lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sun, 13 Dec 2015 23:26:51 +0900
From:	Tetsuo Handa <penguin-kernel@...ove.SAKURA.ne.jp>
To:	hannes@...xchg.org
Cc:	mhocko@...nel.org, linux-mm@...ck.org,
	linux-kernel@...r.kernel.org, torvalds@...ux-foundation.org,
	rientjes@...gle.com, oleg@...hat.com, kwalker@...hat.com,
	cl@...ux.com, akpm@...ux-foundation.org, vdavydov@...allels.com,
	skozina@...hat.com, mgorman@...e.de, riel@...hat.com,
	arekm@...en.pl
Subject: Re: [PATCH v4] mm,oom: Add memory allocation watchdog kernel thread.

Johannes Weiner wrote:
> On Sun, Dec 13, 2015 at 12:33:04AM +0900, Tetsuo Handa wrote:
> > +Currently, when something went wrong inside memory allocation request,
> > +the system will stall with either 100% CPU usage (if memory allocating
> > +tasks are doing busy loop) or 0% CPU usage (if memory allocating tasks
> > +are waiting for file data to be flushed to storage).
> > +But /proc/sys/kernel/hung_task_warnings is not helpful because memory
> > +allocating tasks unlikely sleep in uninterruptible state for
> > +/proc/sys/kernel/hung_task_timeout_secs seconds.
> 
> Yes, this is very annoying. Other tasks in the system get dumped out
> as they are blocked for too long, but not the allocating task itself
> as it's busy looping.
> 

Off-topic, but judging from my experience at support center, people are not
utilizing hung task detector well. Since /proc/sys/kernel/hung_task_warnings
is defaulted to 10 and people are using it with default value, hung task
detector complains nothing because hung_task_warnings is likely already 0
when their systems hang up after many days/months...

> That being said, I'm not entirely sure why we need daemon to do this,
> which then requires us to duplicate allocation state to task_struct.

I thought doing this using timer interrupt (i.e. add_timer()/del_timer())
because allocating tasks can be blocked at locks (e.g. mutex_lock()) or
loops (e.g. too_many_isolated() in shrink_inactive_list()).

