Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp3958754rdg; Wed, 18 Oct 2023 10:32:39 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFQgBISbVmhCy/cRN3UNBMn14jdCLkzMxIOGpts0PPRRlUeDtTmrgQgN4c2JqEi8jTBTFvy X-Received: by 2002:a05:6a20:12cc:b0:13d:8876:4c97 with SMTP id v12-20020a056a2012cc00b0013d88764c97mr5765267pzg.16.1697650358950; Wed, 18 Oct 2023 10:32:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697650358; cv=none; d=google.com; s=arc-20160816; b=JZgNuGYQ2QSI/TWKJ/7xPB2nq4Xv3JCYA0DMw4mGRxWTQK78rXQYY5rgbUd+Xk5LzH oeyTH2srJiEVhjZl5mH4kkA12ATKMC5UC4KJSDXTJiK7Nmp67yYaK2VXK7n0yicXQaKN /Ry/rNNgO7sDEiEuSQ5/MpIaFveEQ1Ov489gociYaX4f2jO0PNN3bkS2SLNekfcPtGHM L9YVkz4t9pXjZ7d/YckF9u460Vxifwpqcv9eLKttEtsdDG7wVbRMKf1kBGUMSsTOEp/Y zU/khh/r6g9laz3mFTDVlOq94AMpuro73YVzGaSXbiIlLD6Ug7kGVarsSu4PpQMcFXGE HcZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:dkim-signature:date; bh=+ZHjqgjJ0DJw5b20QDmJoc6vBigpsp2ZBEUURZnoLsI=; fh=kT2PzLSLgRYf93twU60f5urIp1xwbxJxk/w0hoM2Yh8=; b=W/0a/wbTaWBi7ZEvwwBIl6gSycgjyMcLdtJzZQPIw+jaZwbqqkjOIKsmDYRXrPwxHr +ZZ4IkGZTANsNDbkdVNMMEnsdARPSpRN0avlBgf3m75XfYzVG+On4vkG4c6EvdacHuQp mvXdz7Oktv2blwRcJbae7CjyGLMdePdLxxGUqn1gr83gegnpun0UE4BmcbLHoT81Pdbi qHEvo2LuBwYPl2v8emLDDUsXjEtNA4Ul5/e6nPUpjaNBCuBYu70u3a5ukGz+EGeKLUvh d0kEiVIH7gH9KyJZP9uHjw4xFMRNyuXVWKu2szFt4NtXLcKRWvxnB6rur3k9SGUmI2fL CJZw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=GaTsb0RA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Return-Path: Received: from morse.vger.email (morse.vger.email. [2620:137:e000::3:1]) by mx.google.com with ESMTPS id j5-20020a170902c08500b001ca6809f9e7si284831pld.261.2023.10.18.10.32.38 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 18 Oct 2023 10:32:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) client-ip=2620:137:e000::3:1; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.dev header.s=key1 header.b=GaTsb0RA; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:1 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.dev Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id D8BFD809926C; Wed, 18 Oct 2023 10:32:30 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231865AbjJRRbu (ORCPT + 99 others); Wed, 18 Oct 2023 13:31:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38242 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231283AbjJRRbZ (ORCPT ); Wed, 18 Oct 2023 13:31:25 -0400 Received: from out-210.mta0.migadu.com (out-210.mta0.migadu.com [91.218.175.210]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BBE713C01 for ; Wed, 18 Oct 2023 10:22:38 -0700 (PDT) Date: Wed, 18 Oct 2023 10:22:21 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1697649756; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=+ZHjqgjJ0DJw5b20QDmJoc6vBigpsp2ZBEUURZnoLsI=; b=GaTsb0RAXezus1Vlp+8lGAEICHr1ef9aRz8NOtZuHWbQyJ/aZCBv92T34FHPtPUwZXDY/u w9iKSPUBX7e5vW9uGpTT0cLKiU+yCd07Pknzq0bCZdZ/qDG3KDpkKs2qgawTgbKrwuk2gq DOEP/2oNVLZm88rFvJQFv0J9V5YGklU= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. From: Roman Gushchin To: Vlastimil Babka Cc: Andrew Morton , linux-kernel@vger.kernel.org, cgroups@vger.kernel.org, Johannes Weiner , Michal Hocko , shakeelb@google.com, Muchun Song , Dennis Zhou , David Rientjes , Naresh Kamboju Subject: Re: [PATCH v3 2/5] mm: kmem: add direct objcg pointer to task_struct Message-ID: References: <20231016221900.4031141-1-roman.gushchin@linux.dev> <20231016221900.4031141-3-roman.gushchin@linux.dev> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Migadu-Flow: FLOW_OUT X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Wed, 