From patchwork Mon Aug 24 15:35:58 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Dan Schatzberg X-Patchwork-Id: 11733541 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id 5187514F6 for ; Mon, 24 Aug 2020 15:37:44 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 11C2120866 for ; Mon, 24 Aug 2020 15:37:44 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="SRNEANR+" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 11C2120866 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=gmail.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 2D2216B0008; Mon, 24 Aug 2020 11:37:43 -0400 (EDT) Delivered-To: linux-mm-outgoing@kvack.org Received: by kanga.kvack.org (Postfix, from userid 40) id 25EA08D0003; Mon, 24 Aug 2020 11:37:43 -0400 (EDT) X-Original-To: int-list-linux-mm@kvack.org X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 0FD3F6B0031; Mon, 24 Aug 2020 11:37:43 -0400 (EDT) X-Original-To: linux-mm@kvack.org X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0099.hostedemail.com [216.40.44.99]) by kanga.kvack.org (Postfix) with ESMTP id EBF986B0008 for ; Mon, 24 Aug 2020 11:37:42 -0400 (EDT) Received: from smtpin18.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id 9F4FB8248047 for ; Mon, 24 Aug 2020 15:37:42 +0000 (UTC) X-FDA: 77185867164.18.map37_5414a4727054 Received: from filter.hostedemail.com (10.5.16.251.rfc1918.com [10.5.16.251]) by smtpin18.hostedemail.com (Postfix) with ESMTP id 287BE100ED0F5 for ; Mon, 24 Aug 2020 15:37:32 +0000 (UTC) X-Spam-Summary: 1,0,0,36f8d05a8541ccf1,d41d8cd98f00b204,schatzberg.dan@gmail.com,,RULES_HIT:41:355:379:387:541:967:973:982:988:989:1260:1263:1311:1314:1345:1437:1515:1535:1544:1605:1711:1730:1747:1777:1792:1801:2198:2199:2393:2525:2553:2559:2563:2682:2685:2859:2903:2910:2933:2937:2939:2942:2945:2947:2951:2954:3022:3138:3139:3140:3141:3142:3653:3865:3866:3867:3868:3870:3871:3872:3874:3934:3936:3938:3941:3944:3947:3950:3953:3956:3959:4119:4250:4605:5007:6117:6119:6261:6653:6742:6743:7903:8599:8603:9025:9201:9388:9413:10004:10049:11026:11658:11914:12043:12291:12292:12296:12297:12517:12519:12555:12663:12679:12776:12895:13149:13161:13180:13229:13230:13845:13894:14096:14107:14181:14394:14687:14721:14849:21433:21444:21450:21451:21627:21666:21740:21939:30003:30054:30070:30090,0,RBL:209.85.219.68:@gmail.com:.lbl8.mailshell.net-62.50.0.100 66.100.201.100;04yg8s7nci47seahp9mxs7tua7zy1opukcwpiogy5bxnzxm1w7n8ygrxpt5giyt.9i5uu737z5kw1mmiot4zqwptrbc5834raxxowi8zhsjqwjqwcnskaho4ak9awm3.g-lbl 8.mailsh X-HE-Tag: map37_5414a4727054 X-Filterd-Recvd-Size: 8216 Received: from mail-qv1-f68.google.com (mail-qv1-f68.google.com [209.85.219.68]) by imf03.hostedemail.com (Postfix) with ESMTP for ; Mon, 24 Aug 2020 15:37:31 +0000 (UTC) Received: by mail-qv1-f68.google.com with SMTP id t6so3915765qvw.1 for ; Mon, 24 Aug 2020 08:37:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=R+WnIm5e3oaEHejxIohJMS0+jhs86DYl8gpbwJYmAik=; b=SRNEANR+EJUu/Zk2lbQct/0WbyEkqf2pDiydLArXO1FjTP3+dyQbZb5cme0fCcadXc OiFYofGExGKW448nn7uE+JN14cRscm1+HaD8u86lr15zUszZGT9Pcd+acpXYZV/p+vKL