Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp539089imm; Wed, 18 Jul 2018 06:38:15 -0700 (PDT) X-Google-Smtp-Source: AAOMgpdcnl8F8LEeElhCORa+LJxLabD11qauUfct2SkMBm6JcthesyLbVCQn9/k5TqIqn52qnRCL X-Received: by 2002:a65:6343:: with SMTP id p3-v6mr5985555pgv.48.1531921094967; Wed, 18 Jul 2018 06:38:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531921094; cv=none; d=google.com; s=arc-20160816; b=VfGutZQ94hPsamSGDZkE2qEguSQkxLOUURAb97hfq/gRoo+JbajQ5Jnpb428TY4MeU +39PMlIaybh3QvJS8YCyuHeJt/mssWFXhzm7t3hqNi+obvIqfyyB8fSpOKOncQPHmBiM ODI6nWUElQAeYv9OTYksNo1iRBpR7fJx0TH9jyu6e/SCFPMJaxAEThsxf08THTHrE9NB 2vXvhxsE/gOvhp1P0Nj5eIU/zrS/fXG0hHp1g3Nuo+c+oRsDZNPTqQYYh+fFhBtamKj+ Mek20ONUXUJKVqQHNXJ+tmDZXvHEWt4Kb58tF1KP94WKa0QLrQnnP/K8+on6RpyAB1wF T+OA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=7HUQv07uBdk1KPumkfGsGUVHBi4ADcLsUAztLR2H/O8=; b=XoCwbEUASF6QkUl3E0o16tb7Qq1FMNtTKSfe5IcdnY4rShOeptExDR2kWasoqC5W0s dceRqRTQyL0Q55IQTfs/CjtYZXHD0OGor5rnuYmp7hIw1g/f7tL8NxsZqNi3cebxFcck gzQAaW4j31Oaazv9e9tJbyrH0JFsgEIlQOWxlYdVsEHYIY9fXwVRzqgPBUA+eisi3HTL 13lIoS7w8o0C0Ey/IWB8Q+Uj5896bN4Sp6Pu4j/RTblSdXSlQGY0nqC1R7XCxLltAx7o gw749riu8em5s5f3H1i1qUnpQx9G0ZHwcS8qCoPqBM00rliczmyqDK3RpOEGr+MneNam omyw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x18-v6si3157931pfh.84.2018.07.18.06.37.59; Wed, 18 Jul 2018 06:38:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731589AbeGROOb (ORCPT + 99 others); Wed, 18 Jul 2018 10:14:31 -0400 Received: from mx2.suse.de ([195.135.220.15]:38052 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1730906AbeGROO3 (ORCPT ); Wed, 18 Jul 2018 10:14:29 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id D1E5DAD33; Wed, 18 Jul 2018 13:36:28 +0000 (UTC) From: Vlastimil Babka To: Andrew Morton Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, linux-api@vger.kernel.org, Roman Gushchin , Michal Hocko , Johannes Weiner , Christoph Lameter , David Rientjes , Joonsoo Kim , Mel Gorman , Matthew Wilcox , Vlastimil Babka Subject: [PATCH v3 2/7] mm, slab/slub: introduce kmalloc-reclaimable caches Date: Wed, 18 Jul 2018 15:36:15 +0200 Message-Id: <20180718133620.6205-3-vbabka@suse.cz> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180718133620.6205-1-vbabka@suse.cz> References: <20180718133620.6205-1-vbabka@suse.cz> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Kmem caches can be created with a SLAB_RECLAIM_ACCOUNT flag, which indicates they contain objects which can be reclaimed under memory pressure (typically through a shrinker). This makes the slab pages accounted as NR_SLAB_RECLAIMABLE in vmstat, which is reflected also the MemAvailable meminfo counter and in overcommit decisions. The slab pages are also allocated with __GFP_RECLAIMABLE, which is good for anti-fragmentation through grouping pages by mobility. The generic kmalloc-X caches are created without this flag, but sometimes are used also for objects that can be reclaimed, which due to varying size cannot have a dedicated kmem cache with SLAB_RECLAIM_ACCOUNT flag. A prominent example are dcache external names, which prompted the creation of a new, manually managed vmstat counter NR_INDIRECTLY_RECLAIMABLE_BYTES in commit f1782c9bc547 ("dcache: account external names as indirectly reclaimable memory"). To better handle this and any other similar cases, this patch introduces SLAB_RECLAIM_ACCOUNT variants of kmalloc caches, named kmalloc-rcl-X. They are used whenever the kmalloc() call passes __GFP_RECLAIMABLE among gfp flags. They are added to the kmalloc_caches array as a new type. Allocations with both __GFP_DMA and __GFP_RECLAIMABLE will use a dma type cache. This change only applies to SLAB and SLUB, not SLOB. This is fine, since SLOB's target are tiny system and this patch does add some overhead of kmem management objects. Signed-off-by: Vlastimil Babka --- include/linux/slab.h | 16 +++++++++++---- mm/slab_common.c | 48 ++++++++++++++++++++++++++++---------------- 2 files changed, 43 insertions(+), 21 deletions(-) diff --git a/include/linux/slab.h b/include/linux/slab.h index 4299c59353a1..d89e934e0d8b 100644 --- a/include/linux/slab.h +++ b/include/linux/slab.h @@ -296,11 +296,12 @@ static inline void __check_heap_object(const void *ptr, unsigned long n, (KMALLOC_MIN_SIZE) : 16) #define KMALLOC_NORMAL 0 +#define KMALLOC_RECLAIM 1 #ifdef CONFIG_ZONE_DMA -#define KMALLOC_DMA 1 -#define KMALLOC_TYPES 2 +#define KMALLOC_DMA 2 +#define KMALLOC_TYPES 3 #else -#define KMALLOC_TYPES 1 +#define KMALLOC_TYPES 2 #endif #ifndef CONFIG_SLOB @@ -309,12 +310,19 @@ extern struct kmem_cache *kmalloc_caches[KMALLOC_TYPES][KMALLOC_SHIFT_HIGH + 1]; static __always_inline unsigned int kmalloc_type(gfp_t flags) { int is_dma = 0; + int is_reclaimable; #ifdef CONFIG_ZONE_DMA is_dma = !!(flags & __GFP_DMA); #endif - return is_dma; + is_reclaimable = !!(flags & __GFP_RECLAIMABLE); + + /* + * If an allocation is botth __GFP_DMA and __GFP_RECLAIMABLE, return + * KMALLOC_DMA and effectively ignore __GFP_RECLAIMABLE + */ + return (is_dma * 2) + (is_reclaimable & !is_dma); } /* diff --git a/mm/slab_common.c b/mm/slab_common.c index 4614248ca381..614fb7ab8312 100644 --- a/mm/slab_common.c +++ b/mm/slab_common.c @@ -1107,10 +1107,21 @@ void __init setup_kmalloc_cache_index_table(void) } } -static void __init new_kmalloc_cache(int idx, slab_flags_t flags) +static void __init +new_kmalloc_cache(int idx, int type, slab_flags_t flags) { - kmalloc_caches[KMALLOC_NORMAL][idx] = create_kmalloc_cache( - kmalloc_info[idx].name, + const char *name; + + if (type == KMALLOC_RECLAIM) { + flags |= SLAB_RECLAIM_ACCOUNT; + name = kasprintf(GFP_NOWAIT, "kmalloc-rcl-%u", + kmalloc_info[idx].size); + BUG_ON(!name); + } else { + name = kmalloc_info[idx].name; + } + + kmalloc_caches[type][idx] = create_kmalloc_cache(name, kmalloc_info[idx].size, flags, 0, kmalloc_info[idx].size); } @@ -1122,22 +1133,25 @@ static void __init new_kmalloc_cache(int idx, slab_flags_t flags) */ void __init create_kmalloc_caches(slab_flags_t flags) { - int i; - int type = KMALLOC_NORMAL; + int i, type; - for (i = KMALLOC_SHIFT_LOW; i <= KMALLOC_SHIFT_HIGH; i++) { - if (!kmalloc_caches[type][i]) - new_kmalloc_cache(i, flags); + for (type = KMALLOC_NORMAL; type <= KMALLOC_RECLAIM; type++) { + for (i = KMALLOC_SHIFT_LOW; i <= KMALLOC_SHIFT_HIGH; i++) { + if (!kmalloc_caches[type][i]) + new_kmalloc_cache(i, type, flags); - /* - * Caches that are not of the two-to-the-power-of size. - * These have to be created immediately after the - * earlier power of two caches - */ - if (KMALLOC_MIN_SIZE <= 32 && !kmalloc_caches[type][1] && i == 6) - new_kmalloc_cache(1, flags); - if (KMALLOC_MIN_SIZE <= 64 && !kmalloc_caches[type][2] && i == 7) - new_kmalloc_cache(2, flags); + /* + * Caches that are not of the two-to-the-power-of size. + * These have to be created immediately after the + * earlier power of two caches + */ + if (KMALLOC_MIN_SIZE <= 32 && i == 6 && + !kmalloc_caches[type][1]) + new_kmalloc_cache(1, type, flags); + if (KMALLOC_MIN_SIZE <= 64 && i == 7 && + !kmalloc_caches[type][2]) + new_kmalloc_cache(2, type, flags); + } } /* Kmalloc array is now usable */ -- 2.18.0