18 Oct 2023 10:32:31 -0700 (PDT) On Wed, Oct 18, 2023 at 11:52:27AM +0200, Vlastimil Babka wrote: > On 10/17/23 00:18, Roman Gushchin wrote: > > To charge a freshly allocated kernel object to a memory cgroup, the > > kernel needs to obtain an objcg pointer. Currently it does it > > indirectly by obtaining the memcg pointer first and then calling to > > __get_obj_cgroup_from_memcg(). > > > > Usually tasks spend their entire life belonging to the same object > > cgroup. So it makes sense to save the objcg pointer on task_struct > > directly, so it can be obtained faster. It requires some work on fork, > > exit and cgroup migrate paths, but these paths are way colder. > > > > To avoid any costly synchronization the following rules are applied: > > 1) A task sets it's objcg pointer itself. > > > > 2) If a task is being migrated to another cgroup, the least > > significant bit of the objcg pointer is set atomically. > > > > 3) On the allocation path the objcg pointer is obtained locklessly > > using the READ_ONCE() macro and the least significant bit is > > checked. If it's set, the following procedure is used to update > > it locklessly: > > - task->objcg is zeroed using cmpxcg > > - new objcg pointer is obtained > > - task->objcg is updated using try_cmpxchg > > - operation is repeated if try_cmpxcg fails > > It guarantees that no updates will be lost if task migration > > is racing against objcg pointer update. It also allows to keep > > both read and write paths fully lockless. > > > > Because the task is keeping a reference to the objcg, it can't go away > > while the task is alive. > > > > This commit doesn't change the way the remote memcg charging works. > > > > Signed-off-by: Roman Gushchin (Cruise) > > Tested-by: Naresh Kamboju > > Acked-by: Johannes Weiner > > --- > > include/linux/sched.h | 4 ++ > > mm/memcontrol.c | 130 +++++++++++++++++++++++++++++++++++++++--- > > 2 files changed, 125 insertions(+), 9 deletions(-) > > > > diff --git a/mm/memcontrol.c b/mm/memcontrol.c > > index 16ac2a5838fb..0605e45bd4a2 100644 > > --- a/mm/memcontrol.c > > +++ b/mm/memcontrol.c > > So IIUC here we increase objcg refcount. > > > + break; > > + objcg = NULL; > > + } > > + rcu_read_unlock(); > > + > > + /* > > + * Try set up a new objcg pointer atomically. If it > > + * fails, it means the update flag was set concurrently, so > > + * the whole procedure should be repeated. > > + */ > > + } while (!try_cmpxchg(¤t->objcg, &old, objcg)); > > And if this fails we throw objcg away and try again, but we should do > obj_cgroup_put(objcg) first, as otherwise it would cause a leak? Great catch! Thanks! > > > + > > + return objcg; > > +} > > + > > __always_inline struct obj_cgroup *get_obj_cgroup_from_current(void) > > { > > struct mem_cgroup *memcg; > > @@ -3008,19 +3054,26 @@ __always_inline struct obj_cgroup *get_obj_cgroup_from_current(void) > > > > if (in_task()) { > > memcg = current->active_memcg; > > + if (unlikely(memcg)) > > + goto from_memcg; > > > > - /* Memcg to charge can't be determined. */ > > - if (likely(!memcg) && (!current->mm || (current->flags & PF_KTHREAD))) > > The checks for current->mm and PF_KTHREAD seem to be gone completely after > the patch, was that intended and why? There is no need for those anymore because it's as cheap or cheaper to check task->objcg for being NULL. Those were primarily used to rule out kernel threads allocations early. I gonna fix the objcg ref leak, add the comment you asked above and post v4 of this particular patch. Thank you for reviewing the series!