  [   99.793156] MemAlloc: write(3787) seq=46308 gfp=0x2400240 order=0 delay=30798 uninterruptible exiting
  [   99.795428] write           D ffff880075c974b8     0  3787   3786 0x20020086
  [   99.797381]  ffff880075c974b8 ffff880035d98000 ffff8800777995c0 ffff880075c98000
  [   99.799459]  ffff880075c974f0 ffff88007fc10240 00000000fffcf09e 0000000000000000
  [   99.801518]  ffff880075c974d0 ffffffff816f4127 ffff88007fc10240 ffff880075c97578
  [   99.803571] Call Trace:
  [   99.804605]  [<ffffffff816f4127>] schedule+0x37/0x90
  [   99.806102]  [<ffffffff816f8427>] schedule_timeout+0x117/0x1c0
  [   99.807738]  [<ffffffff810dfbc0>] ? init_timer_key+0x40/0x40
  [   99.809332]  [<ffffffff816f8554>] schedule_timeout_uninterruptible+0x24/0x30
  [   99.811199]  [<ffffffff81147eba>] __alloc_pages_nodemask+0x8ba/0xc80
  [   99.812940]  [<ffffffff8118f2c6>] alloc_pages_current+0x96/0x1b0
  [   99.814621]  [<ffffffff812e3e64>] xfs_buf_allocate_memory+0x170/0x29f
  [   99.816373]  [<ffffffff812ac204>] xfs_buf_get_map+0xe4/0x140
  [   99.817981]  [<ffffffff812ac7e9>] xfs_buf_read_map+0x29/0xd0
  [   99.819603]  [<ffffffff812d65c7>] xfs_trans_read_buf_map+0x97/0x1a0
  [   99.821326]  [<ffffffff81286b53>] xfs_btree_read_buf_block.constprop.28+0x73/0xc0
  [   99.823262]  [<ffffffff81286c1b>] xfs_btree_lookup_get_block+0x7b/0xf0
  [   99.825029]  [<ffffffff8128b15b>] xfs_btree_lookup+0xbb/0x500
  [   99.826662]  [<ffffffff8127561c>] ? xfs_allocbt_init_cursor+0x3c/0xc0
  [   99.828430]  [<ffffffff81273c3b>] xfs_free_ag_extent+0x6b/0x5f0
  [   99.830053]  [<ffffffff81274fb4>] xfs_free_extent+0xf4/0x120
  [   99.831734]  [<ffffffff812d6b31>] xfs_trans_free_extent+0x21/0x60
  [   99.833453]  [<ffffffff812a8eca>] xfs_bmap_finish+0xfa/0x120
  [   99.835087]  [<ffffffff812bda7d>] xfs_itruncate_extents+0x10d/0x190
  [   99.836812]  [<ffffffff812a9bf5>] xfs_free_eofblocks+0x1d5/0x240
  [   99.838494]  [<ffffffff812bdc9f>] xfs_release+0x8f/0x150
  [   99.840017]  [<ffffffff812af330>] xfs_file_release+0x10/0x20
  [   99.841593]  [<ffffffff811c1018>] __fput+0xb8/0x230
  [   99.843071]  [<ffffffff811c11c9>] ____fput+0x9/0x10
  [   99.844449]  [<ffffffff8108d922>] task_work_run+0x72/0xa0
  [   99.845968]  [<ffffffff81071a91>] do_exit+0x2f1/0xb50
  [   99.847406]  [<ffffffff81072377>] do_group_exit+0x47/0xc0
  [   99.848883]  [<ffffffff8107dc22>] get_signal+0x222/0x7e0
  [   99.850406]  [<ffffffff8100f362>] do_signal+0x32/0x670
  [   99.851900]  [<ffffffff8106a3c7>] ? syscall_slow_exit_work+0x4b/0x10d
  [   99.853600]  [<ffffffff811c1b9c>] ? __sb_end_write+0x1c/0x20
  [   99.855142]  [<ffffffff8106a31a>] ? exit_to_usermode_loop+0x2e/0x90
  [   99.856778]  [<ffffffff8106a338>] exit_to_usermode_loop+0x4c/0x90
  [   99.858399]  [<ffffffff810036f2>] do_syscall_32_irqs_off+0x122/0x190
  [   99.860055]  [<ffffffff816fbc38>] entry_INT80_compat+0x38/0x50
  [   99.861630] 3 locks held by write/3787:
  [   99.863151]  #0:  (sb_internal){.+.+.?}, at: [<ffffffff811c2b3c>] __sb_start_write+0xcc/0xe0
  [   99.865391]  #1:  (&(&ip->i_iolock)->mr_lock){++++++}, at: [<ffffffff812bb629>] xfs_ilock_nowait+0x59/0x140
  [   99.867910]  #2:  (&xfs_nondir_ilock_class){++++--}, at: [<ffffffff812bb4ff>] xfs_ilock+0x7f/0xe0
  [   99.871842] MemAlloc: write(3788) uninterruptible dying victim
  [   99.873491] write           D ffff8800793cbcb8     0  3788   3786 0x20120084
  [   99.875414]  ffff8800793cbcb8 ffffffff81c11500 ffff8800766b0000 ffff8800793cc000
  [   99.877443]  ffff88007a9e76b0 ffff8800766b0000 0000000000000246 00000000ffffffff
  [   99.879460]  ffff8800793cbcd0 ffffffff816f4127 ffff88007a9e76a8 ffff8800793cbce0
  [   99.881472] Call Trace:
  [   99.882543]  [<ffffffff816f4127>] schedule+0x37/0x90
  [   99.883993]  [<ffffffff816f4450>] schedule_preempt_disabled+0x10/0x20
  [   99.885726]  [<ffffffff816f51db>] mutex_lock_nested+0x17b/0x3e0
  [   99.887342]  [<ffffffff812b0b7f>] ? xfs_file_buffered_aio_write+0x5f/0x1f0
  [   99.889125]  [<ffffffff812b0b7f>] xfs_file_buffered_aio_write+0x5f/0x1f0
  [   99.890874]  [<ffffffff812b0d94>] xfs_file_write_iter+0x84/0x140
  [   99.892498]  [<ffffffff811be7b7>] __vfs_write+0xc7/0x100
  [   99.894013]  [<ffffffff811bf21d>] vfs_write+0x9d/0x190
  [   99.895482]  [<ffffffff811deb0a>] ? __fget_light+0x6a/0x90
  [   99.897020]  [<ffffffff811c0133>] SyS_write+0x53/0xd0
  [   99.898469]  [<ffffffff8100362f>] do_syscall_32_irqs_off+0x5f/0x190
  [   99.900133]  [<ffffffff816fbc38>] entry_INT80_compat+0x38/0x50
  [   99.901752] 2 locks held by write/3788:
  [   99.903061]  #0:  (sb_writers#8){.+.+.+}, at: [<ffffffff811c2b3c>] __sb_start_write+0xcc/0xe0
  [   99.905412]  #1:  (&sb->s_type->i_mutex_key#12){+.+.+.}, at: [<ffffffff812b0b7f>] xfs_file_buffered_aio_write+0x5f/0x1f0

But I realized that trying to printk() from timer interrupt generates
unreadable/corrupted dumps because there could be thousands of tasks to
report (e.g. when we entered into OOM livelock) while we don't want to do
busy loop inside timer interrupt for serializing printk().

  [  211.563810] MemAlloc-Info: 3914 stalling task, 0 dying task, 1 victim task.

Same thing would happen for warn_alloc_failed() approach when many tasks
called warn_alloc_failed() at the same time...

> There is no scenario where the allocating task is not moving at all
> anymore, right? So can't we dump the allocation state from within the
> allocator and leave the rest to the hung task detector?

I don't think we can reliably get information with hung task detector
approach.

Duplicating allocation state to task_struct allows us to keep information
about last memory allocation request. That is, we will get some hint for
understanding last-minute behavior of the kernel when we analyze vmcore
(or memory snapshot of a virtualized machine).

Besides that, duplicating allocation state to task_struct will allow OOM killer
(a task calling select_bad_process()) to check whether the candidate is stuck
(e.g. http://lkml.kernel.org/r/201505232339.DAB00557.VFFLHMSOJFOOtQ@I-love.SAKURA.ne.jp ),
compared to current situation (i.e. whether the candidate already has TIF_MEMDIE
or not).

"[PATCH] mm/oom_kill.c: don't kill TASK_UNINTERRUPTIBLE tasks" tried to judge it
using the candidate's task state but was not accepted. I already showed that it
is not difficult to defeat OOM reaper using "mmap_sem livelock case" and "least
memory consuming victim case". We will eventually need to consider timeout based
next OOM victim selection...

Even if we don't use a daemon, I think that duplicating allocation state
itself is helpful.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