybLZnFvnxkmxR9HN+FFUNX6NJPhaR9DXjPDVIzOKgDokP qwRA== X-Gm-Message-State: ANhLgQ2WaDg2kKjPfddY/OxauGy+qGCnTt7p5D9casVMiRPovKkmBXHa 6HQWYHM3XtlXCrYgyV7Wi/g5zw== X-Received: by 2002:a17:90b:3888:: with SMTP id mu8mr318609pjb.33.1583955941766; Wed, 11 Mar 2020 12:45:41 -0700 (PDT) Received: from [2620:15c:17:3:3a5:23a7:5e32:4598] ([2620:15c:17:3:3a5:23a7:5e32:4598]) by smtp.gmail.com with ESMTPSA id a6sm5853180pfb.104.2020.03.11.12.45.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 11 Mar 2020 12:45:40 -0700 (PDT) Date: Wed, 11 Mar 2020 12:45:40 -0700 (PDT) From: David Rientjes X-X-Sender: rientjes@chino.kir.corp.google.com To: Michal Hocko cc: Andrew Morton , Vlastimil Babka , linux-kernel@vger.kernel.org, linux-mm@kvack.org Subject: Re: [patch] mm, oom: prevent soft lockup on memcg oom for UP systems In-Reply-To: <20200311082736.GA23944@dhcp22.suse.cz> Message-ID: References: <20200310221019.GE8447@dhcp22.suse.cz> <20200311082736.GA23944@dhcp22.suse.cz> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 11 Mar 2020, Michal Hocko wrote: > > > > When a process is oom killed as a result of memcg limits and the victim > > > > is waiting to exit, nothing ends up actually yielding the processor back > > > > to the victim on UP systems with preemption disabled. Instead, the > > > > charging process simply loops in memcg reclaim and eventually soft > > > > lockups. > > > > > > > > Memory cgroup out of memory: Killed process 808 (repro) total-vm:41944kB, anon-rss:35344kB, file-rss:504kB, shmem-rss:0kB, UID:0 pgtables:108kB oom_score_adj:0 > > > > watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [repro:806] > > > > CPU: 0 PID: 806 Comm: repro Not tainted 5.6.0-rc5+ #136 > > > > RIP: 0010:shrink_lruvec+0x4e9/0xa40 > > > > ... > > > > Call Trace: > > > > shrink_node+0x40d/0x7d0 > > > > do_try_to_free_pages+0x13f/0x470 > > > > try_to_free_mem_cgroup_pages+0x16d/0x230 > > > > try_charge+0x247/0xac0 > > > > mem_cgroup_try_charge+0x10a/0x220 > > > > mem_cgroup_try_charge_delay+0x1e/0x40 > > > > handle_mm_fault+0xdf2/0x15f0 > > > > do_user_addr_fault+0x21f/0x420 > > > > page_fault+0x2f/0x40 > > > > > > > > Make sure that something ends up actually yielding the processor back to > > > > the victim to allow for memory freeing. Most appropriate place appears to > > > > be shrink_node_memcgs() where the iteration of all decendant memcgs could > > > > be particularly lengthy. > > > > > > There is a cond_resched in shrink_lruvec and another one in > > > shrink_page_list. Why doesn't any of them hit? Is it because there are > > > no pages on the LRU list? Because rss data suggests there should be > > > enough pages to go that path. Or maybe it is shrink_slab path that takes > > > too long? > > > > > > > I think it can be a number of cases, most notably mem_cgroup_protected() > > checks which is why the cond_resched() is added above it. Rather than add > > cond_resched() only for MEMCG_PROT_MIN and for certain MEMCG_PROT_LOW, the > > cond_resched() is added above the switch clause because the iteration > > itself may be potentially very lengthy. > > Was any of the above the case for your soft lockup case? How have you > managed to trigger it? As I've said I am not against the patch but I > would really like to see an actual explanation what happened rather than > speculations of what might have happened. If for nothing else then for > the future reference. > Yes, this is how it was triggered in my own testing. > If this is really about all the hierarchy being MEMCG_PROT_MIN protected > and that results in a very expensive and pointless reclaim walk that can > trigger soft lockup then it should be explicitly mentioned in the > changelog. I think the changelog clearly states that we need to guarantee that a reclaimer will yield the processor back to allow a victim to exit. This is where we make the guarantee. If it helps for the specific reason it triggered in my testing, we could add: "For example, mem_cgroup_protected() can prohibit reclaim and thus any yielding in page reclaim would not address the issue."