From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 91BB2D29FF2 for ; Wed, 14 Jan 2026 11:35:52 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 04FB86B00BD; Wed, 14 Jan 2026 06:35:52 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id 01E016B00BF; Wed, 14 Jan 2026 06:35:51 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id E8DB76B00C0; Wed, 14 Jan 2026 06:35:51 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id D664B6B00BD for ; Wed, 14 Jan 2026 06:35:51 -0500 (EST) Received: from smtpin12.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay08.hostedemail.com (Postfix) with ESMTP id 946561404A3 for ; Wed, 14 Jan 2026 11:35:51 +0000 (UTC) X-FDA: 84330364902.12.C3FC5C4 Received: from out-184.mta0.migadu.com (out-184.mta0.migadu.com [91.218.175.184]) by imf30.hostedemail.com (Postfix) with ESMTP id E4A1A8000A for ; Wed, 14 Jan 2026 11:35:49 +0000 (UTC) Authentication-Results: imf30.hostedemail.com; dkim=pass header.d=linux.dev header.s=key1 header.b="slZ/TAA8"; spf=pass (imf30.hostedemail.com: domain of qi.zheng@linux.dev designates 91.218.175.184 as permitted sender) smtp.mailfrom=qi.zheng@linux.dev; dmarc=pass (policy=none) header.from=linux.dev ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1768390550; a=rsa-sha256; cv=none; b=fodEisPTn2ppFBsayWvWomqi0MqTknnDUseWKHNv5fRHrRbJvw3hjMeoj7xH7gjUr0aEze pTgoP5CT17fvQ9F4nOYohckkffco1ijE8vaW4notXeqLLVV5kKI5KT0jHwATTQfgntUbQd wKETOC6dNEFUw3M7ScTM9+NFpUjlh68= ARC-Authentication-Results: i=1; imf30.hostedemail.com; dkim=pass header.d=linux.dev header.s=key1 header.b="slZ/TAA8"; spf=pass (imf30.hostedemail.com: domain of qi.zheng@linux.dev designates 91.218.175.184 as permitted sender) smtp.mailfrom=qi.zheng@linux.dev; dmarc=pass (policy=none) header.from=linux.dev ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1768390550; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=kw4Qx13Tz3w3N8Y7Uh6WKDafDqfBEeECCeDokmS4kMk=; b=mm2ErS+Ev3rrAYfss3MZhq6nIYLM6xtrAGf97bZQn7ZiALVbs7fBo3qiz+a6tXFjbpRIXZ sSscAZXSAiWrIZZl25gJKdwogvZvd94hYqJ1elckLRk/I0tl6hVP/2/NYVCa7Bw1oWJ3Vg ets5VoD4Fwh/0+kPEKnKktTRMd2OGN8= X-Report-Abuse: Please report any abuse attempt to abuse@migadu.com and include these headers. DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.dev; s=key1; t=1768390548; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=kw4Qx13Tz3w3N8Y7Uh6WKDafDqfBEeECCeDokmS4kMk=; b=slZ/TAA86DEIeNudqQJ5V0R8NYkJXXIB125k2oTP7ccdKCy8bXS04PWSXtw/q3syli8p+F LyNzkPW9HqixQFPkntiq83ZtVMFOVyQQqwiniNN4kepMhU4FsUu5kByKacVh2APOVbv3dv foJ+8zHqPOk2C8Of+uO6G/w5dkwmIAw= From: Qi Zheng To: hannes@cmpxchg.org, hughd@google.com, mhocko@suse.com, roman.gushchin@linux.dev, shakeel.butt@linux.dev, muchun.song@linux.dev, david@kernel.org, lorenzo.stoakes@oracle.com, ziy@nvidia.com, harry.yoo@oracle.com, yosry.ahmed@linux.dev, imran.f.khan@oracle.com, kamalesh.babulal@oracle.com, axelrasmussen@google.com, yuanchu@google.com, weixugc@google.com, chenridong@huaweicloud.com, mkoutny@suse.com, akpm@linux-foundation.org, hamzamahfooz@linux.microsoft.com, apais@linux.microsoft.com, lance.yang@linux.dev Cc: linux-mm@kvack.org, linux-kernel@vger.kernel.org, cgroups@vger.kernel.org, Muchun Song , Qi Zheng Subject: [PATCH v3 24/30] mm: memcontrol: prepare for reparenting LRU pages for lruvec lock Date: Wed, 14 Jan 2026 19:32:51 +0800 Message-ID: <0252f9acc29d4b1e9b8252dc003aff065c8ac1f6.1768389889.git.zhengqi.arch@bytedance.com> In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Migadu-Flow: FLOW_OUT X-Rspamd-Server: rspam03 X-Rspamd-Queue-Id: E4A1A8000A X-Stat-Signature: 68p1csx4698dmy8xy4rym5d9qfzcue88 X-Rspam-User: X-HE-Tag: 1768390549-388355 X-HE-Meta: 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 KQrTCwBg JcfHD6LsIXFnWQYO/q3a6/dskws0/ADIlXJm2j9aQfqYkacHNB3/u8M4aBT9RHIK3DWTwlIOzggkwYLuoRdn/aOGNZecgg05csxpCRH5M+Ib7IPZiN3err4VDOGPlP91z+feRY1ERWoCNyHw/QDFOcdFdlrH8avPi+SBhF4F6tXIbcIs/lDcyQDPhr6i2OgS56TQ8YLAZ07dc5kQDTK2CaO0e4M1yEiGEBQLjGHyTlqqlgvEEY/VRlFbS7misqyHT+LTnhRlhghOiPyzWr9tzcHbKlw== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: From: Muchun Song The following diagram illustrates how to ensure the safety of the folio lruvec lock when LRU folios undergo reparenting. In the folio_lruvec_lock(folio) function: ``` rcu_read_lock(); retry: lruvec = folio_lruvec(folio); /* There is a possibility of folio reparenting at this point. */ spin_lock(&lruvec->lru_lock); if (unlikely(lruvec_memcg(lruvec) != folio_memcg(folio))) { /* * The wrong lruvec lock was acquired, and a retry is required. * This is because the folio resides on the parent memcg lruvec * list. */ spin_unlock(&lruvec->lru_lock); goto retry; } /* Reaching here indicates that folio_memcg() is stable. */ ``` In the memcg_reparent_objcgs(memcg) function: ``` spin_lock(&lruvec->lru_lock); spin_lock(&lruvec_parent->lru_lock); /* Transfer folios from the lruvec list to the parent's. */ spin_unlock(&lruvec_parent->lru_lock); spin_unlock(&lruvec->lru_lock); ``` After acquiring the lruvec lock, it is necessary to verify whether the folio has been reparented. If reparenting has occurred, the new lruvec lock must be reacquired. During the LRU folio reparenting process, the lruvec lock will also be acquired (this will be implemented in a subsequent patch). Therefore, folio_memcg() remains unchanged while the lruvec lock is held. Given that lruvec_memcg(lruvec) is always equal to folio_memcg(folio) after the lruvec lock is acquired, the lruvec_memcg_debug() check is redundant. Hence, it is removed. This patch serves as a preparation for the reparenting of LRU folios. Signed-off-by: Muchun Song Signed-off-by: Qi Zheng Acked-by: Johannes Weiner --- include/linux/memcontrol.h | 45 +++++++++++++++++++---------- include/linux/swap.h | 1 + mm/compaction.c | 29 +++++++++++++++---- mm/memcontrol.c | 59 +++++++++++++++++++++----------------- mm/swap.c | 4 +++ 5 files changed, 91 insertions(+), 47 deletions(-) diff --git a/include/linux/memcontrol.h b/include/linux/memcontrol.h index 4b6f20dc694ba..26c3c0e375f58 100644 --- a/include/linux/memcontrol.h +++ b/include/linux/memcontrol.h @@ -742,7 +742,15 @@ static inline struct lruvec *mem_cgroup_lruvec(struct mem_cgroup *memcg, * folio_lruvec - return lruvec for isolating/putting an LRU folio * @folio: Pointer to the folio. * - * This function relies on folio->mem_cgroup being stable. + * Call with rcu_read_lock() held to ensure the lifetime of the returned lruvec. + * Note that this alone will NOT guarantee the stability of the folio->lruvec + * association; the folio can be reparented to an ancestor if this races with + * cgroup deletion. + * + * Use folio_lruvec_lock() to ensure both lifetime and stability of the binding. + * Once a lruvec is locked, folio_lruvec() can be called on other folios, and + * their binding is stable if the returned lruvec matches the one the caller has + * locked. Useful for lock batching. */ static inline struct lruvec *folio_lruvec(struct folio *folio) { @@ -761,18 +769,15 @@ struct mem_cgroup *get_mem_cgroup_from_current(void); struct mem_cgroup *get_mem_cgroup_from_folio(struct folio *folio); struct lruvec *folio_lruvec_lock(struct folio *folio); + __acquires(&lruvec->lru_lock) + __acquires(rcu) struct lruvec *folio_lruvec_lock_irq(struct folio *folio); + __acquires(&lruvec->lru_lock) + __acquires(rcu) struct lruvec *folio_lruvec_lock_irqsave(struct folio *folio, unsigned long *flags); - -#ifdef CONFIG_DEBUG_VM -void lruvec_memcg_debug(struct lruvec *lruvec, struct folio *folio); -#else -static inline -void lruvec_memcg_debug(struct lruvec *lruvec, struct folio *folio) -{ -} -#endif + __acquires(&lruvec->lru_lock) + __acquires(rcu) static inline struct mem_cgroup *mem_cgroup_from_css(struct cgroup_subsys_state *css){ @@ -1199,11 +1204,6 @@ static inline struct lruvec *folio_lruvec(struct folio *folio) return &pgdat->__lruvec; } -static inline -void lruvec_memcg_debug(struct lruvec *lruvec, struct folio *folio) -{ -} - static inline struct mem_cgroup *parent_mem_cgroup(struct mem_cgroup *memcg) { return NULL; @@ -1262,6 +1262,7 @@ static inline struct lruvec *folio_lruvec_lock(struct folio *folio) { struct pglist_data *pgdat = folio_pgdat(folio); + rcu_read_lock(); spin_lock(&pgdat->__lruvec.lru_lock); return &pgdat->__lruvec; } @@ -1270,6 +1271,7 @@ static inline struct lruvec *folio_lruvec_lock_irq(struct folio *folio) { struct pglist_data *pgdat = folio_pgdat(folio); + rcu_read_lock(); spin_lock_irq(&pgdat->__lruvec.lru_lock); return &pgdat->__lruvec; } @@ -1279,6 +1281,7 @@ static inline struct lruvec *folio_lruvec_lock_irqsave(struct folio *folio, { struct pglist_data *pgdat = folio_pgdat(folio); + rcu_read_lock(); spin_lock_irqsave(&pgdat->__lruvec.lru_lock, *flagsp); return &pgdat->__lruvec; } @@ -1500,24 +1503,36 @@ static inline struct lruvec *parent_lruvec(struct lruvec *lruvec) } static inline void lruvec_lock_irq(struct lruvec *lruvec) + __acquires(&lruvec->lru_lock) + __acquires(rcu) { + rcu_read_lock(); spin_lock_irq(&lruvec->lru_lock); } static inline void lruvec_unlock(struct lruvec *lruvec) + __releases(&lruvec->lru_lock) + __releases(rcu) { spin_unlock(&lruvec->lru_lock); + rcu_read_unlock(); } static inline void lruvec_unlock_irq(struct lruvec *lruvec) + __releases(&lruvec->lru_lock) + __releases(rcu) { spin_unlock_irq(&lruvec->lru_lock); + rcu_read_unlock(); } static inline void lruvec_unlock_irqrestore(struct lruvec *lruvec, unsigned long flags) + __releases(&lruvec->lru_lock) + __releases(rcu) { spin_unlock_irqrestore(&lruvec->lru_lock, flags); + rcu_read_unlock(); } /* Test requires a stable folio->memcg binding, see folio_memcg() */ diff --git a/include/linux/swap.h b/include/linux/swap.h index 62fc7499b4089..e60f45b48e74d 100644 --- a/include/linux/swap.h +++ b/include/linux/swap.h @@ -330,6 +330,7 @@ extern unsigned long totalreserve_pages; void lru_note_cost_unlock_irq(struct lruvec *lruvec, bool file, unsigned int nr_io, unsigned int nr_rotated) __releases(lruvec->lru_lock); + __releases(rcu) void lru_note_cost_refault(struct folio *); void folio_add_lru(struct folio *); void folio_add_lru_vma(struct folio *, struct vm_area_struct *); diff --git a/mm/compaction.c b/mm/compaction.c index c3e338aaa0ffb..3648ce22c8072 100644 --- a/mm/compaction.c +++ b/mm/compaction.c @@ -518,6 +518,24 @@ static bool compact_lock_irqsave(spinlock_t *lock, unsigned long *flags, return true; } +static struct lruvec * +compact_folio_lruvec_lock_irqsave(struct folio *folio, unsigned long *flags, + struct compact_control *cc) +{ + struct lruvec *lruvec; + + rcu_read_lock(); +retry: + lruvec = folio_lruvec(folio); + compact_lock_irqsave(&lruvec->lru_lock, flags, cc); + if (unlikely(lruvec_memcg(lruvec) != folio_memcg(folio))) { + spin_unlock_irqrestore(&lruvec->lru_lock, *flags); + goto retry; + } + + return lruvec; +} + /* * Compaction requires the taking of some coarse locks that are potentially * very heavily contended. The lock should be periodically unlocked to avoid @@ -839,7 +857,7 @@ isolate_migratepages_block(struct compact_control *cc, unsigned long low_pfn, { pg_data_t *pgdat = cc->zone->zone_pgdat; unsigned long nr_scanned = 0, nr_isolated = 0; - struct lruvec *lruvec; + struct lruvec *lruvec = NULL; unsigned long flags = 0; struct lruvec *locked = NULL; struct folio *folio = NULL; @@ -1153,18 +1171,17 @@ isolate_migratepages_block(struct compact_control *cc, unsigned long low_pfn, if (!folio_test_clear_lru(folio)) goto isolate_fail_put; - lruvec = folio_lruvec(folio); + if (locked) + lruvec = folio_lruvec(folio); /* If we already hold the lock, we can skip some rechecking */ - if (lruvec != locked) { + if (lruvec != locked || !locked) { if (locked) lruvec_unlock_irqrestore(locked, flags); - compact_lock_irqsave(&lruvec->lru_lock, &flags, cc); + lruvec = compact_folio_lruvec_lock_irqsave(folio, &flags, cc); locked = lruvec; - lruvec_memcg_debug(lruvec, folio); - /* * Try get exclusive access under lock. If marked for * skip, the scan is aborted unless the current context diff --git a/mm/memcontrol.c b/mm/memcontrol.c index 548e67dbf2386..a1573600d4188 100644 --- a/mm/memcontrol.c +++ b/mm/memcontrol.c @@ -1201,23 +1201,6 @@ void mem_cgroup_scan_tasks(struct mem_cgroup *memcg, } } -#ifdef CONFIG_DEBUG_VM -void lruvec_memcg_debug(struct lruvec *lruvec, struct folio *folio) -{ - struct mem_cgroup *memcg; - - if (mem_cgroup_disabled()) - return; - - memcg = folio_memcg(folio); - - if (!memcg) - VM_BUG_ON_FOLIO(!mem_cgroup_is_root(lruvec_memcg(lruvec)), folio); - else - VM_BUG_ON_FOLIO(lruvec_memcg(lruvec) != memcg, folio); -} -#endif - /** * folio_lruvec_lock - Lock the lruvec for a folio. * @folio: Pointer to the folio. @@ -1227,14 +1210,22 @@ void lruvec_memcg_debug(struct lruvec *lruvec, struct folio *folio) * - folio_test_lru false * - folio frozen (refcount of 0) * - * Return: The lruvec this folio is on with its lock held. + * Return: The lruvec this folio is on with its lock held and rcu read lock held. */ struct lruvec *folio_lruvec_lock(struct folio *folio) + __acquires(&lruvec->lru_lock) + __acquires(rcu) { - struct lruvec *lruvec = folio_lruvec(folio); + struct lruvec *lruvec; + rcu_read_lock(); +retry: + lruvec = folio_lruvec(folio); spin_lock(&lruvec->lru_lock); - lruvec_memcg_debug(lruvec, folio); + if (unlikely(lruvec_memcg(lruvec) != folio_memcg(folio))) { + spin_unlock(&lruvec->lru_lock); + goto retry; + } return lruvec; } @@ -1249,14 +1240,22 @@ struct lruvec *folio_lruvec_lock(struct folio *folio) * - folio frozen (refcount of 0) * * Return: The lruvec this folio is on with its lock held and interrupts - * disabled. + * disabled and rcu read lock held. */ struct lruvec *folio_lruvec_lock_irq(struct folio *folio) + __acquires(&lruvec->lru_lock) + __acquires(rcu) { - struct lruvec *lruvec = folio_lruvec(folio); + struct lruvec *lruvec; + rcu_read_lock(); +retry: + lruvec = folio_lruvec(folio); spin_lock_irq(&lruvec->lru_lock); - lruvec_memcg_debug(lruvec, folio); + if (unlikely(lruvec_memcg(lruvec) != folio_memcg(folio))) { + spin_unlock_irq(&lruvec->lru_lock); + goto retry; + } return lruvec; } @@ -1272,15 +1271,23 @@ struct lruvec *folio_lruvec_lock_irq(struct folio *folio) * - folio frozen (refcount of 0) * * Return: The lruvec this folio is on with its lock held and interrupts - * disabled. + * disabled and rcu read lock held. */ struct lruvec *folio_lruvec_lock_irqsave(struct folio *folio, unsigned long *flags) + __acquires(&lruvec->lru_lock) + __acquires(rcu) { - struct lruvec *lruvec = folio_lruvec(folio); + struct lruvec *lruvec; + rcu_read_lock(); +retry: + lruvec = folio_lruvec(folio); spin_lock_irqsave(&lruvec->lru_lock, *flags); - lruvec_memcg_debug(lruvec, folio); + if (unlikely(lruvec_memcg(lruvec) != folio_memcg(folio))) { + spin_unlock_irqrestore(&lruvec->lru_lock, *flags); + goto retry; + } return lruvec; } diff --git a/mm/swap.c b/mm/swap.c index cb1148a92d8ec..7e53479ca1732 100644 --- a/mm/swap.c +++ b/mm/swap.c @@ -240,6 +240,7 @@ void folio_rotate_reclaimable(struct folio *folio) void lru_note_cost_unlock_irq(struct lruvec *lruvec, bool file, unsigned int nr_io, unsigned int nr_rotated) __releases(lruvec->lru_lock) + __releases(rcu) { unsigned long cost; @@ -253,6 +254,7 @@ void lru_note_cost_unlock_irq(struct lruvec *lruvec, bool file, cost = nr_io * SWAP_CLUSTER_MAX + nr_rotated; if (!cost) { spin_unlock_irq(&lruvec->lru_lock); + rcu_read_unlock(); return; } @@ -284,9 +286,11 @@ void lru_note_cost_unlock_irq(struct lruvec *lruvec, bool file, } spin_unlock_irq(&lruvec->lru_lock); + rcu_read_unlock(); lruvec = parent_lruvec(lruvec); if (!lruvec) break; + rcu_read_lock(); spin_lock_irq(&lruvec->lru_lock); } } -- 2.20.1