Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1946063AbdD1Jcz (ORCPT ); Fri, 28 Apr 2017 05:32:55 -0400 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:38867 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1035616AbdD1Jco (ORCPT ); Fri, 28 Apr 2017 05:32:44 -0400 Subject: Re: [PATCH v2 1/2] mm: Uncharge poisoned pages To: Balbir Singh , Naoya Horiguchi References: <1493130472-22843-1-git-send-email-ldufour@linux.vnet.ibm.com> <1493130472-22843-2-git-send-email-ldufour@linux.vnet.ibm.com> <1493171698.4828.1.camel@gmail.com> <20170426023410.GA11619@hori1.linux.bs1.fc.nec.co.jp> <1493178300.4828.5.camel@gmail.com> <20170426044608.GA32451@hori1.linux.bs1.fc.nec.co.jp> <1493197141.16329.1.camel@gmail.com> Cc: "linux-kernel@vger.kernel.org" , "linux-mm@kvack.org" , "akpm@linux-foundation.org" From: Laurent Dufour Date: Fri, 28 Apr 2017 11:32:31 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.8.0 MIME-Version: 1.0 In-Reply-To: <1493197141.16329.1.camel@gmail.com> Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 17042809-0008-0000-0000-000004359416 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17042809-0009-0000-0000-00001D741775 Message-Id: X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-04-28_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=2 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1703280000 definitions=main-1704280142 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1824 Lines: 46 On 26/04/2017 10:59, Balbir Singh wrote: > On Wed, 2017-04-26 at 04:46 +0000, Naoya Horiguchi wrote: >> On Wed, Apr 26, 2017 at 01:45:00PM +1000, Balbir Singh wrote: >>>>>> static int delete_from_lru_cache(struct page *p) >>>>>> { >>>>>> + if (memcg_kmem_enabled()) >>>>>> + memcg_kmem_uncharge(p, 0); >>>>>> + >>>>> >>>>> The changelog is not quite clear, so we are uncharging a page using >>>>> memcg_kmem_uncharge for a page in swap cache/page cache? >>>> >>>> Hi Balbir, >>>> >>>> Yes, in the normal page lifecycle, uncharge is done in page free time. >>>> But in memory error handling case, in-use pages (i.e. swap cache and page >>>> cache) are removed from normal path and they don't pass page freeing code. >>>> So I think that this change is to keep the consistent charging for such a case. >>> >>> I agree we should uncharge, but looking at the API name, it seems to >>> be for kmem pages, why are we not using mem_cgroup_uncharge()? Am I missing >>> something? >> >> Thank you for pointing out. >> Actually I had the same question and this surely looks strange. >> But simply calling mem_cgroup_uncharge() here doesn't work because it >> assumes that page_refcount(p) == 0, which is not true in hwpoison context. >> We need some other clearer way or at least some justifying comment about >> why this is ok. >> > > We should call mem_cgroup_uncharge() after isolate_lru_page()/put_page(). Thanks for the review Naoya and Balbir, I changed the patch to call mem_cgroup_uncharge() once isolate_lru_page() succeeded, but before calling put_page(). It seems to work fine. > We could check if page_count() is 0 or force if required (!MF_RECOVERED && > !MF_DELAYED). We could even skip the VM_BUG_ON if the page is poisoned. This doesn't seem to be needed. Am I still missing something here ? Cheers, Laurent.