All of lore.kernel.org
 help / color / mirror / Atom feed
From: Michal Hocko <mhocko@kernel.org>
To: "Wangnan (F)" <wangnan0@huawei.com>
Cc: Bob Liu <lliubbo@gmail.com>, Linux-MM <linux-mm@kvack.org>,
	Linux-Kernel <linux-kernel@vger.kernel.org>,
	Bob Liu <liubo95@huawei.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	David Rientjes <rientjes@google.com>,
	Ingo Molnar <mingo@kernel.org>, Roman Gushchin <guro@fb.com>,
	Konstantin Khlebnikov <khlebnikov@yandex-team.ru>,
	Andrea Arcangeli <aarcange@redhat.com>,
	will.deacon@arm.com
Subject: Re: [RFC PATCH] mm, oom_reaper: gather each vma to prevent leaking TLB entry
Date: Mon, 6 Nov 2017 12:57:07 +0100	[thread overview]
Message-ID: <20171106115707.lrjniqqba6gfgsjs@dhcp22.suse.cz> (raw)
In-Reply-To: <32853d25-4b72-443f-381c-5905de872221@huawei.com>

On Mon 06-11-17 19:03:34, Wangnan (F) wrote:
> 
> 
> On 2017/11/6 18:40, Michal Hocko wrote:
> > On Mon 06-11-17 17:59:54, Wangnan (F) wrote:
> > > 
> > > On 2017/11/6 16:52, Michal Hocko wrote:
> > > > On Mon 06-11-17 15:04:40, Bob Liu wrote:
> > > > > On Mon, Nov 6, 2017 at 11:36 AM, Wang Nan <wangnan0@huawei.com> wrote:
> > > > > > tlb_gather_mmu(&tlb, mm, 0, -1) means gathering all virtual memory space.
> > > > > > In this case, tlb->fullmm is true. Some archs like arm64 doesn't flush
> > > > > > TLB when tlb->fullmm is true:
> > > > > > 
> > > > > >     commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1").
> > > > > > 
> > > > > CC'ed Will Deacon.
> > > > > 
> > > > > > Which makes leaking of tlb entries. For example, when oom_reaper
> > > > > > selects a task and reaps its virtual memory space, another thread
> > > > > > in this task group may still running on another core and access
> > > > > > these already freed memory through tlb entries.
> > > > No threads should be running in userspace by the time the reaper gets to
> > > > unmap their address space. So the only potential case is they are
> > > > accessing the user memory from the kernel when we should fault and we
> > > > have MMF_UNSTABLE to cause a SIGBUS. So is the race you are describing
> > > > real?
> > > > 
> > > > > > This patch gather each vma instead of gathering full vm space,
> > > > > > tlb->fullmm is not true. The behavior of oom reaper become similar
> > > > > > to munmapping before do_exit, which should be safe for all archs.
> > > > I do not have any objections to do per vma tlb flushing because it would
> > > > free gathered pages sooner but I am not sure I see any real problem
> > > > here. Have you seen any real issues or this is more of a review driven
> > > > fix?
> > > We saw the problem when we try to reuse oom reaper's code in
> > > another situation. In our situation, we allow reaping a task
> > > before all other tasks in its task group finish their exiting
> > > procedure.
> > > 
> > > I'd like to know what ensures "No threads should be running in
> > > userspace by the time the reaper"?
> > All tasks are killed by the time. So they should be taken out to the
> > kernel.
> 
> Sorry. I read oom_kill_process() but still unable to understand
> why all tasks are killed.
> 
> oom_kill_process() kill victim by sending SIGKILL. It will be
> broadcast to all tasks in its task group, but it is asynchronized.
> In the following case, race can happen (Thread1 in Task1's task group):
> 
> core 1                core 2
> Thread1 running       oom_kill_process() selects Task1 as victim
>                       oom_kill_process() sends SIGKILL to Task1
>                       oom_kill_process() sends SIGKILL to Thread1
>                       oom_kill_process() wakes up oom reaper
>                       switch to oom_reaper
>                       __oom_reap_task_mm
>                       tlb_gather_mmu
>                       unmap_page_range, reap Task1
>                       tlb_finish_mmu
> Write page
> be kicked off from core
> Receives SIGKILL
> 
> So what makes Thread1 being kicked off from core 1 before core 2
> starting unmapping?

complete_signal should call signal_wake_up on all threads because this
is a group fatal signal and that should send an IPI to all of the cpus
they run on to. Even if we do not wait for IPI to complete the race
window should be few instructions only while it takes quite some time to
hand over to the oom reaper.

-- 
Michal Hocko
SUSE Labs

WARNING: multiple messages have this Message-ID (diff)
From: Michal Hocko <mhocko@kernel.org>
To: "Wangnan (F)" <wangnan0@huawei.com>
Cc: Bob Liu <lliubbo@gmail.com>, Linux-MM <linux-mm@kvack.org>,
	Linux-Kernel <linux-kernel@vger.kernel.org>,
	Bob Liu <liubo95@huawei.com>,
	Andrew Morton <akpm@linux-foundation.org>,
	David Rientjes <rientjes@google.com>,
	Ingo Molnar <mingo@kernel.org>, Roman Gushchin <guro@fb.com>,
	Konstantin Khlebnikov <khlebnikov@yandex-team.ru>,
	Andrea Arcangeli <aarcange@redhat.com>,
	will.deacon@arm.com
Subject: Re: [RFC PATCH] mm, oom_reaper: gather each vma to prevent leaking TLB entry
Date: Mon, 6 Nov 2017 12:57:07 +0100	[thread overview]
Message-ID: <20171106115707.lrjniqqba6gfgsjs@dhcp22.suse.cz> (raw)
In-Reply-To: <32853d25-4b72-443f-381c-5905de872221@huawei.com>

