Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp4046033ioo; Wed, 25 May 2022 13:40:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw1ZXjC/xa4WBSKQEQB28BhtBYsACTWpKkSB7Z8q9/kAJzWrrP3h1vKBE0kDBMHFr4asLEq X-Received: by 2002:a17:902:b10e:b0:161:a747:7683 with SMTP id q14-20020a170902b10e00b00161a7477683mr34951311plr.151.1653511221788; Wed, 25 May 2022 13:40:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653511221; cv=none; d=google.com; s=arc-20160816; b=xNEmegiOc/aDJFnLPahO37L/2AAS+qq6Nrl2tckxh3GIDa9fEh9nTo5k1KVpeilaL5 vsrT3Q+nh4Ld71QAMBsTFVXb76J+kdv9T6JIfCmR1CElu6rYj3Dcz7qETZS495llLbuj iXVMRIVQGDQXyOkuXb1aYVfDvIO9YoHyvUg6lSsncEnb2aAKdIPKwx44wjQhXDBsV4xY qWdvLPIGyMRecssJj3VEC9ESQa6v6/cPE1Qa35E9mlhANXVFOFoI+//Cv5Oud+nQkUYf TtjMeTh0kZu+ERnFT5oLEnHDI38blP6dJLGr9+g4o9pmizVjp6IaHutlKicaCfVyuvx3 5oDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=tGzB1fLmlxRXyYdmcpYtxBC3rVybZlDMUrElQqcQOQo=; b=G/7Zd801FY58/IScUG4n1dp/MuEa/J/RlrDFPd/3TD8rY9Fhj1yoZPNL3kSODq9sgZ 3IPHqW6YzQobjGVhtgYOQBeNYaXeNOOjkL8R8GWqexyC7YooHJJ1VGEkx5Cm97bA33GY FiFIiDwl7Y1dgJ/FVWXxCvi2aLTlGs6rMvjf9Wisyl4zoHoZ1AWoYmhCS+Y66C2yZBo+ ztXImtRi76+AXnCW3arGLvTP+q5ys0ItkHipgyTTqv4OOoUq3Dxyka/kqqqUAWIy+k7L OZGiEXJ+uMsIXng3FVxt3PY6GKYyT6tr7fx4LglBP3vcDYBn4HVPH9BJuaEWHiNOcItT HKDg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b="j3/WDylH"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y62-20020a638a41000000b003fb00f5d317si1203872pgd.655.2022.05.25.13.39.43; Wed, 25 May 2022 13:40:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b="j3/WDylH"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237304AbiEYDDy (ORCPT + 99 others); Tue, 24 May 2022 23:03:54 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35564 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232805AbiEYDDu (ORCPT ); Tue, 24 May 2022 23:03:50 -0400 Received: from out2.migadu.com (out2.migadu.com [IPv6:2001:41d0:2:aacc::]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 209385C373; Tue, 24 May 2022 20:03:48 -0700 (PDT) Date: Tue, 24 May 2022 20:03:41 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1653447826; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=tGzB1fLmlxRXyYdmcpYtxBC3rVybZlDMUrElQqcQOQo=; b=j3/WDylHWQSiiFYSXC0odFtPAgxViEVcuiHLkPOX2+jKMdT3Xu8f5duBnEFpN1OaIsctxL svJTFP4Tl8sdNPxwratPJQ7CZS+huoVXIJ7O8/wdOQ0Cjt2uMoxNYIS+Z/ajkk6wBZDy/r 8hqN/1UlmZrugb9vWzGoMXsrI0jRSmI= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Roman Gushchin To: Muchun Song Cc: hannes@cmpxchg.org, mhocko@kernel.org, shakeelb@google.com, cgroups@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, duanxiongchun@bytedance.com, longman@redhat.com Subject: Re: [PATCH v4 07/11] mm: memcontrol: make all the callers of {folio,page}_memcg() safe Message-ID: References: <20220524060551.80037-1-songmuchun@bytedance.com> <20220524060551.80037-8-songmuchun@bytedance.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220524060551.80037-8-songmuchun@bytedance.com> X-Migadu-Flow: FLOW_OUT X-Migadu-Auth-User: linux.dev X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 24, 2022 at 02:05:47PM +0800, Muchun Song wrote: > When we use objcg APIs to charge the LRU pages, the page will not hold > a reference to the memcg associated with the page. So the caller of the > {folio,page}_memcg() should hold an rcu read lock or obtain a reference > to the memcg associated with the page to protect memcg from being > released. So introduce get_mem_cgroup_from_{page,folio}() to obtain a > reference to the memory cgroup associated with the page. > > In this patch, make all the callers hold an rcu read lock or obtain a > reference to the memcg to protect memcg from being released when the LRU > pages