Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1893261imm; Sun, 15 Jul 2018 20:40:15 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfg5UqY7Al8xNdw+UXYJMrpT4cMNIhQagqMdivyiUqvcliB3Q7V9ARF66gCMz3vcMNANU4B X-Received: by 2002:a17:902:6ac3:: with SMTP id i3-v6mr2647444plt.252.1531712415601; Sun, 15 Jul 2018 20:40:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531712415; cv=none; d=google.com; s=arc-20160816; b=qabybuVB/sRmw5UL/4QJu9cfphY/L4D9VUHEREJP++62DGgoBo49zBPnUyiUr0R3PE JyX8XTYCKEXDW5eWKav18rgo7gpi+x+GqJKkAnvU64hb9uP6/AgdcwL9Sl85kojLWlY7 XeW/OxzdgHDshUIT+Lmg9EbjPYg+0qKHBJNECFvQaaSSyMvOyiXyBWZfA47hLe31vQYE aBivsVrgbs0GawiGzAObuhiANhAfnQmrM5oXA8qwbbZdOrTk30O56cn3OruFtFOtG07s injTFRxJowphU+I2vRWbX0xmNdZ4vWys5zzcjNVSjWq/ThYTF5RgnRJLj1UThhV44Gr5 GEGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=XTKRxXwARErFdamAx7nM6wlMEjskJT0yFImSXgE9+v0=; b=g2lz0QY2Yyh3EmbDYO2dLQfIkJ1CpLP3qSWJlE43lPa3klDCMp+lURVTTSK3YhJ41f WSaT+OlewPu+aLb89g8LMb0aun4yPuRxQ1uAylf8o/Q0AQoKCDfdcjGGS7e53lzeZDrR d7iUuFYZz3dCk2b7Tejc3CiJGmuwvrQHgvkO8tVXxZHq9vfcqkGD9dLxPIezu2KapF1q kp20gNPJNeY4Z6v4Uqlh/2XNCv8+MMLtqdsxagaHFN7kU8hPtmlql3jlZKIk+9u58WtL aMHKb/VFoq50zyYIfsthlL901Jo/sWbMfntWjZFFLhEWEQ1TmPkhe3FuRpZ/NM2VXtEZ 4h1A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=YbBcrUW9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s184-v6si28409483pgb.161.2018.07.15.20.40.00; Sun, 15 Jul 2018 20:40:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=YbBcrUW9; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726353AbeGPEEp (ORCPT + 99 others); Mon, 16 Jul 2018 00:04:45 -0400 Received: from mail-it0-f66.google.com ([209.85.214.66]:50489 "EHLO mail-it0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725731AbeGPEEp (ORCPT ); Mon, 16 Jul 2018 00:04:45 -0400 Received: by mail-it0-f66.google.com with SMTP id w16-v6so18920155ita.0; Sun, 15 Jul 2018 20:39:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=XTKRxXwARErFdamAx7nM6wlMEjskJT0yFImSXgE9+v0=; b=YbBcrUW9s8U2fYOynpA3TsRHCtBGtJZO3VE8a7/hqRyN6CKA7ivMpmsInoBa3lEm7G hD1jVeAmHE0OlAJIxegU/FmrBtOsk+QwM0WElp2TmktTb9c4ES3MMB+OkrfS60R4vb3Z Vh9BGqLU/8oU91s4AXZtIrleGFKphVBScvAENubRdldW7bOMDKjiKjj6fP4wtb2JDcg+ QJhZCfSdYpsQMc5DWnBb/KNXVBEmIwGXPEFKHm1inksHrO3VUU+blNL2WW2hZhoBVONV Nf2rhO69V5e7xae2fGz6AS3O15phtwUTROLdLE9tiT6ssw+h5WnBkmb1yI0I6eXps8Y/ RYHg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=XTKRxXwARErFdamAx7nM6wlMEjskJT0yFImSXgE9+v0=; b=UPbvA+Y8UeEVwMnaxy6y4XhT7NKEfcxz0OlJn3BZ5TrI55NzFhUJsHzFyvwqlI+gEV KgDNYbtO9nwBKJV5leXgTJwaVpu5v7FUWkWnOPMcRBKIOC/dUwst+yoPWjaAlrgXbG9S KNJ+lZsU39m4yDbhDd7/G4fyrcZo3do1HXfWH9tT5RvsaqhlhRbvfSOQC5K5K/CmA88W hIHRpqJcj3c01oYa3Qk1jM00WtAKCT4ONwNs1LESkiCSSgJm1mM3pSZWMn845zCvJ7TV ATHg6JksUPAHgDDB/bxsbWQuDZH0FwJNw84JZ9A13OgmIOdnPmNj6xBz7YhRCvxAwXie T4pw== X-Gm-Message-State: AOUpUlFFIoWf+w2hHoMJ3LMepIKX01CzFMnY14zXhcmbnyqKawXL3GCT sN/XsSDXoWss4igd1fHtk7tSXZHOEL/dB1Tg/2o= X-Received: by 2002:a24:9194:: with SMTP id i142-v6mr11426600ite.142.1531712366378; Sun, 15 Jul 2018 20:39:26 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a6b:7a47:0:0:0:0:0 with HTTP; Sun, 15 Jul 2018 20:38:45 -0700 (PDT) In-Reply-To: References: <1531557122-12540-1-git-send-email-laoar.shao@gmail.com> From: Yafang Shao Date: Mon, 16 Jul 2018 11:38:45 +0800 Message-ID: Subject: Re: [PATCH] mm: avoid bothering interrupted task when charge memcg in softirq To: Shakeel Butt Cc: Johannes Weiner , Michal Hocko , Vladimir Davydov , Cgroups , Linux MM , LKML , Roman