Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp613018pxy; Wed, 5 May 2021 09:32:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz7K8ZEVqNB01tygcSJbNQUb/KOFgwwqioSUOGoDrNgaZPe1rR09oVQus/a/hrnvIeGvk2k X-Received: by 2002:a63:5448:: with SMTP id e8mr14581567pgm.170.1620232346642; Wed, 05 May 2021 09:32:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620232346; cv=none; d=google.com; s=arc-20160816; b=eElU+necuHZjIoDjoCqWUWtR6Xz2Q9epg1tcOPh7Pqj7hv3wdH1wUn9GQ20glOYgH4 qe94JICOOFSzhnDRuaTsYqyZ0aLC/sV3Ij83iek8f2HncTl8J2GKZGb920qnjdcJTKWw K1PIdJslaDUiti/cu6hHcI57oDWxFLz2DlafZUVhT5qiP8CkRlw3ndo3Y8mTRj5tH59Q RBD0pnPdYGkmyF85S0IISU7/wFwd2vCXxI/8s94cFZSZ5zVXy3nFHIc3fpxKdHTnykY+ i5GJFP63a+OqkJcyfrlR4VpFF4rDlXGfwoaUBCo2OZE0FxSQguvs+y61jyfXqLKzAn+Z PcSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-language:content-transfer-encoding :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:subject:from:dkim-signature; bh=81DdwLuppEsne8dGMXcwRqVz38oxfrnLdDs7rg3uPgM=; b=mti1SMfhcSRN2tf4opEjx3qWpXXYQOzcf3Fh57aeAsKuKhLN84Sy6yALVwc63cbrv1 3sQupnYqCpJI3uI1JVYUemRggoFPlB5Tj/lQN6zJdSTccsVozNMmnNHrNhfkFNPtufU2 0F+xHM/SG6B/FZTW8365tKYEdX7OF2D8l4Ho6kI/1u9NO4oFAAoEU7vRssZrB3Fbgopl sUYf6asd0a9TxM5sbxxtCtUo2NjRQ9rMaF2L5/4JSsNy39CxOV21/UOmnU73x7gm1W19 WwDSXqf5pXDM3S4GrWZyU955QBFXpf0ISMvVgeeaqgwgjkSmj0ap+j7P5A8cddGoQxJ+ sG/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="a65U/VOd"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z6si8130879plo.372.2021.05.05.09.32.05; Wed, 05 May 2021 09:32:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="a65U/VOd"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234096AbhEEQcP (ORCPT + 99 others); Wed, 5 May 2021 12:32:15 -0400 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:39287 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234101AbhEEQcL (ORCPT ); Wed, 5 May 2021 12:32:11 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1620232274; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=81DdwLuppEsne8dGMXcwRqVz38oxfrnLdDs7rg3uPgM=; b=a65U/VOdhBbIQB/m3vpi+3wT15YOxGG0dzzRtZZfhBxSfaVgDcoAUOlb1pS/O8+Mr5gZhJ qzbT2w/eKZAStnpSXcpZ+lEQl9KlnOQjbX3WjHYnd/Ux0Rjz/3eoHwXeKadh0o3CnMAuUe MSzJtk2VTlPGq135IPYOqx0BuCQu9ao= Received: from mail-qk1-f197.google.com (mail-qk1-f197.google.com [209.85.222.197]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-565-HLwRDkXdPgGfWVRaHIXi_A-1; Wed, 05 May 2021 12:31:12 -0400 X-MC-Unique: HLwRDkXdPgGfWVRaHIXi_A-1 Received: by mail-qk1-f197.google.com with SMTP id s123-20020a3777810000b02902e9adec2313so1542552qkc.4 for ; Wed, 05 May 2021 09:31:12 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:subject:to:cc:references:message-id:date :user-agent:mime-version:in-reply-to:content-transfer-encoding :content-language; bh=81DdwLuppEsne8dGMXcwRqVz38oxfrnLdDs7rg3uPgM=; b=Tqh1V0y+RjL81lHPYb3x7+sGZhqQndw4QYIBhb5YpqYMs7rf9sI9X/xYI2AqzNZCSL tyJdcfFzSf0NDx7tQB+cDxYjLPBrfu/qvT8UZRb0Yz3krz3DdTYIg0DntemUOYSmgBWg qNwHc395TGX+P2Vne8aKb7lf0jc+z9NHJz+Wg3QsUShrCN07Q7fxpj3ZjJ8Itu3196+L Dr7xZK8anFeacKngS6MYME6ROwZD3ky9XzovAxt8G5qKJlfa1Bnn4DynMDWJf5xfS3A6 AtNpyjwf6IrR9rW3wlTd+opQ7NFh6MpWzFokQIP6he0aqlLDqqgC21ZzUnZr3CP/w2ea P3Rg== X-Gm-Message-State: AOAM530sql1BkNyEA8rWky01XR5DuwV/6LEetuPufTmWpsa6QL6bHYng jwTpklKGLg5qpLtM8k6vD3clxZvHINlyEdsi20NPDxpIhWFb2Vxr/J5cGixaeTJzykF6fMlZ+ia ctpvf0WuAczJmpyv6G/QQaF5I X-Received: by 2002:a05:620a:15ca:: with SMTP id o10mr3168440qkm.448.1620232272344; Wed, 05 May 2021 09:31:12 -0700 (PDT) X-Received: by 2002:a05:620a:15ca:: with SMTP id o10mr3168418qkm.448.1620232272090; Wed, 05 May 2021 09:31:12 -0700 (PDT) Received: from llong.remote.csb ([2601:191:8500:76c0::cdbc]) by smtp.gmail.com with ESMTPSA id c23sm5338915qtm.46.2021.05.05.09.31.10 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 05 May 2021 09:31:11 -0700 (PDT) From: Waiman Long X-Google-Original-From: Waiman Long Subject: Re: [PATCH v3 2/2] mm: memcg/slab: Create a new set of kmalloc-cg- caches To: Vlastimil Babka , Johannes Weiner , Michal Hocko , Vladimir Davydov , Andrew Morton , Christoph Lameter , Pekka Enberg , David Rientjes , Joonsoo Kim , Roman Gushchin , Shakeel Butt Cc: linux-kernel@vger.kernel.org, cgroups@vger.kernel.org, linux-mm@kvack.org References: <20210505154613.17214-1-longman@redhat.com> <20210505154613.17214-3-longman@redhat.com> <4c1a0436-2d46-d23a-2eef-d558e37373bf@suse.cz> Message-ID: Date: Wed, 5 May 2021 12:31:09 -0400 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.9.0 MIME-Version: 1.0 In-Reply-To: <4c1a0436-2d46-d23a-2eef-d558e37373bf@suse.cz> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Content-Language: en-US Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/5/21 12:06 PM, Vlastimil Babka wrote: > On 5/5/21 5:46 PM, Waiman Long wrote: >> There are currently two problems in the way the objcg pointer array >> (memcg_data) in the page structure is being allocated and freed. >> >> On its allocation, it is possible that the allocated objcg pointer >> array comes from the same slab that requires memory accounting. If this >> happens, the slab will never become empty again as there is at least >> one object left (the obj_cgroup array) in the slab. >> >> When it is freed, the objcg pointer array object may be the last one >> in its slab and hence causes kfree() to be called again. With the >> right workload, the slab cache may be set up in a way that allows the >> recursive kfree() calling loop to nest deep enough to cause a kernel >> stack overflow and panic the system. >> >> One way to solve this problem is to split the kmalloc- caches >> (KMALLOC_NORMAL) into two separate sets - a new set of kmalloc- >> (KMALLOC_NORMAL) caches for non-accounted objects only and a new set of >> kmalloc-cg- (KMALLOC_CGROUP) caches for accounted objects only. All >> the other caches can still allow a mix of accounted and non-accounted >> objects. >> >> With this change, all the objcg pointer array objects will come from >> KMALLOC_NORMAL caches which won't have their objcg pointer arrays. So >> both the recursive kfree() problem and non-freeable slab problem are >> gone. Since both the KMALLOC_NORMAL and KMALLOC_CGROUP caches no longer >> have mixed accounted and unaccounted objects, this will slightly reduce >> the number of objcg pointer arrays that need to be allocated and save >> a bit of memory. >> >> The new KMALLOC_CGROUP is added between KMALLOC_NORMAL and >> KMALLOC_RECLAIM so that the first for loop in create_kmalloc_caches() >> will include the newly added caches without change. >> >> Suggested-by: Vlastimil Babka >> Signed-off-by: Waiman Long >> --- >> include/linux/slab.h | 42 ++++++++++++++++++++++++++++++++++-------- >> mm/slab_common.c | 23 +++++++++++++++-------- >> 2 files changed, 49 insertions(+), 16 deletions(-) >> >> diff --git a/include/linux/slab.h b/include/linux/slab.h >> index 0c97d788762c..f2d9ebc34f5c 100644 >> --- a/include/linux/slab.h >> +++ b/include/linux/slab.h >> @@ -305,9 +305,16 @@ static inline void __check_heap_object(const void *ptr, unsigned long n, >> /* >> * Whenever changing this, take care of that kmalloc_type() and >> * create_kmalloc_caches() still work as intended. >> + * >> + * KMALLOC_NORMAL is for non-accounted objects only whereas KMALLOC_CGROUP >> + * is for accounted objects only. All the other kmem caches can have both >> + * accounted and non-accounted objects. >> */ >> enum kmalloc_cache_type { >> KMALLOC_NORMAL = 0, >> +#ifdef CONFIG_MEMCG_KMEM >> + KMALLOC_CGROUP, >> +#endif >> KMALLOC_RECLAIM, >> #ifdef CONFIG_ZONE_DMA >> KMALLOC_DMA, >> @@ -315,28 +322,47 @@ enum kmalloc_cache_type { >> NR_KMALLOC_TYPES >> }; >> >> +#ifndef CONFIG_MEMCG_KMEM >> +#define KMALLOC_CGROUP KMALLOC_NORMAL >> +#endif >> +#ifndef CONFIG_ZONE_DMA >> +#define KMALLOC_DMA KMALLOC_NORMAL >> +#endif > You could move this to the enum definition itself? E.g.: > > #ifdef CONFIG_MEMCG_KMEM > KMALLOC_CGROUP, > #else > KMALLOC_CGROUP = KMALLOC_NORMAL, > #endif > >> + >> #ifndef CONFIG_SLOB >> extern struct kmem_cache * >> kmalloc_caches[NR_KMALLOC_TYPES][KMALLOC_SHIFT_HIGH + 1]; >> >> +/* >> + * Define gfp bits that should not be set for KMALLOC_NORMAL. >> + */ >> +#define KMALLOC_NOT_NORMAL_BITS \ >> + (__GFP_RECLAIMABLE | \ >> + (IS_ENABLED(CONFIG_ZONE_DMA) ? __GFP_DMA : 0) | \ >> + (IS_ENABLED(CONFIG_MEMCG_KMEM) ? __GFP_ACCOUNT : 0)) >> + >> static __always_inline enum kmalloc_cache_type kmalloc_type(gfp_t flags) >> { >> -#ifdef CONFIG_ZONE_DMA >> /* >> * The most common case is KMALLOC_NORMAL, so test for it >> * with a single branch for both flags. > Not "both flags" anymore. Something like "so test with a single branch that > there are none of the flags that would select a different type" Right. I just left the comment there without taking a deeper look. My bad. Cheers, Longman