Received: by 2002:a05:6a10:6744:0:0:0:0 with SMTP id w4csp3815753pxu; Mon, 12 Oct 2020 01:42:34 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzCZQz3iVllUfY4GYjoWYl4NgTexELIwhGcIyi1/0EksKM1EotuNDtNSK3Gnw2fVSHapToP X-Received: by 2002:a17:906:3ada:: with SMTP id z26mr5083274ejd.151.1602492154409; Mon, 12 Oct 2020 01:42:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1602492154; cv=none; d=google.com; s=arc-20160816; b=yArNtj+dvM1yqULJq3FPV0Oi4EO90uJ8m3X4ojUJyr6+erI3bmNk/4Yv+JuZg2lWdP dbQBgOp7m4iUUIJ35xrxxUnPBXHupEGgty+WFzo6lX8/qCdHy1qWINf2qDtJo3h03Klw C6i/THl4Ym2HiGby2i6WRxU1pusVnUTCJ2byya4Bh/WmmWt3AMhFHe1nDwN4EvXl6XQJ OJvTk9h3pRLeMCBjzntBXWqLmytFBQPxev4iQvpWzHajaGC+KBZnWanylqw1S7csGdlh dkPtM4IA312Ic+1DrfHAwPqRHMd1CaFeY5FPCRyn6sxtKyyenIB72vAQb0xueLpsyflp Z7/g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=nTI2YVEwOfgh9p+oFG+z1qgnrhBmz+BUoqQKcix3EZ0=; b=suB0+4s/bgjv+8nKNwrK1GoTKBh14L1Jt/b6jnETLgr7JDjrnneHTZoM1OeCuoC+tE CBl4mVXY8e9jWtzep37TiNnRt/4wCN7ozGTpvCaDGEp0SD9bO5quf7ugS2PPtVyTqYIV j2TH7FjGgPOq3k2jUZe/Dv9KyLXrukXUMGSk1gVB+Q99Xq0QoXoAp5SlCpD5fmSAY/4l QqLpr6dqcJIL5m57IkSYUbDCp0sfLD+IAPH4oNkpZZ9mbRF6PHFzpgk4YdQiIYTrX+8F NFddLUAf0Wf2kaoIJDn1ojVzXcF1rT4brj8v0zGCLnjpUOv52X9E+i5ONTmAjnVC29Df GXqA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bytedance-com.20150623.gappssmtp.com header.s=20150623 header.b=vqGvXRZV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v13si871798eju.630.2020.10.12.01.42.11; Mon, 12 Oct 2020 01:42:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@bytedance-com.20150623.gappssmtp.com header.s=20150623 header.b=vqGvXRZV; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=bytedance.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727610AbgJLIkG (ORCPT + 99 others); Mon, 12 Oct 2020 04:40:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41120 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727121AbgJLIkF (ORCPT ); Mon, 12 Oct 2020 04:40:05 -0400 Received: from mail-pf1-x444.google.com (mail-pf1-x444.google.com [IPv6:2607:f8b0:4864:20::444]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A71AEC0613D1 for ; Mon, 12 Oct 2020 01:40:05 -0700 (PDT) Received: by mail-pf1-x444.google.com with SMTP id c20so2263430pfr.8 for ; Mon, 12 Oct 2020 01:40:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=nTI2YVEwOfgh9p+oFG+z1qgnrhBmz+BUoqQKcix3EZ0=; b=vqGvXRZVq1jW4sgEi8S0/sHNxlcmL0ZqERj4Pwa/WZ/ql0G1AeXGVR3f0CADFyveGx yE4XNBUehdPzqu2tIoeidrSoNM+0p+0j7cD6/4C60mkXbuwx65n9284S00AVMuCMxpzo uqC2OXUTVpLHQgjMfUzNeNti7tYU4VRki29c2wScgRT6DVhDhxHhld/yLPfdsOhNpiIT HjAcfMVzJE3T9Kbg0UMlUJz+JCT5AHgArYOkj2SUDhQXJV/3KxaCC79zC7ZAP/nVi9uH jN9YsFuUeBuLNATPATZ0u25+bWi/vJ+VL/CNOz+ep9qFyHAmUYLN9mhb4C6/FxmKGN2v G5Dw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=nTI2YVEwOfgh9p+oFG+z1qgnrhBmz+BUoqQKcix3EZ0=; b=OwJBDbWyJwSjck4a7th1PoFDc0lJIWp6FD5RpRliR6AAXZZy2CeNndDgqVkCLd/O1q iMqaHKN4UU7v5kAdQOJAjkVKmzyIa1RzdQ8LhQiWctpomIULwYWX4CJMoB7+nHegZDtK jwFQZjeUa25y+z+nCljPF0ndsHZ0m5ASzMENC2YwK3OiovMb+6dDOaGPMwXTnHplvKUg wv5jC77q7j3MdrOYa39kfXx2pcKgLRefpG6JN3WzWUYWhM/IGsV3rnkiuhbkGyJbEe3M F0440ezMirulMvvtzvWAyZy0I39g+6QKuq+NIdnMHd4eGS2+5lfM7jhE3/Hp/YHDri1r FimQ== X-Gm-Message-State: AOAM5316i2YBR+V4B1WpNtVOvbo+I963aoD9fzZ7wkVKHpgnEuIxbH8f 2HyDrFabZkIGtrjr7pvuYSyxVtZBxZZiTb2mrjZYCw== X-Received: by 2002:a63:fd0a:: with SMTP id d10mr12237891pgh.273.1602492005028; Mon, 12 Oct 2020 01:40:05 -0700 (PDT) MIME-Version: 1.0 References: <20201010103854.66746-1-songmuchun@bytedance.com> In-Reply-To: From: Muchun Song Date: Mon, 12 Oct 2020 16:39:28 +0800 Message-ID: Subject: Re: [External] Re: [PATCH] mm: proc: add Sock to /proc/meminfo To: Eric Dumazet Cc: Cong Wang , Greg KH , rafael@kernel.org, "Michael S. Tsirkin" , Jason Wang , David Miller , Jakub Kicinski , Alexey Dobriyan , Andrew Morton , Alexey Kuznetsov , Hideaki YOSHIFUJI , Steffen Klassert , Herbert Xu , Shakeel Butt , Will Deacon , Michal Hocko , Roman Gushchin , Neil Brown , rppt@kernel.org, Sami Tolvanen , "Kirill A. Shutemov" , Feng