Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1609687ybt; Thu, 2 Jul 2020 09:23:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxeBBJiYySGDjUk4jgDi1oMTo7pdhnjnCGbGF9A+ul05eujecWmOGNJNt7JOkLALsLMya4R X-Received: by 2002:a50:cc8a:: with SMTP id q10mr36588169edi.257.1593707005957; Thu, 02 Jul 2020 09:23:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593707005; cv=none; d=google.com; s=arc-20160816; b=d0XmKXZ3///XMr2q8fFPi4WreZBk/hGwz0Q0TkWwcQQlM4bR8eyyW815kYwzazC5E1 y12l8bqElO7+V8/H00uGPHN6avAVkkubyayUFWQwfNEwlV/Ho6BLuoQbMzJgHSBsarrs f/e8bqC9Da19oIXTZUpSPp2wz3EQbZznAvi+pCEcPxjJDSoiv1q9CxBmdu6jdcruZgOp F7Q0W/BJJBWNBaNVb35sYPBXL8dV4Tyj9khPjmUrs29nnahEJx3MO4hfUyIVUVp5PsCn uYfqqZbT8wPtM+ndQZDVmY/O9Fe/yG0fU6UldzeZZuEHNJ5Gw/zt1Vsh7RbvIliWkjUB VJ/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=DbONkljCM39wKkgdtWGmPLeGjsUj+0c2PNnDTJ43lyE=; b=VGfwULXg1fJRTI08q3Tm+p0FlD3iG+pPCCpkX1si72tEBgtjm7K8PWYYwH0wFb/T7M 3UyqX1AIT800DfyOYwoB7j+0oljZbDbRfZtKLa/iwU1kDrs1AUmdRu0xgD4LgjgSbalF uoTslZxvjZ5UjBeRqidGOShEizL7YGtWvUocOQY0U3mVEHpoxxd//JuY1KUaK1Z55jQX c9zoNfrp8AuSRqsMNanWPCrxwgbvKR0lm0zmsPZPcunFnO/w3sfkRijLpAVqhcTO+4Oz Y2euB+DbbMSEkGwooeiF3VzzX5ycU69T0SJHaZ/D9COofhEpfhzaKH5PEzCsCKJpF4LK aMNA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o10si6346399ejx.722.2020.07.02.09.23.02; Thu, 02 Jul 2020 09:23:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726449AbgGBQWH (ORCPT + 99 others); Thu, 2 Jul 2020 12:22:07 -0400 Received: from mail-ej1-f68.google.com ([209.85.218.68]:45716 "EHLO mail-ej1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726119AbgGBQWH (ORCPT ); Thu, 2 Jul 2020 12:22:07 -0400 Received: by mail-ej1-f68.google.com with SMTP id a1so30443425ejg.12 for ; Thu, 02 Jul 2020 09:22:06 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=DbONkljCM39wKkgdtWGmPLeGjsUj+0c2PNnDTJ43lyE=; b=dXWgSWCGeaj8Uyc3ccn94fJw5oC64tl73Y2gQ56e6RVxqEecezu/49glx5H233wDyC zWXJxpICrj5kmNEEKWoCXoAMhYqiJH+n106iF7Bd+HArBc7ZNIquVSQ9RUloXeKi/YYq +Vzw7BfdFKYK9wFL6d6ZTbkXGai2wBlBRiGBI4BW1jfnuGVwbO2AOVME0DtKW4/ZTBh2 41lSefZKu8ps2MASjnhAoq+eHZV7xVg3PfkbrLFRupw7KTkogj5fJltMGBwJiRyzLOEd c1PEvHICGLSGNblrsGsNBmIX5QAMdZw0as005oYwfGuJ3PNKotxhjqiiXaqr2ZwxxlIM vpzQ== X-Gm-Message-State: AOAM532mz0MxFuYp/bZOwFLIXcZkvW69ne7t5f3kwoM618RD0aJoomcK JFo9Il66nnueCmST9Hctszk= X-Received: by 2002:a17:906:7686:: with SMTP id o6mr29370028ejm.326.1593706925426; Thu, 02 Jul 2020 09:22:05 -0700 (PDT) Received: from localhost (ip-37-188-168-3.eurotel.cz. [37.188.168.3]) by smtp.gmail.com with ESMTPSA id q7sm7261247eja.69.2020.07.02.09.22.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Jul 2020 09:22:04 -0700 (PDT) Date: Thu, 2 Jul 2020 18:22:02 +0200 From: Michal Hocko To: Roman Gushchin Cc: Naresh Kamboju , Shakeel Butt , Johannes Weiner , Andrew Morton , linux-mm , open list , lkft-triage@lists.linaro.org, Chris Down Subject: Re: BUG: Bad page state in process - page dumped because: page still charged to cgroup Message-ID: <20200702162202.GI18446@dhcp22.suse.cz> References: <20200701082904.GM2369@dhcp22.suse.cz> <20200701184552.GA61684@carbon.DHCP.thefacebook.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200701184552.GA61684@carbon.DHCP.thefacebook.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed 01-07-20 11:45:52, Roman Gushchin wrote: [...] > >From c97afecd32c0db5e024be9ba72f43d22974f5bcd Mon Sep 17 00:00:00 2001 > From: Roman Gushchin > Date: Wed, 1 Jul 2020 11:05:32 -0700 > Subject: [PATCH] mm: kmem: make memcg_kmem_enabled() irreversible > > Historically the kernel memory accounting was an opt-in feature, which > could be enabled for individual cgroups. But now it's not true, and > it's on by default both on cgroup v1 and cgroup v2. And as long as a > user has at least one non-root memory cgroup, the kernel memory > accounting is on. So in most setups it's either always on (if memory > cgroups are in use and kmem accounting is not disabled), either always > off (otherwise). > > memcg_kmem_enabled() is used in many places to guard the kernel memory > accounting code. If memcg_kmem_enabled() can reverse from returning > true to returning false (as now), we can't rely on it on release paths > and have to check if it was on before. > > If we'll make memcg_kmem_enabled() irreversible (always returning true > after returning it for the first time), it'll make the general logic > more simple and robust. It also will allow to guard some checks which > otherwise would stay unguarded. > > Signed-off-by: Roman Gushchin > --- > mm/memcontrol.c | 6 ++---- > 1 file changed, 2 insertions(+), 4 deletions(-) > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > index 50ae77f3985e..2d018a51c941 100644 > --- a/mm/memcontrol.c > +++ b/mm/memcontrol.c > @@ -3582,7 +3582,8 @@ static int memcg_online_kmem(struct mem_cgroup *memcg) > objcg->memcg = memcg; > rcu_assign_pointer(memcg->objcg, objcg); > > - static_branch_inc(&memcg_kmem_enabled_key); > + if (!memcg_kmem_enabled()) > + static_branch_inc(&memcg_kmem_enabled_key); Wouldn't be static_branch_enable() more readable? > /* > * A memory cgroup is considered kmem-online as soon as it gets > * kmemcg_id. Setting the id after enabling static branching will > @@ -3643,9 +3644,6 @@ static void memcg_free_kmem(struct mem_cgroup *memcg) > /* css_alloc() failed, offlining didn't happen */ > if (unlikely(memcg->kmem_state == KMEM_ONLINE)) > memcg_offline_kmem(memcg); > - > - if (memcg->kmem_state == KMEM_ALLOCATED) > - static_branch_dec(&memcg_kmem_enabled_key); > } > #else > static int memcg_online_kmem(struct mem_cgroup *memcg) > -- > 2.26.2 -- Michal Hocko SUSE Labs