Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp1223488pxf; Fri, 2 Apr 2021 04:52:02 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzw2X0rLR66eZ0RB/17SvbDVnJKI9thEtx+B0ve6FEdlLivvyhbpRBA7qRkp6Jrs8yUcNTu X-Received: by 2002:a17:906:e2d4:: with SMTP id gr20mr13836875ejb.432.1617364322130; Fri, 02 Apr 2021 04:52:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617364322; cv=none; d=google.com; s=arc-20160816; b=HxaByf/b3SjZkJh2W+4yXjvmVbzIlr63OysDEBs+8uBM8FCMrKj6ZPOQ7hKYi8EijS yRWfEiLTG3UNqo9t719mFQoN7T24Ossk0JJ6sjGX8a4A1HOfhqUi1wuxatJre7a5VdJg GMSAlOH78ixTywTUc7k7+gjadSRslLIxjByecW2/E594dZxCQTyoK2sUXtbQNK2fdsom P/3/+jrLDREayDKBruy/yAcdEug8/CpvXxcT/vDluzljERP7OfA5vn3Xne/AKNQ9nhJ1 DFXYXu5MmSpdq9l+0L0+hey8XVQQhxEkHIc3w/Sq008CupKwMKgHHYzSTH8RbOXg3k7t Mjrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=pCjEZECQPiebw+X1K1zwiGvYJ/xWjSlqTQ96fn3lqUk=; b=NSaNvimvzvIPWYyiOC/7ACvkS5aHgUluajCrzWfsvwp7GnGwgN1iOYWcXOut1O2llL FcPxnOTYs2yzWEc4YZRYIIz205ZFAnzCrBqacpE+Eod5p+L07th/e56UoxWeehiZ6Yfd 13l5hpueYTDEqZVPJj5EOi3M+9zw/ZGBkb6h9l1DLo5m+OLi0ojwOQkbRnceBb3XQFm8 h9yPu6Y65a3RDILsvUK0PYz2DG5gjev2qHT1piIQfK4bfWl1hTY0LXfGTuaElBkMTEh4 BVXV0ZKDs7aiidMpOzb9jDvQnp7nb0clwVfzDjIn2MbjK60BtF9dVymi/y5d8LrzNmNy 6lnQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gentoo.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u5si6128625ejt.35.2021.04.02.04.51.15; Fri, 02 Apr 2021 04:52:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gentoo.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234161AbhDBLus (ORCPT + 99 others); Fri, 2 Apr 2021 07:50:48 -0400 Received: from smtp.gentoo.org ([140.211.166.183]:50824 "EHLO smtp.gentoo.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229599AbhDBLus (ORCPT ); Fri, 2 Apr 2021 07:50:48 -0400 Date: Fri, 2 Apr 2021 12:50:39 +0100 From: Sergei Trofimovich To: Andrew Morton Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, Ingo Molnar , Peter Zijlstra , Juri Lelli , Vincent Guittot , Dietmar Eggemann , Steven Rostedt , Ben Segall , Mel Gorman , Daniel Bristot de Oliveira Subject: Re: [PATCH] mm: page_owner: detect page_owner recursion via task_struct Message-ID: <20210402125039.671f1f40@sf> In-Reply-To: <20210401170519.00824fbdf8ab60b720609422@linux-foundation.org> References: <20210401223010.3580480-1-slyfox@gentoo.org> <20210401170519.00824fbdf8ab60b720609422@linux-foundation.org> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.32; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 1 Apr 2021 17:05:19 -0700 Andrew Morton wrote: > On Thu, 1 Apr 2021 23:30:10 +0100 Sergei Trofimovich wrote: > > > Before the change page_owner recursion was detected via fetching > > backtrace and inspecting it for current instruction pointer. > > It has a few problems: > > - it is slightly slow as it requires extra backtrace and a linear > > stack scan of the result > > - it is too late to check if backtrace fetching required memory > > allocation itself (ia64's unwinder requires it). > > > > To simplify recursion tracking let's use page_owner recursion depth > > as a counter in 'struct task_struct'. > > Seems like a better approach. > > > The change make page_owner=on work on ia64 bu avoiding infinite > > recursion in: > > kmalloc() > > -> __set_page_owner() > > -> save_stack() > > -> unwind() [ia64-specific] > > -> build_script() > > -> kmalloc() > > -> __set_page_owner() [we short-circuit here] > > -> save_stack() > > -> unwind() [recursion] > > > > ... > > > > --- a/include/linux/sched.h > > +++ b/include/linux/sched.h > > @@ -1371,6 +1371,15 @@ struct task_struct { > > struct llist_head kretprobe_instances; > > #endif > > > > +#ifdef CONFIG_PAGE_OWNER > > + /* > > + * Used by page_owner=on to detect recursion in page tracking. > > + * Is it fine to have non-atomic ops here if we ever access > > + * this variable via current->page_owner_depth? > > Yes, it is fine. This part of the comment can be removed. Cool! Will do. > > + */ > > + unsigned int page_owner_depth; > > +#endif > > Adding to the task_struct has a cost. But I don't expect that > PAGE_OWNER is commonly used in prodction builds (correct?). Yeah, PAGE_OWNER should not be enabled for production kernels. Not having extra memory overhead (or layout disruption) is a nice benefit though. I'll switch to "Unserialized, strictly 'current'" bitfield. > > --- a/init/init_task.c > > +++ b/init/init_task.c > > @@ -213,6 +213,9 @@ struct task_struct init_task > > #ifdef CONFIG_SECCOMP > > .seccomp = { .filter_count = ATOMIC_INIT(0) }, > > #endif > > +#ifdef CONFIG_PAGE_OWNER > > + .page_owner_depth = 0, > > +#endif > > }; > > EXPORT_SYMBOL(init_task); > > It will be initialized to zero by the compiler. We can omit this hunk > entirely. > > > --- a/mm/page_owner.c > > +++ b/mm/page_owner.c > > @@ -20,6 +20,16 @@ > > */ > > #define PAGE_OWNER_STACK_DEPTH (16) > > > > +/* > > + * How many reenters we allow to page_owner. > > + * > > + * Sometimes metadata allocation tracking requires more memory to be allocated: > > + * - when new stack trace is saved to stack depot > > + * - when backtrace itself is calculated (ia64) > > + * Instead of falling to infinite recursion give it a chance to recover. > > + */ > > +#define PAGE_OWNER_MAX_RECURSION_DEPTH (1) > > So this is presently a boolean. Is there any expectation that > PAGE_OWNER_MAX_RECURSION_DEPTH will ever be greater than 1? If not, we > could use a single bit in the task_struct. Add it to the > "Unserialized, strictly 'current'" bitfields. Could make it a 2-bit field if we want > to permit PAGE_OWNER_MAX_RECURSION_DEPTH=larger. Let's settle on depth=1. depth>1 is not trivial for other reasons I don't completely understand. Follow-up patch incoming. -- Sergei