Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp759147pxb; Tue, 3 Nov 2020 11:41:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJwvBGxCBscPUVsMuQroQNgGx6R8oollgNUFBW5UyzEu1tbFsISp+Et1SamVKPARmQHBOWFA X-Received: by 2002:a17:907:42a1:: with SMTP id nf1mr22432881ejb.135.1604432486888; Tue, 03 Nov 2020 11:41:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604432486; cv=none; d=google.com; s=arc-20160816; b=Gwx4kXuMA9WsJPNsO7zTTRJjjXwT9HiZ0MAqJI1vs2Pvx8rXzwyz83UWF8qwOmihPf muy1Qr6C7y+dgMStJo+8JO271usLwn/wqetKS5/AoECwPqhhDN+HxBj6V58FRgksizZP pFNmHAshZV/QaPPQmucU3wEbDPjzRZQ1M9K1JLKppYfB706aTuGy42B4J+0IRW9jZ4PW bTIptHO0KVIND8TSbWg1/s6iL/uiZ5CvEysMc077uPuS4elQm8VEJw2/iBJaKJsi8nOW FP8VdTf5E+1OHCVyerIzRuNx2h2UlktmkPR0WoBH9QsKeimnnV57BTLpxKi/OP39TvTf D2oA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:subject:cc:to:from :dkim-signature; bh=YH5qs3ECwIUFehV5nWCcU1wrJlau/0WJfkMsxtIJe9c=; b=HmL5WeSZkUjwHGquy+ubtZMezavWnzFVHwhmTXvNlazy7PdZfs18doXNOE1CAX3Hqd TqpTMfw4X+FIMrKAusWzaV25nLSQM1miOkKGGkwlQmxHJvh5GO1xv8Pz4YOjgbTNQO62 aGaLvxFDpFZm7MJnNsSq7Ci8jZf5xkJ3/dJwA9Koj3BwX+wP31EG8uTrBgUmzcUkbIb0 ga+upQVzfqvsm7dDWru3g/xuMAvcrVEry/8DcwaRdZUAnDCEUqUbTl/r/7HGmZiYwc4c WlxoIdaiqkqzpTRSoM9Z/kwIJ7Fxwz8YEJgEsKuv658YNlOiJglom+3ui5J4PjM4B41r mBhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=BVpG3BI8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h34si12743778edd.264.2020.11.03.11.41.03; Tue, 03 Nov 2020 11:41:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2020-01-29 header.b=BVpG3BI8; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729552AbgKCThM (ORCPT + 99 others); Tue, 3 Nov 2020 14:37:12 -0500 Received: from userp2120.oracle.com ([156.151.31.85]:46800 "EHLO userp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725957AbgKCThM (ORCPT ); Tue, 3 Nov 2020 14:37:12 -0500 Received: from pps.filterd (userp2120.oracle.com [127.0.0.1]) by userp2120.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 0A3JZ8Vc186834; Tue, 3 Nov 2020 19:37:02 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id; s=corp-2020-01-29; bh=YH5qs3ECwIUFehV5nWCcU1wrJlau/0WJfkMsxtIJe9c=; b=BVpG3BI8HrP72ZvUl4B2PeIMOmoyNVmQJiHdTzXOqFY3lP0skPEmhtFItMQ2Xn5HNRAB AtF6JDOerH2yynwCiP7rC3AAMgkcM1M8KRYpYXgvGERDfj5GygLCmG6OzoMQZlG79tPt SnT0XY15HbcRkUihP2MU+TsexDa7e+s/FkufAnmNNWDtOgyVOdPcYjG5qs1hCHz9hm6C g1ZpPfZAqro60DgnTDiuO2nXqJOAMIslG13VCGvpu5ff77QNQX3Ru46lVodjMcJSnpDh kNVY7OkwqhwLiI8dzfQsFQxwJ6JytoCv4x0VlBEg877Biwh4526xbB3ssd4jgnw07eOi SA== Received: from aserp3030.oracle.com (aserp3030.oracle.com [141.146.126.71]) by userp2120.oracle.com with ESMTP id 34hhw2k5xw-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Tue, 03 Nov 2020 19:37:02 +0000 Received: from pps.filterd (aserp3030.oracle.com [127.0.0.1]) by aserp3030.oracle.com (8.16.0.42/8.16.0.42) with SMTP id 0A3JYnWx194954; Tue, 3 Nov 2020 19:35:01 GMT Received: from userv0122.oracle.com (userv0122.oracle.com [156.151.31.75]) by aserp3030.oracle.com with ESMTP id 34jf48y4mj-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Tue, 03 Nov 2020 19:35:01 +0000 Received: from abhmp0013.oracle.com (abhmp0013.oracle.com [141.146.116.19]) by userv0122.oracle.com (8.14.4/8.14.4) with ESMTP id 0A3JYwdD005340; Tue, 3 Nov 2020 19:34:58 GMT Received: from localhost.localdomain (/10.211.9.80) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Tue, 03 Nov 2020 11:34:57 -0800 From: Dongli Zhang To: linux-mm@kvack.org, netdev@vger.kernel.org Cc: linux-kernel@vger.kernel.org, akpm@linux-foundation.org, davem@davemloft.net, kuba@kernel.org, dongli.zhang@oracle.com, aruna.ramakrishna@oracle.com, bert.barbe@oracle.com, rama.nichanamatlu@oracle.com, venkat.x.venkatsubra@oracle.com, manjunath.b.patil@oracle.com, joe.jin@oracle.com, srinivas.eeda@oracle.com