reparented. > > We do not need to adjust the callers of {folio,page}_memcg() during > the whole process of mem_cgroup_move_task(). Because the cgroup migration > and memory cgroup offlining are serialized by @cgroup_mutex. In this > routine, the LRU pages cannot be reparented to its parent memory cgroup. > So {folio,page}_memcg() is stable and cannot be released. > > This is a preparation for reparenting the LRU pages. > > Signed-off-by: Muchun Song Overall the patch looks good to me (some nits below). > --- > fs/buffer.c | 4 +-- > fs/fs-writeback.c | 23 ++++++++-------- > include/linux/memcontrol.h | 51 ++++++++++++++++++++++++++++++++--- > include/trace/events/writeback.h | 5 ++++ > mm/memcontrol.c | 58 ++++++++++++++++++++++++++++++---------- > mm/migrate.c | 4 +++ > mm/page_io.c | 5 ++-- > 7 files changed, 117 insertions(+), 33 deletions(-) > > diff --git a/fs/buffer.c b/fs/buffer.c > index 2b5561ae5d0b..80975a457670 100644 > --- a/fs/buffer.c > +++ b/fs/buffer.c > @@ -819,8 +819,7 @@ struct buffer_head *alloc_page_buffers(struct page *page, unsigned long size, > if (retry) > gfp |= __GFP_NOFAIL; > > - /* The page lock pins the memcg */ > - memcg = page_memcg(page); > + memcg = get_mem_cgroup_from_page(page); Looking at these changes I wonder if we need to remove unsafe getters or at least add a BOLD comment on how/when it's safe to use them. > old_memcg = set_active_memcg(memcg); > > head = NULL; > @@ -840,6 +839,7 @@ struct buffer_head *alloc_page_buffers(struct page *page, unsigned long size, > set_bh_page(bh, page, offset); > } > out: > + mem_cgroup_put(memcg); > set_active_memcg(old_memcg); > return head; > /* > diff --git a/fs/fs-writeback.c b/fs/fs-writeback.c > index 1fae0196292a..56612ace8778 100644 > --- a/fs/fs-writeback.c > +++ b/fs/fs-writeback.c > @@ -243,15 +243,13 @@ void __inode_attach_wb(struct inode *inode, struct page *page) > if (inode_cgwb_enabled(inode)) { > struct cgroup_subsys_state *memcg_css; > > - if (page) { > - memcg_css = mem_cgroup_css_from_page(page); > - wb = wb_get_create(bdi, memcg_css, GFP_ATOMIC); > - } else { > - /* must pin memcg_css, see wb_get_create() */ > + /* must pin memcg_css, see wb_get_create() */ > + if (page) > + memcg_css = get_mem_cgroup_css_from_page(page); > + else > memcg_css = task_get_css(current, memory_cgrp_id); > - wb = wb_get_create(bdi, memcg_css, GFP_ATOMIC); > - css_put(memcg_css); > - } > + wb = wb_get_create(bdi, memcg_css, GFP_ATOMIC); > + css_put(memcg_css); > } > > if (!wb) > @@ -868,16 +866,16 @@ void wbc_account_cgroup_owner(struct writeback_control *wbc, struct page *page, > if (!wbc->wb || wbc->no_cgroup_owner) > return; > > - css = mem_cgroup_css_from_page(page); > + css = get_mem_cgroup_css_from_page(page); > /* dead cgroups shouldn't contribute to inode ownership arbitration */ > if (!(css->flags & CSS_ONLINE)) > - return; > + goto out; > > id = css->id; > > if (id == wbc->wb_id) { > wbc->wb_bytes += bytes; > - return; > + goto out; > } > > if (id == wbc->wb_lcand_id) > @@ -890,6 +888,9 @@ void wbc_account_cgroup_owner(struct writeback_control *wbc, struct page *page, > wbc->wb_tcand_bytes += bytes; > else > wbc->wb_tcand_bytes -= min(bytes, wbc->wb_tcand_bytes); > + > +out: > + css_put(css); > } > EXPORT_SYMBOL_GPL(wbc_account_cgroup_owner); > > diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h > index 8c2f1ba2f471..3a0e2592434e 100644 > --- a/include/linux/memcontrol.h > +++ b/include/linux/memcontrol.h > @@ -373,7 +373,7 @@ static inline bool folio_memcg_kmem(struct folio *folio); > * a valid memcg, but can be atomically swapped to the parent memcg. > * > * The caller must ensure that the returned memcg won't be released: > - * e.g. acquire