[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <546AB1F5.6030306@redhat.com>
Date: Mon, 17 Nov 2014 21:41:57 -0500
From: Rik van Riel <riel@...hat.com>
To: Andrew Morton <akpm@...ux-foundation.org>,
Michel Lespinasse <walken@...gle.com>,
Hugh Dickins <hughd@...gle.com>,
Andrea Arcangeli <aarcange@...hat.com>,
linux-kernel@...r.kernel.org, linux-mm@...ck.org,
Tim Hartrick <tim@...ecast.com>, Michal Hocko <mhocko@...e.cz>
Subject: Re: [PATCH] Repeated fork() causes SLAB to grow without bound
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On 11/17/2014 08:41 PM, Daniel Forrest wrote:
> On Mon, Nov 17, 2014 at 04:02:12PM -0800, Andrew Morton wrote:
>> On Fri, 14 Nov 2014 10:30:53 -0600 Daniel Forrest
>> <dan.forrest@...c.wisc.edu> wrote:
>>
>>> There have been a couple of inquiries about the status of this
>>> patch over the last few months, so I am going to try pushing it
>>> out.
>>>
>>> Andrea Arcangeli has commented:
>>>
>>>> Agreed. The only thing I don't like about this patch is the
>>>> hardcoding of number 5: could we make it a variable to tweak
>>>> with sysfs/sysctl so if some weird workload arises we have a
>>>> tuning tweak? It'd cost one cacheline during fork, so it
>>>> doesn't look excessive overhead.
>>>
>>> Adding this is beyond my experience level, so if it is required
>>> then someone else will have to make it so.
>>>
>>> Rik van Riel has commented:
>>>
>>>> I believe we should just merge that patch.
>>>>
>>>> I have not seen any better ideas come by.
>>>>
>>>> The comment should probably be fixed to reflect the chain
>>>> length of 5 though :)
>>>
>>> So here is Michel's patch again with "(length > 1)" modified
>>> to "(length > 5)" and fixed comments.
>>>
>>> I have been running with this patch (with the threshold set to
>>> 5) for over two years now and it does indeed solve the
>>> problem.
>>>
>>> ---
>>>
>>> anon_vma_clone() is modified to return the length of the
>>> existing same_vma anon vma chain, and we create a new anon_vma
>>> in the child if it is more than five forks after the anon_vma
>>> was created, as we don't want the same_vma chain to grow
>>> arbitrarily large.
>>
>> hoo boy, what's going on here.
>>
>> - Under what circumstances are we seeing this slab windup?
>
> The original bug report is here:
>
> https://lkml.org/lkml/2012/8/15/765
>
>> - What are the consequences? Can it OOM the machine?
>
> Yes, eventually you run out of SLAB space.
>
>> - Why is this occurring? There aren't an infinite number of
>> vmas, so there shouldn't be an infinite number of anon_vmas or
>> anon_vma_chains.
>
> Because of the serial forking there does indeed end up being an
> infinite number of vmas. The initial vma can never be deleted
> (even though the initial parent process has long since terminated)
> because the initial vma is referenced by the children.
There is a finite number of VMAs, but an infite number of
anon_vmas.
Subtle, yet deadly...
>> - IOW, what has to be done to fix this properly?
>
> As far as I know, this is the best solution. I tried a
> refcounting solution based on comments by Rik van Riel:
>
> https://lkml.org/lkml/2012/8/17/536
>
> But it didn't fully work, probably because I didn't quite get the
> locking done properly. In any case, at this point questions came
> up about the overhead of the page refcounting and Michel
> Lespinasse suggested the initial version of this patch:
>
> https://lkml.org/lkml/2012/8/21/730
>
>> - What are the runtime consequences of limiting the length of the
>> chain?
>
> I can't say, but it only affects users who fork more than five
> levels deep without doing an exec. On the other hand, there are at
> least three users (Tim Hartrick, Michal Hocko, and myself) who have
> real world applications where the consequence of no patch is a
> crashed system.
>
> I would suggest reading the thread starting with my initial bug
> report for what others have had to say about this.
I suspect what Andrew is hinting at is that the
changelog for the patch should contain a detailed
description of exactly what the bug is, how it is
triggered, what the symptoms are, and how the
patch avoids it.
That way people can understand what the code does
simply by looking at the changelog - no need to go
find old linux-kernel mailing list threads.
>>> ...
>>>
>>> @@ -331,10 +334,17 @@ int anon_vma_fork(struct vm_area_struct
>>> *vma, struct vm_area_struct *pvma) * First, attach the new VMA
>>> to the parent VMA's anon_vmas, * so rmap can find non-COWed
>>> pages in child processes. */ - if (anon_vma_clone(vma, pvma)) +
>>> length = anon_vma_clone(vma, pvma); + if (length < 0) return
>>> -ENOMEM;
>>
>> This should propagate the anon_vma_clone() return val instead of
>> assuming ENOMEM. But that won't fix anything...
>
> Agreed, but the only failure return value of anon_vma_clone is
> -ENOMEM.
>
> Scanning the code in __split_vma (mm/mmap.c) it looks like the
> error return is lost (between Linux 3.11 and 3.12 the err variable
> is now used before the call to anon_vma_clone and the default
> initial value of -ENOMEM is overwritten). This is an actual bug in
> the current code.
>
> I can update the patch to fix these issues.
>
>>> + else if (length > 5) + return 0;
>>>
>>> - /* Then add our own anon_vma. */ + /* + * Then add our own
>>> anon_vma. We do this only for five forks after + * the
>>> anon_vma was created, as we don't want the same_vma chain to +
>>> * grow arbitrarily large. + */ anon_vma = anon_vma_alloc();
>
- --
All rights reversed
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
iQEcBAEBAgAGBQJUarH1AAoJEM553pKExN6DXwUH/RHNwGTYhzzwIQtbtMqnHYjE
YWriqPLIOW8yWh85hkrmTsjWIegbDnEsbgNRX0Y8ANrKgx+vWRRW/eJ/s+Z+m7UY
lD1DKO3vIfUSQvL4QHnViTEgEHfdychnhe0SE/kMeQbnLpUw8ywviJxX0UibeLdK
L/F8xMzpUj/PBkNTtPxQRevWwUEMMMY6RS8RjHNBADe9ym/Fjd0dzAkoPCYCUapT
barWfI9RMC3gYfyObFNBNYyaYyyK1FlAyBq52d/W8xCBW/5EIhEtFBGben/lAuEP
alJt+jnFq4B1tXQtJIu1YBhY4OhuqWQy5lbz7NFPxg8+cECVPd3Vq6O2Bxilz9U=
=GLaM
-----END PGP SIGNATURE-----
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists