[mm-unstable,v3,3/3] mm: replace VM_WARN_ON to pr_warn if the node is offline with __GFP_THISNODE
Message ID | 20221108184357.55614-3-shy828301@gmail.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:6687:0:0:0:0:0 with SMTP id l7csp2886606wru; Tue, 8 Nov 2022 10:48:05 -0800 (PST) X-Google-Smtp-Source: AMsMyM5M5OglyoOQwJq1cTcmp4u9vwd/8hDZsHIAg2ihSYOovpfSejmDI3Rp/rNVP/fAcusNnLY7 X-Received: by 2002:a05:6a00:1947:b0:565:c337:c53b with SMTP id s7-20020a056a00194700b00565c337c53bmr57571283pfk.10.1667933285103; Tue, 08 Nov 2022 10:48:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1667933285; cv=none; d=google.com; s=arc-20160816; b=R2vCcTMKNkQZoSXiRA/qqyw80R768ZjdSSbHBnm/2zyDMCVA4He9qVoALHYzbyNSE+ CjKRFouWYFV7SFHyfis3o1JYwxdcKFMgSY4r8k8Vsk58XRs/19vjXSd9JUKxLqV1gsp0 jPJdCzCYoeCj2BNciEf/eRr2zPzm1MtV9USxtIjsj6XQ4eIySKDiZVbc7l2l8+5jqnMZ PrY/ZFd3aK3Dz4tK7fYx8CziMZY/ZgxihBeV+fyHqIF7lxyQ8CJYg9JUUPyYbIwDPWoI rz6INQtuX3v/NtCHPj6Tmz6c1R++YBzO+mloqFKmCUjHQU9vCotqcck5dwg/vO5Wpo1S gPaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=BLlH60L5DB/ktOFiwnGrQ8aIIlSEZ8HnuFFJi5Cg/+Y=; b=DlaKFmsGF87AERs4BdbwwePmGTwXDXQGl30WDEa4AqMB2cBj+HfCTj2UFnrjSL/OjR KvtR4HMD/HonZfNFGNxOwxVunDnKk0WYojNptA61C2dKX9Sn4ytrAzfUDAEmT5MGRU8Y w38u1A/I1tx3UaSoNPoJsenrwUWSILPwSNfm7kJ+J71QUCrgSTvV+ecPROnM8quddZaV oGZfOjreoQl+geXtwmNl5QczuFeGjKw3cGWEyWNMO4Yh6k2thj8fc4Gm0gwY2w3oFWq2 Z+a/YH5Qvm1LPfW2h/FwEjsXRnXUnEdgX7w6YxwbJ+OUzniKyK6gkqnlUlc9EzsTnQza EHdA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=qHBuK7zV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id oe8-20020a17090b394800b00212fa424170si14144909pjb.130.2022.11.08.10.47.51; Tue, 08 Nov 2022 10:48:05 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=qHBuK7zV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229503AbiKHSpe (ORCPT <rfc822;tony84727@gmail.com> + 99 others); Tue, 8 Nov 2022 13:45:34 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55268 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232988AbiKHSov (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Tue, 8 Nov 2022 13:44:51 -0500 Received: from mail-pg1-x529.google.com (mail-pg1-x529.google.com [IPv6:2607:f8b0:4864:20::529]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AEE141CB1E for <linux-kernel@vger.kernel.org>; Tue, 8 Nov 2022 10:44:25 -0800 (PST) Received: by mail-pg1-x529.google.com with SMTP id r18so14121124pgr.12 for <linux-kernel@vger.kernel.org>; Tue, 08 Nov 2022 10:44:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=BLlH60L5DB/ktOFiwnGrQ8aIIlSEZ8HnuFFJi5Cg/+Y=; b=qHBuK7zVmzkkKLJ6WbtDxkBCLmKdeeWdk5cNJPUhRnwE3N3ZeV0/MIhTPiWbq9cfG7 XPT96SHCOmtN6tTUyWcYE3k29EqlaZvsaCjnhj5zT7/QLDFnlc+lQ10icJLdSAqykEWN S/GiLXnmZWA7TMpvCerNUtl8ewRolKYKVCmgBctDXAdnlP4T0Wn7eEWyAdoUGz2rhVkm qsr56LPR7FhESYAn7FHukIjm2P5ZpDYXbfZ/P90eQcxydPwvmKO9/GwUqpmMxntfHNnO wwGyMn2JQVlAGc112TdfsihKlTcZoctbWVCjjht8nNTg6VnyjZRjN3SOlazDDcvuV7Bx iPEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=BLlH60L5DB/ktOFiwnGrQ8aIIlSEZ8HnuFFJi5Cg/+Y=; b=5zGHilRCFZhMdSkvq8fqe2gt4Chmd+O2/+Yp6fVzBCGQIxTxHe3t9UWKrqwAnF4T+s bi8GsFXqkVGY/rZsmdAFbHjvdfqIzkk/VlQBC2CpFzUAFnABmZv0HsqEYgSq1qo0GYXQ 0QhCKeeLISKMNRcJ77KHJm4BpAkeEcxcsPh1Rd4+TH4S2PheD5MSvyQHL45eJRtuXQTN /i3bSR+9/GK3p5YeCLiQttgAav07vlhXsfg2lVtYV8h9KmG7E6vl9tMligz4WrYKyxFn zSxRKbz4CebASJO22Jm9MF575V6rpsutGclt6u884ZLTt6KbkS6wVRCFp3Bb3IuH3wom PaFg== X-Gm-Message-State: ACrzQf3Bbhb6XKWNTc/3COco/nuzZYtNLNYNiwxORHVOQuFrl0AeYDk+ ITQqSDPrL5BvYSPj8+K94fw= X-Received: by 2002:a63:8041:0:b0:470:1cd2:9914 with SMTP id j62-20020a638041000000b004701cd29914mr23509938pgd.539.1667933065185; Tue, 08 Nov 2022 10:44:25 -0800 (PST) Received: from localhost.localdomain (c-67-174-241-145.hsd1.ca.comcast.net. [67.174.241.145]) by smtp.gmail.com with ESMTPSA id ij22-20020a170902ab5600b0017f36638010sm7210438plb.276.2022.11.08.10.44.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 08 Nov 2022 10:44:24 -0800 (PST) From: Yang Shi <shy828301@gmail.com> To: zokeefe@google.com, mhocko@suse.com, akpm@linux-foundation.org Cc: shy828301@gmail.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, syzbot+0044b22d177870ee974f@syzkaller.appspotmail.com Subject: [mm-unstable v3 PATCH 3/3] mm: replace VM_WARN_ON to pr_warn if the node is offline with __GFP_THISNODE Date: Tue, 8 Nov 2022 10:43:57 -0800 Message-Id: <20221108184357.55614-3-shy828301@gmail.com> X-Mailer: git-send-email 2.38.1 In-Reply-To: <20221108184357.55614-1-shy828301@gmail.com> References: <20221108184357.55614-1-shy828301@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_ENVFROM_END_DIGIT, FREEMAIL_FROM,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1748954812179158592?= X-GMAIL-MSGID: =?utf-8?q?1748954812179158592?= |
Series |
[mm-unstable,v3,1/3] Revert "mm: don't warn if the node is offlined"
|
|
Commit Message
Yang Shi
Nov. 8, 2022, 6:43 p.m. UTC
Syzbot reported the below splat:
WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221 __alloc_pages_node
include/linux/gfp.h:221 [inline]
WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221
hpage_collapse_alloc_page mm/khugepaged.c:807 [inline]
WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221
alloc_charge_hpage+0x802/0xaa0 mm/khugepaged.c:963
Modules linked in:
CPU: 1 PID: 3646 Comm: syz-executor210 Not tainted
6.1.0-rc1-syzkaller-00454-ga70385240892 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS
Google 10/11/2022
RIP: 0010:__alloc_pages_node include/linux/gfp.h:221 [inline]
RIP: 0010:hpage_collapse_alloc_page mm/khugepaged.c:807 [inline]
RIP: 0010:alloc_charge_hpage+0x802/0xaa0 mm/khugepaged.c:963
Code: e5 01 4c 89 ee e8 6e f9 ae ff 4d 85 ed 0f 84 28 fc ff ff e8 70 fc
ae ff 48 8d 6b ff 4c 8d 63 07 e9 16 fc ff ff e8 5e fc ae ff <0f> 0b e9
96 fa ff ff 41 bc 1a 00 00 00 e9 86 fd ff ff e8 47 fc ae
