[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20210814052519.86679-1-songmuchun@bytedance.com>
Date: Sat, 14 Aug 2021 13:25:07 +0800
From: Muchun Song <songmuchun@...edance.com>
To: guro@...com, hannes@...xchg.org, mhocko@...nel.org,
akpm@...ux-foundation.org, shakeelb@...gle.com,
vdavydov.dev@...il.com
Cc: linux-kernel@...r.kernel.org, linux-mm@...ck.org,
duanxiongchun@...edance.com, fam.zheng@...edance.com,
bsingharora@...il.com, shy828301@...il.com, alexs@...nel.org,
smuchun@...il.com, zhengqi.arch@...edance.com,
Muchun Song <songmuchun@...edance.com>
Subject: [PATCH v1 00/12] Use obj_cgroup APIs to charge the LRU pages
Hi,
This version is basded on the next-20210811 and drops RFC tag from the last
version. Comments and reviews are welcome. Thanks.
Since the following patchsets applied. All the kernel memory are charged
with the new APIs of obj_cgroup.
[v17,00/19] The new cgroup slab memory controller[1]
[v5,0/7] Use obj_cgroup APIs to charge kmem pages[2]
But user memory allocations (LRU pages) pinning memcgs for a long time -
it exists at a larger scale and is causing recurring problems in the real
world: page cache doesn't get reclaimed for a long time, or is used by the
second, third, fourth, ... instance of the same job that was restarted into
a new cgroup every time. Unreclaimable dying cgroups pile up, waste memory,
and make page reclaim very inefficient.
We can convert LRU pages and most other raw memcg pins to the objcg direction
to fix this problem, and then the LRU pages will not pin the memcgs.
This patchset aims to make the LRU pages to drop the reference to memory
cgroup by using the APIs of obj_cgroup. Finally, we can see that the number
of the dying cgroups will not increase if we run the following test script.
```bash
#!/bin/bash
cat /proc/cgroups | grep memory
cd /sys/fs/cgroup/memory
for i in range{1..500}
do
mkdir test
echo $$ > test/cgroup.procs
sleep 60 &
echo $$ > cgroup.procs
echo `cat test/cgroup.procs` > cgroup.procs
rmdir test
done
cat /proc/cgroups | grep memory
```
Thanks.
[1] https://lore.kernel.org/linux-mm/20200623015846.1141975-1-guro@fb.com/
[2] https://lore.kernel.org/linux-mm/20210319163821.20704-1-songmuchun@bytedance.com/
Changlogs in v1:
1. Drop RFC tag.
2. Rebase to linux next-20210811.
Changlogs in RFC v4:
1. Collect Acked-by from Roman.
2. Rebase to linux next-20210525.
3. Rename obj_cgroup_release_uncharge() to obj_cgroup_release_kmem().
4. Change the patch 1 title to "prepare objcg API for non-kmem usage".
5. Convert reparent_ops_head to an array in patch 8.
Thanks for Roman's review and suggestions.
Changlogs in RFC v3:
1. Drop the code cleanup and simplification patches. Gather those patches
into a separate series[1].
2. Rework patch #1 suggested by Johannes.
Changlogs in RFC v2:
1. Collect Acked-by tags by Johannes. Thanks.
2. Rework lruvec_holds_page_lru_lock() suggested by Johannes. Thanks.
3. Fix move_pages_to_lru().
Muchun Song (12):
mm: memcontrol: prepare objcg API for non-kmem usage
mm: memcontrol: introduce compact_folio_lruvec_lock_irqsave
mm: memcontrol: make lruvec lock safe when LRU pages are reparented
mm: vmscan: rework move_pages_to_lru()
mm: thp: introduce folio_split_queue_lock{_irqsave}()
mm: thp: make split queue lock safe when LRU pages are reparented
mm: memcontrol: make all the callers of {folio,page}_memcg() safe
mm: memcontrol: introduce memcg_reparent_ops
mm: memcontrol: use obj_cgroup APIs to charge the LRU pages
mm: memcontrol: rename {un}lock_page_memcg() to {un}lock_page_objcg()
mm: lru: add VM_BUG_ON_FOLIO to lru maintenance function
mm: lru: use lruvec lock to serialize memcg changes
Documentation/admin-guide/cgroup-v1/memory.rst | 2 +-
fs/buffer.c | 11 +-
fs/fs-writeback.c | 23 +-
include/linux/memcontrol.h | 184 ++++----
include/linux/mm.h | 1 +
include/linux/mm_inline.h | 15 +-
mm/compaction.c | 39 +-
mm/filemap.c | 2 +-
mm/huge_memory.c | 162 ++++++--
mm/memcontrol.c | 554 ++++++++++++++++++-------
mm/migrate.c | 4 +
mm/page-writeback.c | 6 +-
mm/page_io.c | 5 +-
mm/rmap.c | 14 +-
mm/swap.c | 49 +--
mm/vmscan.c | 57 ++-
16 files changed, 778 insertions(+), 350 deletions(-)
--
2.11.0
Powered by blists - more mailing lists