Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1647733ybt; Thu, 2 Jul 2020 10:16:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyzUrrOPaZ0P//IUExsKBUFXIQH7OiDI+nxiIelc8h0PsIWJiRo3+6aLqcDNmot9rhpM37+ X-Received: by 2002:a05:6402:2c5:: with SMTP id b5mr22389606edx.316.1593710195537; Thu, 02 Jul 2020 10:16:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593710195; cv=none; d=google.com; s=arc-20160816; b=K5rsuE0xdPV4DwCLE78wDZHqUbTesVeUgNGdZha9wuRfPg1ScsXw1IFctgus7p5a4P WhElG6ElauLq5on78DLLYKclwgAoLqbrAqXxu8Qt5DrPQtYxS5IScChdRt/EodjywSzJ 2OQOQcqYYfWYRGsRHjMrsCoMMoD8+pIXxnrYhbc813C8PWY3IVNI06jYHt45BmkAw59m hY//whkaNa4jLvNVXBfRCOairQeQ4dRH5h8gRR/nN/rG2dTU6/3LArE/SDXFmRyGKIZ0 eDKAjRRqGpFkDLzcPG+q8Ps93vT0+AxwhulopVXekOHZ0J4G1IJVnO2K/7SYBdgHgp2J DPbA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=VVnE4dgvyAySr2AFaA3khkVH7tNEvr0JK5jKeXH+JQw=; b=XSniU7THhsHwq5tKTR99gkNRtd6M+ZCecr+Yba7rTTGvQY+Mhsh5d3V7DlKUHectMW wxCEUosfOrc4cPjv8yTELHE6XrfVhoqVAjMLfGu0HTy8Jlgwg7QcEAdTOTII48qJTFYK fB1FGzOmRMHJ982d4onNZifoH1Lw4Vy5FZj7gb3XQtYIm5NIaInhWNN9dvJ83Pjjd74E cjZT7BrCR4NV1ufsgtmB6MTB9LecAwXI2PdE3whdzU0FHcla+LTv/43hrRmLDFDZWLr1 Rh7rdqd5MaLxFx1p6vRJNFBAPhiyPFbfsVIsrjJ9MzA35ZRaUwnOL+FiKy+nLs9bbkNj zHCA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l15si5879269ejq.119.2020.07.02.10.16.12; Thu, 02 Jul 2020 10:16:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727944AbgGBRNG (ORCPT + 99 others); Thu, 2 Jul 2020 13:13:06 -0400 Received: from mail-ed1-f68.google.com ([209.85.208.68]:41622 "EHLO mail-ed1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727939AbgGBRNF (ORCPT ); Thu, 2 Jul 2020 13:13:05 -0400 Received: by mail-ed1-f68.google.com with SMTP id e22so24748166edq.8 for ; Thu, 02 Jul 2020 10:13:04 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=VVnE4dgvyAySr2AFaA3khkVH7tNEvr0JK5jKeXH+JQw=; b=E88RV0GJ4qfH3ZZ18t4A0aou6wY4Spn0IogKeSbet7ghWERlp3LVTR3KI66YmcbMVV bBbZQ4089uwviSUww5XjCFvmRkuC+aRCvfzeiR/L84tv2hsX/bmVKEGNJDq3V6o/l+nW bXMqcIIGZppAeLObyGemvQ6njzyUoeD27YTIpnViih2qMbZgtEHeF8KlbTz7SGZSnH6s 416pSHrwASpqBZRDy6Iq3ND7WJHAaFWeAO8FaKIwXa7/Qq8DnDdeO+X5/5dJwQgy4O7r VTRe0LvQQfwe8zWmam2cHnqczl8Ky9VP2mPq8+d6W/wjoAxqEaNuijWyNi5g2Jlb2RvB 1yzg== X-Gm-Message-State: AOAM532URzdrj92TWLYVu4xwcuHBt9duhBaKTavbdwbmDT5/7hwFkf0V mKA6vPLasdzwnJMYWPEHZwQ= X-Received: by 2002:aa7:c50e:: with SMTP id o14mr36265439edq.168.1593709983439; Thu, 02 Jul 2020 10:13:03 -0700 (PDT) Received: from localhost (ip-37-188-168-3.eurotel.cz. [37.188.168.3]) by smtp.gmail.com with ESMTPSA id x4sm7204449eju.2.2020.07.02.10.13.02 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Jul 2020 10:13:02 -0700 (PDT) Date: Thu, 2 Jul 2020 19:13:02 +0200 From: Michal Hocko To: Roman Gushchin Cc: Naresh Kamboju , Shakeel Butt , Johannes Weiner , Andrew Morton , linux-mm , open list , lkft-triage@lists.linaro.org, Chris Down Subject: Re: BUG: Bad page state in process - page dumped because: page still charged to cgroup Message-ID: <20200702171302.GK18446@dhcp22.suse.cz> References: <20200701082904.GM2369@dhcp22.suse.cz> <20200701184552.GA61684@carbon.DHCP.thefacebook.com> <20200702162202.GI18446@dhcp22.suse.cz> <20200702163738.GA106423@carbon.dhcp.thefacebook.