RSP: 0018:ffffc90003fdf7d8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff888077f457c0 RSI: ffffffff81cd8f42 RDI: 0000000000000001
RBP: ffff888079388c0c R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000
FS: 00007f6b48ccf700(0000) GS:ffff8880b9b00000(0000)
knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f6b48a819f0 CR3: 00000000171e7000 CR4: 00000000003506e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
collapse_file+0x1ca/0x5780 mm/khugepaged.c:1715
hpage_collapse_scan_file+0xd6c/0x17a0 mm/khugepaged.c:2156
madvise_collapse+0x53a/0xb40 mm/khugepaged.c:2611
madvise_vma_behavior+0xd0a/0x1cc0 mm/madvise.c:1066
madvise_walk_vmas+0x1c7/0x2b0 mm/madvise.c:1240
do_madvise.part.0+0x24a/0x340 mm/madvise.c:1419
do_madvise mm/madvise.c:1432 [inline]
__do_sys_madvise mm/madvise.c:1432 [inline]
__se_sys_madvise mm/madvise.c:1430 [inline]
__x64_sys_madvise+0x113/0x150 mm/madvise.c:1430
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd
RIP: 0033:0x7f6b48a4eef9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 15 00 00 90 48 89 f8 48 89
f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01
f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f6b48ccf318 EFLAGS: 00000246 ORIG_RAX: 000000000000001c
RAX: ffffffffffffffda RBX: 00007f6b48af0048 RCX: 00007f6b48a4eef9
RDX: 0000000000000019 RSI: 0000000000600003 RDI: 0000000020000000
RBP: 00007f6b48af0040 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b48aa53a4
R13: 00007f6b48bffcbf R14: 00007f6b48ccf400 R15: 0000000000022000
</TASK>
It is because khugepaged allocates pages with __GFP_THISNODE, but the
preferred node is bogus. The previous patch fixed the khugepaged
code to avoid allocating page from non-existing node. But it is still
racy against memory hotremove. There is no synchronization with the
memory hotplug so it is possible that memory gets offline during a
longer taking scanning.
So this warning still seems not quite helpful because:
* There is no guarantee the node is online for __GFP_THISNODE context
for all the callsites.
* Kernel just fails the allocation regardless the warning, and it looks
all callsites handle the allocation failure gracefully.
Although while the warning has helped to identify a buggy code, it is not
safe in general and this warning could panic the system with panic-on-warn
configuration which tends to be used surprisingly often. So replace
VM_WARN_ON to pr_warn(). And the warning will be triggered if
__GFP_NOWARN is set since the allocator would print out warning for such
case if __GFP_NOWARN is not set.
Reported-by: syzbot+0044b22d177870ee974f@syzkaller.appspotmail.com
Signed-off-by: Yang Shi <shy828301@gmail.com>
Suggested-by: Michal Hocko <mhocko@suse.com>
Cc: Zach O'Keefe <zokeefe@google.com>
---
v3: * Reverted the old commit from mm-unstable which remove the VM_WARN
(patch 1/3).
* Incorporated the suggestion from Michal to use pr_warn.
v2: * Added patch 1/2.
* Reworded the commit log per Michal.
include/linux/gfp.h | 14 ++++++++++++--
1 file changed, 12 insertions(+), 2 deletions(-)
Comments
On Tue 08-11-22 10:43:57, Yang Shi wrote: > Syzbot reported the below splat: > > WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221 __alloc_pages_node > include/linux/gfp.h:221 [inline] > WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221 > hpage_collapse_alloc_page mm/khugepaged.c:807 [inline] > WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221 > alloc_charge_hpage+0x802/0xaa0 mm/khugepaged.c:963 > Modules linked in: > CPU: 1 PID: 3646 Comm: syz-executor210 Not tainted > 6.1.0-rc1-syzkaller-00454-ga70385240892 #0 > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > Google 10/11/2022 > RIP: 0010:__alloc_pages_node include/linux/gfp.h:221 [inline] > RIP: 0010:hpage_collapse_alloc_page mm/khugepaged.c:807 [inline] > RIP: 0010:alloc_charge_hpage+0x802/0xaa0 mm/khugepaged.c:963 > Code: e5 01 4c 89 ee e8 6e f9 ae ff 4d 85 ed 0f 84 28 fc ff ff e8 70 fc > ae ff 48 8d 6b ff 4c 8d 63 07 e9 16 fc ff ff e8 5e fc ae ff <0f> 0b e9 > 96 fa ff ff 41 bc 1a 00 00 00 e9 86 fd ff ff e8 47 fc ae > RSP: 0018:ffffc90003fdf7d8 EFLAGS: 00010293 > RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 > RDX: ffff888077f457c0 RSI: ffffffff81cd8f42 RDI: 0000000000000001 > RBP: ffff888079388c0c R08: 0000000000000001 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 > R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 > FS: 00007f6b48ccf700(0000) GS:ffff8880b9b00000(0000) > knlGS:0000000000000000 > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > CR2: 00007f6b48a819f0 CR3: 00000000171e7000 CR4: 00000000003506e0 > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > Call Trace: > <TASK> > collapse_file+0x1ca/0x5780 mm/khugepaged.c:1715 > hpage_collapse_scan_file+0xd6c/0x17a0 mm/khugepaged.c:2156 > madvise_collapse+0x53a/0xb40 mm/khugepaged.c:2611 > madvise_vma_behavior+0xd0a/0x1cc0 mm/madvise.c:1066 > madvise_walk_vmas+0x1c7/0x2b0 mm/madvise.c:1240 > do_madvise.part.0+0x24a/0x340 mm/madvise.c:1419 > do_madvise mm/madvise.c:1432 [inline] > __do_sys_madvise mm/madvise.c:1432 [inline] > __se_sys_madvise mm/madvise.c:1430 [inline] > __x64_sys_madvise+0x113/0x150 mm/madvise.c:1430 > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 > entry_SYSCALL_64_after_hwframe+0x63/0xcd > RIP: 0033:0x7f6b48a4eef9 > Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 15 00 00 90 48 89 f8 48 89 > f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 > f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 > RSP: 002b:00007f6b48ccf318 EFLAGS: 00000246 ORIG_RAX: 000000000000001c > RAX: ffffffffffffffda RBX: 00007f6b48af0048 RCX: 00007f6b48a4eef9 > RDX: 0000000000000019 RSI: 0000000000600003 RDI: 0000000020000000 > RBP: 00007f6b48af0040 R08: 0000000000000000 R09: 0000000000000000 > R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b48aa53a4 > R13: 00007f6b48bffcbf R14: 00007f6b48ccf400 R15: 0000000000022000 > </TASK> > > It is because khugepaged allocates pages with __GFP_THISNODE, but the > preferred node is bogus. The previous patch fixed the khugepaged > code to avoid allocating page from non-existing node. But it is still > racy against memory hotremove. There is no synchronization with the > memory hotplug so it is possible that memory