Tang , Paolo Abeni , Willem de Bruijn , Randy Dunlap , Florian Westphal , gustavoars@kernel.org, Pablo Neira Ayuso , Dexuan Cui , Jakub Sitnicki , Peter Zijlstra , Christian Brauner , "Eric W. Biederman" , Thomas Gleixner , dave@stgolabs.net, Michel Lespinasse , Jann Horn , chenqiwu@xiaomi.com, christophe.leroy@c-s.fr, Minchan Kim , Martin KaFai Lau , Alexei Starovoitov , Daniel Borkmann , Miaohe Lin , Kees Cook , LKML , virtualization@lists.linux-foundation.org, Linux Kernel Network Developers , linux-fsdevel , linux-mm Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Oct 12, 2020 at 3:42 PM Eric Dumazet wrote: > > On Mon, Oct 12, 2020 at 6:22 AM Muchun Song wr= ote: > > > > On Mon, Oct 12, 2020 at 2:39 AM Cong Wang wr= ote: > > > > > > On Sat, Oct 10, 2020 at 3:39 AM Muchun Song wrote: > > > > > > > > The amount of memory allocated to sockets buffer can become signifi= cant. > > > > However, we do not display the amount of memory consumed by sockets > > > > buffer. In this case, knowing where the memory is consumed by the k= ernel > > > > > > We do it via `ss -m`. Is it not sufficient? And if not, why not addin= g it there > > > rather than /proc/meminfo? > > > > If the system has little free memory, we can know where the memory is v= ia > > /proc/meminfo. If a lot of memory is consumed by socket buffer, we cann= ot > > know it when the Sock is not shown in the /proc/meminfo. If the unaware= user > > can't think of the socket buffer, naturally they will not `ss -m`. The > > end result > > is that we still don=E2=80=99t know where the memory is consumed. And w= e add the > > Sock to the /proc/meminfo just like the memcg does('sock' item in the c= group > > v2 memory.stat). So I think that adding to /proc/meminfo is sufficient. > > > > > > > > > static inline void __skb_frag_unref(skb_frag_t *frag) > > > > { > > > > - put_page(skb_frag_page(frag)); > > > > + struct page *page =3D skb_frag_page(frag); > > > > + > > > > + if (put_page_testzero(page)) { > > > > + dec_sock_node_page_state(page); > > > > + __put_page(page); > > > > + } > > > > } > > > > > > You mix socket page frag with skb frag at least, not sure this is exa= ctly > > > what you want, because clearly skb page frags are frequently used > > > by network drivers rather than sockets. > > > > > > Also, which one matches this dec_sock_node_page_state()? Clearly > > > not skb_fill_page_desc() or __skb_frag_ref(). > > > > Yeah, we call inc_sock_node_page_state() in the skb_page_frag_refill(). > > So if someone gets the page returned by skb_page_frag_refill(), it must > > put the page via __skb_frag_unref()/skb_frag_unref(). We use PG_private > > to indicate that we need to dec the node page state when the refcount o= f > > page reaches zero. > > > > Pages can be transferred from pipe to socket, socket to pipe (splice() > and zerocopy friends...) > > If you want to track TCP memory allocations, you always can look at > /proc/net/sockstat, > without adding yet another expensive memory accounting. The 'mem' item in the /proc/net/sockstat does not represent real memory usage. This is just the total amount of charged memory. For example, if a task sends a 10-byte message, it only charges one page to memcg. But the system may allocate 8 pages. Therefore, it does not truly reflect the memory allocated by the above memory allocation path. We can see the difference via the following message. cat /proc/net/sockstat sockets: used 698 TCP: inuse 70 orphan 0 tw 617 alloc 134 mem 13 UDP: inuse 90 mem 4 UDPLITE: inuse 0 RAW: inuse 1 FRAG: inuse 0 memory 0 cat /proc/meminfo | grep Sock Sock: 13664 kB The /proc/net/sockstat only shows us that there are 17*4 kB TCP memory allocations. But apply this patch, we can see that we truly allocate 13664 kB(May be greater than this value because of per-cpu stat cache). Of course the load of the example here is not high. In some high load cases, I believe the difference here will be even greater. --=20 Yours, Muchun