linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
From: Yang Shi <yang.shi@linux.alibaba.com>
To: Jan Stancek <jstancek@redhat.com>,
	will deacon <will.deacon@arm.com>,
	linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org
Cc: kirill@shutemov.name, willy@infradead.org,
	kirill shutemov <kirill.shutemov@linux.intel.com>,
	vbabka@suse.cz, Andrea Arcangeli <aarcange@redhat.com>,
	akpm@linux-foundation.org, Waiman Long <longman@redhat.com>,
	Mel Gorman <mgorman@techsingularity.net>,
	Rik van Riel <riel@surriel.com>,
	catalin marinas <catalin.marinas@arm.com>
Subject: Re: [bug] aarch64: userspace stalls on page fault after dd2283f2605e ("mm: mmap: zap pages with read mmap_sem in munmap")
Date: Tue, 7 May 2019 09:42:43 -0700	[thread overview]
Message-ID: <3d0843fa-1a34-1d5a-ca4d-abe4032bad8b@linux.alibaba.com> (raw)
In-Reply-To: <756571293.21386229.1557229889545.JavaMail.zimbra@redhat.com>



On 5/7/19 4:51 AM, Jan Stancek wrote:
> ----- Original Message -----
>>
>> On 5/6/19 2:35 PM, Jan Stancek wrote:
>>> ----- Original Message -----
>>>> On 5/5/19 7:10 AM, Jan Stancek wrote:
>>>>> Hi,
>>>>>
>>>>> I'm seeing userspace program getting stuck on aarch64, on kernels 4.20
>>>>> and
>>>>> newer.
>>>>> It stalls from seconds to hours.
>>>>>
>>>>> I have simplified it to following scenario (reproducer linked below [1]):
>>>>>      while (1):
>>>>>        spawn Thread 1: mmap, write, munmap
>>>>>        spawn Thread 2: <nothing>
>>>>>
>>>>> Thread 1 is sporadically getting stuck on write to mapped area.
>>>>> User-space
>>>>> is not
>>>>> moving forward - stdout output stops. Observed CPU usage is however 100%.
>>>>>
>>>>> At this time, kernel appears to be busy handling page faults (~700k per
>>>>> second):
>>>>>
>>>>> # perf top -a -g
>>>>> -   98.97%     8.30%  a.out                     [.] map_write_unmap
>>>>>       - 23.52% map_write_unmap
>>>>>          - 24.29% el0_sync
>>>>>             - 10.42% do_mem_abort
>>>>>                - 17.81% do_translation_fault
>>>>>                   - 33.01% do_page_fault
>>>>>                      - 56.18% handle_mm_fault
>>>>>                           40.26% __handle_mm_fault
>>>>>                           2.19% __ll_sc___cmpxchg_case_acq_4
>>>>>                           0.87% mem_cgroup_from_task
>>>>>                      - 6.18% find_vma
>>>>>                           5.38% vmacache_find
>>>>>                        1.35% __ll_sc___cmpxchg_case_acq_8
>>>>>                        1.23% __ll_sc_atomic64_sub_return_release
>>>>>                        0.78% down_read_trylock
>>>>>               0.93% do_translation_fault
>>>>>       + 8.30% thread_start
>>>>>
>>>>> #  perf stat -p 8189 -d
>>>>> ^C
>>>>>     Performance counter stats for process id '8189':
>>>>>
>>>>>            984.311350      task-clock (msec)         #    1.000 CPUs
>>>>>            utilized
>>>>>                     0      context-switches          #    0.000 K/sec
>>>>>                     0      cpu-migrations            #    0.000 K/sec
>>>>>               723,641      page-faults               #    0.735 M/sec
>>>>>         2,559,199,434      cycles                    #    2.600 GHz
>>>>>           711,933,112      instructions              #    0.28  insn per
>>>>>           cycle
>>>>>       <not supported>      branches
>>>>>               757,658      branch-misses
>>>>>           205,840,557      L1-dcache-loads           #  209.121 M/sec
>>>>>            40,561,529      L1-dcache-load-misses     #   19.71% of all
>>>>>            L1-dcache hits
>>>>>       <not supported>      LLC-loads
>>>>>       <not supported>      LLC-load-misses
>>>>>
>>>>>           0.984454892 seconds time elapsed
>>>>>
>>>>> With some extra traces, it appears looping in page fault for same
>>>>> address,
>>>>> over and over:
>>>>>      do_page_fault // mm_flags: 0x55
>>>>>        __do_page_fault
>>>>>          __handle_mm_fault
>>>>>            handle_pte_fault
>>>>>              ptep_set_access_flags
>>>>>                if (pte_same(pte, entry))  // pte: e8000805060f53, entry:
>>>>>                e8000805060f53
>>>>>
