Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp1005380ybz; Thu, 16 Apr 2020 00:38:07 -0700 (PDT) X-Google-Smtp-Source: APiQypIm3OAlIb0CDgHsQiNA3ljgG0vule2Jvt10bqnUkq0UBOr9OBcrllAVsr4Aka3AjKlTIix+ X-Received: by 2002:a17:906:1c8a:: with SMTP id g10mr8929317ejh.342.1587022687231; Thu, 16 Apr 2020 00:38:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587022687; cv=none; d=google.com; s=arc-20160816; b=k+8bYPeL7AlZ3Vrli2NdIS79mWhjahjhJMJSHHJyDjav8cMzbCs9xYCm1oUcoMq5fC 37AxGDVEfA7AEwfzDcjKbYQPEm/K+9Pu+1EQ2CF/JlA4D77+LpraStQ9afoI3a3cYM2j zfeihtYgtLl/YrO/rFlUFucDqqWWkFvpAvSk7iClgKHaElmNXbBOPJWXvNbXbPhf5NkT vQLl5cvf7fgqad7aGNbQP7Qr6X+2SZaokE9l0rjEkxY+5fuNoNKswpwTwezTQ+m5eh8j eV61Gne6jeRCd8n0RySj+q/cosOuMw3gIqxdYONh8mAwCz9vR3d0jogovBH8EPh3YkhQ b0zw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=Nxv5kpTqinY+ODzNYtSbDuaLVbS6rONas/3LXmmJm3Y=; b=kdntYhY3IDIFz49PtS9j843wc7OsJHCZJTCScTTzHo9l7ROOpsb5q7heCwWmQEvzRh JePXS/oSiMFP72qYr4s0yUDHE7jGdFiw/bzYP1V6kzx2dEb+xSKaCUBkBCE6UBguB5+6 YmaJQcGvA0mhCIKqkEYXTK2V75jSgHFmBUzSK/0xoAQoBAitv3ALob6sKVP/KZHMqM2y ZNUY0l+8jZLUmz6BjlTkUL5PVahLMr9R8MvligNthzWnAVkzp1RUnYO+mqMWdzaymG37 7oSWR7izhBPk4NyPWEGpdlEiLqzUUgmTvggQ1PKvj5LVVpGjYiUW7nw7IRO6gkBW7FZp g1XA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="A3kOy/3s"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q3si6322976ejt.286.2020.04.16.00.37.43; Thu, 16 Apr 2020 00:38:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="A3kOy/3s"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2439327AbgDPHek (ORCPT + 99 others); Thu, 16 Apr 2020 03:34:40 -0400 Received: from us-smtp-delivery-1.mimecast.com ([207.211.31.120]:36850 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S2438944AbgDPHef (ORCPT ); Thu, 16 Apr 2020 03:34:35 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1587022474; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=Nxv5kpTqinY+ODzNYtSbDuaLVbS6rONas/3LXmmJm3Y=; b=A3kOy/3sehg4yg0wkzlPbnzTVB7Sg+IuVM+A/3xO7DATFpeF4EtdReNPQjQQABVDZU6Dqz BFCkJZ44c00UDEDLYb3PGNTOzhhU5yEN9o8Z+bRSNV/Uo4nITawVjzpOLuPn3LYcTCmGku 58ZhzW3buZ1XDGfPVlPoCRhJ1OEhrwU= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-409-Bv8t9qYvOmqW98wuIGuo1w-1; Thu, 16 Apr 2020 03:34:27 -0400 X-MC-Unique: Bv8t9qYvOmqW98wuIGuo1w-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id 80B3B1005509; Thu, 16 Apr 2020 07:34:24 +0000 (UTC) Received: from t480s.redhat.com (ovpn-114-9.ams2.redhat.com [10.36.114.9]) by smtp.corp.redhat.com (Postfix) with ESMTP id 43BE15C1D4; Thu, 16 Apr 2020 07:34:18 +0000 (UTC) From: David Hildenbrand To: linux-kernel@vger.kernel.org Cc: linux-mm@kvack.org, David Hildenbrand , Pavel Tatashin , Pankaj Gupta , Baoquan He , Shile Zhang , Michal Hocko , Andrew Morton , Kirill Tkhai , Daniel Jordan , Michal Hocko , Alexander Duyck , Oscar Salvador Subject: [PATCH v2] mm/page_alloc: fix watchdog soft lockups during set_zone_contiguous() Date: Thu, 