Subject: [PATCH 1/1] mm: avoid re-using pfmemalloc page in page_frag_alloc() Date: Tue, 3 Nov 2020 11:32:39 -0800 Message-Id: <20201103193239.1807-1-dongli.zhang@oracle.com> X-Mailer: git-send-email 2.17.1 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9794 signatures=668682 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0 suspectscore=0 mlxscore=0 bulkscore=0 malwarescore=0 mlxlogscore=999 phishscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2011030131 X-Proofpoint-Virus-Version: vendor=nai engine=6000 definitions=9794 signatures=668682 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 adultscore=0 malwarescore=0 mlxscore=0 suspectscore=0 clxscore=1011 priorityscore=1501 impostorscore=0 spamscore=0 lowpriorityscore=0 mlxlogscore=999 phishscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2011030131 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The ethernet driver may allocates skb (and skb->data) via napi_alloc_skb(). This ends up to page_frag_alloc() to allocate skb->data from page_frag_cache->va. During the memory pressure, page_frag_cache->va may be allocated as pfmemalloc page. As a result, the skb->pfmemalloc is always true as skb->data is from page_frag_cache->va. The skb will be dropped if the sock (receiver) does not have SOCK_MEMALLOC. This is expected behaviour under memory pressure. However, once kernel is not under memory pressure any longer (suppose large amount of memory pages are just reclaimed), the page_frag_alloc() may still re-use the prior pfmemalloc page_frag_cache->va to allocate skb->data. As a result, the skb->pfmemalloc is always true unless page_frag_cache->va is re-allocated, even the kernel is not under memory pressure any longer. Here is how kernel runs into issue. 1. The kernel is under memory pressure and allocation of PAGE_FRAG_CACHE_MAX_ORDER in __page_frag_cache_refill() will fail. Instead, the pfmemalloc page is allocated for page_frag_cache->va. 2: All skb->data from page_frag_cache->va (pfmemalloc) will have skb->pfmemalloc=true. The skb will always be dropped by sock without SOCK_MEMALLOC. This is an expected behaviour. 3. Suppose a large amount of pages are reclaimed and kernel is not under memory pressure any longer. We expect skb->pfmemalloc drop will not happen. 4. Unfortunately, page_frag_alloc() does not proactively re-allocate page_frag_alloc->va and will always re-use the prior pfmemalloc page. The skb->pfmemalloc is always true even kernel is not under memory pressure any longer. Therefore, this patch always checks and tries to avoid re-using the pfmemalloc page for page_frag_alloc->va. Cc: Aruna Ramakrishna Cc: Bert Barbe Cc: Rama Nichanamatlu Cc: Venkat Venkatsubra Cc: Manjunath Patil Cc: Joe Jin Cc: SRINIVAS Signed-off-by: Dongli Zhang --- mm/page_alloc.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/mm/page_alloc.c b/mm/page_alloc.c index 23f5066bd4a5..291df2f9f8f3 100644 --- a/mm/page_alloc.c +++ b/mm/page_alloc.c @@ -5075,6 +5075,16 @@ void *page_frag_alloc(struct page_frag_cache *nc, struct page *page; int offset; + /* + * Try to avoid re-using pfmemalloc page because kernel may already + * run out of the memory pressure situation at any time. + */ + if (unlikely(nc->va && nc->pfmemalloc)) { + page = virt_to_page(nc->va); + __page_frag_cache_drain(page, nc->pagecnt_bias); + nc->va = NULL; + } + if (unlikely(!nc->va)) { refill: page = __page_frag_cache_refill(nc, gfp_mask); -- 2.17.1