Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3547377pxk; Mon, 21 Sep 2020 17:26:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzteEyHWg0W/ivatRzkqKlMuTQ7ahxsHrIxJqFRgo94WuThUvgX9TYByBJaJldT4qHc/INN X-Received: by 2002:a17:906:33ca:: with SMTP id w10mr2268446eja.438.1600734414548; Mon, 21 Sep 2020 17:26:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600734414; cv=none; d=google.com; s=arc-20160816; b=EH4TnvJdqlUnBx9ejNzouMKT82oJacZRvyGF7ouXmRs2L5njzHfYemelh44d/vTy+J AW8uD39NOqgAswiqvtmIfAlYlP80bwJUmwhHYlr4btqhwtVLk5aEt1eNzZGvGeftRXYb oPe2YZqV1fggeYj29aQblMjEzEDxKc+yZm9f8EV+njo1Vg80pqV00vydtdG9pQJQnUqV a+LLXhXcT2XwHIYpzxgDt6bm7v3+ADT3MxSvO3nMnwH/rg6/dXS7ACWoimeu7JrI89I3 AHyF4SgoDuDAlmIfEna1rIYNjppFux/Dvd9uh2fzyrtmuZFbVZ1te2aWBjQlrPktSo3W Cn/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date:dkim-signature; bh=BcuKgc3jGxItkyWiUdeL+SY34z52t2Wt1/MsImKvlh8=; b=a/HsCTgZARin58VRqrwfBXKU2jbEIJ56VE9s7wzrGOAt1g1uivEQqsY0SmzxDLGxRY wQitxm7ktRFCednkFKMBEuDC+Jmoocb6ywO+7yI4y0MO3/lHkmlL8AOYaWMDhdzvIu29 ZCfDZYsFG4BQBxELvKlb/5inUWumCY6hfY52AviV+pUdqW9Km14TiCmG6JMLvYzjYTJ2 9KjGUxojBRv5mclQLDjwyDD+bJZuNaKfas5aZ5KJRogPBZPAyQk4WhZBkCBghFLyPWnr 8FOImdD2j9iq13/t8RPDTas2Q7CtmVBMx8ZVfrHjjnhK1emMTjctBxfIyZmzhNh3qxNp Wfzw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=OwUkAegz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n13si8923050ejd.442.2020.09.21.17.26.31; Mon, 21 Sep 2020 17:26:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=OwUkAegz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728788AbgIUXQ1 (ORCPT + 99 others); Mon, 21 Sep 2020 19:16:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38178 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726457AbgIUXQ0 (ORCPT ); Mon, 21 Sep 2020 19:16:26 -0400 Received: from mail-oo1-xc44.google.com (mail-oo1-xc44.google.com [IPv6:2607:f8b0:4864:20::c44]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D0CBC061755 for ; Mon, 21 Sep 2020 16:16:26 -0700 (PDT) Received: by mail-oo1-xc44.google.com with SMTP id o20so3702213ook.1 for ; Mon, 21 Sep 2020 16:16:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:in-reply-to:message-id:references :user-agent:mime-version; bh=BcuKgc3jGxItkyWiUdeL+SY34z52t2Wt1/MsImKvlh8=; b=OwUkAegznMAyRepl3dJUGb6AvehwhPSLy4u20VbZg7b+iDXgW9jL56zxMha44sB13R b7CQj+PEtHbo/sPf6l9KPOdgDx/la5T3n/cKY2W4QElvKFp/TMCWvLVXJN/ciFtjjO5d Va3JBo4OiFysnblBrHIAXeOeESaLSYPEmu5M068HhHikVBrqb1OowVkOfw4xMWoLFr+Q zzLJjj36wE2eg3hiGR4dehp4k+9zAkBkwU7M69DTdJtkWY/FViEjHFgZ1bO0A6mTE+lb jMtXZLwDIw7LH1GX0vl/tXViaZYdZx3tgTlmsmIwpb1bfnEn9bLowtektJJksCMuf4G3 oC4A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:in-reply-to:message-id :references:user-agent:mime-version; bh=BcuKgc3jGxItkyWiUdeL+SY34z52t2Wt1/MsImKvlh8=; b=Frme6Wwo/HogB9sHlhR5SNUqo1hyjK3UNAt72I/Q9JIo74exgR7+CDGuOiWCeCYU+/ qkL6yzxckZuAQv2sVnYXurqFiJchfvKMrXm82RuEDifvFLPpcyiM/M2dLRQn3+UA5eHm NntpU5pEgohPBs0uatWfjrOVnnrowHrEnCBRc1LtJn8G+ax187oGiwyx+njz0RAE9VFb OaGQenczQoOwsX/ZNyZHSSvVZGWkDZyZbqBpqH9eS/jgj58Mi2Avv0ly3+erDyYYYpLY 66swnMbrq/pD9EUqkh1mRwYLWStqBUDQSuNwBfzz9xYGRvXK68OaiLrGIgUpmd4s7B/x lwSw== X-Gm-Message-State: AOAM5313tXapLTdmsKLyetUqHseitqjNZIDef+WMEjQU7ExY7Nc1Ayg+ xT3tbOtRmmE7kZVGer0qfRdatA== X-Received: by 2002:a4a:a58f:: with SMTP id d15mr1160919oom.36.1600730185416; Mon, 21 Sep 2020 16:16:25 -0700 (PDT) Received: from eggly.attlocal.net (172-10-233-147.lightspeed.sntcca.sbcglobal.net. [172.10.233.147]) by smtp.gmail.com with ESMTPSA id j24sm6298704otn.64.2020.09.21.16.16.22 (version=TLS1 cipher=ECDHE-ECDSA-AES128-SHA bits=128/128); Mon, 21 Sep 2020 16:16:24 -0700 (PDT) Date: Mon, 21 Sep 2020 16:16:16 -0700 (PDT) From: Hugh Dickins X-X-Sender: hugh@eggly.anvils To: Alex Shi cc: akpm@linux-foundation.org, mgorman@techsingularity.net, tj@kernel.org, hughd@google.com, khlebnikov@yandex-team.ru, daniel.m.jordan@oracle.com, willy@infradead.org, hannes@cmpxchg.org, lkp@intel.