16 Apr 2020 09:34:17 +0200 Message-Id: <20200416073417.5003-1-david@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Without CONFIG_PREEMPT, it can happen that we get soft lockups detected, e.g., while booting up. [ 105.608900] watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [swapper= /0:1] [ 105.608933] Modules linked in: [ 105.608933] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.6.0-next-20200= 331+ #4 [ 105.608933] Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4= 066+0f1aadab 04/01/2014 [ 105.608933] RIP: 0010:__pageblock_pfn_to_page+0x134/0x1c0 [ 105.608933] Code: 85 c0 74 71 4a 8b 04 d0 48 85 c0 74 68 48 01 c1 74 6= 3 f6 01 04 74 5e 48 c1 e7 06 4c 8b 05 cc 991 [ 105.608933] RSP: 0000:ffffb6d94000fe60 EFLAGS: 00010286 ORIG_RAX: ffff= ffffffffff13 [ 105.608933] RAX: fffff81953250000 RBX: 000000000a4c9600 RCX: ffff8fe9f= f7c1990 [ 105.608933] RDX: ffff8fe9ff7dab80 RSI: 000000000a4c95ff RDI: 000000029= 3250000 [ 105.608933] RBP: ffff8fe9ff7dab80 R08: fffff816c0000000 R09: 000000000= 0000008 [ 105.608933] R10: 0000000000000014 R11: 0000000000000014 R12: 000000000= 0000000 [ 105.608933] R13: 0000000000000000 R14: 0000000000000000 R15: 000000000= 0000000 [ 105.608933] FS: 0000000000000000(0000) GS:ffff8fe1ff400000(0000) knlG= S:0000000000000000 [ 105.608933] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 105.608933] CR2: 000000000f613000 CR3: 00000088cf20a000 CR4: 000000000= 00006f0 [ 105.608933] Call Trace: [ 105.608933] set_zone_contiguous+0x56/0x70 [ 105.608933] page_alloc_init_late+0x166/0x176 [ 105.608933] kernel_init_freeable+0xfa/0x255 [ 105.608933] ? rest_init+0xaa/0xaa [ 105.608933] kernel_init+0xa/0x106 [ 105.608933] ret_from_fork+0x35/0x40 The issue becomes visible when having a lot of memory (e.g., 4TB) assigned to a single NUMA node - a system that can easily be created using QEMU. Inside VMs on a hypervisor with quite some memory overcommit, this is fairly easy to trigger. Reviewed-by: Pavel Tatashin Reviewed-by: Pankaj Gupta Reviewed-by: Baoquan He Reviewed-by: Shile Zhang Acked-by: Michal Hocko Cc: Andrew Morton Cc: Kirill Tkhai Cc: Shile Zhang Cc: Pavel Tatashin Cc: Daniel Jordan Cc: Michal Hocko Cc: Alexander Duyck Cc: Baoquan He Cc: Oscar Salvador Signed-off-by: David Hildenbrand --- This is just a resend of patch #2 of https://lkml.kernel.org/r/20200401104156.11564-3-david@redhat.com Not that patch #1 was replaced by https://lkml.kernel.org/r/20200403140952.17177-4-pasha.tatashin@soleen.co= m --- mm/page_alloc.c | 1 + 1 file changed, 1 insertion(+) diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 1385d786a01a..ae1545246b69 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -1607,6 +1607,7 @@ void set_zone_contiguous(struct zone *zone) if (!__pageblock_pfn_to_page(block_start_pfn, block_end_pfn, zone)) return; + cond_resched(); } =20 /* We confirm that there is no hole */ --=20 2.25.1