E51D0SLFRHLJcLebrCRFqIuWZCjtfYAl6CMo9rhWPV4MnTmMM7r+aca3EyM64nyOwYT6 pDp2BEydP35vDC0pbt3gzjsa9AiW4VqaKmzVoaCLi03yhZe1aL430W3wWlkDKVLHMq8t eIjW/ApOprDE/v2vKEJgj7tOW7L1ZV8eFFsHj6BmSxI13i4G+85BRhLUMHFRq00I05E5 Vbug== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=R+WnIm5e3oaEHejxIohJMS0+jhs86DYl8gpbwJYmAik=; b=L5kL7CsVo3nSAfB8/UQo5nkAGBRwBhK8AdcfvnDdAj3bAtOyByfXo0Q8ZAyLNVlCBx Pz9fS9gr7AGrkOJ4x0jVzg/UWjqx8YjBYJa0q/y1fGnl1vdSxnFVbPWNI1IyYT3EH27W hwEYRJVve/w0Uv+oiMQc6NFd7aReEDTEpoKJw3O99N2wqP3EUIxuJqg9qSVSysHJF0lg CIl/8e8zNkfS70PjQBrZp7tNk+ldWi3mtqZjTJMc0V4PkBeblnjHPaapYMcgfJq3oQM5 p6zonRamnQI4QQEuF2dueHnNwt87liNUMIVdibwza+nOERLfZF0pUpJ0mlH8SP7iVISt LUUQ== X-Gm-Message-State: AOAM5332Jqp+LJVwsR1VqWvMwuPDXD78+BriU1HvmtiQinnBufz3VQLx /oqVhLFyYf/AMk5TCrSdxHg= X-Google-Smtp-Source: ABdhPJyCkEYCo3MtdQiF5GUBFIBN/888a4pv+196Xxoe+h/IaEsTQWgG71kxxVvbnJOBBJJdhoRpKA== X-Received: by 2002:ad4:5812:: with SMTP id dd18mr5401314qvb.23.1598283450715; Mon, 24 Aug 2020 08:37:30 -0700 (PDT) Received: from dschatzberg-fedora-PC0Y6AEN.thefacebook.com ([2620:10d:c091:480::1:dd21]) by smtp.gmail.com with ESMTPSA id m17sm10942758qkn.45.2020.08.24.08.37.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 24 Aug 2020 08:37:29 -0700 (PDT) From: Dan Schatzberg To: Cc: Dan Schatzberg , Jens Axboe , Alexander Viro , Jan Kara , Amir Goldstein , Tejun Heo , Li Zefan , Johannes Weiner , Michal Hocko , Vladimir Davydov , Andrew Morton , Hugh Dickins , Shakeel Butt , Roman Gushchin , Joonsoo Kim , Chris Down , Yafang Shao , Jakub Kicinski , Yang Shi , Peter Zijlstra , Ingo Molnar , Mathieu Desnoyers , Vlastimil Babka , Daniel Jordan , Thomas Gleixner , Michel Lespinasse , linux-block@vger.kernel.org (open list:BLOCK LAYER), linux-kernel@vger.kernel.org (open list), linux-fsdevel@vger.kernel.org (open list:FILESYSTEMS (VFS and infrastructure)), cgroups@vger.kernel.org (open list:CONTROL GROUP (CGROUP)), linux-mm@kvack.org (open list:CONTROL GROUP - MEMORY RESOURCE CONTROLLER (MEMCG)) Subject: [PATCH v7 0/4] Charge loop device i/o to issuing cgroup Date: Mon, 24 Aug 2020 11:35:58 -0400 Message-Id: <20200824153607.6595-1-schatzberg.dan@gmail.com> X-Mailer: git-send-email 2.21.3 MIME-Version: 1.0 X-Rspamd-Queue-Id: 287BE100ED0F5 X-Spamd-Result: default: False [0.00 / 100.00] X-Rspamd-Server: rspam04 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Much of the discussion about this has died down. There's been a concern raised that we could generalize infrastructure across loop, md, etc. This may be possible, in the future, but it isn't clear to me how this would look like. I'm inclined to fix the existing issue with loop devices now (this is a problem we hit at FB) and address consolidation with other cases if and when those need to be addressed. Note that patch 2 in this series (mm: support nesting memalloc_use_memcg()) has also been submitted by Roman Guschchin to the mm tree and can be seen here: http://lkml.iu.edu/hypermail/linux/kernel/2008.2/09214.html - I include it here for completeness, but this series works with either version of the patch. Changes since V7: * Rebased against linus's branch