>>>>> I had traces in mmap() and munmap() as well, they don't get hit when
>>>>> reproducer
>>>>> hits the bad state.
>>>>>
>>>>> Notes:
>>>>> - I'm not able to reproduce this on x86.
>>>>> - Attaching GDB or strace immediatelly recovers application from stall.
>>>>> - It also seems to recover faster when system is busy with other tasks.
>>>>> - MAP_SHARED vs. MAP_PRIVATE makes no difference.
>>>>> - Turning off THP makes no difference.
>>>>> - Reproducer [1] usually hits it within ~minute on HW described below.
>>>>> - Longman mentioned that "When the rwsem becomes reader-owned, it causes
>>>>>      all the spinning writers to go to sleep adding wakeup latency to
>>>>>      the time required to finish the critical sections", but this looks
>>>>>      like busy loop, so I'm not sure if it's related to rwsem issues
>>>>>      identified
>>>>>      in:
>>>>>      https://lore.kernel.org/lkml/20190428212557.13482-2-longman@redhat.com/
>>>> It sounds possible to me. What the optimization done by the commit ("mm:
>>>> mmap: zap pages with read mmap_sem in munmap") is to downgrade write
>>>> rwsem to read when zapping pages and page table in munmap() after the
>>>> vmas have been detached from the rbtree.
>>>>
>>>> So the mmap(), which is writer, in your test may steal the lock and
>>>> execute with the munmap(), which is the reader after the downgrade, in
>>>> parallel to break the mutual exclusion.
>>>>
>>>> In this case, the parallel mmap() may map to the same area since vmas
>>>> have been detached by munmap(), then mmap() may create the complete same
>>>> vmas, and page fault happens on the same vma at the same address.
>>>>
>>>> I'm not sure why gdb or strace could recover this, but they use ptrace
>>>> which may acquire mmap_sem to break the parallel inadvertently.
>>>>
>>>> May you please try Waiman's patch to see if it makes any difference?
>>> I don't see any difference in behaviour after applying:
>>>     [PATCH-tip v7 01/20] locking/rwsem: Prevent decrement of reader count
>>>     before increment
>>> Issue is still easily reproducible for me.
>>>
>>> I'm including output of mem_abort_decode() / show_pte() for sample PTE,
>>> that
>>> I see in page fault loop. (I went through all bits, but couldn't find
>>> anything invalid about it)
>>>
>>>     mem_abort_decode: Mem abort info:
>>>     mem_abort_decode:   ESR = 0x92000047
>>>     mem_abort_decode:   Exception class = DABT (lower EL), IL = 32 bits
>>>     mem_abort_decode:   SET = 0, FnV = 0
>>>     mem_abort_decode:   EA = 0, S1PTW = 0
>>>     mem_abort_decode: Data abort info:
>>>     mem_abort_decode:   ISV = 0, ISS = 0x00000047
>>>     mem_abort_decode:   CM = 0, WnR = 1
>>>     show_pte: user pgtable: 64k pages, 48-bit VAs, pgdp = 0000000067027567
>>>     show_pte: [0000ffff6dff0000] pgd=000000176bae0003
>>>     show_pte: , pud=000000176bae0003
>>>     show_pte: , pmd=000000174ad60003
>>>     show_pte: , pte=00e80008023a0f53
>>>     show_pte: , pte_pfn: 8023a
>>>
>>>     >>> print bin(0x47)
>>>     0b1000111
>>>
>>>     Per D12-2779 (ARM Architecture Reference Manual),
>>>         ISS encoding for an exception from an Instruction Abort:
>>>       IFSC, bits [5:0], Instruction Fault Status Code
>>>       0b000111 Translation fault, level 3
>>>
>>> ---
>>>
>>> My theory is that TLB is getting broken.
> Theory continued:
>
> unmap_region() is batching updates to TLB (for vmas and page tables).
> And at the same time another thread handles page fault for same mm,
> which increases "tlb_flush_pending".
>
> tlb_finish_mmu() called from unmap_region() will thus set 'force = 1'.
> And arch_tlb_finish_mmu() will in turn reset TLB range, presumably making
> it smaller then it would be if force == 0.
>
> Change below appears to fix it:
>
> diff --git a/mm/mmu_gather.c b/mm/mmu_gather.c
> index f2f03c655807..a4cef21bd62b 100644
> --- a/mm/mmu_gather.c
> +++ b/mm/mmu_gather.c
> @@ -93,7 +93,7 @@ void arch_tlb_finish_mmu(struct mmu_gather *tlb,
>          struct mmu_gather_batch *batch, *next;
>   
>          if (force) {
> -               __tlb_reset_range(tlb);
>                  __tlb_adjust_range(tlb, start, end - start);

