Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1371537ybk; Thu, 21 May 2020 05:27:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxawH1V4d1TUhmN8ZYzRGNa6UVRH6O9pJRgR3VbdsTQeDy7gJv0DulMSMDDQ/iH9bUROnKt X-Received: by 2002:a17:906:b881:: with SMTP id hb1mr3494455ejb.77.1590064035512; Thu, 21 May 2020 05:27:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1590064035; cv=none; d=google.com; s=arc-20160816; b=XbGp7ERlJr8QRXJjJWT7x8m+sPlq27AJ7GUFMljOq1mptc9Udlcd9XBWxIzwefKrCO ea/nag3XmcFoY2VlxsjDcqpVibQS7nb3el0fdzIK89u3wqtp7Q2212m4DZQE1iCN5lrk ykOp17UDPRQW6jkTB2ubsjSE2q+uVDvOUCEwah1ZbikSzpciXHHN96syweTanf1Hkpk/ skEsgCBPx8+CV2KTPeUKVI+UBkh4X6CVII045hSZpIaFOI574YgbIte1UcXr13ueE0IW GZeBMD31jTQsa3kgG/5YbDCAqELhpSjhwU+U1JNzGFInj8obgyZK8g5trH0NsUCkxvzO 2GTg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date:dkim-signature; bh=PhDrJCxRBSBAodlC1XBnNa5He6+juNPIjvBJ9yPZkZU=; b=lHig0x9pwyXG77ry++ruFAwlITLq2c79Pfs/98OpnAg19PhTnhcbkzKM9chekJtASm bke8zJaapR6897dH3O8L2iuodiZmAIgxiMkvXTvnXse9Mcuihz3sbQajC3l0DI0Iby5x BYf3ZvdfU83KEoswPcUIPfTOpRvhQ6V4H3K7w1Et7+j7H2t+XeygzxUVIrfXiGaJMzfz 6/M1TFQ8sMBzKSYinJWJkqleSwI2w7Ex4MapjPlvUVG42XYFEPzaM73rCOCV7Mvc9IJ/ T9XxI2GMZDBFe3sgYdLaVoedyi4//qm3op9+y30ea8UN359wDaKguVVyO0vG+mnNikLF BYng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=GAwoCLbW; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dd22si2994817edb.557.2020.05.21.05.26.44; Thu, 21 May 2020 05:27:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=GAwoCLbW; spf=pass (google.com: domain of linux-ext4-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-ext4-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729331AbgEUMZM (ORCPT + 99 others); Thu, 21 May 2020 08:25:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35452 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727983AbgEUMZM (ORCPT ); Thu, 21 May 2020 08:25:12 -0400 Received: from mail-ot1-x343.google.com (mail-ot1-x343.google.com [IPv6:2607:f8b0:4864:20::343]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 21B13C061A0F for ; Thu, 21 May 2020 05:25:12 -0700 (PDT) Received: by mail-ot1-x343.google.com with SMTP id f18so5304849otq.11 for ; Thu, 21 May 2020 05:25:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=PhDrJCxRBSBAodlC1XBnNa5He6+juNPIjvBJ9yPZkZU=; b=GAwoCLbWD9HuyBSQd0wB8YF9zAyMXx8NbeSM7sRIrSyCwgXCk1LyqZeRL1KKYDxGpO SfcyL7WWrKzTySa7jQ2M5Ts1LnWUm3g/Qx1L8g5kC2IoeCBruc4gzU1F4CJxlTlthFwn 8cQLzuQJ8GunRzg6SAVUB5eWIOoS/I4/3TvmOl6Os6sL6dq8+TYnF4G2BikWZZdixt6Z 8YGeoGhg3eET12atEyxNGeStgzAZYgEGop4eXnXIT8ch1u4jTGjXtDWtipmKoMC+brMH 7uiUWwSCg6szqJOXce1pc6s7/tvySaQmynhC56Uz1zN68+slGilfarrZouXqBlszBgta PC+A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=PhDrJCxRBSBAodlC1XBnNa5He6+juNPIjvBJ9yPZkZU=; b=CKjTMxUfsR0OU4/n9Bn35qjNtST/daLL8xI2rUV+U+bzz9QNTH0kdsGxN4lmWNMU3a NduVgXv2HDOG4i33ZlfeNfQQ1AZmN/a0d7PgyfX/g+AJNpq8OZhDyxvSfDB/WoOvq/Rd +os7aiSi5oQCH2b39idnFPXY0asREo3txAQEZPsSd2qxkYWLODyQI/DfkhWYh4VdyChS i6YaRdOgwrUTia/Wv7LM0kid4WLy/EWD1Ie3Phzu2nMQmY55HnxoyYThRzprNJQM6B9j 0rPRKupyhJN44zq5p3kJnkvdLZWfrdCSksxdwYc6UrNS/yzzdP0JGjJOyLsnTks1Cydl bcMA== X-Gm-Message-State: AOAM530L4AO1ydVoLR6Pp+MR6LwR7xvAMiaFAvwO7K3SIjLcNklMlMi3 gC/BC+7j0HvzMZqSbnFAz5ON0g== X-Received: by 2002:a05:6830:1de3:: with SMTP id b3mr6316659otj.71.1590063911088; Thu, 21 May 2020 05:25:11 -0700 (PDT) Received: from eggly.attlocal.net (172-10-233-147.lightspeed.sntcca.sbcglobal.net. [172.10.233.147]) by smtp.gmail.com with ESMTPSA id t2sm1553308otq.54.2020.05.21.05.25.07 (version=TLS1 cipher=ECDHE-ECDSA-AES128-SHA bits=128/128); Thu, 21 May 2020 05:25:09 -0700 (PDT) Date: Thu, 21 May 2020 05:24:27 -0700 (PDT) From: Hugh Dickins X-X-Sender: hugh@eggly.anvils To: Michal Hocko cc: Naresh Kamboju , Chris Down , Yafang Shao , Anders Roxell , "Linux F2FS DEV, Mailing List" , linux-ext4 , linux-block , Andrew Morton , open list , Linux-Next Mailing List , linux-mm , Arnd Bergmann , Andreas Dilger , Jaegeuk Kim , Theodore Ts'o , Chao Yu , Hugh Dickins , Andrea Arcangeli , Matthew Wilcox , Chao Yu , lkft-triage@lists.linaro.org, Johannes Weiner , Roman Gushchin , Cgroups Subject: Re: mm: mkfs.ext4 invoked oom-killer on i386 - pagecache_get_page In-Reply-To: <20200521105801.GL6462@dhcp22.suse.cz> Message-ID: References: <20200501135806.4eebf0b92f84ab60bba3e1e7@linux-foundation.org> <20200519075213.GF32497@dhcp22.suse.cz> <20200519084535.GG32497@dhcp22.suse.cz> <20200520190906.GA558281@chrisdown.name> <20200521095515.GK6462@dhcp22.suse.cz> <20200521105801.GL6462@dhcp22.suse.cz> User-Agent: Alpine 2.11 (LSU 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-ext4-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-ext4@vger.kernel.org On Thu, 21 May 2020, Michal Hocko wrote: > On Thu 21-05-20 16:11:11, Naresh Kamboju wrote: > > On Thu, 21 May 2020 at 15:25, Michal Hocko wrote: > > > > > > On Wed 20-05-20 20:09:06, Chris Down wrote: > > > > Hi Naresh, > > > > > > > > Naresh Kamboju writes: > > > > > As a part of investigation on this issue LKFT teammate Anders Roxell > > > > > git bisected the problem and found bad commit(s) which caused this problem. > > > > > > > > > > The following two patches have been reverted on next-20200519 and retested the > > > > > reproducible steps and confirmed the test case mkfs -t ext4 got PASS. > > > > > ( invoked oom-killer is gone now) > > > > > > > > > > Revert "mm, memcg: avoid stale protection values when cgroup is above > > > > > protection" > > > > > This reverts commit 23a53e1c02006120f89383270d46cbd040a70bc6. > > > > > > > > > > Revert "mm, memcg: decouple e{low,min} state mutations from protection > > > > > checks" > > > > > This reverts commit 7b88906ab7399b58bb088c28befe50bcce076d82. > > > > > > > > Thanks Anders and Naresh for tracking this down and reverting. > > > > > > > > I'll take a look tomorrow. I don't see anything immediately obviously wrong > > > > in either of those commits from a (very) cursory glance, but they should > > > > only be taking effect if protections are set. > > > > > > Agreed. If memory.{low,min} is not used then the patch should be > > > effectively a nop. Btw. do you see the problem when booting with > > > cgroup_disable=memory kernel command line parameter? > > > > With extra kernel command line parameters, cgroup_disable=memory > > I have noticed a differ problem now. > > > > + mkfs -t ext4 /dev/disk/by-id/ata-TOSHIBA_MG04ACA100N_Y8NRK0BPF6XF > > mke2fs 1.43.8 (1-Jan-2018) > > Creating filesystem with 244190646 4k blocks and 61054976 inodes > > Filesystem UUID: 3bb1a285-2cb4-44b4-b6e8-62548f3ac620 > > Superblock backups stored on blocks: > > 32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632, 2654208, > > 4096000, 7962624, 11239424, 20480000, 23887872, 71663616, 78675968, > > 102400000, 214990848 > > Allocating group tables: 0/7453 done > > Writing inode tables: 0/7453 done > > Creating journal (262144 blocks): [ 35.502102] BUG: kernel NULL > > pointer dereference, address: 000000c8 > > [ 35.508372] #PF: supervisor read access in kernel mode > > [ 35.513506] #PF: error_code(0x0000) - not-present page > > [ 35.518638] *pde = 00000000 > > [ 35.521514] Oops: 0000 [#1] SMP > > [ 35.524652] CPU: 0 PID: 145 Comm: kswapd0 Not tainted > > 5.7.0-rc6-next-20200519+ #1 > > [ 35.532121] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS > > 2.2 05/23/2018 > > [ 35.539507] EIP: mem_cgroup_get_nr_swap_pages+0x28/0x60 > > Could you get faddr2line for this offset? No need for that, I can help with the "cgroup_disabled=memory" crash: I've been happily running with the fixup below, but haven't got to send it in yet (and wouldn't normally be reading mail at this time!) because of busy chasing a couple of other bugs (not necessarily mm); and maybe the fix would be better with explicit mem_cgroup_disabled() test, or maybe that should be where cgroup_memory_noswap is decided - up to Johannes. --- mm/memcontrol.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- 5.7-rc6-mm1/mm/memcontrol.c 2020-05-20 12:21:56.109693740 -0700 +++ linux/mm/memcontrol.c 2020-05-20 12:26:15.500478753 -0700 @@ -6954,7 +6954,8 @@ long mem_cgroup_get_nr_swap_pages(struct { long nr_swap_pages = get_nr_swap_pages(); - if (cgroup_memory_noswap || !cgroup_subsys_on_dfl(memory_cgrp_subsys)) + if (!memcg || cgroup_memory_noswap || + !cgroup_subsys_on_dfl(memory_cgrp_subsys)) return nr_swap_pages; for (; memcg != root_mem_cgroup; memcg = parent_mem_cgroup(memcg)) nr_swap_pages = min_t(long, nr_swap_pages,