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, cgroups@vger.kernel.org, shakeelb@google.com, iamjoonsoo.kim@lge.com, richard.weiyang@gmail.com, kirill@shutemov.name, alexander.duyck@gmail.com, rong.a.chen@intel.com, mhocko@suse.com, vdavydov.dev@gmail.com, shy828301@gmail.com, Michal Hocko Subject: Re: [PATCH v18 16/32] mm/lru: introduce TestClearPageLRU In-Reply-To: <1598273705-69124-17-git-send-email-alex.shi@linux.alibaba.com> Message-ID: References: <1598273705-69124-1-git-send-email-alex.shi@linux.alibaba.com> <1598273705-69124-17-git-send-email-alex.shi@linux.alibaba.com> User-Agent: Alpine 2.11 (LSU 23 2013-08-11) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 24 Aug 2020, Alex Shi wrote: > Currently lru_lock still guards both lru list and page's lru bit, that's > ok. but if we want to use specific lruvec lock on the page, we need to > pin down the page's lruvec/memcg during locking. Just taking lruvec > lock first may be undermined by the page's memcg charge/migration. To > fix this problem, we could clear the lru bit out of locking and use > it as pin down action to block the page isolation in memcg changing. > > So now a standard steps of page isolation is following: > 1, get_page(); #pin the page avoid to be free > 2, TestClearPageLRU(); #block other isolation like memcg change > 3, spin_lock on lru_lock; #serialize lru list access > 4, delete page from lru list; > The step 2 could be optimzed/replaced in scenarios which page is > unlikely be accessed or be moved between memcgs. > > This patch start with the first part: TestClearPageLRU, which combines > PageLRU check and ClearPageLRU into a macro func TestClearPageLRU. This > function will be used as page isolation precondition to prevent other > isolations some where else. Then there are may !PageLRU page on lru > list, need to remove BUG() checking accordingly. > > There 2 rules for lru bit now: > 1, the lru bit still indicate if a page on lru list, just in some > temporary moment(isolating), the page may have no lru bit when > it's on lru list. but the page still must be on lru list when the > lru bit set. > 2, have to remove lru bit before delete it from lru list. > > Hugh Dickins pointed that when a page is in free path and no one is > possible to take it, non atomic lru bit clearing is better, like in > __page_cache_release and release_pages. > And no need get_page() before lru bit clear in isolate_lru_page, > since it '(1) Must be called with an elevated refcount on the page'. Delete that paragraph: you're justifying changes made during the course of earlier review, but not needed here. If we start to comment on everything that is not done...! > > As Andrew Morton mentioned this change would dirty cacheline for page > isn't on LRU. But the lost would be acceptable with Rong Chen > report: > https://lkml.org/lkml/2020/3/4/173 Please use a lore link instead, lkml.org is nice but unreliable: https://lore.kernel.org/lkml/20200304090301.GB5972@shao2-debian/ > > Suggested-by: Johannes Weiner > Signed-off-by: Alex Shi Acked-by: Hugh Dickins when you make the changes suggested above and below. I still have long-standing reservations about this TestClearPageLRU technique (it's hard to reason about, and requires additional atomic ops in some places); but it's working, so I'd like it to go in, then later we can experiment with whether lock_page_memcg() does a better job, or rechecking memcg when getting the lru_lock (my original technique). > Cc: Hugh Dickins > Cc: Johannes Weiner > Cc: Michal Hocko > Cc: Vladimir Davydov > Cc: Andrew Morton > Cc: linux-kernel@vger.kernel.org > Cc: cgroups@vger.kernel.org > Cc: linux-mm@kvack.org > --- > include/linux/page-flags.h | 1 + > mm/mlock.c | 3 +-- > mm/swap.c | 5 ++--- > mm/vmscan.c | 18 +++++++----------- > 4 files changed, 11 insertions(+), 16 deletions(-) > > diff --git a/include/linux/page-flags.h b/include/linux/page-flags.h > index 6be1aa559b1e..9554ed1387dc 100644 > --- a/include/linux/page-flags.h > +++ b/include/linux/page-flags.h > @@ -326,6 +326,7 @@ static inline void page_init_poison(struct page *page, size_t size) > PAGEFLAG(Dirty, dirty, PF_HEAD) TESTSCFLAG(Dirty, dirty, PF_HEAD) > __CLEARPAGEFLAG(Dirty, dirty, PF_HEAD) > PAGEFLAG(LRU, lru, PF_HEAD) __CLEARPAGEFLAG(LRU, lru, PF_HEAD) > + TESTCLEARFLAG(LRU, lru, PF_HEAD) > PAGEFLAG(Active, active, PF_HEAD) __CLEARPAGEFLAG(Active, active, PF_HEAD) > TESTCLEARFLAG(Active, active, PF_HEAD) > PAGEFLAG(Workingset, workingset, PF_HEAD) > diff --git a/mm/mlock.c b/mm/mlock.c > index 93ca2bf30b4f..3762d9dd5b31 100644 > --- a/mm/mlock.c > +++ b/mm/mlock.c > @@ -107,13 +107,12 @@ void mlock_vma_page(struct page *page) > */ > static bool __munlock_isolate_lru_page(struct page *page, bool getpage) > { > - if (PageLRU(page)) { > + if (TestClearPageLRU(page)) { > struct lruvec *lruvec; > > lruvec = mem_cgroup_page_lruvec(page, page_pgdat(page)); > if (getpage) > get_page(page); > - ClearPageLRU(page); > del_page_from_lru_list(page, lruvec, page_lru(page)); > return true; > } > diff --git a/mm/swap.c b/mm/swap.c > index f80ccd6f3cb4..446ffe280809 100644 > --- a/mm/swap.c > +++ b/mm/swap.c > @@ -83,10 +83,9 @@ static void __page_cache_release(struct page *page) > struct lruvec *lruvec; > unsigned long flags; > > + __ClearPageLRU(page); > spin_lock_irqsave(&pgdat->lru_lock, flags); > lruvec = mem_cgroup_page_lruvec(page, pgdat); > - VM_BUG_ON_PAGE(!PageLRU(page), page); > - __ClearPageLRU(page); > del_page_from_lru_list(page, lruvec, page_off_lru(page)); > spin_unlock_irqrestore(&pgdat->lru_lock, flags); > } > @@ -880,9 +879,9 @@ void release_pages(struct page **pages, int nr) > spin_lock_irqsave(&locked_pgdat->lru_lock, flags); > } > > - lruvec = mem_cgroup_page_lruvec(page, locked_pgdat); > VM_BUG_ON_PAGE(!PageLRU(page), page); > __ClearPageLRU(page); > + lruvec = mem_cgroup_page_lruvec(page, locked_pgdat); > del_page_from_lru_list(page, lruvec, page_off_lru(page)); > } > Please delete all those mods to mm/swap.c from this patch. This patch is about introducing TestClearPageLRU, but that is not involved here. Several versions ago, yes it was, then I pointed out that these are operations on refcount 0 pages, and we don't want to add unnecessary atomic operations on them. I expect you want to keep the rearrangements, but do them where you need them later (I expect that's in 20/32). And I notice that one VM_BUG_ON_PAGE was kept and the other deleted: though one can certainly argue that they're redundant (as all BUGs should be), I think most people will feel safer to keep them both. > diff --git a/mm/vmscan.c b/mm/vmscan.c > index 7b7b36bd1448..1b3e0eeaad64 100644 > --- a/mm/vmscan.c > +++ b/mm/vmscan.c > @@ -1665,8 +1665,6 @@ static unsigned long isolate_lru_pages(unsigned long nr_to_scan, > page = lru_to_page(src); > prefetchw_prev_lru_page(page, src, flags); > > - VM_BUG_ON_PAGE(!PageLRU(page), page); > - > nr_pages = compound_nr(page); > total_scan += nr_pages; > It is not enough to remove just that one VM_BUG_ON_PAGE there. This is a patch series, and we don't need it to be perfect at every bisection point between patches, but we do need it to be reasonably robust, so as not to waste unrelated bughunters' time. It didn't take me very long to