the rcu_read_lock or css_set_lock. > + * e.g. acquire the rcu_read_lock or objcg_lock or cgroup_mutex. > */ > static inline struct mem_cgroup *obj_cgroup_memcg(struct obj_cgroup *objcg) > { > @@ -454,7 +454,37 @@ static inline struct mem_cgroup *page_memcg(struct page *page) > return folio_memcg(page_folio(page)); > } > > -/** > +/* > + * get_mem_cgroup_from_folio - Obtain a reference on the memory cgroup > + * associated with a folio. > + * @folio: Pointer to the folio. > + * > + * Returns a pointer to the memory cgroup (and obtain a reference on it) > + * associated with the folio, or NULL. This function assumes that the > + * folio is known to have a proper memory cgroup pointer. It's not safe > + * to call this function against some type of pages, e.g. slab pages or > + * ex-slab pages. > + */ > +static inline struct mem_cgroup *get_mem_cgroup_from_folio(struct folio *folio) > +{ > + struct mem_cgroup *memcg; > + > + rcu_read_lock(); > +retry: > + memcg = folio_memcg(folio); > + if (unlikely(memcg && !css_tryget(&memcg->css))) > + goto retry; > + rcu_read_unlock(); > + > + return memcg; > +} > + > +static inline struct mem_cgroup *get_mem_cgroup_from_page(struct page *page) > +{ > + return get_mem_cgroup_from_folio(page_folio(page)); > +} > + > +/* > * folio_memcg_rcu - Locklessly get the memory cgroup associated with a folio. > * @folio: Pointer to the folio. > * > @@ -873,7 +903,7 @@ static inline bool mm_match_cgroup(struct mm_struct *mm, > return match; > } > > -struct cgroup_subsys_state *mem_cgroup_css_from_page(struct page *page); > +struct cgroup_subsys_state *get_mem_cgroup_css_from_page(struct page *page); > ino_t page_cgroup_ino(struct page *page); > > static inline bool mem_cgroup_online(struct mem_cgroup *memcg) > @@ -1047,10 +1077,13 @@ static inline void count_memcg_events(struct mem_cgroup *memcg, > static inline void count_memcg_page_event(struct page *page, > enum vm_event_item idx) > { > - struct mem_cgroup *memcg = page_memcg(page); > + struct mem_cgroup *memcg; > > + rcu_read_lock(); > + memcg = page_memcg(page); > if (memcg) > count_memcg_events(memcg, idx, 1); > + rcu_read_unlock(); > } > > static inline void count_memcg_event_mm(struct mm_struct *mm, > @@ -1129,6 +1162,16 @@ static inline struct mem_cgroup *page_memcg(struct page *page) > return NULL; > } > > +static inline struct mem_cgroup *get_mem_cgroup_from_folio(struct folio *folio) > +{ > + return NULL; > +} > + > +static inline struct mem_cgroup *get_mem_cgroup_from_page(struct page *page) > +{ > + return NULL; > +} > + > static inline struct mem_cgroup *folio_memcg_rcu(struct folio *folio) > { > WARN_ON_ONCE(!rcu_read_lock_held()); > diff --git a/include/trace/events/writeback.h b/include/trace/events/writeback.h > index 86b2a82da546..cdb822339f13 100644 > --- a/include/trace/events/writeback.h > +++ b/include/trace/events/writeback.h > @@ -258,6 +258,11 @@ TRACE_EVENT(track_foreign_dirty, > __entry->ino = inode ? inode->i_ino : 0; > __entry->memcg_id = wb->memcg_css->id; > __entry->cgroup_ino = __trace_wb_assign_cgroup(wb); > + /* > + * TP_fast_assign() is under preemption disabled which can > + * serve as an RCU read-side critical section so that the > + * memcg returned by folio_memcg() cannot be freed. > + */ > __entry->page_cgroup_ino = cgroup_ino(folio_memcg(folio)->css.cgroup); > ), > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > index b38a77f6696f..dcaf6cf5dc74 100644 > --- a/mm/memcontrol.c > +++ b/mm/memcontrol.c > @@ -371,7 +371,7 @@ EXPORT_SYMBOL(memcg_kmem_enabled_key); > #endif > > /** > - * mem_cgroup_css_from_page - css of the memcg associated with a page > + * get_mem_cgroup_css_from_page - get css of the memcg associated with a page > * @page: page of interest > * > * If memcg is bound to the default hierarchy, css of the memcg associated > @@ -381,13 +381,15 @@ EXPORT_SYMBOL(memcg_kmem_enabled_key); > * If memcg is bound to a traditional hierarchy, the css of root_mem_cgroup > * is returned. > */ > -struct cgroup_subsys_state *mem_cgroup_css_from_page(struct page *page) > +struct cgroup_subsys_state *get_mem_cgroup_css_from_page(struct page *page) > { > struct mem_cgroup *memcg; > > - memcg = page_memcg(page); > + if (!cgroup_subsys_on_dfl(memory_cgrp_subsys)) > + return &root_mem_cgroup->css; > > - if (!memcg || !cgroup_subsys_on_dfl(memory_cgrp_subsys)) > + memcg = get_mem_cgroup_from_page(page); > + if (!memcg) > memcg = root_mem_cgroup; > > return &memcg->css; > @@ -770,13 +772,13 @@ void __mod_lruvec_state(struct lruvec *lruvec, enum node_stat_item idx, > void __mod_lruvec_page_state(struct page *page, enum node_stat_item idx, > int val) > { > - struct page *head = compound_head(page); /* rmap on tail pages */ > + struct folio *folio = page_folio(page); /* rmap on tail pages */ > struct mem_cgroup *memcg; > pg_data_t *pgdat = page_pgdat(page); > struct lruvec *lruvec; > > rcu_read_lock(); > - memcg = page_memcg(head); > + memcg = folio_memcg(folio); > /* Untracked pages have no memcg, no lruvec. Update only the node */ > if (!memcg) { > rcu_read_unlock(); > @@ -2058,7 +2060,9 @@ void folio_memcg_lock(struct folio *folio) > * The RCU lock is held throughout the transaction. The fast > * path can get away without acquiring the memcg->move_lock > * because page moving starts with an RCU grace period. > - */ > + * > + * The RCU lock also protects the memcg from being freed. > + */ > rcu_read_lock(); > > if (mem_cgroup_disabled()) > @@ -3296,7 +3300,7 @@ void obj_cgroup_uncharge(struct obj_cgroup *objcg, size_t size) > void split_page_memcg(struct page *head, unsigned int nr) > { > struct folio *folio = page_folio(head); > - struct mem_cgroup *memcg = folio_memcg(folio); > + struct mem_cgroup *memcg = get_mem_cgroup_from_folio(folio); > int i; > > if (mem_cgroup_disabled() || !memcg) > @@ -3309,6 +3313,8 @@ void split_page_memcg(struct page *head, unsigned int nr) > obj_cgroup_get_many(__folio_objcg(folio), nr - 1); > else > css_get_many(&memcg->css, nr - 1); > + > + css_put(&memcg->css); > } > > #ifdef CONFIG_MEMCG_SWAP > @@ -4511,7 +4517,7 @@ void mem_cgroup_wb_stats(struct bdi_writeback *wb, unsigned long *pfilepages, > void mem_cgroup_track_foreign_dirty_slowpath(struct folio *folio, > struct bdi_writeback *wb) > { > - struct mem_cgroup *memcg = folio_memcg(folio); > + struct mem_cgroup *memcg = get_mem_cgroup_from_folio(folio); > struct memcg_cgwb_frn *frn; > u64 now = get_jiffies_64(); > u64 oldest_at = now; > @@ -4558,6 +4564,7 @@ void mem_cgroup_track_foreign_dirty_slowpath(struct folio *folio, > frn->memcg_id = wb->memcg_css->id; > frn->at = now; > } > + css_put(&memcg->css); > } > > /* issue foreign writeback flushes for recorded foreign dirtying events */ > @@ -6092,6 +6099,14 @@ static void mem_cgroup_move_charge(void) > atomic_dec(&mc.from->moving_account); > } > > +/* > + * The cgroup migration and memory cgroup offlining are serialized by > + * @cgroup_mutex. If we reach here, it means that the LRU pages cannot > + * be reparented to its parent memory cgroup. So during the whole process > + * of mem_cgroup_move_task(), page_memcg(page) is stable. So we do not > + * need to worry about the memcg (returned from page_memcg()) being > + * released even if we do not hold an rcu read lock. > + */ > static void mem_cgroup_move_task(void) > { > if (mc.to) { > @@ -6895,7 +6910,7 @@ void mem_cgroup_migrate(struct folio *old, struct