Received: by 10.192.165.156 with SMTP id m28csp559028imm; Fri, 13 Apr 2018 04:04:48 -0700 (PDT) X-Google-Smtp-Source: AIpwx4+xvEc6h9qeSL05zLObc/Ok41SI2vDZSk1RzePbLuNrNvkDtJntPPF0bNPrYXytGlvTM1CF X-Received: by 2002:a17:902:8501:: with SMTP id bj1-v6mr4753998plb.239.1523617488489; Fri, 13 Apr 2018 04:04:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523617488; cv=none; d=google.com; s=arc-20160816; b=VOyiqUCTD3bZzmX4NnKGRDCCzV9G5hnkS6uwzEMScc0bh13yA/o8FXLeYYiOjb8GIq lwasUqEPPXpFSg3uYVBOKP6QDUwfZOxk67aAfQJfgIgWuoCHsSgd1olQxi3ws9URm611 4vWpF8LHgFHhYgu6vgSCltIGCvUzV6BjILMo9PDkk0QtK7HYsGKkAPUVTIE5aTfwFWas cHT5tmsLhkUTXOdTnWZUPir+lzXODygIJFUtUbS4AZTMfBDPqlEQhbqGQwr0vQe8zGUL l87EGlMDAhohXXuNdIPqJ6Sut53XWa04EBeGjbdzvs8NVNx8YOEdsZV5YQVKoeua04bd tKZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=5LPfxt6emPUETNeqdwrEqsC0DWNU33fhr13FollfUiQ=; b=olt7EkTfS9Ge1LkewGwAhPqV/7D8qetPjwzTS6texcMsi/3GjedvrXujYOPL/3WNlc 2q6qXO9uLCxfXjlnWt7Rsn4E+l5XHagNGmOMxnMcwmr9RugSWCT6pRJJl8fJUlW6/Ogc ifRz7D5zIoGYpVk8DdJmzXAE8nJL4L4F2ocdytfEMKyEyPQGzsbAdZ/8cIQAITzCP0Y5 7BAG9Dr4uu9Yn+wdTLKuEouLBwDeQ8YHXcJfPpFNxH6Q8rlUSMBP3QoLhS0uEk8y281c ez8sEb+NguhLeCKOO3gjPp7N4Ly9r+8mOEEF6YWZTLrCtcehy0NLxIHBquZDFZS52+gA EnGw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e9si3860165pgv.306.2018.04.13.04.04.34; Fri, 13 Apr 2018 04:04:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753989AbeDMLCH (ORCPT + 99 others); Fri, 13 Apr 2018 07:02:07 -0400 Received: from mx2.suse.de ([195.135.220.15]:37116 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753296AbeDMLCF (ORCPT ); Fri, 13 Apr 2018 07:02:05 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 1FB3CACB8; Fri, 13 Apr 2018 11:02:04 +0000 (UTC) Date: Fri, 13 Apr 2018 13:02:00 +0200 From: Michal Hocko To: Kirill Tkhai Cc: akpm@linux-foundation.org, hannes@cmpxchg.org, vdavydov.dev@gmail.com, cgroups@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH] memcg: Remove memcg_cgroup::id from IDR on mem_cgroup_css_alloc() failure Message-ID: <20180413110200.GG17484@dhcp22.suse.cz> References: <152354470916.22460.14397070748001974638.stgit@localhost.localdomain> <20180413085553.GF17484@dhcp22.suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri 13-04-18 12:35:22, Kirill Tkhai wrote: > On 13.04.2018 11:55, Michal Hocko wrote: > > On Thu 12-04-18 17:52:04, Kirill Tkhai wrote: > > [...] > >> @@ -4471,6 +4477,7 @@ mem_cgroup_css_alloc(struct cgroup_subsys_state *parent_css) > >> > >> return &memcg->css; > >> fail: > >> + mem_cgroup_id_remove(memcg); > >> mem_cgroup_free(memcg); > >> return ERR_PTR(-ENOMEM); > >> } > > > > The only path which jumps to fail: here (in the current mmotm tree) is > > error = memcg_online_kmem(memcg); > > if (error) > > goto fail; > > > > AFAICS and the only failure path in memcg_online_kmem > > memcg_id = memcg_alloc_cache_id(); > > if (memcg_id < 0) > > return memcg_id; > > > > I am not entirely clear on memcg_alloc_cache_id but it seems we do clean > > up properly. Or am I missing something? > > memcg_alloc_cache_id() may allocate a lot of memory, in case of the system reached > memcg_nr_cache_ids cgroups. In this case it iterates over all LRU lists, and double > size of every of them. In case of memory pressure it can fail. If this occurs, > mem_cgroup::id is not unhashed from IDR and we leak this id. OK, my bad I was looking at the bad code path. So you want to clean up after mem_cgroup_alloc not memcg_online_kmem. Now it makes much more sense. Sorry for the confusion on my end. Anyway, shouldn't we do the thing in mem_cgroup_free() to be symmetric to mem_cgroup_alloc? -- Michal Hocko SUSE Labs