Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3204821pxf; Mon, 5 Apr 2021 06:09:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxooWtVi/b9z9edC5fu02PJFELEC4hjLYZbH2htcn4ArHzXBnoCMc2o2PcveDIbTCK6XO8R X-Received: by 2002:a17:906:130c:: with SMTP id w12mr1945725ejb.169.1617628181110; Mon, 05 Apr 2021 06:09:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617628181; cv=none; d=google.com; s=arc-20160816; b=kApi8z+BdHe945+ssbrppoQJ7XfdQ48BJh5Z92G7I8ZZU1hLjUvJKDvZ/faaXPbvDb rCP1c0jd11Im9Uj2KKmbZV0qvnW/P2SmJPw+BjK3LsSo6nsoajsoXixREJZCMu5RGTxM +Rtc/1nwOysje4uTiaUhSMd3ILd877kDAIj9biKJCecqcZa6ye2jFc0Y9DLRCdxvWG1p kjioHzhr6sU7QsTnztRxV2mdibP661qepkR01SaN9fx/URpPysTjyX3uHJNGmrtlAMym 9tpyAtQgYdzEPyvDgkugCPvRVGSPdOu2+ghM6G1jE3b274mn56xPPb84GuNkNsMcOjqP 2XfQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=CJiA6nYyJAgNU/F27tNEw0V6+jt5ucRtAHRxLdcZpPk=; b=ixHuYgSTGco4upLAPlX51RWCrDS/DeDyJuHJI2JSURkBm0aZxAzIFXGu3fnVAQu1Qp i77EfW+8zzvH0vCdcEM5tEMFoCTuc+nEz5sGojZcJs21kL34bQ3MZ/5zDsSaqdL4JbWs f55mDUJ7vBDsULysrKQMgaSAYxOpsUbQIfXK1PopPgH1na+/CCy5nZbJhdgpM0OONXLw CsssUXyyS5KhRV7+L9cdTrj4WqYg0Gblchc5pqLQH91TRY36w9od8RMcfrZIzNzZCT+Q jbkG50Z1Djug5ydEFeNwhOZJP9SE5mf44oGTgFdSzYDqZDWNUdyTc6333eBTSUvQvZWx IR1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=gRPSfNx4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jy27si12730938ejc.748.2021.04.05.06.09.06; Mon, 05 Apr 2021 06:09:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=gRPSfNx4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237018AbhDEJAy (ORCPT + 99 others); Mon, 5 Apr 2021 05:00:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:41692 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237066AbhDEJAM (ORCPT ); Mon, 5 Apr 2021 05:00:12 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 888E7613A5; Mon, 5 Apr 2021 09:00:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617613207; bh=MlyoqGQDdBgFgvy9WiTiNYHqEhDIjQiHUhgVS/YCSTg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=gRPSfNx4UZWWkKmekycLeLWf4LnqDOcCpF9kWIBAvz81Ny1Vjv3VfJ4BMg9LDCfMW ukclBOoklmzE5W5aMahy4IAVroS38z/FTAtSujS+vl3IYdmsyow05XaPvHzfJDGfqG w9qgpbRahaOcUdjsl225xHbhGEVZa9AlAZE8Dfv8= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Roman Gushchin , Konstantin Khlebnikov , Johannes Weiner , Michal Hocko , Vladimir Davydov , Andrew Morton , Linus Torvalds , Frank van der Linden , Sasha Levin Subject: [PATCH 4.14 35/52] mm: fix oom_kill event handling Date: Mon, 5 Apr 2021 10:54:01 +0200 Message-Id: <20210405085023.135458367@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210405085021.996963957@linuxfoundation.org> References: <20210405085021.996963957@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Roman Gushchin commit fe6bdfc8e1e131720abbe77a2eb990c94c9024cb upstream. Commit e27be240df53 ("mm: memcg: make sure memory.events is uptodate when waking pollers") converted most of memcg event counters to per-memcg atomics, which made them less confusing for a user. The "oom_kill" counter remained untouched, so now it behaves differently than other counters (including "oom"). This adds nothing but confusion. Let's fix this by adding the MEMCG_OOM_KILL event, and follow the MEMCG_OOM approach. This also removes a hack from count_memcg_event_mm(), introduced earlier specially for the OOM_KILL counter. [akpm@linux-foundation.org: fix for droppage of memcg-replace-mm-owner-with-mm-memcg.patch] Link: http://lkml.kernel.org/r/20180508124637.29984-1-guro@fb.com Signed-off-by: Roman Gushchin Acked-by: Konstantin Khlebnikov Acked-by: Johannes Weiner Acked-by: Michal Hocko Cc: Vladimir Davydov Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds [fllinden@amazon.com: backport to 4.14, minor contextual changes] Signed-off-by: Frank van der Linden Signed-off-by: Greg Kroah-Hartman Signed-off-by: Sasha Levin --- include/linux/memcontrol.h | 26 ++++++++++++++++++++++---- mm/memcontrol.c | 6 ++++-- mm/oom_kill.c | 2 +- 3 files changed, 27 insertions(+), 7 deletions(-) diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h index c7876eadd206..b5cd86e320ff 100644 --- a/include/linux/memcontrol.h +++ b/include/linux/memcontrol.h @@ -53,6 +53,7 @@ enum memcg_memory_event { MEMCG_HIGH, MEMCG_MAX, MEMCG_OOM, + MEMCG_OOM_KILL, MEMCG_NR_MEMORY_EVENTS, }; @@ -706,11 +707,8 @@ static inline void count_memcg_event_mm(struct mm_struct *mm, rcu_read_lock(); memcg = mem_cgroup_from_task(rcu_dereference(mm->owner)); - if (likely(memcg)) { + if (likely(memcg)) count_memcg_events(memcg, idx, 1); - if (idx == OOM_KILL) - cgroup_file_notify(&memcg->events_file); - } rcu_read_unlock(); } @@ -721,6 +719,21 @@ static inline void memcg_memory_event(struct mem_cgroup *memcg, cgroup_file_notify(&memcg->events_file); } +static inline void memcg_memory_event_mm(struct mm_struct *mm, + enum memcg_memory_event event) +{ + struct mem_cgroup *memcg; + + if (mem_cgroup_disabled()) + return; + + rcu_read_lock(); + memcg = mem_cgroup_from_task(rcu_dereference(mm->owner)); + if (likely(memcg)) + memcg_memory_event(memcg, event); + rcu_read_unlock(); +} + #ifdef CONFIG_TRANSPARENT_HUGEPAGE void mem_cgroup_split_huge_fixup(struct page *head); #endif @@ -742,6 +755,11 @@ static inline void memcg_memory_event(struct mem_cgroup *memcg, { } +static inline void memcg_memory_event_mm(struct mm_struct *mm, + enum memcg_memory_event event) +{ +} + static inline bool mem_cgroup_low(struct mem_cgroup *root, struct mem_cgroup *memcg) { diff --git a/mm/memcontrol.c b/mm/memcontrol.c index 31972189a827..ef6d996a920a 100644 --- a/mm/memcontrol.c +++ b/mm/memcontrol.c @@ -3648,7 +3648,8 @@ static int mem_cgroup_oom_control_read(struct seq_file *sf, void *v) seq_printf(sf, "oom_kill_disable %d\n", memcg->oom_kill_disable); seq_printf(sf, "under_oom %d\n", (bool)memcg->under_oom); - seq_printf(sf, "oom_kill %lu\n", memcg_sum_events(memcg, OOM_KILL)); + seq_printf(sf, "oom_kill %lu\n", + atomic_long_read(&memcg->memory_events[MEMCG_OOM_KILL])); return 0; } @@ -5320,7 +5321,8 @@ static int memory_events_show(struct seq_file *m, void *v) atomic_long_read(&memcg->memory_events[MEMCG_MAX])); seq_printf(m, "oom %lu\n", atomic_long_read(&memcg->memory_events[MEMCG_OOM])); - seq_printf(m, "oom_kill %lu\n", memcg_sum_events(memcg, OOM_KILL)); + seq_printf(m, "oom_kill %lu\n", + atomic_long_read(&memcg->memory_events[MEMCG_OOM_KILL])); return 0; } diff --git a/mm/oom_kill.c b/mm/oom_kill.c index 6482d743c5c8..6f1bed211122 100644 --- a/mm/oom_kill.c +++ b/mm/oom_kill.c @@ -917,7 +917,7 @@ static void oom_kill_process(struct oom_control *oc, const char *message) /* Raise event before sending signal: task reaper must see this */ count_vm_event(OOM_KILL); - count_memcg_event_mm(mm, OOM_KILL); + memcg_memory_event_mm(mm, MEMCG_OOM_KILL); /* * We should send SIGKILL before granting access to memory reserves -- 2.30.2