I don't get why the change could fix it? __tlb_reset_range() just reset 
start and end to TASK_SIZE and 0, then __tlb_adjust_range() set proper 
start and end. I don't get why "force" flush smaller range?

>          }
>
>>> I made a dummy kernel module that exports debugfs file, which on read
>>> triggers:
>>>     flush_tlb_all();
>>>
>>> Any time reproducer stalls and I read debugfs file, it recovers
>>> immediately and resumes printing to stdout.
>> That commit doesn't change anything about TLB flush, just move zapping
>> pages under read mmap_sem as what MADV_DONTNEED does.
>>
>> I don't have aarch64 board to reproduce and debug it. And, I'm not
>> familiar with aarch64 architecture either. But, some history told me the
>> parallel zapping page may run into stale TLB and defer a flush meaning
>> that this call may observe pte_none and fails to flush the TLB. But,
>> this has been solved by commit 56236a59556c ("mm: refactor TLB gathering
>> API") and 99baac21e458 ("mm: fix MADV_[FREE|DONTNEED] TLB flush miss
>> problem").
>>
>> For more detail, please refer to commit 4647706ebeee ("mm: always flush
>> VMA ranges affected by zap_page_range"). Copied Mel and Rik in this
>> thread. Also added Will Deacon and Catalin Marinas, who are aarch64
>> maintainers, in this loop
> Thanks
>
>> But, your test (triggering TLB flush) does demonstrate TLB flush is
>> *not* done properly at some point as expected for aarch64. Could you
>> please give the below patch a try?
> Your patch also fixes my reproducer.

Thanks for testing it.