gets offline during a > longer taking scanning. > > So this warning still seems not quite helpful because: > * There is no guarantee the node is online for __GFP_THISNODE context > for all the callsites. > * Kernel just fails the allocation regardless the warning, and it looks > all callsites handle the allocation failure gracefully. > > Although while the warning has helped to identify a buggy code, it is not > safe in general and this warning could panic the system with panic-on-warn > configuration which tends to be used surprisingly often. So replace > VM_WARN_ON to pr_warn(). And the warning will be triggered if > __GFP_NOWARN is set since the allocator would print out warning for such > case if __GFP_NOWARN is not set. > > Reported-by: syzbot+0044b22d177870ee974f@syzkaller.appspotmail.com > Signed-off-by: Yang Shi <shy828301@gmail.com> > Suggested-by: Michal Hocko <mhocko@suse.com> > Cc: Zach O'Keefe <zokeefe@google.com> Acked-by: Michal Hocko <mhocko@suse.com> minor nit > --- > v3: * Reverted the old commit from mm-unstable which remove the VM_WARN > (patch 1/3). > * Incorporated the suggestion from Michal to use pr_warn. > > v2: * Added patch 1/2. > * Reworded the commit log per Michal. > > include/linux/gfp.h | 14 ++++++++++++-- > 1 file changed, 12 insertions(+), 2 deletions(-) > > diff --git a/include/linux/gfp.h b/include/linux/gfp.h > index ef4aea3b356e..60a1c70ec85c 100644 > --- a/include/linux/gfp.h > +++ b/include/linux/gfp.h > @@ -210,6 +210,16 @@ alloc_pages_bulk_array_node(gfp_t gfp, int nid, unsigned long nr_pages, struct p > return __alloc_pages_bulk(gfp, nid, NULL, nr_pages, NULL, page_array); > } > > +static inline void warn_if_node_offline(int nid, gfp_t gfp_mask) > +{ > + gfp_t gfp = gfp_mask & (__GFP_THISNODE|__GFP_NOWARN); I would use rather this_node or similarly descriptive name. gfp sounds like a pasm but this is only a subset of it. If you really want to improve the readability then you can restructure the condition a bit if (gfp_mask & (__GFP_THISNODE|__GFP_NOWARN)) != (__GFP_THISNODE|__GFP_NOWARN)) return; if (node_online(nid)) return; pr_warn("%pGg allocation from offline node %d\n", &gfp, nid); dump_stack(); > + > + if ((gfp == (__GFP_THISNODE|__GFP_NOWARN)) && !node_online(nid)) { > + pr_warn("%pGg allocation from offline node %d\n", &gfp, nid); > + dump_stack(); > + } > +} > +
On Tue, Nov 8, 2022 at 2:15 PM Michal Hocko <mhocko@suse.com> wrote: > > On Tue 08-11-22 10:43:57, Yang Shi wrote: > > Syzbot reported the below splat: > > > > WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221 __alloc_pages_node > > include/linux/gfp.h:221 [inline] > > WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221 > > hpage_collapse_alloc_page mm/khugepaged.c:807 [inline] > > WARNING: CPU: 1 PID: 3646 at include/linux/gfp.h:221 > > alloc_charge_hpage+0x802/0xaa0 mm/khugepaged.c:963 > > Modules linked in: > > CPU: 1 PID: 3646 Comm: syz-executor210 Not tainted > > 6.1.0-rc1-syzkaller-00454-ga70385240892 #0 > > Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS > > Google 10/11/2022 > > RIP: 0010:__alloc_pages_node include/linux/gfp.h:221 [inline] > > RIP: 0010:hpage_collapse_alloc_page mm/khugepaged.c:807 [inline] > > RIP: 0010:alloc_charge_hpage+0x802/0xaa0 mm/khugepaged.c:963 > > Code: e5 01 4c 89 ee e8 6e f9 ae ff 4d 85 ed 0f 84 28 fc