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200702163738.GA106423@carbon.dhcp.thefacebook.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 02-07-20 09:37:38, Roman Gushchin wrote: > On Thu, Jul 02, 2020 at 06:22:02PM +0200, Michal Hocko wrote: > > On Wed 01-07-20 11:45:52, Roman Gushchin wrote: > > [...] > > > >From c97afecd32c0db5e024be9ba72f43d22974f5bcd Mon Sep 17 00:00:00 2001 > > > From: Roman Gushchin > > > Date: Wed, 1 Jul 2020 11:05:32 -0700 > > > Subject: [PATCH] mm: kmem: make memcg_kmem_enabled() irreversible > > > > > > Historically the kernel memory accounting was an opt-in feature, which > > > could be enabled for individual cgroups. But now it's not true, and > > > it's on by default both on cgroup v1 and cgroup v2. And as long as a > > > user has at least one non-root memory cgroup, the kernel memory > > > accounting is on. So in most setups it's either always on (if memory > > > cgroups are in use and kmem accounting is not disabled), either always > > > off (otherwise). > > > > > > memcg_kmem_enabled() is used in many places to guard the kernel memory > > > accounting code. If memcg_kmem_enabled() can reverse from returning > > > true to returning false (as now), we can't rely on it on release paths > > > and have to check if it was on before. > > > > > > If we'll make memcg_kmem_enabled() irreversible (always returning true > > > after returning it for the first time), it'll make the general logic > > > more simple and robust. It also will allow to guard some checks which > > > otherwise would stay unguarded. > > > > > > Signed-off-by: Roman Gushchin > > > --- > > > mm/memcontrol.c | 6 ++---- > > > 1 file changed, 2 insertions(+), 4 deletions(-) > > > > > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > > > index 50ae77f3985e..2d018a51c941 100644 > > > --- a/mm/memcontrol.c > > > +++ b/mm/memcontrol.c > > > @@ -3582,7 +3582,8 @@ static int memcg_online_kmem(struct mem_cgroup *memcg) > > > objcg->memcg = memcg; > > > rcu_assign_pointer(memcg->objcg, objcg); > > > > > > - static_branch_inc(&memcg_kmem_enabled_key); > > > + if (!memcg_kmem_enabled()) > > > + static_branch_inc(&memcg_kmem_enabled_key); > > > > Wouldn't be static_branch_enable() more readable? > > Agree, will change, add reported-by and tested-by tags and resend. > Thanks! Feel free to add Acked-by: Michal Hocko > Btw, don't we wanna to change memcg_kmem_enabled() definition > from static_branch_unlikely() to static_branch_likely()? Honestly, I do not know what would be the impact but considering kmem is enabled unless explicitly disabled these days then likely sounds more logical from reading POV. I do not think that early allocations until the first memcg is created is the case to optimize for. Worth a separate patch I guess. -- Michal Hocko SUSE Labs