From patchwork Tue Oct 5 13:52:40 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vasily Averin X-Patchwork-Id: 12536709 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D5D8AC4332F for ; Tue, 5 Oct 2021 13:52:45 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 555886023D for ; Tue, 5 Oct 2021 13:52:45 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 555886023D Authentication-Results: mail.kernel.org; dmarc=fail (p=quarantine dis=none) header.from=virtuozzo.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id EF735940007; Tue, 5 Oct 2021 09:52:44 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id EA6186B0071; Tue, 5 Oct 2021 09:52:44 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id D7014940007; Tue, 5 Oct 2021 09:52:44 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0148.hostedemail.com [216.40.44.148]) by kanga.kvack.org (Postfix) with ESMTP id C84436B006C for ; Tue, 5 Oct 2021 09:52:44 -0400 (EDT) Received: from smtpin11.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay02.hostedemail.com (Postfix) with ESMTP id 7F63D2C5BD for ; Tue, 5 Oct 2021 13:52:44 +0000 (UTC) X-FDA: 78662524248.11.5BA16B8 Received: from relay.sw.ru (relay.sw.ru [185.231.240.75]) by imf14.hostedemail.com (Postfix) with ESMTP id 3AA276002BAF for ; Tue, 5 Oct 2021 13:52:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Date:Message-ID:Subject :From; bh=wDI2KAde98v08hZLs6870emZXeENggnRAUE1+E9iwPs=; b=oe9Kw+Jm7+nbWFTV/Mq f4d5MqyA4aoEKGe4haLjvSTVgBY5nmczJxUHvbdrhMOPYTZI26Ez+l+IEUw0f2RoKpUIFqrnSdWjN b1hryhqynKHFg0wMWtCGJYS2T/TUUGi9X2qQwEowdyg8ogYZJAPcVQdAYmZSTLnKnjTaLsdCpv4=; Received: from [10.93.0.56] by relay.sw.ru with esmtp (Exim 4.94.2) (envelope-from ) id 1mXks4-0054Uo-N0; Tue, 05 Oct 2021 16:52:40 +0300 From: Vasily Averin Subject: [PATCH mm v2] vmalloc: back off when the current task is OOM-killed To: Michal Hocko Cc: Johannes Weiner , Vladimir Davydov , Andrew Morton , Tetsuo Handa , cgroups@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel@openvz.org References: Message-ID: <83efc664-3a65-2adb-d7c4-2885784cf109@virtuozzo.com> Date: Tue, 5 Oct 2021 16:52:40 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.13.0 MIME-Version: 1.0 In-Reply-To: Content-Language: en-US Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=virtuozzo.com header.s=relay header.b=oe9Kw+Jm; spf=pass (imf14.hostedemail.com: domain of vvs@virtuozzo.com designates 185.231.240.75 as permitted sender) smtp.mailfrom=vvs@virtuozzo.com; dmarc=pass (policy=quarantine) header.from=virtuozzo.com X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: 3AA276002BAF X-Stat-Signature: xw38i7jixz37dmayietpg1narbosn8hg X-HE-Tag: 1633441964-169441 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Huge vmalloc allocation on heavy loaded node can lead to a global memory shortage. Task called vmalloc can have worst badness and be selected by OOM-killer, however taken fatal signal does not interrupt allocation cycle. Vmalloc repeat page allocaions again and again, exacerbating the crisis and consuming the memory freed up by another killed tasks. After a successful completion of the allocation procedure, a fatal signal will be processed and task will be destroyed finally. However it may not release the consumed memory, since the allocated object may have a lifetime unrelated to the completed task. In the worst case, this can lead to the host will panic due to "Out of memory and no killable processes..." This patch allows OOM-killer to break vmalloc cycle, makes OOM more effective and avoid host panic. It does not check oom condition directly, however, and breaks page allocation cycle when fatal signal was received. This may trigger some hidden problems, when caller does not handle vmalloc failures, or when rollaback after failed vmalloc calls own vmallocs inside. However all of these scenarios are incorrect: vmalloc does not guarantee successful allocation, it has never been called with __GFP_NOFAIL and threfore either should not be used for any rollbacks or should handle such errors correctly and not lead to critical failures. Signed-off-by: Vasily Averin Acked-by: Michal Hocko --- v2: tsk_is_oom_victim() check replaced by fatal_signal_pending(current), removed check inside __alloc_pages_bulk(), according to feedback from mhocko@. Updated patch description. --- mm/vmalloc.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/mm/vmalloc.c b/mm/vmalloc.c index d77830ff604c..71706f5447f0 100644 --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -2860,6 +2860,9 @@ vm_area_alloc_pages(gfp_t gfp, int nid, struct page *page; int i; + if (fatal_signal_pending(current)) + break; + page = alloc_pages_node(nid, gfp, order); if (unlikely(!page)) break;