ff ff e8 70 fc > > ae ff 48 8d 6b ff 4c 8d 63 07 e9 16 fc ff ff e8 5e fc ae ff <0f> 0b e9 > > 96 fa ff ff 41 bc 1a 00 00 00 e9 86 fd ff ff e8 47 fc ae > > RSP: 0018:ffffc90003fdf7d8 EFLAGS: 00010293 > > RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000000 > > RDX: ffff888077f457c0 RSI: ffffffff81cd8f42 RDI: 0000000000000001 > > RBP: ffff888079388c0c R08: 0000000000000001 R09: 0000000000000000 > > R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 > > R13: dffffc0000000000 R14: 0000000000000000 R15: 0000000000000000 > > FS: 00007f6b48ccf700(0000) GS:ffff8880b9b00000(0000) > > knlGS:0000000000000000 > > CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 > > CR2: 00007f6b48a819f0 CR3: 00000000171e7000 CR4: 00000000003506e0 > > DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 > > DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 > > Call Trace: > > <TASK> > > collapse_file+0x1ca/0x5780 mm/khugepaged.c:1715 > > hpage_collapse_scan_file+0xd6c/0x17a0 mm/khugepaged.c:2156 > > madvise_collapse+0x53a/0xb40 mm/khugepaged.c:2611 > > madvise_vma_behavior+0xd0a/0x1cc0 mm/madvise.c:1066 > > madvise_walk_vmas+0x1c7/0x2b0 mm/madvise.c:1240 > > do_madvise.part.0+0x24a/0x340 mm/madvise.c:1419 > > do_madvise mm/madvise.c:1432 [inline] > > __do_sys_madvise mm/madvise.c:1432 [inline] > > __se_sys_madvise mm/madvise.c:1430 [inline] > > __x64_sys_madvise+0x113/0x150 mm/madvise.c:1430 > > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > > do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80 > > entry_SYSCALL_64_after_hwframe+0x63/0xcd > > RIP: 0033:0x7f6b48a4eef9 > > Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 b1 15 00 00 90 48 89 f8 48 89 > > f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 > > f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 > > RSP: 002b:00007f6b48ccf318 EFLAGS: 00000246 ORIG_RAX: 000000000000001c > > RAX: ffffffffffffffda RBX: 00007f6b48af0048 RCX: 00007f6b48a4eef9 > > RDX: 0000000000000019 RSI: 0000000000600003 RDI: 0000000020000000 > > RBP: 00007f6b48af0040 R08: 0000000000000000 R09: 0000000000000000 > > R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6b48aa53a4 > > R13: 00007f6b48bffcbf R14: 00007f6b48ccf400 R15: 0000000000022000 > > </TASK> > > > > It is because khugepaged allocates pages with __GFP_THISNODE, but the > > preferred node is bogus. The previous patch fixed the khugepaged > > code to avoid allocating page from non-existing node. But it is still > > racy against memory hotremove. There is no synchronization with the > > memory hotplug so it is possible that memory gets offline during a > > longer taking scanning. > > > > So this warning still seems not quite helpful because: > > * There is no guarantee the node is online for __GFP_THISNODE context > > for all the callsites. > > * Kernel just fails the allocation regardless the warning, and it looks > > all callsites handle the allocation failure gracefully. > > > > Although while the warning has helped to identify a buggy code, it is not > > safe in general and this warning could panic the system with panic-on-warn > > configuration which tends to be used surprisingly often. So replace > > VM_WARN_ON to pr_warn(). And the warning will be triggered if > > __GFP_NOWARN is set since the allocator would print out warning for such > > case if __GFP_NOWARN is not set. > > > > Reported-by: syzbot+0044b22d177870ee974f@syzkaller.appspotmail.com > > Signed-off-by: Yang Shi <shy828301@gmail.com> > > Suggested-by: Michal Hocko <mhocko@suse.com> > > Cc: Zach O'Keefe <zokeefe@google.com> > > Acked-by: Michal Hocko <mhocko@suse.com> > > minor nit > > > --- > > v3: * Reverted the old commit from mm-unstable which remove the VM_WARN > > (patch 1/3). > > * Incorporated the suggestion from Michal to use pr_warn. > > > > v2: * Added patch 1/2. > > * Reworded the commit log per Michal. > > > > include/linux/gfp.h | 14 ++++++++++++-- > > 1 file changed, 12 insertions(+), 2 deletions(-) > > > > diff --git a/include/linux/gfp.h b/include/linux/gfp.h > > index ef4aea3b356e..60a1c70ec85c 100644 > > --- a/include/linux/gfp.h > > +++ b/include/linux/gfp.h > > @@ -210,6 +210,16 @@ alloc_pages_bulk_array_node(gfp_t gfp, int nid, unsigned long nr_pages, struct p > > return __alloc_pages_bulk(gfp, nid, NULL, nr_pages, NULL, page_array); > > } > > > > +static inline void warn_if_node_offline(int nid, gfp_t gfp_mask) > > +{ > > + gfp_t gfp = gfp_mask & (__GFP_THISNODE|__GFP_NOWARN); > > I would use rather this_node or similarly descriptive name. gfp sounds this_node sounds good to me. > like a pasm but this is only a subset of it. If you really want to > improve the readability then you can restructure the condition a bit Just because I thought "if (gfp_mask & (__GFP_THISNODE|__GFP_NOWARN)) != (__GFP_THISNODE|__GFP_NOWARN))" is too long, so I added gfp to store the intermediate result. > > if (gfp_mask & (__GFP_THISNODE|__GFP_NOWARN)) != (__GFP_THISNODE|__GFP_NOWARN)) > return; > > if (node_online(nid)) > return; > > pr_warn("%pGg allocation from offline node %d\n", &gfp, nid); > dump_stack(); > > > + > > + if ((gfp == (__GFP_THISNODE|__GFP_NOWARN)) && !node_online(nid)) { > > + pr_warn("%pGg allocation from offline node %d\n", &gfp, nid); > > + dump_stack(); > > + } > > +} > > + > -- > Michal Hocko > SUSE Labs
diff --git a/include/linux/gfp.h b/include/linux/gfp.h index ef4aea3b356e..60a1c70ec85c 100644 --- a/include/linux/gfp.h +++ b/include/linux/gfp.h @@ -210,6 +210,16 @@ alloc_pages_bulk_array_node(gfp_t gfp, int nid, unsigned long nr_pages, struct p return __alloc_pages_bulk(gfp, nid, NULL, nr_pages, NULL, page_array); } +static inline void warn_if_node_offline(int nid, gfp_t gfp_mask) +{ + gfp_t gfp = gfp_mask & (__GFP_THISNODE|__GFP_NOWARN); + + if ((gfp == (__GFP_THISNODE|__GFP_NOWARN)) && !node_online(nid)) { + pr_warn("%pGg allocation from offline node %d\n", &gfp, nid); + dump_stack(); + } +} + /* * Allocate pages, preferring the node given as nid. The node must be valid and * online. For more general interface, see alloc_pages_node(). @@ -218,7 +228,7 @@ static inline struct page * __alloc_pages_node(int nid, gfp_t gfp_mask, unsigned int order) { VM_BUG_ON(nid < 0 || nid >= MAX_NUMNODES); - VM_WARN_ON((gfp_mask & __GFP_THISNODE) && !node_online(nid)); + warn_if_node_offline(nid, gfp_mask); return __alloc_pages(gfp_mask, order, nid, NULL); } @@ -227,7 +237,7 @@ static inline struct folio *__folio_alloc_node(gfp_t gfp, unsigned int order, int nid) { VM_BUG_ON(nid < 0 || nid >= MAX_NUMNODES); - VM_WARN_ON((gfp & __GFP_THISNODE) && !node_online(nid)); + warn_if_node_offline(nid, gfp); return __folio_alloc(gfp, order, nid, NULL); }