From: Naresh Kamboju <naresh.kamboju@linaro.org>
To: Michal Hocko <mhocko@kernel.org>
Cc: Chris Down <chris@chrisdown.name>,
Yafang Shao <laoar.shao@gmail.com>,
Anders Roxell <anders.roxell@linaro.org>,
"Linux F2FS DEV,
Mailing List" <linux-f2fs-devel@lists.sourceforge.net>,
linux-ext4 <linux-ext4@vger.kernel.org>,
linux-block <linux-block@vger.kernel.org>,
Andrew Morton <akpm@linux-foundation.org>,
open list <linux-kernel@vger.kernel.org>,
Linux-Next Mailing List <linux-next@vger.kernel.org>,
linux-mm <linux-mm@kvack.org>, Arnd Bergmann <arnd@arndb.de>,
Andreas Dilger <adilger.kernel@dilger.ca>,
Jaegeuk Kim <jaegeuk@kernel.org>,
"Theodore Ts'o" <tytso@mit.edu>, Chao Yu <chao@kernel.org>,
Hugh Dickins <hughd@google.com>,
Andrea Arcangeli <aarcange@redhat.com>,
Matthew Wilcox <willy@infradead.org>,
Chao Yu <yuchao0@huawei.com>,
lkft-triage@lists.linaro.org,
Johannes Weiner <hannes@cmpxchg.org>,
Roman Gushchin <guro@fb.com>, Cgroups <cgroups@vger.kernel.org>
Subject: Re: mm: mkfs.ext4 invoked oom-killer on i386 - pagecache_get_page
Date: Thu, 21 May 2020 16:11:11 +0530 [thread overview]
Message-ID: <CA+G9fYvAB9F+Xo0vUsSveKnExkv3cV9-oOG9gBqGEcXsO95m0w@mail.gmail.com> (raw)
In-Reply-To: <20200521095515.GK6462@dhcp22.suse.cz>
On Thu, 21 May 2020 at 15:25, Michal Hocko <mhocko@kernel.org> wrote:
>
> On Wed 20-05-20 20:09:06, Chris Down wrote:
> > Hi Naresh,
> >
> > Naresh Kamboju writes:
> > > As a part of investigation on this issue LKFT teammate Anders Roxell
> > > git bisected the problem and found bad commit(s) which caused this problem.
> > >
> > > The following two patches have been reverted on next-20200519 and retested the
> > > reproducible steps and confirmed the test case mkfs -t ext4 got PASS.
> > > ( invoked oom-killer is gone now)
> > >
> > > Revert "mm, memcg: avoid stale protection values when cgroup is above
> > > protection"
> > > This reverts commit 23a53e1c02006120f89383270d46cbd040a70bc6.
> > >
> > > Revert "mm, memcg: decouple e{low,min} state mutations from protection
> > > checks"
> > > This reverts commit 7b88906ab7399b58bb088c28befe50bcce076d82.
> >
> > Thanks Anders and Naresh for tracking this down and reverting.
> >
> > I'll take a look tomorrow. I don't see anything immediately obviously wrong
> > in either of those commits from a (very) cursory glance, but they should
> > only be taking effect if protections are set.
>
> Agreed. If memory.{low,min} is not used then the patch should be
> effectively a nop. Btw. do you see the problem when booting with
> cgroup_disable=memory kernel command line parameter?
With extra kernel command line parameters, cgroup_disable=memory
I have noticed a differ problem now.