Changes since V6: * Added separate spinlock for worker synchronization * Minor style changes Changes since V5: * Fixed a missing css_put when failing to allocate a worker * Minor style changes Changes since V4: Only patches 1 and 2 have changed. * Fixed irq lock ordering bug * Simplified loop detach * Added support for nesting memalloc_use_memcg Changes since V3: * Fix race on loop device destruction and deferred worker cleanup * Ensure charge on shmem_swapin_page works just like getpage * Minor style changes Changes since V2: * Deferred destruction of workqueue items so in the common case there is no allocation needed Changes since V1: * Split out and reordered patches so cgroup charging changes are separate from kworker -> workqueue change * Add mem_css to struct loop_cmd to simplify logic The loop device runs all i/o to the backing file on a separate kworker thread which results in all i/o being charged to the root cgroup. This allows a loop device to be used to trivially bypass resource limits and other policy. This patch series fixes this gap in accounting. A simple script to demonstrate this behavior on cgroupv2 machine: ''' #!/bin/bash set -e CGROUP=/sys/fs/cgroup/test.slice LOOP_DEV=/dev/loop0 if [[ ! -d $CGROUP ]] then sudo mkdir $CGROUP fi grep oom_kill $CGROUP/memory.events # Set a memory limit, write more than that limit to tmpfs -> OOM kill sudo unshare -m bash -c " echo \$\$ > $CGROUP/cgroup.procs; echo 0 > $CGROUP/memory.swap.max; echo 64M > $CGROUP/memory.max; mount -t tmpfs -o size=512m tmpfs /tmp; dd if=/dev/zero of=/tmp/file bs=1M count=256" || true grep oom_kill $CGROUP/memory.events # Set a memory limit, write more than that limit through loopback # device -> no OOM kill sudo unshare -m bash -c " echo \$\$ > $CGROUP/cgroup.procs; echo 0 > $CGROUP/memory.swap.max; echo 64M > $CGROUP/memory.max; mount -t tmpfs -o size=512m tmpfs /tmp; truncate -s 512m /tmp/backing_file losetup $LOOP_DEV /tmp/backing_file dd if=/dev/zero of=$LOOP_DEV bs=1M count=256; losetup -D $LOOP_DEV" || true grep oom_kill $CGROUP/memory.events ''' Naively charging cgroups could result in priority inversions through the single kworker thread in the case where multiple cgroups are reading/writing to the same loop device. This patch series does some minor modification to the loop driver so that each cgroup can make forward progress independently to avoid this inversion. With this patch series applied, the above script triggers OOM kills when writing through the loop device as expected. Dan Schatzberg (3): loop: Use worker per cgroup instead of kworker mm: Charge active memcg when no mm is set loop: Charge i/o to mem and blk cg Johannes Weiner (1): mm: support nesting memalloc_use_memcg() drivers/block/loop.c | 248 ++++++++++++++++++++++----- drivers/block/loop.h | 15 +- fs/buffer.c | 6 +- fs/notify/fanotify/fanotify.c | 5 +- fs/notify/inotify/inotify_fsnotify.c | 5 +- include/linux/memcontrol.h | 6 + include/linux/sched/mm.h | 28 +-- kernel/cgroup/cgroup.c | 1 + mm/memcontrol.c | 17 +- mm/shmem.c | 4 +- 10 files changed, 253 insertions(+), 82 deletions(-)