Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp2031862pxt; Sun, 8 Aug 2021 09:12:25 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyPtDSlvAhPbKbawGejRucaBsCMU3cgCTf0ZMj4Zwpp6mzzeE0MgYQ3MIqjzhvgWNHMcKnQ X-Received: by 2002:a05:6402:215:: with SMTP id t21mr24633852edv.68.1628439145098; Sun, 08 Aug 2021 09:12:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628439145; cv=none; d=google.com; s=arc-20160816; b=mBQeR3W1ju3f749ZvIp04svu3CLjbK8vaz8SNd8uXPuOwgvZCeb/Fxuj3UxNIoPwvX s2akf3jdIBdX2pOT+WjiNBss2Z+Bic41dtxxHaWIRdBFiqZ0qKqhbmky04JdTV43e9mD vfW+OsKBS1yyjaNbGW63wjgvt6ygYAPAgAjpyaB7BHQUWWSPwcAExS+vfrH7Tc8FWzCR m3kQvs7BKtRvKDYCES3KitxrUTDK2R1UkIfRsEBhye3NvgdQem49Pa6aZBIwT63W7Q9d N+79PmMekywIouHJgeBQBR+1bq0JDrIe5gjQGdqzWH4Bd51G7u86fER4DbM2ZTYYng+o vsBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=L0Uwt6aQVn6oCqr0wcgwrO21cHc++7sRbVmBO4SXG1I=; b=YRbK6cT1LyAgeXxgsUNyYwWn+iFfHxZoQfQC4F7m2fQNumXAnOcqFY3AJJQAywD4PR a/kPgA3Dhfo5afNnPwPmfU+WDekdhkfdZvWin7OBFDyhZN1RknvtsxklZKGX4P6xa39L rvYzY+qrBIsWdA8OFdCev9k/+WVSrNx377U+PoI2hWKiFNM/UopLccE3g49auP/4q1I5 M0OmIRaCuAJ/b04HGg70FPtoXmK1zkwPLBIpChku5TCT6wZ4OqG+aw65SpQFIuaSdiCG CshNdNYVhhOqiSd0GVKVM5X1vvZo1m79kk+AXGlN4HeChvG4d5I9FfrDS+J1dU9YT84V 7/Ew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=s3dgGmM+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t14si4221025edr.573.2021.08.08.09.12.01; Sun, 08 Aug 2021 09:12:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=s3dgGmM+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230448AbhHHQIr (ORCPT + 99 others); Sun, 8 Aug 2021 12:08:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57542 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229882AbhHHQIq (ORCPT ); Sun, 8 Aug 2021 12:08:46 -0400 Received: from mail-yb1-xb4a.google.com (mail-yb1-xb4a.google.com [IPv6:2607:f8b0:4864:20::b4a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9C5FDC0613CF for ; Sun, 8 Aug 2021 09:08:27 -0700 (PDT) Received: by mail-yb1-xb4a.google.com with SMTP id n200-20020a25d6d10000b02905935ac4154aso4253729ybg.23 for ; Sun, 08 Aug 2021 09:08:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=L0Uwt6aQVn6oCqr0wcgwrO21cHc++7sRbVmBO4SXG1I=; b=s3dgGmM+iGKhdSUGeERXwP1nS3yy3tu3ZVhJaMxAzrZ6KZpc4YYMtpMyq5HyPVSxuC 2us/Vq0FvGTmJmW8xheeHHq7180460RM5HRwekMWKtdMfeUHDDbPv0Z898IykmWAnnAe dPo19jcuexX8gQj8oNgdAIZawDK5Ztm3oqub9Btf0G6LY4JDsyZNII2VpHlEs96mNqku SsSAqRlcSno8EBIl+kAAp7MwsNxOlKxtdEUtj3DX/nk+BQ2eSRfH3DP3eU47Oi8tk/XE zkXA4AhfAFcH4ibSKtFPtkSxJtwYSByRMUXCiFRZJ9c1aJK2uQc0gl6lx8kHNpwS8U2S zEwg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=L0Uwt6aQVn6oCqr0wcgwrO21cHc++7sRbVmBO4SXG1I=; b=Q7SULPqHjiLOIX5HfIF/9dW8tzQURND90hUHjtGen1ngvc0movjlMR6TB3C5mx1Dt6 9gKpKXKpYI7KN6WlSBWznALXSf6zUJoXIwnKPhi4MRzvzkxN/F7U77fPyZhM+JfFTRL6 xZX6ltYywit33jRzpGcA0AcoxZW9FUe9U8cE7j+sUJPJxLc/5pkGR8m5QvIjU4C5+6jf rqVWzHQgQYYKfLUoYVM5IAwSPnz8wtov+zyUotmtrAgz2ppPldkN+v0gPWFefySIH7LQ gdczno0TOp48E4siCbRNplHUtkT5qMAAF2qyZJLDiPgQG5IlYBAMMRHGjm/UQS2IZY1O WRaQ== X-Gm-Message-State: AOAM530eCQ1H7XSc9GVzVTJPx7fP4313AsNwJRhZX5aFERSo9TL91oLc X3U75U4f9+iGLT17r6r20LqfrxOkWig= X-Received: from surenb1.mtv.corp.google.com ([2620:15c:211:200:55a4:b9af:f5da:997e]) (user=surenb job=sendgmr) by 2002:a25:764e:: with SMTP id r75mr7581963ybc.263.1628438906646; Sun, 08 Aug 2021 09:08:26 -0700 (PDT) Date: Sun, 8 Aug 2021 09:08:22 -0700 Message-Id: <20210808160823.3553954-1-surenb@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.32.0.605.g8dce9f2422-goog Subject: [PATCH v8 1/2] mm: introduce process_mrelease system call From: Suren Baghdasaryan To: akpm@linux-foundation.org Cc: mhocko@kernel.org, mhocko@suse.com, rientjes@google.com, willy@infradead.org, hannes@cmpxchg.org, guro@fb.com, riel@surriel.com, minchan@kernel.org, christian@brauner.io, hch@infradead.org, oleg@redhat.com, david@redhat.com, jannh@google.com, shakeelb@google.com, luto@kernel.org, christian.brauner@ubuntu.com, fweimer@redhat.com, jengelh@inai.de, timmurray@google.com, linux-api@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, kernel-team@android.com, surenb@google.