On Mon 06-11-17 19:03:34, Wangnan (F) wrote:
> 
> 
> On 2017/11/6 18:40, Michal Hocko wrote:
> > On Mon 06-11-17 17:59:54, Wangnan (F) wrote:
> > > 
> > > On 2017/11/6 16:52, Michal Hocko wrote:
> > > > On Mon 06-11-17 15:04:40, Bob Liu wrote:
> > > > > On Mon, Nov 6, 2017 at 11:36 AM, Wang Nan <wangnan0@huawei.com> wrote:
> > > > > > tlb_gather_mmu(&tlb, mm, 0, -1) means gathering all virtual memory space.
> > > > > > In this case, tlb->fullmm is true. Some archs like arm64 doesn't flush
> > > > > > TLB when tlb->fullmm is true:
> > > > > > 
> > > > > >     commit 5a7862e83000 ("arm64: tlbflush: avoid flushing when fullmm == 1").
> > > > > > 
> > > > > CC'ed Will Deacon.
> > > > > 
> > > > > > Which makes leaking of tlb entries. For example, when oom_reaper
> > > > > > selects a task and reaps its virtual memory space, another thread
> > > > > > in this task group may still running on another core and access
> > > > > > these already freed memory through tlb entries.
> > > > No threads should be running in userspace by the time the reaper gets to
> > > > unmap their address space. So the only potential case is they are
> > > > accessing the user memory from the kernel when we should fault and we
> > > > have MMF_UNSTABLE to cause a SIGBUS. So is the race you are describing
> > > > real?
> > > > 
> > > > > > This patch gather each vma instead of gathering full vm space,
> > > > > > tlb->fullmm is not true. The behavior of oom reaper become similar
> > > > > > to munmapping before do_exit, which should be safe for all archs.
> > > > I do not have any objections to do per vma tlb flushing because it would
> > > > free gathered pages sooner but I am not sure I see any real problem
> > > > here. Have you seen any real issues or this is more of a review driven
> > > > fix?
> > > We saw the problem when we try to reuse oom reaper's code in
> > > another situation. In our situation, we allow reaping a task
> > > before all other tasks in its task group finish their exiting
> > > procedure.
> > > 
> > > I'd like to know what ensures "No threads should be running in
> > > userspace by the time the reaper"?
> > All tasks are killed by the time. So they should be taken out to the
> > kernel.
> 
> Sorry. I read oom_kill_process() but still unable to understand
> why all tasks are killed.
> 
> oom_kill_process() kill victim by sending SIGKILL. It will be
> broadcast to all tasks in its task group, but it is asynchronized.
> In the following case, race can happen (Thread1 in Task1's task group):
> 
> core 1                core 2
> Thread1 running       oom_kill_process() selects Task1 as victim
>                       oom_kill_process() sends SIGKILL to Task1
>                       oom_kill_process() sends SIGKILL to Thread1
>                       oom_kill_process() wakes up oom reaper
>                       switch to oom_reaper
>                       __oom_reap_task_mm
>                       tlb_gather_mmu
>                       unmap_page_range, reap Task1
>                       tlb_finish_mmu
> Write page
> be kicked off from core
> Receives SIGKILL
> 
> So what makes Thread1 being kicked off from core 1 before core 2
> starting unmapping?

complete_signal should call signal_wake_up on all threads because this
is a group fatal signal and that should send an IPI to all of the cpus
they run on to. Even if we do not wait for IPI to complete the race
window should be few instructions only while it takes quite some time to
hand over to the oom reaper.

-- 
Michal Hocko
SUSE Labs

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

  reply	other threads:[~2017-11-06 11:57 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-11-06  3:36 [RFC PATCH] mm, oom_reaper: gather each vma to prevent leaking TLB entry Wang Nan
2017-11-06  3:36 ` Wang Nan
2017-11-06  7:04 ` Bob Liu
2017-11-06  7:04   ` Bob Liu
2017-11-06  8:52   ` Michal Hocko
2017-11-06  8:52     ` Michal Hocko
2017-11-06  9:59     ` Wangnan (F)
2017-11-06  9:59       ` Wangnan (F)
2017-11-06 10:40       ` Michal Hocko
2017-11-06 10:40         ` Michal Hocko
2017-11-06 11:03         ` Wangnan (F)
2017-11-06 11:03           ` Wangnan (F)
2017-11-06 11:57           ` Michal Hocko [this message]
2017-11-06 11:57             ` Michal Hocko
2017-11-07  3:51             ` Wangnan (F)
2017-11-07  3:51               ` Wangnan (F)
2017-11-06 12:27     ` Michal Hocko
2017-11-06 12:27       ` Michal Hocko
2017-11-07  0:54       ` Will Deacon
2017-11-07  0:54         ` Will Deacon
2017-11-07  7:54         ` Michal Hocko
2017-11-07  7:54           ` Michal Hocko

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20171106115707.lrjniqqba6gfgsjs@dhcp22.suse.cz \
    --to=mhocko@kernel.org \
    --cc=aarcange@redhat.com \
    --cc=akpm@linux-foundation.org \
    --cc=guro@fb.com \
    --cc=khlebnikov@yandex-team.ru \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-mm@kvack.org \
    --cc=liubo95@huawei.com \
    --cc=lliubbo@gmail.com \
    --cc=mingo@kernel.org \
    --cc=rientjes@google.com \
    --cc=wangnan0@huawei.com \
    --cc=will.deacon@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.