+ mkfs -t ext4 /dev/disk/by-id/ata-TOSHIBA_MG04ACA100N_Y8NRK0BPF6XF
mke2fs 1.43.8 (1-Jan-2018)
Creating filesystem with 244190646 4k blocks and 61054976 inodes
Filesystem UUID: 3bb1a285-2cb4-44b4-b6e8-62548f3ac620
Superblock backups stored on blocks:
32768, 98304, 163840, 229376, 294912, 819200, 884736, 1605632, 2654208,
4096000, 7962624, 11239424, 20480000, 23887872, 71663616, 78675968,
102400000, 214990848
Allocating group tables: 0/7453 done
Writing inode tables: 0/7453 done
Creating journal (262144 blocks): [ 35.502102] BUG: kernel NULL
pointer dereference, address: 000000c8
[ 35.508372] #PF: supervisor read access in kernel mode
[ 35.513506] #PF: error_code(0x0000) - not-present page
[ 35.518638] *pde = 00000000
[ 35.521514] Oops: 0000 [#1] SMP
[ 35.524652] CPU: 0 PID: 145 Comm: kswapd0 Not tainted
5.7.0-rc6-next-20200519+ #1
[ 35.532121] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS
2.2 05/23/2018
[ 35.539507] EIP: mem_cgroup_get_nr_swap_pages+0x28/0x60
[ 35.544724] Code: 00 00 80 3d 84 b5 e1 cb 00 89 c2 a1 9c a5 f5 cb
75 48 55 89 e5 57 56 53 3e 8d 74 26 00 8b 1d 88 b5 e1 cb 31 f6 eb 27
8d 76 00 <8b> 8a c8 00 00 00 8b ba bc 00 00 00 29 f9 39 c8 0f 4f c1 8b
8a 98
[ 35.563461] EAX: 00000000 EBX: f5411000 ECX: 00000000 EDX: 00000000
[ 35.569718] ESI: 00000000 EDI: f4e13ea8 EBP: f4e13e10 ESP: f4e13e04
[ 35.575976] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010207
[ 35.582751] CR0: 80050033 CR2: 000000c8 CR3: 0bef4000 CR4: 003406d0
[ 35.589010] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 35.595266] DR6: fffe0ff0 DR7: 00000400
[ 35.599096] Call Trace:
[ 35.601544] shrink_lruvec+0x447/0x630
[ 35.605294] ? newidle_balance.isra.100+0x8e/0x3f0
[ 35.610080] ? pick_next_task_fair+0x3a/0x320
[ 35.614437] ? deactivate_task+0xcf/0x100
[ 35.618442] ? put_prev_entity+0x1a/0xd0
[ 35.622359] ? deactivate_task+0xcf/0x100
[ 35.626363] shrink_node+0x1be/0x640
[ 35.629932] ? shrink_node+0x1be/0x640
[ 35.633676] kswapd+0x32c/0x890
[ 35.636815] ? deactivate_task+0xcf/0x100
[ 35.640820] kthread+0xf1/0x110
[ 35.643963] ? do_try_to_free_pages+0x3b0/0x3b0
[ 35.648489] ? kthread_park+0xa0/0xa0
[ 35.652147] ret_from_fork+0x1c/0x28
[ 35.655726] Modules linked in: x86_pkg_temp_thermal
[ 35.660605] CR2: 00000000000000c8
[ 35.663916] ---[ end trace d85b8564ea55fb0d ]---
[ 35.663917] BUG: kernel NULL pointer dereference, address: 000000c8
[ 35.663918] #PF: supervisor read access in kernel mode
[ 35.668534] EIP: mem_cgroup_get_nr_swap_pages+0x28/0x60
[ 35.674792] #PF: error_code(0x0000) - not-present page
[ 35.674792] *pde = 00000000
[ 35.679921] Code: 00 00 80 3d 84 b5 e1 cb 00 89 c2 a1 9c a5 f5 cb
75 48 55 89 e5 57 56 53 3e 8d 74 26 00 8b 1d 88 b5 e1 cb 31 f6 eb 27
8d 76 00 <8b> 8a c8 00 00 00 8b ba bc 00 00 00 29 f9 39 c8 0f 4f c1 8b
8a 98
[ 35.685140] Oops: 0000 [#2] SMP
[ 35.685142] CPU: 2 PID: 391 Comm: mkfs.ext4 Tainted: G D
5.7.0-rc6-next-20200519+ #1
[ 35.690278] EAX: 00000000 EBX: f5411000 ECX: 00000000 EDX: 00000000