folio *new) > if (folio_memcg(new)) > return; > > - memcg = folio_memcg(old); > + memcg = get_mem_cgroup_from_folio(old); > VM_WARN_ON_ONCE_FOLIO(!memcg, old); > if (!memcg) > return; > @@ -6914,6 +6929,8 @@ void mem_cgroup_migrate(struct folio *old, struct folio *new) > mem_cgroup_charge_statistics(memcg, nr_pages); > memcg_check_events(memcg, folio_nid(new)); > local_irq_restore(flags); > + > + css_put(&memcg->css); > } > > DEFINE_STATIC_KEY_FALSE(memcg_sockets_enabled_key); > @@ -7100,6 +7117,10 @@ void mem_cgroup_swapout(struct folio *folio, swp_entry_t entry) > if (cgroup_subsys_on_dfl(memory_cgrp_subsys)) > return; > > + /* > + * Interrupts should be disabled by the caller (see the comments below), > + * which can serve as RCU read-side critical sections. > + */ > memcg = folio_memcg(folio); > > VM_WARN_ON_ONCE_FOLIO(!memcg, folio); > @@ -7165,15 +7186,16 @@ int __mem_cgroup_try_charge_swap(struct page *page, swp_entry_t entry) > if (!cgroup_subsys_on_dfl(memory_cgrp_subsys)) > return 0; > > + rcu_read_lock(); > memcg = page_memcg(page); > > VM_WARN_ON_ONCE_PAGE(!memcg, page); > if (!memcg) > - return 0; > + goto out; > > if (!entry.val) { > memcg_memory_event(memcg, MEMCG_SWAP_FAIL); > - return 0; > + goto out; > } > > memcg = mem_cgroup_id_get_online(memcg); > @@ -7183,6 +7205,7 @@ int __mem_cgroup_try_charge_swap(struct page *page, swp_entry_t entry) > memcg_memory_event(memcg, MEMCG_SWAP_MAX); > memcg_memory_event(memcg, MEMCG_SWAP_FAIL); > mem_cgroup_id_put(memcg); > + rcu_read_unlock(); > return -ENOMEM; If you add the "out" label, please use it here too. > } > > @@ -7192,6 +7215,8 @@ int __mem_cgroup_try_charge_swap(struct page *page, swp_entry_t entry) > oldid = swap_cgroup_record(entry, mem_cgroup_id(memcg), nr_pages); > VM_BUG_ON_PAGE(oldid, page); > mod_memcg_state(memcg, MEMCG_SWAP, nr_pages); > +out: > + rcu_read_unlock(); > > return 0; > } > @@ -7246,17 +7271,22 @@ bool mem_cgroup_swap_full(struct page *page) > if (cgroup_memory_noswap || !cgroup_subsys_on_dfl(memory_cgrp_subsys)) > return false; > > + rcu_read_lock(); > memcg = page_memcg(page); > if (!memcg) > - return false; > + goto out; > > for (; memcg != root_mem_cgroup; memcg = parent_mem_cgroup(memcg)) { > unsigned long usage = page_counter_read(&memcg->swap); > > if (usage * 2 >= READ_ONCE(memcg->swap.high) || > - usage * 2 >= READ_ONCE(memcg->swap.max)) > + usage * 2 >= READ_ONCE(memcg->swap.max)) { > + rcu_read_unlock(); > return true; Please, make something like ret = true; goto out; here. It will be more consistent. > + } > } > +out: > + rcu_read_unlock(); > > return false; > } > diff --git a/mm/migrate.c b/mm/migrate.c > index 6c31ee1e1c9b..59e97a8a64a0 100644 > --- a/mm/migrate.c > +++ b/mm/migrate.c > @@ -430,6 +430,10 @@ int folio_migrate_mapping(struct address_space *mapping, > struct lruvec *old_lruvec, *new_lruvec; > struct mem_cgroup *memcg; > > + /* > + * Irq is disabled, which can serve as RCU read-side critical > + * sections. > + */ > memcg = folio_memcg(folio); > old_lruvec = mem_cgroup_lruvec(memcg, oldzone->zone_pgdat); > new_lruvec = mem_cgroup_lruvec(memcg, newzone->zone_pgdat); > diff --git a/mm/page_io.c b/mm/page_io.c > index 89fbf3cae30f..a0d9cd68e87a 100644 > --- a/mm/page_io.c > +++ b/mm/page_io.c > @@ -221,13 +221,14 @@ static void bio_associate_blkg_from_page(struct bio *bio, struct page *page) > struct cgroup_subsys_state *css; > struct mem_cgroup *memcg; > > + rcu_read_lock(); > memcg = page_memcg(page); > if (!memcg) > - return; > + goto out; > > - rcu_read_lock(); > css = cgroup_e_css(memcg->css.cgroup, &io_cgrp_subsys); > bio_associate_blkg_from_css(bio, css); > +out: > rcu_read_unlock(); > } > #else > -- > 2.11.0 >