Gushchin Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 16, 2018 at 11:09 AM, Shakeel Butt wrote: > On Sun, Jul 15, 2018 at 6:50 PM Yafang Shao wrote: >> >> On Sun, Jul 15, 2018 at 11:04 PM, Shakeel Butt wrote: >> > On Sun, Jul 15, 2018 at 1:02 AM Yafang Shao wrote: >> >> >> >> On Sun, Jul 15, 2018 at 2:34 PM, Shakeel Butt wrote: >> >> > On Sat, Jul 14, 2018 at 10:26 PM Yafang Shao wrote: >> >> >> >> >> >> On Sun, Jul 15, 2018 at 12:25 PM, Shakeel Butt wrote: >> >> >> > On Sat, Jul 14, 2018 at 7:10 PM Yafang Shao wrote: >> >> >> >> >> >> >> >> On Sat, Jul 14, 2018 at 11:38 PM, Shakeel Butt wrote: >> >> >> >> > On Sat, Jul 14, 2018 at 1:32 AM Yafang Shao wrote: >> >> >> >> >> >> >> >> >> >> try_charge maybe executed in packet receive path, which is in interrupt >> >> >> >> >> context. >> >> >> >> >> In this situation, the 'current' is the interrupted task, which may has >> >> >> >> >> no relation to the rx softirq, So it is nonsense to use 'current'. >> >> >> >> >> >> >> >> >> > >> >> >> >> > Have you actually seen this occurring? >> >> >> >> >> >> >> >> Hi Shakeel, >> >> >> >> >> >> >> >> I'm trying to produce this issue, but haven't find it occur yet. >> >> >> >> >> >> >> >> > I am not very familiar with the >> >> >> >> > network code but I can think of two ways try_charge() can be called >> >> >> >> > from network code. Either through kmem charging or through >> >> >> >> > mem_cgroup_charge_skmem() and both locations correctly handle >> >> >> >> > interrupt context. >> >> >> >> > >> >> >> >> >> >> >> >> Why do you say that mem_cgroup_charge_skmem() correctly hanle >> >> >> >> interrupt context ? >> >> >> >> >> >> >> >> Let me show you why mem_cgroup_charge_skmem isn't hanling interrupt >> >> >> >> context correctly. >> >> >> >> >> >> >> >> mem_cgroup_charge_skmem() is calling try_charge() twice. >> >> >> >> The first one is with GFP_NOWAIT as the gfp_mask, and the second one >> >> >> >> is with (GFP_NOWAIT | __GFP_NOFAIL) as the gfp_mask. >> >> >> >> >> >> >> >> If page_counter_try_charge() failes at the first time, -ENOMEM is returned. >> >> >> >> Then mem_cgroup_charge_skmem() will call try_charge() once more with >> >> >> >> __GFP_NOFAIL set, and this time if If page_counter_try_charge() failes >> >> >> >> again the ' >> >> >> >> force' label in try_charge() will be executed and 0 is returned. >> >> >> >> >> >> >> >> No matter what, the 'current' will be used and touched, that is >> >> >> >> meaning mem_cgroup_charge_skmem() isn't hanling the interrupt context >> >> >> >> correctly. >> >> >> >> >> >> >> > >> >> >> > Hi Yafang, >> >> >> > >> >> >> > If you check mem_cgroup_charge_skmem(), the memcg passed is not >> >> >> > 'current' but is from the sock object i.e. sk->sk_memcg for which the >> >> >> > network buffer is allocated for. >> >> >> > >> >> >> >> >> >> That's correct, the memcg if from the sock object. >> >> >> But the point is, in this situation why 'current' is used in try_charge() ? >> >> >> As 'current' is not related with the memcg, which is just a interrupted task. >> >> >> >> >> > >> >> > Hmm so you mean the behavior of memcg charging in the interrupt >> >> > context depends on the state of the interrupted task. >> >> >> >> Yes. >> >> >> >> > As you have >> >> > noted, mem_cgroup_charge_skmem() tries charging again with >> >> > __GFP_NOFAIL and the charge succeeds. Basically the memcg charging by >> >> > mem_cgroup_charge_skmem() will always succeed irrespective of the >> >> > state