Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp703158ybb; Wed, 1 Apr 2020 08:08:21 -0700 (PDT) X-Google-Smtp-Source: APiQypLzoQjuw1XMmvAcWt8bbKEHFtLIIBMkH02OGy8AxLJxaQoeXlAaqa5lJdZgPfDzXO+gT0ow X-Received: by 2002:aca:75d5:: with SMTP id q204mr3224410oic.9.1585753701183; Wed, 01 Apr 2020 08:08:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585753701; cv=none; d=google.com; s=arc-20160816; b=Fq/ZzAUWLKOKethXcpt6JoO/kW4xwRZni2FgS80uYLiiMxN7YKf62k8CbKKlXL77Nb boBOH9oNRxDVxqWJBoU8crWhIs/RK9KytKFwkSba8ji9MWNbWeD0lExWCqn1OWFMHFzB 8oiV9J8ufP+UJkm23caG6mP739JhMULu0pWJDpI4piZeb733ByXgw5dsgw5nAJwdPQFu QTAzqcEPwmCedDCgabaS3qYPbcKxQ4vvnUFz1b/qnHmPZGCJulAzo2n2vwjT83mFj45S jqQZkXporD3didaKyjl0aYWJxSqlbGA+ljIYT+HNdfWiyVVY+9TtDwFSqQSTXna2ZUiD 3sQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-language :content-transfer-encoding:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=WG4cm6hwu/uu5JEuCZWLdEIB+iwbbJ/b04O3xdsjdWs=; b=DHG8wB5oLSAiGtAZQKd5Mhy+nPOw7I50ObCJM0taaYRn4jQDiL7ZNMihtEssSlYAd5 Mr1JkTvVo9vyyqNqS4WiWM3NAVULF1xptXPlY5Bcoooe8COYOejc3W7iCuzcv+1fosMg 2ARtmystopqJoqTOmG6nn1iYutuMU6VXE/EM6LJh/HAFXR/6Y5Wul6BCqA0f/aW0QZD+ NSriqsUYtxzf9PD1UMOJGJ07ztFOdxrwQKzCECe056mLj5cG8OWcF/OywVyhlAlC22Sz mTbAOFm4641IAVPPgLk/G9KzCquly8rEWk/WWB2ClbHETxBHtlotiduj23mjUWpoFXAE +IZQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z12si909132otm.3.2020.04.01.08.07.52; Wed, 01 Apr 2020 08:08:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=alibaba.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732824AbgDAN7s (ORCPT + 99 others); Wed, 1 Apr 2020 09:59:48 -0400 Received: from out30-54.freemail.mail.aliyun.com ([115.124.30.54]:52204 "EHLO out30-54.freemail.mail.aliyun.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732808AbgDAN7r (ORCPT ); Wed, 1 Apr 2020 09:59:47 -0400 X-Alimail-AntiSpam: AC=PASS;BC=-1|-1;BR=01201311R801e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=e01e04394;MF=shile.zhang@linux.alibaba.com;NM=1;PH=DS;RN=11;SR=0;TI=SMTPD_---0TuK-7Fh_1585749544; Received: from ali-6c96cfdd1403.local(mailfrom:shile.zhang@linux.alibaba.com fp:SMTPD_---0TuK-7Fh_1585749544) by smtp.aliyun-inc.com(127.0.0.1); Wed, 01 Apr 2020 21:59:04 +0800 Subject: Re: [PATCH v1 2/2] mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous() To: David Hildenbrand , linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, Andrew Morton , Kirill Tkhai , Pavel Tatashin , Daniel Jordan , Michal Hocko , Alexander Duyck , Baoquan He , Oscar Salvador References: <20200401104156.11564-1-david@redhat.com> <20200401104156.11564-3-david@redhat.com> From: Shile Zhang Message-ID: <2b2408eb-9695-08af-3e6f-a4c88ee505fc@linux.alibaba.com> Date: Wed, 1 Apr 2020 21:59:04 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <20200401104156.11564-3-david@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/4/1 18:41, David Hildenbrand wrote: > Without CONFIG_PREEMPT, it can happen that we get soft lockups detected, > e.g., while booting up. > > [ 105.608900] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper/0:1] > [ 105.608933] Modules linked in: > [ 105.608933] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.6.0-next-20200331+ #4 > [ 105.608933] Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014 > [ 105.608933] RIP: 0010:__pageblock_pfn_to_page+0x134/0x1c0 > [ 105.608933] Code: 85 c0 74 71 4a 8b 04 d0 48 85 c0 74 68 48 01 c1 74 63 f6 01 04 74 5e 48 c1 e7 06 4c 8b 05 cc 991 > [ 105.608933] RSP: 0000:ffffb6d94000fe60 EFLAGS: 00010286 ORIG_RAX: ffffffffffffff13 > [ 105.608933] RAX: fffff81953250000 RBX: 000000000a4c9600 RCX: ffff8fe9ff7c1990 > [ 105.608933] RDX: ffff8fe9ff7dab80 RSI: 000000000a4c95ff RDI: 0000000293250000 > [ 105.608933] RBP: ffff8fe9ff7dab80 R08: fffff816c0000000 R09: 0000000000000008 > [ 105.608933] R10: 0000000000000014 R11: 0000000000000014 R12: 0000000000000000 > [ 105.608933] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 > [ 105.608933] FS: 0000000000000000(0000) GS:ffff8fe1ff400000(0000) knlGS:0000000000000000 > [ 105.608933] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > [ 105.608933] CR2: 000000000f613000 CR3: 00000088cf20a000 CR4: 00000000000006f0 > [ 105.608933] Call Trace: > [ 105.608933] set_zone_contiguous+0x56/0x70 > [ 105.608933] page_alloc_init_late+0x166/0x176 > [ 105.608933] kernel_init_freeable+0xfa/0x255 > [ 105.608933] ? rest_init+0xaa/0xaa > [ 105.608933] kernel_init+0xa/0x106 > [ 105.608933] ret_from_fork+0x35/0x40 > > The issue becomes visible when having a lot of memory (e.g., 4TB) > assigned to a single NUMA node - a system that can easily be created > using QEMU. Inside VMs on a hypervisor with quite some memory > overcommit, this is fairly easy to trigger. > > Cc: Andrew Morton > Cc: Kirill Tkhai > Cc: Shile Zhang > Cc: Pavel Tatashin > Cc: Daniel Jordan > Cc: Michal Hocko > Cc: Alexander Duyck > Cc: Baoquan He > Cc: Oscar Salvador > Signed-off-by: David Hildenbrand > --- > mm/page_alloc.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/mm/page_alloc.c b/mm/page_alloc.c > index 084cabffc90d..cc4f07d52939 100644 > --- a/mm/page_alloc.c > +++ b/mm/page_alloc.c > @@ -1607,6 +1607,7 @@ void set_zone_contiguous(struct zone *zone) > if (!__pageblock_pfn_to_page(block_start_pfn, > block_end_pfn, zone)) > return; > + cond_resched(); > } > > /* We confirm that there is no hole */ Reviewed-by: Shile Zhang