[ 35.690279] ESI: 00000000 EDI: f4e13ea8 EBP: f4e13e10 ESP: f4e13e04
[ 35.693155] Hardware name: Supermicro SYS-5019S-ML/X11SSH-F, BIOS
2.2 05/23/2018
[ 35.693158] EIP: mem_cgroup_get_nr_swap_pages+0x28/0x60
[ 35.711893] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010207
[ 35.711894] CR0: 80050033 CR2: 000000c8 CR3: 0bef4000 CR4: 003406d0
[ 35.715031] Code: 00 00 80 3d 84 b5 e1 cb 00 89 c2 a1 9c a5 f5 cb
75 48 55 89 e5 57 56 53 3e 8d 74 26 00 8b 1d 88 b5 e1 cb 31 f6 eb 27
8d 76 00 <8b> 8a c8 00 00 00 8b ba bc 00 00 00 29 f9 39 c8 0f 4f c1 8b
8a 98
[ 35.724061] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 35.730317] EAX: 00000000 EBX: f5411000 ECX: 00000000 EDX: 00000000
[ 35.730318] ESI: 00000000 EDI: f2d73c14 EBP: f2d73b78 ESP: f2d73b6c
[ 35.736576] DR6: fffe0ff0 DR7: 00000400
[ 35.803603] DS: 007b ES: 007b FS: 00d8 GS: 00e0 SS: 0068 EFLAGS: 00010207
[ 35.810380] CR0: 80050033 CR2: 000000c8 CR3: 33241000 CR4: 003406d0
[ 35.816636] DR0: 00000000 DR1: 00000000 DR2: 00000000 DR3: 00000000
[ 35.822893] DR6: fffe0ff0 DR7: 00000400
[ 35.826725] Call Trace:
[ 35.829171] shrink_lruvec+0x447/0x630
[ 35.832921] ? check_preempt_curr+0x75/0x80
[ 35.837100] shrink_node+0x1be/0x640
[ 35.840670] ? shrink_node+0x1be/0x640
[ 35.844412] do_try_to_free_pages+0xc1/0x3b0
[ 35.848677] try_to_free_pages+0xba/0x1d0
[ 35.852683] __alloc_pages_nodemask+0x573/0xe90
[ 35.857232] ? set_bh_page+0x33/0x50
[ 35.860829] ? xas_load+0xf/0x70
[ 35.864050] ? __xa_set_mark+0x4d/0x70
[ 35.867795] ? find_get_entry+0x47/0x110
[ 35.871714] pagecache_get_page+0xbe/0x250
[ 35.875805] grab_cache_page_write_begin+0x1a/0x30
[ 35.880588] block_write_begin+0x25/0x90
[ 35.884504] blkdev_write_begin+0x1e/0x20
[ 35.888507] ? bdev_evict_inode+0xc0/0xc0
[ 35.892513] generic_perform_write+0x95/0x190
[ 35.896863] __generic_file_write_iter+0xe0/0x1a0
[ 35.901562] blkdev_write_iter+0xbf/0x1c0
[ 35.905564] __vfs_write+0x122/0x1e0
[ 35.909136] vfs_write+0x8f/0x1b0
[ 35.912454] ksys_pwrite64+0x60/0x80
[ 35.916024] __ia32_sys_ia32_pwrite64+0x16/0x20
[ 35.920549] do_fast_syscall_32+0x66/0x240
[ 35.924641] entry_SYSENTER_32+0xa5/0xf8
[ 35.928567] EIP: 0xb7f72549
[ 35.931357] Code: 03 74 c0 01 10 05 03 74 b8 01 10 06 03 74 b4 01
10 07 03 74 b0 01 10 08 03 74 d8 01 00 00 00 00 00 51 52 55 89 e5 0f
34 cd 80 <5d> 5a 59 c3 90 90 90 90 8d 76 00 58 b8 77 00 00 00 cd 80 90
8d 76
[ 35.950093] EAX: ffffffda EBX: 00000003 ECX: b7866010 EDX: 00400000
[ 35.956351] ESI: 39000000 EDI: 00000074 EBP: 07439000 ESP: bf973700
[ 35.962607] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 007b EFLAGS: 00000246
[ 35.969384] Modules linked in: x86_pkg_temp_thermal
[ 35.974269] CR2: 00000000000000c8
[ 35.977582] ---[ end trace d85b8564ea55fb0e ]---
[ 35.977583] BUG: kernel NULL pointer dereference, address: 000000c8
[ 35.977584] #PF: supervisor read access in kernel mode
[ 35.982193] EIP: mem_cgroup_get_nr_swap_pages+0x28/0x60
[ 35.982195] Code: 00 00 80 3d 84 b5 e1 cb 00 89 c2 a1 9c a5 f5 cb