of the interrupted task. However mem_cgroup_charge_skmem() can >> >> > return true if the interrupted task was exiting or a fatal signal is >> >> > pending or oom victim or reclaiming memory. Can you please explain why >> >> > this is bad? >> >> > >> >> >> >> Let me show you the possible issues cause by this behavoir. >> >> 1. In mem_cgroup_oom(), some members in 'current' is set. >> >> That means an innocent task will be in task_in_memcg_oom state. >> >> But this task may be in a different memcg, I mean the memcg of >> >> the 'current' may be differenct with the sk->sk_memcg. >> >> Then when this innocent 'current' do try_charge it will hit "if >> >> (unlikely(task_in_memcg_oom(current)))" and -ENOMEM is returned, >> >> While there're maybe some free memory (or some memory could be freed ) >> >> in the memcg of the innocent 'task'. >> >> >> > >> > No memory will be freed as try_charge() is in interrupt context. >> > >> >> I mean when this interrupted 'current' is running, that's in process context. >> In process context it should call try_to_free_mem_cgroup_pages() to >> free some memory, >> but it will hit "if (unlikely(task_in_memcg_oom(current)))" before as >> it is set in the interrupt context. >> >> That's an obviously issue. Do you understand ? >> > > Not really. I couldn't find where current->memcg_in_oom can be set in > the interrupt context. > You are right. current->memcg_in_oom can't be set in the interrupt context. >> >> 2. If the interrupted task was exiting or a fatal signal is pending >> >> or oom victim, >> >> it will directly goto force and 0 is returned, and then >> >> mem_cgroup_charge_skmem() will return true. >> >> But mem_cgroup_charge_skmem() maybe need to try the second time >> >> and return false. >> >> >> >> That are all unexpected behavoir. >> >> >> > >> > Yes, this is inconsistent behavior. Can you explain how this will >> > affect network traffic? Basically mem_cgroup_charge_skmem() was >> > supposed to return false but sometime based on the interrupted task, >> > mem_cgroup_charge_skmem() returns true. How is this behavior bad for >> > network traffic? >> > >> >> You could see the funtion __sk_mem_raise_allocated(). >> If mem_cgroup_charge_skmem() return false, it will goto >> suppress_allocation and uncharge skmem, >> while when mem_cgroup_charge_skmem() return true, it will charge skmem >> sucessfully. >> >> The consequence behavior is sk_rmem_schedule may fail while it should sucess. >> And then it will call tcp_prune_queue() and tcp collapse may take a long time. >> > > Is that a good thing or bad? > From what I understand with your change > if charge fails, sk_rmem_schedule will always fail. However without > your change the interrupted task's state might help sk_rmem_schedule > to pass. I am all for consistent behavior but I wanted to make sure if > that is what you are aiming for. > Yes, with this change it will always fail. Without this change it may sucess depends on the interrupted task's state. My previous statement makes some mistake. I have no clear idea it is bad or good. That's why I'm trying to produce the issue now. But I think that we should avoid this unexpected behavior due to state of the random interrupted task. > Anyways, from what I remember Facebook is using the cgroup-v2's tcpmem > accounting. Johannes or Roman can shed some light if they have > observed this issue in production and might have opinion on how to > solve it. > > thanks, > Shakeel