Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp41459pxj; Wed, 16 Jun 2021 19:44:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwzZnRZgMwrTBZ9yB1VKWT1Wpbt6bS7y046OBCTfp5oLlNrpVa33rlVy4UsenEOIk53ptb1 X-Received: by 2002:a92:d24d:: with SMTP id v13mr1822523ilg.165.1623897875186; Wed, 16 Jun 2021 19:44:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623897875; cv=none; d=google.com; s=arc-20160816; b=Q7tRmsgp311rplpqk+sm32Ecg6fb/gRxBvRdxjlSOR4ucz1fGro8XJUYe1AP3SwBHK szvpKuBwOP+mx22BlR4EUy05QbQqgeb0K1Aq/zcVOQk8dpqwRw61UKPE84dGwI31Xffv COj7OC2mr96cjoFNDppdF4AS6NJeVK0MJLP3DXOdr9qotPuG33YzaLO+UQWwwCsQFbx6 dws6yZYpzrFqnV5LoGsT3HpDg5UyeSxQHDvv3YDMcgLEkL1Z+53xi2+r3rXWES/jmrFZ /0e+Rpso1VBKv1RCjvJHSTf3R9VJPa4LlUflRMap7xdOTOmZdCaJgI440NyUDEF4sgQp 3Q5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=/P1XTqmOSZ3tCk+5tTFlL59tcqN9csPcsMUADz//ww8=; b=g3cAvxlB/Xom0GFpuixNL4pF+o/7efpq/nkMUkrYs6neYTinNB0elxAzOoJQ+5h3rx WcDntzqh1PjFMvu3EQ8xK8NUT+7WU5es0m4g25iSc1bKC5bfjAnyxm61IS1LnlDbQyLM xEjvHs5HrDDzXfql1YFRb7ipE9VXcyf6/gnVdH8JW3PtmQp/z8ImGJQibeFAc9G98vRG 1s3W37RNdLi3rzgrfBO/Zbk+aePmez+2e6xVSrHvTrADSHQxAkPikBsEFWPAh0bCbuBo khaC/9V5V21DlsM/9PF1Y54WUsB0IoAdZobAr3rSSm4zdBCBFcrQUqN8pmRIKwpMVOyD GRrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Uzj+Y5/0"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q11si4540298ilv.97.2021.06.16.19.44.23; Wed, 16 Jun 2021 19:44:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="Uzj+Y5/0"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231613AbhFQBKX (ORCPT + 99 others); Wed, 16 Jun 2021 21:10:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:34998 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230267AbhFQBKW (ORCPT ); Wed, 16 Jun 2021 21:10:22 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id EA738613CA; Thu, 17 Jun 2021 01:08:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1623892095; bh=RQPUupKWZ39Ts6YqMKJZ4NPWboTMlQ8j5iTcoZkvN1k=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=Uzj+Y5/0oeum/sHwVpH3FrC9rXrZG+fQBJaFLaQe2AOqs6Y5Y5jw9mxqwhIBR1lom kD13ydZHMuEsO2EF2BxS4VXNnf2huKbhzP6lqozAuO3h9jJdnYeNFmosBrKo65cbSx Z+YptmJn/u0tIv1ZH2QguJXNmRZ7N9zOc8vxPzj+kqr8JtNtjH520Dbb/eXcwPR7qf rsgbQwnj08bFdvEfk1/zj2dD2X+1I8aEh9pYhd1WNrnV3JK+5bLaPxJe73jxsaVxCi oGEs2CnGYClYHt+Ozd09LnTcX9hgu3QeVjl56DRNhr4+bVvKl8YZ/fzF6zRSYvtmzT F6/eLuSZZx/RA== Subject: Re: vmemmap alloc failure in hot_add_req() To: David Hildenbrand Cc: "K. Y. Srinivasan" , Haiyang Zhang , Stephen Hemminger , Wei Liu , Dexuan Cui , linux-hyperv@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Oscar Salvador , Hillf Danton References: <20210612021115.2136-1-hdanton@sina.com> <951ddbaf-3d74-7043-4866-3809ff991cfd@redhat.com> From: Nathan Chancellor Message-ID: Date: Wed, 16 Jun 2021 18:08:15 -0700 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <951ddbaf-3d74-7043-4866-3809ff991cfd@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi David, On 6/14/2021 12:38 AM, David Hildenbrand wrote: > On 12.06.21 04:11, Hillf Danton wrote: >> On