75 48 55 89 e5 57 56 53 3e 8d 74 26 00 8b 1d 88 b5 e1 cb 31 f6 eb 27
8d 76 00 <8b> 8a c8 00 00 00 8b ba bc 00 00 00 29 f9 39 c8 0f 4f c1 8b
8a 98
[ 35.988450] #PF: error_code(0x0000) - not-present page
[ 35.988451] *pde = 00000000
full test log link,
https://lkft.validation.linaro.org/scheduler/job/1443939#L1170
- Naresh
next prev parent reply other threads:[~2020-05-21 10:41 UTC|newest]
Thread overview: 50+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-05-01 12:38 Naresh Kamboju
2020-05-01 20:58 ` Andrew Morton
2020-05-18 14:10 ` Naresh Kamboju
2020-05-19 7:52 ` Michal Hocko
2020-05-19 8:11 ` Arnd Bergmann
2020-05-19 8:45 ` Michal Hocko
2020-05-20 11:56 ` Naresh Kamboju
2020-05-20 17:59 ` Naresh Kamboju
2020-05-20 19:09 ` Chris Down
2020-05-21 9:22 ` Naresh Kamboju
2020-05-21 9:35 ` Arnd Bergmann
2020-05-21 9:55 ` Michal Hocko
2020-05-21 10:41 ` Naresh Kamboju [this message]
2020-05-21 10:58 ` Michal Hocko
2020-05-21 12:24 ` Hugh Dickins
2020-05-21 12:44 ` Michal Hocko
2020-05-21 19:17 ` Johannes Weiner
2020-05-21 20:06 ` Hugh Dickins
2020-05-21 21:58 ` Johannes Weiner
2020-05-21 23:35 ` Hugh Dickins
2020-05-28 14:59 ` Michal Hocko
2020-05-21 16:34 ` Michal Hocko
2020-05-21 19:00 ` Naresh Kamboju
2020-05-21 20:53 ` Naresh Kamboju
2020-05-28 15:03 ` Michal Hocko
2020-05-28 16:17 ` Naresh Kamboju
2020-05-28 16:41 ` Chris Down
2020-05-29 1:50 ` Yafang Shao
2020-05-29 1:56 ` Chris Down
2020-05-29 9:49 ` Michal Hocko
2020-06-11 9:55 ` Michal Hocko
2020-06-12 9:43 ` Naresh Kamboju
2020-06-12 12:09 ` Michal Hocko
2020-06-17 13:37 ` Naresh Kamboju
2020-06-17 13:57 ` Chris Down
2020-06-17 14:11 ` Michal Hocko
2020-06-17 15:53 ` Naresh Kamboju
2020-06-17 16:06 ` Michal Hocko
2020-06-17 20:13 ` Naresh Kamboju
2020-06-17 21:09 ` Chris Down
2020-06-18 1:43 ` Yafang Shao
2020-06-18 12:37 ` Chris Down
2020-06-18 12:41 ` Michal Hocko
2020-06-18 12:49 ` Chris Down
2020-06-18 14:59 ` Yafang Shao
2020-06-17 13:59 ` Michal Hocko
2020-06-17 14:08 ` Chris Down
2020-05-21 2:39 ` Yafang Shao
2020-05-21 8:58 ` Naresh Kamboju
2020-05-21 9:47 ` Yafang Shao
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CA+G9fYvAB9F+Xo0vUsSveKnExkv3cV9-oOG9gBqGEcXsO95m0w@mail.gmail.com \
--to=naresh.kamboju@linaro.org \
--cc=aarcange@redhat.com \
--cc=adilger.kernel@dilger.ca \
--cc=akpm@linux-foundation.org \
--cc=anders.roxell@linaro.org \
--cc=arnd@arndb.de \
--cc=cgroups@vger.kernel.org \
--cc=chao@kernel.org \
--cc=chris@chrisdown.name \
--cc=guro@fb.com \
--cc=hannes@cmpxchg.org \
--cc=hughd@google.com \
--cc=jaegeuk@kernel.org \
--cc=laoar.shao@gmail.com \
--cc=linux-block@vger.kernel.org \
--cc=linux-ext4@vger.kernel.org \
--cc=linux-f2fs-devel@lists.sourceforge.net \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=linux-next@vger.kernel.org \
--cc=lkft-triage@lists.linaro.org \
--cc=mhocko@kernel.org \
--cc=tytso@mit.edu \
--cc=willy@infradead.org \
--cc=yuchao0@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox