From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-vk0-f71.google.com (mail-vk0-f71.google.com [209.85.213.71]) by kanga.kvack.org (Postfix) with ESMTP id D70A26B0264 for ; Fri, 29 Jul 2016 15:47:58 -0400 (EDT) Received: by mail-vk0-f71.google.com with SMTP id s189so129003838vkh.0 for ; Fri, 29 Jul 2016 12:47:58 -0700 (PDT) Received: from mail-ua0-x22a.google.com (mail-ua0-x22a.google.com. [2607:f8b0:400c:c08::22a]) by mx.google.com with ESMTPS id i7si5085043uad.81.2016.07.29.12.47.58 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 29 Jul 2016 12:47:58 -0700 (PDT) Received: by mail-ua0-x22a.google.com with SMTP id l32so68982845ual.2 for ; Fri, 29 Jul 2016 12:47:58 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <20160729030146.GA31867@js1304-P5Q-DELUXE> References: <5799AF6A.2070507@huawei.com> <20160728072028.GC31860@dhcp22.suse.cz> <5799B741.8090506@huawei.com> <20160728075856.GE31860@dhcp22.suse.cz> <5799C612.1050502@huawei.com> <20160728094327.GB1000@dhcp22.suse.cz> <5799E394.4060200@huawei.com> <20160729030146.GA31867@js1304-P5Q-DELUXE> From: Andy Lutomirski Date: Fri, 29 Jul 2016 12:47:38 -0700 Message-ID: Subject: Re: [RFC] can we use vmalloc to alloc thread stack if compaction failed Content-Type: text/plain; charset=UTF-8 Sender: owner-linux-mm@kvack.org List-ID: To: Joonsoo Kim Cc: Andy Lutomirski , Xishi Qiu , Michal Hocko , Tejun Heo , Ingo Molnar , Peter Zijlstra , LKML , Linux MM , Yisheng Xie ---------- Forwarded message ---------- From: "Joonsoo Kim" Date: Jul 28, 2016 7:57 PM Subject: Re: [RFC] can we use vmalloc to alloc thread stack if compaction failed To: "Andy Lutomirski" Cc: "Xishi Qiu" , "Michal Hocko" , "Tejun Heo" , "Ingo Molnar" , "Peter Zijlstra" , "LKML" , "Linux MM" , "Yisheng Xie" > On Thu, Jul 28, 2016 at 08:07:51AM -0700, Andy Lutomirski wrote: > > On Thu, Jul 28, 2016 at 3:51 AM, Xishi Qiu wrote: > > > On 2016/7/28 17:43, Michal Hocko wrote: > > > > > >> On Thu 28-07-16 16:45:06, Xishi Qiu wrote: > > >>> On 2016/7/28 15:58, Michal Hocko wrote: > > >>> > > >>>> On Thu 28-07-16 15:41:53, Xishi Qiu wrote: > > >>>>> On 2016/7/28 15:20, Michal Hocko wrote: > > >>>>> > > >>>>>> On Thu 28-07-16 15:08:26, Xishi Qiu wrote: > > >>>>>>> Usually THREAD_SIZE_ORDER is 2, it means we need to alloc 16kb continuous > > >>>>>>> physical memory during fork a new process. > > >>>>>>> > > >>>>>>> If the system's memory is very small, especially the smart phone, maybe there > > >>>>>>> is only 1G memory. So the free memory is very small and compaction is not > > >>>>>>> always success in slowpath(__alloc_pages_slowpath), then alloc thread stack > > >>>>>>> may be failed for memory fragment. > > >>>>>> > > >>>>>> Well, with the current implementation of the page allocator those > > >>>>>> requests will not fail in most cases. The oom killer would be invoked in > > >>>>>> order to free up some memory. > > >>>>>> > > >>>>> > > >>>>> Hi Michal, > > >>>>> > > >>>>> Yes, it success in most cases, but I did have seen this problem in some > > >>>>> stress-test. > > >>>>> > > >>>>> DMA free:470628kB, but alloc 2 order block failed during fork a new process. > > >>>>> There are so many memory fragments and the large block may be soon taken by > > >>>>> others after compact because of stress-test. > > >>>>> > > >>>>> --- dmesg messages --- > > >>>>> 07-13 08:41:51.341 <4>[309805.658142s][pid:1361,cpu5,sManagerService]sManagerService: page allocation failure: order:2, mode:0x2000d1 > > >>>> > > >>>> Yes but this is __GFP_DMA allocation. I guess you have already reported > > >>>> this failure and you've been told that this is quite unexpected for the > > >>>> kernel stack allocation. It is your out-of-tree patch which just makes > > >>>> things worse because DMA restricted allocations are considered "lowmem" > > >>>> and so they do not invoke OOM killer and do not retry like regular > > >>>> GFP_KERNEL allocations. > > >>> > > >>> Hi Michal, > > >>> > > >>> Yes, we add GFP_DMA, but I don't think this is the key for the problem. > > >> > > >> You are restricting the allocation request to a single zone which is > > >> definitely not good. Look at how many larger order pages are available > > >> in the Normal zone. > > >> > > >>> If we do oom-killer, maybe we will get a large block later, but there > > >>> is enough free memory before oom(although most of them are fragments). > > >> > > >> Killing a task is of course the last resort action. It would give you > > >> larger order blocks used for the victims thread. > > >> > > >>> I wonder if we can alloc success without kill any process in this situation. > > >> > > >> Sure it would be preferable to compact that memory but that might be > > >> hard with your restriction in place. Consider that DMA zone would tend > > >> to be less movable than normal zones as users would have to pin it for > > >> DMA. Your DMA is really large so this might turn out to just happen to > > >> work but note that the primary problem here is that you put a zone > > >> restriction for your allocations. > > >> > > >>> Maybe use vmalloc is a good way, but I don't know the influence. > > >> > > >> You can have a look at vmalloc patches posted by Andy. They are not that > > >> trivial. > > >> > > > > > > Hi Michal, > > > > > > Thank you for your comment, could you give me the link? > > > > > > > I've been keeping it mostly up to date in this branch: > > > > https://git.kernel.org/cgit/linux/kernel/git/luto/linux.git/log/?h=x86/vmap_stack > > > > It's currently out of sync due to a bunch of the patches being queued > > elsewhere for the merge window. > > Hello, Andy. > > I have some questions about it. > > IIUC, to turn on HAVE_ARCH_VMAP_STACK on different architecture, there > is nothing to be done in architecture side if the architecture doesn't > support lazily faults in top-level paging entries for the vmalloc > area. Is my understanding is correct? > There should be nothing fundamental that needs to be done. On the other hand, it might be good to make sure the arch code can print a clean stack trace on stack overflow. If it's helpful, I just pushed out anew > And, I'd like to know how you search problematic places using kernel > stack for DMA. > I did some searching for problematic sg_init_buf calls using Coccinelle. I'm not very good at Coccinelle, so I may have missed something. For the most part, DMA API debugging should have found the problems already. The ones I found were in drivers that didn't do real DMA: crypto users and virtio. > One note is that, stack overflow happens at the previous page of the > stack end position if stack grows down, but, guard page is placed at > the next page of the stack begin position. So, this stack overflow > detection depends on the fact that previous vmalloc-ed area is allocated > without VM_NO_GUARD. There isn't many users for this flag so there > would be no problem but just note. Yes, and that's a known weakness. It would be nice to improve it. --Andy -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org