From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id D2EEEC77B7F for ; Wed, 17 May 2023 10:02:35 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 6AEE9900006; Wed, 17 May 2023 06:02:35 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 65E25900003; Wed, 17 May 2023 06:02:35 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 52689900006; Wed, 17 May 2023 06:02:35 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 4388E900003 for ; Wed, 17 May 2023 06:02:35 -0400 (EDT) Received: from smtpin25.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 1262A4017B for ; Wed, 17 May 2023 10:02:35 +0000 (UTC) X-FDA: 80799307470.25.531C6A6 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by imf06.hostedemail.com (Postfix) with ESMTP id A52F2180019 for ; Wed, 17 May 2023 10:02:32 +0000 (UTC) Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=hfcAtck7; spf=pass (imf06.hostedemail.com: domain of rppt@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=rppt@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1684317752; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=VvOhZdOYLPMoHm1rmehte/wT1urv5iokNJfV4oRP80E=; b=Hr85clD9PX8xyfe07xS85wWzhiJUoaJI6dBYVwBBkgqxMTCKsWHVC36fTP7CkyTYYThGrN l3NJWaEkcP/1M0dmlCOZAUSSZj8XOp7O0dE8uWSdhnsffERpf59TXKMuZaV5Rr9syNe5Zi sAOEIULjoCpllJNznVVhfb4QtUGwbag= ARC-Authentication-Results: i=1; imf06.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=hfcAtck7; spf=pass (imf06.hostedemail.com: domain of rppt@kernel.org designates 139.178.84.217 as permitted sender) smtp.mailfrom=rppt@kernel.org; dmarc=pass (policy=none) header.from=kernel.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1684317752; a=rsa-sha256; cv=none; b=b34VtMZJ4EsV6guOCdOfg/IqQYEPNlueWKdix8ZMWmc+XvFRQaI2oOlYoIUjwtOROKyQwt MchSUCePPuW0UPgEDhMagWeHupjBMql6ImjLXT9P5IveMnUAV05rquS3iJ9POr3TYZiQnU FyJiqHr83bbOjglMRph7n++S9lxRq78= Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 6D089642EC; Wed, 17 May 2023 10:02:31 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 9DD2AC433EF; Wed, 17 May 2023 10:02:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1684317750; bh=PbekS8+IA5tbx4Cq85liWjKwLbPGx4u9SGD0MjiI4QQ=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=hfcAtck7hgrOXPsMbggGI16yKRwOl/F5DugG3c0HptXEs+wrV3MF80BuNkOghUrUq eHeZSD/Iw4hX/uwvPVjYZnR2sF1YSMz4p1NIUlVyfxO+k3LUSrEGl16wvkMnJ/A0Ln Se8YECM+J4yHr+D93N1MoGEsgnA5kpsFDNKuQ3AysysOwcg5AYvKKswn6Vp29nQS/y /YGSN1AqfqctMSlpytXj50g9tZ2Ugkj9c3Z7cGPLWl/Iulyy2/VBknTY1fefTkjK3L qt5YpwTm0Ups6Ff+2mrOB14miTwnXdVNKcetfYZnFKdHNsHZnD/XaNSLiGduhRcnhw lw5OS40WbwBlw== Date: Wed, 17 May 2023 13:02:20 +0300 From: Mike Rapoport To: "Pratoussy, Martin (GE Vernova)" Cc: "linux-mm@kvack.org" , "Kurtz1, Florian (GE Vernova)" Subject: Re: Disabling CONFIG_COMPACTION Message-ID: <20230517100220.GB4967@kernel.org> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Rspam-User: X-Rspamd-Server: rspam01 X-Rspamd-Queue-Id: A52F2180019 X-Stat-Signature: 168x958mfu1kgqinne6az9u4d1ydi7w3 X-HE-Tag: 1684317752-412093 X-HE-Meta: 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 3KQ6sJVH fF/vdoM9/wNzBc6iBJx0mx5kV+AK3q592FhxpgyBAfZOTb3sU2fjCA4K7i19svXpbERsfdopxYp11iougdQU2P6i5ycHuvaog8snEGclrqe89doIWC2W0yZBSnQbiudJEjyUlHZQaj58+wpldc94c6V/gSogfPuEdbcXHsIshLkG7+8OGddH8wDtgNEKr0TpTo6Gfn8Ub7mWN1Kie4mwnsDpMN+DgFQ90iyx0YEzWdnzwBlt64xg9u2F7qq6hnNZcQcMsgZ7vEcD7+cCI8tdnhBbrqbarzvvQpupKexoPem8unr/lmstFqfwygEcieBaJx4rTu7swJKhLw4nEqA+W3hF05iPMk/PymhpLQZB9g3NfUq1PD4QNi09gbpvL3007looZRa47xx3nrPUJL0yX1AoYnmLowPPxFKMxjX7r621R9kSBoPiSoDqOKA== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi, On Mon, May 15, 2023 at 08:44:30AM +0000, Pratoussy, Martin (GE Vernova) wrote: > Hello, > > We are facing an issue regarding Linux kernel 5.10.153. When we try to > allocate huge amount of memory, we eventually run prematurely out of > memory. The bug has been discovered as follows: although "free" and > "top" commands would show 40 MB of free memory, sending a 32 MB file > through SFTP into RAM cache will lead to an OOM error before finishing > the transfer. > It has been noted that the command "echo 1 > /prox/sys/vm/compact_memory" > leads into the very same behavior of the kernel. Disabling > CONFIG_COMPACTION is surprisingly resolving the allocation issue and we > are trying to understand why. > > You will find below more information about the error we are facing: > > * Architecture: Nios2 > * Total RAM size: 64 MB > * Available RAM size when error occurs: ~17MB > * Error message: "Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF" > > Would you have any idea of what is happening? Even without digging into the actual reason for OOM, it makes perfect sense to disable compaction on your system. > You will find attached the .config of our kernel. > > Best regards, > > Martin Pratoussy > Embedded software engineer apprentice - Electronics & High Voltage Digital, Grid Solutions > GE Renewable > M +33 (0)7 82 54 60 81 > www.gegridsolutions.com > 21, Rue Cyprian | 69100 Villeurbanne | France > -- Sincerely yours, Mike.