Fri, 11 Jun 2021 12:48:26 -0700 Nathan Chancellor wrote: >>> Hi all, >>> >>> I am occasionally seeing a kernel warning when running virtual machines >>> in Hyper-V, which usually happens a minute or so after boot. It does not >>> happen on every boot and it is reproducible on at least v5.10. I think >>> it might have something to do with constant reboots, which I do when >>> testing various kernels. >>> >>> The stack trace is as follows: >>> >>> [   49.215291] kworker/0:1: vmemmap alloc failure: order:9, >>> mode:0x4cc0(GFP_KERNEL|__GFP_RETRY_MAYFAIL), >>> nodemask=(null),cpuset=/,mems_allowed=0 >>> [   49.215299] CPU: 0 PID: 18 Comm: kworker/0:1 Not tainted >>> 5.13.0-rc5 #1 >>> [   49.215301] Hardware name: Microsoft Corporation Virtual >>> Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.0 11/01/2019 >>> [   49.215302] Workqueue: events hot_add_req [hv_balloon] >> >> Apart from order:9 (mm Cced), events_unbound is the right workqueue >> instead >> because the report shows the risk that hot_add_req could block other >> pending >> events longer than thought. Any special reason for the events wq? >> >>> [   49.215307] Call Trace: >>> [   49.215310]  dump_stack+0x76/0x94 >>> [   49.215314]  warn_alloc.cold+0x78/0xdc >>> [   49.215316]  ? __alloc_pages+0x200/0x230 >>> [   49.215319]  vmemmap_alloc_block+0x86/0xdc >>> [   49.215323]  vmemmap_populate+0x10e/0x31c >>> [   49.215324]  __populate_section_memmap+0x38/0x4e >>> [   49.215326]  sparse_add_section+0x12c/0x1cf >>> [   49.215329]  __add_pages+0xa9/0x130 >>> [   49.215330]  add_pages+0x12/0x60 >>> [   49.215333]  add_memory_resource+0x180/0x300 >>> [   49.215335]  __add_memory+0x3b/0x80 >>> [   49.215336]  add_memory+0x2e/0x50 >>> [   49.215337]  hot_add_req+0x3fc/0x5a0 [hv_balloon] >>> [   49.215340]  process_one_work+0x214/0x3e0 >>> [   49.215342]  worker_thread+0x4d/0x3d0 >>> [   49.215344]  ? process_one_work+0x3e0/0x3e0 >>> [   49.215345]  kthread+0x133/0x150 >>> [   49.215347]  ? kthread_associate_blkcg+0xc0/0xc0 >>> [   49.215348]  ret_from_fork+0x22/0x30 >>> [   49.215351] Mem-Info: >>> [   49.215352] active_anon:251 inactive_anon:140868 isolated_anon:0 >>>                  active_file:47497 inactive_file:88505 isolated_file:0 >>>                  unevictable:8 dirty:14 writeback:0 >>>                  slab_reclaimable:12013 slab_unreclaimable:11403 >>>                  mapped:131701 shmem:12671 pagetables:3140 bounce:0 >>>                  free:41388 free_pcp:37 free_cma:0 >>> [   49.215355] Node 0 active_anon:1004kB inactive_anon:563472kB >>> active_file:189988kB inactive_file:354020kB unevictable:32kB >>> isolated(anon):0kB isolated(file):0kB mapped:526804kB dirty:56kB >>> writeback:0kB shmem:50684kB shmem_thp: 0kB shmem_pmdmapped: 0kB >>> anon_thp: 0kB writeback_tmp:0kB kernel_stack:5904kB >>> pagetables:12560kB all_unreclaimable? no >>> [   49.215358] Node 0 DMA free:6496kB min:480kB low:600kB high:720kB >>> reserved_highatomic:0KB active_anon:0kB inactive_anon:3120kB >>> active_file:2584kB inactive_file:2792kB unevictable:0kB >>> writepending:0kB present:15996kB managed:15360kB mlocked:0kB >>> bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB >>> [   49.215361] lowmem_reserve[]: 0 1384 1384 1384 1384 >>> [   49.215364] Node 0 DMA32 free:159056kB min:44572kB low:55712kB >>> high:66852kB reserved_highatomic:0KB active_anon:1004kB >>> inactive_anon:560352kB active_file:187004kB inactive_file:350864kB >>> unevictable:32kB writepending:56kB present:1555760kB >>> managed:1432388kB mlocked:32kB bounce:0kB free_pcp:172kB >>> local_pcp:0kB free_cma:0kB >>> [   49.215367] lowmem_reserve[]: 0 0 0 0 0 >>> [   49.215369] Node 0 DMA: 17*4kB (UM) 13*8kB (M) 10*16kB (M) 3*32kB >>> (ME) 3*64kB (UME) 4*128kB (UME) 1*256kB (E) 2*512kB (UE) 2*1024kB >>> (ME) 1*2048kB (E) 0*4096kB = 6508kB >>> [   49.215377] Node 0 DMA32: 8061*4kB (UME) 5892*8kB (UME) 2449*16kB >>> (UME) 604*32kB (UME) 207*64kB (UME) 49*128kB (UM) 7*256kB (M) 1*512kB >>> (M) 0*1024kB 0*2048kB 0*4096kB = 159716kB >>> [   49.215388] 148696 total pagecache pages >>> [   49.215388] 0 pages in swap cache >>> [   49.215389] Swap cache stats: add 0, delete 0, find 0/0 >>> [   49.215390] Free swap  = 0kB >>> [   49.215390] Total swap = 0kB >>> [   49.215391] 392939 pages RAM >>> [   49.215391] 0 pages HighMem/MovableOnly >>> [   49.215391] 31002 pages reserved >>> [   49.215392] 0 pages cma reserved >>> [   49.215393] 0 pages hwpoisoned >>> >>> Is this a known issue and/or am I doing something wrong? I only noticed >>> this because there are times when I am compiling something intensive in >>> the VM such as LLVM and the VM runs out of memory even though I have >>> plenty of free memory on the host but I am not sure if this warning is >>> related to that issue. > > Hi, > > Is hotplugged memory getting onlined automatically (either from user > space via a udev script or via the kernel, for example, with > CONFIG_MEMORY_HOTPLUG_DEFAULT_ONLINE)? It does look like this kernel configuration has CONFIG_MEMORY_HOTPLUG_DEFAULT_ONLINE=y. > If it's not getting onlined, you easily sport after hotplug e.g., via > "lsmem" that there are quite some offline memory blocks. > > Note that x86_64 code will fallback from populating huge pages to > populating base pages for the vmemmap; this can happen easily when under > memory pressure. Not sure if it is relevant or not but this warning can show up within a minute of startup without me doing anything in particular. > If adding memory would fail completely, you'd see another "hot_add > memory failed error is ..." error message from hyper-v in the kernel > log. If that doesn't show up, it's simply suboptimal, but hotplugging > memory still succeeded. I did notice that from the code in hv_balloon.c but I do not think I have ever seen that message in my logs. > Note: we could support "memmap_on_memory" in some cases (e.g., no memory > holes in hotadded range) when hotplugging memory blocks via hyper-v, > which would result in this warning less trigger less frequently. Cheers, Nathan