>
>> diff --git a/mm/memory.c b/mm/memory.c
>> index ab650c2..ef41ad5 100644
>> --- a/mm/memory.c
>> +++ b/mm/memory.c
>> @@ -1336,8 +1336,10 @@ void unmap_vmas(struct mmu_gather *tlb,
>>
>>           mmu_notifier_range_init(&range, vma->vm_mm, start_addr, end_addr);
>>           mmu_notifier_invalidate_range_start(&range);
>> -       for ( ; vma && vma->vm_start < end_addr; vma = vma->vm_next)
>> +       for ( ; vma && vma->vm_start < end_addr; vma = vma->vm_next) {
>>                   unmap_single_vma(tlb, vma, start_addr, end_addr, NULL);
>> +               flush_tlb_range(vma, start_addr, end_addr);
>> +       }
>>           mmu_notifier_invalidate_range_end(&range);
>>    }
>>
>>>>> - I tried 2 different aarch64 systems so far: APM X-Gene CPU Potenza A3
>>>>> and
>>>>>      Qualcomm 65-LA-115-151.
>>>>>      I can reproduce it on both with v5.1-rc7. It's easier to reproduce
>>>>>      on latter one (for longer periods of time), which has 46 CPUs.
>>>>> - Sample output of reproducer on otherwise idle system:
>>>>>      # ./a.out
>>>>>      [00000314] map_write_unmap took: 26305 ms
>>>>>      [00000867] map_write_unmap took: 13642 ms
>>>>>      [00002200] map_write_unmap took: 44237 ms
>>>>>      [00002851] map_write_unmap took: 992 ms
>>>>>      [00004725] map_write_unmap took: 542 ms
>>>>>      [00006443] map_write_unmap took: 5333 ms
>>>>>      [00006593] map_write_unmap took: 21162 ms
>>>>>      [00007435] map_write_unmap took: 16982 ms
>>>>>      [00007488] map_write unmap took: 13 ms^C
>>>>>
>>>>> I ran a bisect, which identified following commit as first bad one:
>>>>>      dd2283f2605e ("mm: mmap: zap pages with read mmap_sem in munmap")
>>>>>
>>>>> I can also make the issue go away with following change:
>>>>> diff --git a/mm/mmap.c b/mm/mmap.c
>>>>> index 330f12c17fa1..13ce465740e2 100644
>>>>> --- a/mm/mmap.c
>>>>> +++ b/mm/mmap.c
>>>>> @@ -2844,7 +2844,7 @@ EXPORT_SYMBOL(vm_munmap);
>>>>>     SYSCALL_DEFINE2(munmap, unsigned long, addr, size_t, len)
>>>>>     {
>>>>>            profile_munmap(addr);
>>>>> -       return __vm_munmap(addr, len, true);
>>>>> +       return __vm_munmap(addr, len, false);
>>>>>     }
>>>>>
>>>>> # cat /proc/cpuinfo  | head
>>>>> processor       : 0
>>>>> BogoMIPS        : 40.00
>>>>> Features        : fp asimd evtstrm aes pmull sha1 sha2 crc32 cpuid
>>>>> asimdrdm
>>>>> CPU implementer : 0x51
>>>>> CPU architecture: 8
>>>>> CPU variant     : 0x0
>>>>> CPU part        : 0xc00
>>>>> CPU revision    : 1
>>>>>
>>>>> # numactl -H
>>>>> available: 1 nodes (0)
>>>>> node 0 cpus: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22
>>>>> 23
>>>>> 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45
>>>>> node 0 size: 97938 MB
>>>>> node 0 free: 95732 MB
>>>>> node distances:
>>>>> node   0
>>>>>      0:  10
>>>>>
>>>>> Regards,
>>>>> Jan
>>>>>
>>>>> [1]
>>>>> https://github.com/jstancek/reproducers/blob/master/kernel/page_fault_stall/mmap5.c
>>>>> [2]
>>>>> https://github.com/jstancek/reproducers/blob/master/kernel/page_fault_stall/config
>>


  reply	other threads:[~2019-05-07 16:42 UTC|newest]

Thread overview: 10+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <820667266.20994189.1557058281210.JavaMail.zimbra@redhat.com>
2019-05-05 14:10 ` [bug] aarch64: userspace stalls on page fault after dd2283f2605e ("mm: mmap: zap pages with read mmap_sem in munmap") Jan Stancek
2019-05-06 19:04   ` Yang Shi
2019-05-06 21:35     ` Jan Stancek
2019-05-06 23:07       ` Yang Shi
2019-05-06 23:15         ` Yang Shi
2019-05-07 11:51         ` Jan Stancek
2019-05-07 16:42           ` Yang Shi [this message]
2019-05-07 17:19             ` Jan Stancek
2019-05-07 19:55               ` Yang Shi
2019-05-07 21:04                 ` Yang Shi

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3d0843fa-1a34-1d5a-ca4d-abe4032bad8b@linux.alibaba.com \
    --to=yang.shi@linux.alibaba.com \
    --cc=aarcange@redhat.com \
    --cc=akpm@linux-foundation.org \
    --cc=catalin.marinas@arm.com \
    --cc=jstancek@redhat.com \
    --cc=kirill.shutemov@linux.intel.com \
    --cc=kirill@shutemov.name \
    --cc=linux-arm-kernel@lists.infradead.org \
    --cc=linux-mm@kvack.org \
    --cc=longman@redhat.com \
    --cc=mgorman@techsingularity.net \
    --cc=riel@surriel.com \
    --cc=vbabka@suse.cz \
    --cc=will.deacon@arm.com \
    --cc=willy@infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).