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In modern systems it's not unusual to have a system component monitoring memory conditions of the system and tasked with keeping system memory pressure under control. One way to accomplish that is to kill non-essential processes to free up memory for more important ones. Examples of this are Facebook's OOM killer daemon called oomd and Android's low memory killer daemon called lmkd. For such system component it's important to be able to free memory quickly and efficiently. Unfortunately the time process takes to free up its memory after receiving a SIGKILL might vary based on the state of the process (uninterruptible sleep), size and OPP level of the core the process is running. A mechanism to free resources of the target process in a more predictable way would improve system's ability to control its memory pressure. Introduce process_mrelease system call that releases memory of a dying process from the context of the caller. This way the memory is freed in a more controllable way with CPU affinity and priority of the caller. The workload of freeing the memory will also be charged to the caller. The operation is allowed only on a dying process. After previous discussions [1, 2, 3] the decision was made [4] to introduce a dedicated system call to cover this use case. The API is as follows, int process_mrelease(int pidfd, unsigned int flags); DESCRIPTION The process_mrelease() system call is used to free the memory of an exiting process. The pidfd selects the process referred to by the PID file descriptor. (See pidfd_open(2) for further information) The flags argument is reserved for future use; currently, this argument must be specified as 0. RETURN VALUE On success, process_mrelease() returns 0. On error, -1 is returned and errno is set to indicate the error. ERRORS EBADF pidfd is not a valid PID file descriptor. EAGAIN Failed to release part of the address space. EINTR The call was interrupted by a signal; see signal(7). EINVAL flags is not 0. EINVAL The memory of the task cannot be released because the process is not exiting, the address space is shared with another live process or there is a core dump in progress. ENOSYS This system call is not supported, for example, without MMU support built into Linux. ESRCH The target process does not exist (i.e., it has terminated and been waited on). [1] https://lore.kernel.org/lkml/20190411014353.113252-3-surenb@google.com/ [2] https://lore.kernel.org/linux-api/20201113173448.1863419-1-surenb@google.com/ [3] https://lore.kernel.org/linux-api/20201124053943.1684874-3-surenb@google.com/ [4] https://lore.kernel.org/linux-api/20201223075712.GA4719@lst.de/ Signed-off-by: Suren Baghdasaryan --- changes in v8: - Replaced mmget with mmgrab, per Shakeel Butt - Refactored the code to simplify and fix the task_lock release issue, per Michal Hocko mm/oom_kill.c | 70 +++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 70 insertions(+) diff --git a/mm/oom_kill.c b/mm/oom_kill.c index c729a4c4a1ac..f8acc26f7300 100644 --- a/mm/oom_kill.c +++ b/mm/oom_kill.c @@ -28,6 +28,7 @@ #include #include #include +#include #include #include #include @@ -1141,3 +1142,72 @@ void pagefault_out_of_memory(void) out_of_memory(&oc); mutex_unlock(&oom_lock); } + +SYSCALL_DEFINE2(process_mrelease, int, pidfd, unsigned int, flags) +{ +#ifdef CONFIG_MMU + struct mm_struct *mm = NULL; + struct task_struct *task; + struct task_struct *p; + unsigned int f_flags; + bool reap = true; + struct pid *pid; + long ret = 0; + + if (flags) + return -EINVAL; + + pid = pidfd_get_pid(pidfd, &f_flags); + if (IS_ERR(pid)) + return PTR_ERR(pid); + + task = get_pid_task(pid, PIDTYPE_PID); + if (!task) { + ret = -ESRCH; + goto put_pid; + } + + /* + * Make sure to choose a thread which still has a reference to mm + * during the group exit + */ + p = find_lock_task_mm(task); + if (!p) { + ret = -ESRCH; + goto put_task; + } + + mm = p->mm; + mmgrab(mm); + + /* If the work has been done already, just exit with success */ + if (test_bit(MMF_OOM_SKIP, &mm->flags)) + reap = false; + else if (!task_will_free_mem(p)) { + reap = false; + ret = -EINVAL; + } + task_unlock(p); + + if (!reap) + goto drop_mm; + + if (mmap_read_lock_killable(mm)) { + ret = -EINTR; + goto drop_mm; + } + if (!__oom_reap_task_mm(mm)) + ret = -EAGAIN; + mmap_read_unlock(mm); + +drop_mm: + mmdrop(mm); +put_task: + put_task_struct(task); +put_pid: + put_pid(pid); + return ret; +#else + return -ENOSYS; +#endif /* CONFIG_MMU */ +} -- 2.32.0.605.g8dce9f2422-goog