Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp3114730pxb; Tue, 21 Sep 2021 15:05:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzrostUDLLxLiry+p89QgbwhfSqi/qxl80G9Q4XzEjozL9/XoEzicarhifZhPhbZNZfE3UA X-Received: by 2002:a50:bec6:: with SMTP id e6mr38803835edk.216.1632261936989; Tue, 21 Sep 2021 15:05:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632261936; cv=none; d=google.com; s=arc-20160816; b=BQ9Fpjwtt4sWcMsV8w8VmIAIIWBtT8px9JJaFvd2wIaKIQjftGgs7c6/QbpYwHUU5U IZYVbLRvV8L4jUa0lzM3GhgIbPZzMOui0Fb8FsCXeWEdHYD9XpdbRMW/6nrIS9ln7EVP qV9fHpgUPg0CZj6nFp0lw03r2f9NvT99j+/GypiQV9KpH/vx4KmfmCOfvmqNyd27CQ+u g0cVM2wdhqr6WZB+0JM1H2vn2lWsMlLkluI6r40ROWW1CTPM4Ace7tnWhNH7pKypNoR0 PjfOx9BDsom3Zb+cUJM5J8XX4wOp10kKEw/B3jeGc5q7X6d4oVZiU0JIL9yDgOfgJ4+G h9Ig== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=OEpicLpFcIEa0CuDyFPS1MArLW4MklO9PQfEzTqnfGQ=; b=KsfxKszd6p5g73Lolm9Psgog5yop54VZGzgVuTziTDw3XnDv9VihciaLuSu8Qf7af2 w4GVF4yHDeV/6CtLq1gr+lUbsga4tuPjJ0GGLQSdfBK5IqoS7s2c7Oz1kCiUCs8vM7ys xzXlXWn7LXVzMS7vV60DAMZ3bKnx3sH1Tllw2xxahnXmxVVof9p4F64+JrFj1+GgxccQ IOvxh1+dytdSwuhe4g5qAxBdXjy2CGCmhHUqIIDLunX+JVSTMflKZtpeGQRLMJt8egNl 8pJj4Ixki7TU5RfRX4vM1GQqHDvNjaSEmgP2YEelTa0s+XbYyxvtTOHhnvq4+YU0r4k+ 7Y2A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=XQ+uwo9C; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i5si256894ejo.605.2021.09.21.15.05.03; Tue, 21 Sep 2021 15:05:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=XQ+uwo9C; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233713AbhIUS4x (ORCPT + 99 others); Tue, 21 Sep 2021 14:56:53 -0400 Received: from mail.kernel.org ([198.145.29.99]:55784 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232142AbhIUS4x (ORCPT ); Tue, 21 Sep 2021 14:56:53 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 449AB61186; Tue, 21 Sep 2021 18:55:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1632250524; bh=4nfKbEEvnuIK73VTBrjV7lsPLdW7d5cR0/3cZDpflDE=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=XQ+uwo9Ce+qeUe704wH19OCWWpxZTbGGZupNJ9QAWTxokV6Pl54kFG8CGUjfSin5P 2qTK4wVyhoeLepL7/wCyWf9SYbghTbeZ9lU9z7iIS+ZxtmF1wiEpq6H4d9beaaP3bG FCxw6qzVjGkphbM53CO0re/aquN3en7e4TUSt7NY= Date: Tue, 21 Sep 2021 11:55:23 -0700 From: Andrew Morton To: Vasily Averin Cc: Tetsuo Handa , Michal Hocko , Johannes Weiner , Vladimir Davydov , cgroups@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel@openvz.org, "Uladzislau Rezki (Sony)" Subject: Re: [PATCH mm] vmalloc: back off when the current task is OOM-killed Message-Id: <20210921115523.8606cea0b2f0a5ca4e79cbd0@linux-foundation.org> In-Reply-To: References: <20210919163126.431674722b8db218453dc18c@linux-foundation.org> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 20 Sep 2021 13:59:35 +0300 Vasily Averin wrote: > On 9/20/21 4:22 AM, Tetsuo Handa wrote: > > On 2021/09/20 8:31, Andrew Morton wrote: > >> On Fri, 17 Sep 2021 11:06:49 +0300 Vasily Averin wrote: > >> > >>> Huge vmalloc allocation on heavy loaded node can lead to a global > >>> memory shortage. A task called vmalloc can have the worst badness > >>> and be chosen by OOM-killer, however received fatal signal and > >>> oom victim mark does not interrupt allocation cycle. Vmalloc will > >>> continue allocating pages over and over again, exacerbating the crisis > >>> and consuming the memory freed up by another killed tasks. > >>> > >>> This patch allows OOM-killer to break vmalloc cycle, makes OOM more > >>> effective and avoid host panic. > >>> > >>> Unfortunately it is not 100% safe. Previous attempt to break vmalloc > >>> cycle was reverted by commit b8c8a338f75e ("Revert "vmalloc: back off when > >>> the current task is killed"") due to some vmalloc callers did not handled > >>> failures properly. Found issues was resolved, however, there may > >>> be other similar places. > >> > >> Well that was lame of us. > >> > >> I believe that at least one of the kernel testbots can utilize fault > >> injection. If we were to wire up vmalloc (as we have done with slab > >> and pagealloc) then this will help to locate such buggy vmalloc callers. > > Andrew, could you please clarify how we can do it? > Do you mean we can use exsiting allocation fault injection infrastructure to trigger > such kind of issues? Unfortunately I found no ways to reach this goal. > It allows to emulate single faults with small probability, however it is not enough, > we need to completely disable all vmalloc allocations. I don't see why there's a problem? You're saying "there might still be vmalloc() callers which don't correctly handle allocation failures", yes? I'm suggesting that we use fault injection to cause a small proportion of vmalloc() calls to artificially fail, so such buggy callers will eventually be found and fixed. Why does such a scheme require that *all* vmalloc() calls fail?