lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240111192807.GA424308@cmpxchg.org>
Date: Thu, 11 Jan 2024 14:28:07 -0500
From: Johannes Weiner <hannes@...xchg.org>
To: Roman Gushchin <roman.gushchin@...ux.dev>
Cc: Andrew Morton <akpm@...ux-foundation.org>,
	Michal Hocko <mhocko@...nel.org>,
	Shakeel Butt <shakeelb@...gle.com>,
	Muchun Song <muchun.song@...ux.dev>, Tejun Heo <tj@...nel.org>,
	Dan Schatzberg <schatzberg.dan@...il.com>, cgroups@...r.kernel.org,
	linux-mm@...ck.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH] mm: memcontrol: don't throttle dying tasks on memory.high

On Thu, Jan 11, 2024 at 09:59:11AM -0800, Roman Gushchin wrote:
> On Thu, Jan 11, 2024 at 08:29:02AM -0500, Johannes Weiner wrote:
> > While investigating hosts with high cgroup memory pressures, Tejun
> > found culprit zombie tasks that had were holding on to a lot of
> > memory, had SIGKILL pending, but were stuck in memory.high reclaim.
> > 
> > In the past, we used to always force-charge allocations from tasks
> > that were exiting in order to accelerate them dying and freeing up
> > their rss. This changed for memory.max in a4ebf1b6ca1e ("memcg:
> > prohibit unconditional exceeding the limit of dying tasks"); it noted
> > that this can cause (userspace inducable) containment failures, so it
> > added a mandatory reclaim and OOM kill cycle before forcing charges.
> > At the time, memory.high enforcement was handled in the userspace
> > return path, which isn't reached by dying tasks, and so memory.high
> > was still never enforced by dying tasks.
> > 
> > When c9afe31ec443 ("memcg: synchronously enforce memory.high for large
> > overcharges") added synchronous reclaim for memory.high, it added
> > unconditional memory.high enforcement for dying tasks as well. The
> > callstack shows that this path is where the zombie is stuck in.
> > 
> > We need to accelerate dying tasks getting past memory.high, but we
> > cannot do it quite the same way as we do for memory.max: memory.max is
> > enforced strictly, and tasks aren't allowed to move past it without
> > FIRST reclaiming and OOM killing if necessary. This ensures very small
> > levels of excess. With memory.high, though, enforcement happens lazily
> > after the charge, and OOM killing is never triggered. A lot of
> > concurrent threads could have pushed, or could actively be pushing,
> > the cgroup into excess. The dying task will enter reclaim on every
> > allocation attempt, with little hope of restoring balance.
> > 
> > To fix this, skip synchronous memory.high enforcement on dying tasks
> > altogether again. Update memory.high path documentation while at it.
> 
> It makes total sense to me.
> Acked-by: Roman Gushchin <roman.gushchin@...ux.dev>

Thanks

> However if tasks can stuck for a long time in the "high reclaim" state,
> shouldn't we also handle the case when tasks are being killed during the
> reclaim? E. g. something like this (completely untested):

Yes, that's probably a good idea.

> diff --git a/mm/memcontrol.c b/mm/memcontrol.c
> index c4c422c81f93..9f971fc6aae8 100644
> --- a/mm/memcontrol.c
> +++ b/mm/memcontrol.c
> @@ -2465,6 +2465,9 @@ static unsigned long reclaim_high(struct mem_cgroup *memcg,
>                     READ_ONCE(memcg->memory.high))
>                         continue;
> 
> +               if (task_is_dying())
> +                       break;
> +
>                 memcg_memory_event(memcg, MEMCG_HIGH);
> 
>                 psi_memstall_enter(&pflags);

I think we can skip this one. The loop is for traversing from the
charging cgroup to the one that has memory.high set and breached, and
then reclaim it. It's not expected to run multiple reclaims.

> @@ -2645,6 +2648,9 @@ void mem_cgroup_handle_over_high(gfp_t gfp_mask)
>         current->memcg_nr_pages_over_high = 0;
> 
>  retry_reclaim:
> +       if (task_is_dying())
> +               return;
> +
>         /*
>          * The allocating task should reclaim at least the batch size, but for
>          * subsequent retries we only want to do what's necessary to prevent oom

Yeah this is the better place for this check.

How about this?

---

>From 6124a13cb073f5ff06b9c1309505bc937d65d6e5 Mon Sep 17 00:00:00 2001
From: Johannes Weiner <hannes@...xchg.org>
Date: Thu, 11 Jan 2024 07:18:47 -0500
Subject: [PATCH] mm: memcontrol: don't throttle dying tasks on memory.high

While investigating hosts with high cgroup memory pressures, Tejun
found culprit zombie tasks that had were holding on to a lot of
memory, had SIGKILL pending, but were stuck in memory.high reclaim.

In the past, we used to always force-charge allocations from tasks
that were exiting in order to accelerate them dying and freeing up
their rss. This changed for memory.max in a4ebf1b6ca1e ("memcg:
prohibit unconditional exceeding the limit of dying tasks"); it noted
that this can cause (userspace inducable) containment failures, so it
added a mandatory reclaim and OOM kill cycle before forcing charges.
At the time, memory.high enforcement was handled in the userspace
return path, which isn't reached by dying tasks, and so memory.high
was still never enforced by dying tasks.

When c9afe31ec443 ("memcg: synchronously enforce memory.high for large
overcharges") added synchronous reclaim for memory.high, it added
unconditional memory.high enforcement for dying tasks as well. The
callstack shows that this path is where the zombie is stuck in.

We need to accelerate dying tasks getting past memory.high, but we
cannot do it quite the same way as we do for memory.max: memory.max is
enforced strictly, and tasks aren't allowed to move past it without
FIRST reclaiming and OOM killing if necessary. This ensures very small
levels of excess. With memory.high, though, enforcement happens lazily
after the charge, and OOM killing is never triggered. A lot of
concurrent threads could have pushed, or could actively be pushing,
the cgroup into excess. The dying task will enter reclaim on every
allocation attempt, with little hope of restoring balance.

To fix this, skip synchronous memory.high enforcement on dying tasks
altogether again. Update memory.high path documentation while at it.

Fixes: c9afe31ec443 ("memcg: synchronously enforce memory.high for large overcharges")
Reported-by: Tejun Heo <tj@...nel.org>
Signed-off-by: Johannes Weiner <hannes@...xchg.org>
---
 mm/memcontrol.c | 29 +++++++++++++++++++++++++----
 1 file changed, 25 insertions(+), 4 deletions(-)

diff --git a/mm/memcontrol.c b/mm/memcontrol.c
index 73692cd8c142..7be7a2f4e536 100644
--- a/mm/memcontrol.c
+++ b/mm/memcontrol.c
@@ -2603,8 +2603,9 @@ static unsigned long calculate_high_delay(struct mem_cgroup *memcg,
 }
 
 /*
- * Scheduled by try_charge() to be executed from the userland return path
- * and reclaims memory over the high limit.
+ * Reclaims memory over the high limit. Called directly from
+ * try_charge() (context permitting), as well as from the userland
+ * return path where reclaim is always able to block.
  */
 void mem_cgroup_handle_over_high(gfp_t gfp_mask)
 {
@@ -2623,6 +2624,17 @@ void mem_cgroup_handle_over_high(gfp_t gfp_mask)
 	current->memcg_nr_pages_over_high = 0;
 
 retry_reclaim:
+	/*
+	 * Bail if the task is already exiting. Unlike memory.max,
+	 * memory.high enforcement isn't as strict, and there is no
+	 * OOM killer involved, which means the excess could already
+	 * be much bigger (and still growing) than it could for
+	 * memory.max; the dying task could get stuck in fruitless
+	 * reclaim for a long time, which isn't desirable.
+	 */
+	if (task_is_dying())
+		goto out;
+
 	/*
 	 * The allocating task should reclaim at least the batch size, but for
 	 * subsequent retries we only want to do what's necessary to prevent oom
@@ -2673,6 +2685,9 @@ void mem_cgroup_handle_over_high(gfp_t gfp_mask)
 	}
 
 	/*
+	 * Reclaim didn't manage to push usage below the limit, slow
+	 * this allocating task down.
+	 *
 	 * If we exit early, we're guaranteed to die (since
 	 * schedule_timeout_killable sets TASK_KILLABLE). This means we don't
 	 * need to account for any ill-begotten jiffies to pay them off later.
@@ -2867,11 +2882,17 @@ static int try_charge_memcg(struct mem_cgroup *memcg, gfp_t gfp_mask,
 		}
 	} while ((memcg = parent_mem_cgroup(memcg)));
 
+	/*
+	 * Reclaim is set up above to be called from the userland
+	 * return path. But also attempt synchronous reclaim to avoid
+	 * excessive overrun while the task is still inside the
+	 * kernel. If this is successful, the return path will see it
+	 * when it rechecks the overage and simply bail out.
+	 */
 	if (current->memcg_nr_pages_over_high > MEMCG_CHARGE_BATCH &&
 	    !(current->flags & PF_MEMALLOC) &&
-	    gfpflags_allow_blocking(gfp_mask)) {
+	    gfpflags_allow_blocking(gfp_mask))
 		mem_cgroup_handle_over_high(gfp_mask);
-	}
 	return 0;
 }
 
-- 
2.43.0


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