crash on the "default: BUG()" further down isolate_lru_pages(), because now PageLRU may get cleared at any instant, whatever locks are held. (But you're absolutely right to leave the compaction and pagevec mods to subsequent patches: it's fairly safe to separate those out, and much easier for reviewers that you did so.) This patch is much more robust with __isolate_lru_page() mods below on top. I agree there's other ways to do it, but given that nobody cares what the error return is from __isolate_lru_page(), except for the isolate_lru_pages() switch statement BUG() which has become invalid, I suggest just use -EBUSY throughout __isolate_lru_page(). Yes, we can and should change that switch statement to an "if {} else {}" without any BUG(), but I don't want to mess you around at this time, leave cleanup like that until later. Please fold in this patch on top: --- a/mm/vmscan.c +++ b/mm/vmscan.c @@ -1540,7 +1540,7 @@ unsigned int reclaim_clean_pages_from_list(struct zone *zone, */ int __isolate_lru_page(struct page *page, isolate_mode_t mode) { - int ret = -EINVAL; + int ret = -EBUSY; /* Only take pages on the LRU. */ if (!PageLRU(page)) @@ -1550,8 +1550,6 @@ int __isolate_lru_page(struct page *page, isolate_mode_t mode) if (PageUnevictable(page) && !(mode & ISOLATE_UNEVICTABLE)) return ret; - ret = -EBUSY; - /* * To minimise LRU disruption, the caller can indicate that it only * wants to isolate pages it will be able to operate on without @@ -1598,8 +1596,10 @@ int __isolate_lru_page(struct page *page, isolate_mode_t mode) * sure the page is not being freed elsewhere -- the * page release code relies on it. */ - ClearPageLRU(page); - ret = 0; + if (TestClearPageLRU(page)) + ret = 0; + else + put_page(page); } return ret; > @@ -1763,21 +1761,19 @@ int isolate_lru_page(struct page *page) > VM_BUG_ON_PAGE(!page_count(page), page); > WARN_RATELIMIT(PageTail(page), "trying to isolate tail page"); > > - if (PageLRU(page)) { > + if (TestClearPageLRU(page)) { > pg_data_t *pgdat = page_pgdat(page); > struct lruvec *lruvec; > + int lru = page_lru(page); > > - spin_lock_irq(&pgdat->lru_lock); > + get_page(page); > lruvec = mem_cgroup_page_lruvec(page, pgdat); > - if (PageLRU(page)) { > - int lru = page_lru(page); > - get_page(page); > - ClearPageLRU(page); > - del_page_from_lru_list(page, lruvec, lru); > - ret = 0; > - } > + spin_lock_irq(&pgdat->lru_lock); > + del_page_from_lru_list(page, lruvec, lru); > spin_unlock_irq(&pgdat->lru_lock); > + ret = 0; > } > + > return ret; > } And a small mod to isolate_lru_page() to be folded in. I had never noticed this before, but here you are evaluating page_lru() after clearing PageLRU, but before getting lru_lock: that seems unsafe. I'm pretty sure it's unsafe at this stage of the series; I did once persuade myself that it becomes safe by the end of the series, but I've already forgotten the argument for that (I have already said TestClearPageLRU is difficult to reason about). Please don't force us to have to think about this! Just get page_lru after lru_lock. --- a/mm/vmscan.c +++ b/mm/vmscan.c @@ -1764,12 +1764,11 @@ int isolate_lru_page(struct page *page) if (TestClearPageLRU(page)) { pg_data_t *pgdat = page_pgdat(page); struct lruvec *lruvec; - int lru = page_lru(page); get_page(page); lruvec = mem_cgroup_page_lruvec(page, pgdat); spin_lock_irq(&pgdat->lru_lock); - del_page_from_lru_list(page, lruvec, lru); + del_page_from_lru_list(page, lruvec, page_lru(page)); spin_unlock_irq(&pgdat->lru_lock); ret = 0; } And lastly, please do check_move_unevictable_pages()'s TestClearPageLRU mod here at the end of mm/vmscan.c in this patch: I noticed that your lruv19 branch is doing it in a later patch, but it fits better here.